Search results for: psychological security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4452

Search results for: psychological security

4182 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 304
4181 The Adaptive Properties of the Strategic Assurance System of the National Economy Sustainability to the Economic Security Threats

Authors: Badri Gechbaia

Abstract:

Adaptive management as a fundamental element of the concept of the assurance of economy`s sustainability to the economic security of the system-synergetic type has been considered. It has been proved that the adaptive sustainable development is a transitional phase from the extensive one and later on from the rapid growth to the sustainable development. It has been determined that the adaptive system of the strategic assurance of the sustainability of the economy to the economic security threats is formed on the principles of the domination in its complex of the subsystems with weightier adaptive characteristics that negate the destructive influence of external and internal environmental factors on the sustainability of the national economy.

Keywords: adaptive management, adaptive properties, economic security, strategic assurance

Procedia PDF Downloads 474
4180 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces

Authors: Emmanuel Mugiraneza

Abstract:

Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.

Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping

Procedia PDF Downloads 95
4179 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 352
4178 Assets and Health: Examining the Asset-Building Theoretical Framework and Psychological Distress

Authors: Einav Srulovici, Michal Grinstein-Weiss, George Knafl, Linda Beeber, Shawn Kneipp, Barbara Mark

Abstract:

Background: The asset-building theoretical framework (ABTF) is acknowledged as the most complete framework thus far for depicting the relationships between asset accumulation (the stock of a household’s saved resources available for future investment) and health outcomes. Although the ABTF takes into consideration the reciprocal relationship between asset accumulation and health, no ABTF based study has yet examined this relationship. Therefore, the purpose of this study was to test the ABTF and psychological distress, focusing on the reciprocal relationship between assets accumulation and psychological distress. Methods: The study employed longitudinal data from 6,295 families from the 2001 and 2007 Panel Study of Income Dynamics data sets. Structural equation modeling (SEM) was used to test the reciprocal relationship between asset accumulation and psychological distress. Results: In general, the data displayed a good fit to the model. The longitudinal SEM found that asset accumulation significantly increased with a decreased in psychological distress over time, while psychological distress significantly increased with an increase in asset accumulation over time, confirming the existence of the hypothesized reciprocal relationship. Conclusions: Individuals who are less psychological distressed might have more energy to engage in activities, such as furthering their education or obtaining better jobs that are in turn associated with greater asset accumulation, while those who have greater assets may invest those assets in riskier investments, resulting in increased psychological distress. The confirmation of this reciprocal relationship highlights the importance of conducting longitudinal studies and testing the reciprocal relationship between asset accumulation and other health outcomes.

Keywords: asset-building theoretical framework, psychological distress, structural equation modeling, reciprocal relationship

Procedia PDF Downloads 358
4177 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 99
4176 The Developmental Process of Panic Disorder: Focusing on the Psychological Dynamics of a Family Therapy Case

Authors: Tai-Young Park, Yangjin Park

Abstract:

Introduction: This study analyzed a family therapy case involving a female client in her thirties with panic disorder (PD) in South Korea. We identified five stages of the psychological process in the development of PD and examined external situations, family dynamics, and psychological experiences at each stage. Method: The client, mother, sister, and husband participated in therapy. Researchers analyzed the transcripts, notes, and video recordings of the therapy sessions. A thematic analysis was used to examine the data and display our findings using a network. Results: The developmental process of PD was as follows: (1) formation of anxiety, (2) sheltered life, (3) crisis, (4) loss of safe haven, and (5) inner breakdown. Conclusion: The family dynamics that developed as a result of coping with external situations in each stage contributed to clients’ psychological experiences. These psychological experiences triggered anxiety, which led to the development of PD. Moreover, this study empirically suggests that family dynamics can be associated with a person’s internal experiences that could lead to PD. Our findings highlight the significance of functional family dynamics and coping patterns when facing difficult external situations or crises.

Keywords: developmental process, family therapy, panic disorder, psychological dynamics

Procedia PDF Downloads 67
4175 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 139
4174 Assessment of Pastoralist-Crop Farmers Conflict and Food Security of Farming Households in Kwara State, Nigeria

Authors: S. A. Salau, I. F. Ayanda, I. Afe, M. O. Adesina, N. B. Nofiu

Abstract:

Food insecurity is still a critical challenge among rural and urban households in Nigeria. The country’s food insecurity situation became more pronounced due to frequent conflict between pastoralist and crop farmers. Thus, this study assesses pastoralist-crop farmers’ conflict and food security of farming households in Kwara state, Nigeria. The specific objectives are to measure the food security status of the respondents, quantify pastoralist- crop farmers’ conflict, determine the effect of pastoralist- crop farmers conflict on food security and describe the effective coping strategies adopted by the respondents to reduce the effect of food insecurity. A combination of purposive and simple random sampling techniques will be used to select 250 farming households for the study. The analytical tools include descriptive statistics, Likert-scale, logistic regression, and food security index. Using the food security index approach, the percentage of households that were food secure and insecure will be known. Pastoralist- crop farmers’ conflict will be measured empirically by quantifying loses due to the conflict. The logistic regression will indicate if pastoralist- crop farmers’ conflict is a critical determinant of food security among farming households in the study area. The coping strategies employed by the respondents in cushioning the effects of food insecurity will also be revealed. Empirical studies on the effect of pastoralist- crop farmers’ conflict on food security are rare in the literature. This study will quantify conflict and reveal the direction as well as the extent of the relationship between conflict and food security. It could contribute to the identification and formulation of strategies for the minimization of conflict among pastoralist and crop farmers in an attempt to reduce food insecurity. Moreover, this study could serve as valuable reference material for future researches and open up new areas for further researches.

Keywords: agriculture, conflict, coping strategies, food security, logistic regression

Procedia PDF Downloads 151
4173 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 277
4172 Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States

Authors: Cleopatra Gittens

Abstract:

It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies.

Keywords: benefits, pension, small island developing states, social security reform

Procedia PDF Downloads 66
4171 Comparison of Psychological Well-Being, Hope, and Health Concern in Leukemia Patients before and After Receiving Stem Cells

Authors: Tahereh Yavari, Sara Norozi Far

Abstract:

The aim of this study was to compare psychological well-being, hope, and health concerns in leukemia patients before and after receiving stem cells. The statistical population of the present study was made up of leukemia patients in Tehran, and the research sample was among the patients referred to the Bone Marrow Transplant Center of Shariati Hospital in Tehran, and they were placed in two experimental and control groups (15 people in each group), which were selected by purposive sampling method. In order to collect the data for the research, three psychological well-being questionnaires were used by Riff (2002), Schneider's Hope Scale (SHS), and Schneider's Health Concern Questionnaire (HCQ). In order to analyze the data in this research, according to the "pre-test-post-test design with a control group," covariance analysis was used. Based on the research findings, it was concluded that receiving stem cells increases hope and psychological well-being in leukemia patients and significantly reduces health concerns.

Keywords: psychological well-being, hope, health concerns, blood cancer, stem cells

Procedia PDF Downloads 66
4170 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 368
4169 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 130
4168 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 372
4167 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality

Authors: Mduduzi Nhlozi

Abstract:

Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.

Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude

Procedia PDF Downloads 93
4166 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 117
4165 The Psychological and Behavioral Problems of Children of the First Years and Their Interest in School Education

Authors: Amina Salem Attia

Abstract:

This east project consists in studying The child's mental health is the medium through which he expresses his thoughts, so pay attention to it because it is an essential building block in the process of building the child's future personality, where it gives him a balance between feelings and mental thoughts, and since the family is the child's first guardian, it greatly affects his personality and psychological development. As the disturbed environment contributes to behavioral deviations and mental disorders, unlike the stable environment, which plays a major role in developing the child's abilities and forming his psychologically sound attitudes, this should not be forgotten about the role of the school, it is also the second social institution after the family and has a major impact on the child's mental health as it contributes It is important in forming the child's personality and developing his skills and achieving his healthy psychological development, by providing him with psychological care and helping him to solve his problems by using models that are valid for the behavior that is taught to him or that the teachers present in their daily behavior with him.

Keywords: psychological, behavioral problems, children, school education

Procedia PDF Downloads 104
4164 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review

Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park

Abstract:

Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.

Keywords: delta regions, coastal, food security, indicators, systematic review

Procedia PDF Downloads 215
4163 Psychological Testing in Industrial/Organizational Psychology: Validity and Reliability of Psychological Assessments in the Workplace

Authors: Melissa C. Monney

Abstract:

Psychological testing has been of interest to researchers for many years as useful tools in assessing and diagnosing various disorders as well as to assist in understanding human behavior. However, for over 20 years now, researchers and laypersons alike have been interested in using them for other purposes, such as determining factors in employee selection, promotion, and even termination. In recent years, psychological assessments have been useful in facilitating workplace decision processing, regarding employee circulation within organizations. This literature review explores four of the most commonly used psychological tests in workplace environments, namely cognitive ability, emotional intelligence, integrity, and personality tests, as organizations have used these tests to assess different factors of human behavior as predictive measures of future employee behaviors. The findings suggest that while there is much controversy and debate regarding the validity and reliability of these tests in workplace settings as they were not originally designed for these purposes, the use of such assessments in the workplace has been useful in decreasing costs and employee turnover as well as increase job satisfaction by ensuring the right employees are selected for their roles.

Keywords: cognitive ability, personality testing, predictive validity, workplace behavior

Procedia PDF Downloads 218
4162 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 640
4161 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 449
4160 Grit and Psychological Well-Being Among Elite Wushu Players

Authors: Guneet Inder Jit Kaur, Kuldeep Singh, Sunil G. Purohit

Abstract:

Being a collective phrase for Martial arts that originated from China, Wushu is a form of self-defense and an international (Olympic) sport. Having emerged as a competitive sport, the competitions are generally in two disciplines in Wushu, namely ‘taolu,’ which refers to the forms, and ‘sanda’, which refers to the sparring. Indeed, the competition at the elite level is challenging more mentally than physically. Being masters of their games, excellence at that level is immensely defined by the mental strength characterized by perseverance and passion (grit) along with the psychological wellbeing. Thus, research attempting to understand this relationship is important. The present study was aimed to investigate the relationship between grit and psychological wellbeing among elite Wushu players. The sample of the present study comprised of 35 elite wushu players from India. Out of the 35 players, 16 were females (45.7%), and 19 were males (54.3%), and all had represented at the National and International level. 14 players were from the event of Taolu, and 21 players were from the event of Sanda. The questionnaires used were the short grit scale (Duckworth & Quinn, 2009) and the flourishing scale for psychological wellbeing (Diener et. al., 2009). The statistics included Descriptive (Mean, Standard deviation) and Inferential analysis (correlation). The results highlighted the relationship between the two variables. The insights gained from this study indeed seem immensely helpful in adding to the research of the psychological profile of Elite wushu players and has implications for psychological interventions and mental training for the players.

Keywords: wushu, elite athletes, grit, psychological wellbeing, excellence

Procedia PDF Downloads 89
4159 Non-Executive Employees’ Psychological Capital and Goal Attainment Development Through Positive Psychology Micro-Coaching Intervention

Authors: Iman Abrishamchi

Abstract:

The aim of this study is to investigate the effect of Positive psychology micro coaching (PPMC) on nonexecutive employees' psychological capital and the relation between goal-related self-efficacy and goal attainment. This study was in the form of a control trial design for 150 people in the factory over a period of 5 weeks; the intervention method was a strength-based approach. Participants were divided into two experimental groups (EX) and the waiting list group (WL). The measurement methods were a mix of quantitative and qualitative and included the psychological capital measurement questionnaire, a 2X2 ANOVA to analyze the within-subject factors and between-subject factors, t-tests for evaluating the time effect, and data analysis by the SPSS 25.0 statistical program. The results of the study showed that PPMC could increase psychological capital in employees, and goal-related self-efficacy can predict goal attainment, so this contributes to successful organizational outcomes.

Keywords: psychological capital, goal attainment, positive psychology, micro-coaching intervention, goal related self-efficacy

Procedia PDF Downloads 51
4158 Moderating Role of Positive External Factors in Relationship of Abusive Supervision and Knowledge Sharing

Authors: I.Hussain, A. Gulzar

Abstract:

Knowledge sharing is very important in organizations for their future progress and survival. This study investigates the impact of destructive leadership (abusive supervision) on knowledge sharing in employees. Further, the authors want to investigate a context variable (group cohesion) and explore its cross level influence on the relationship of abusive supervision and knowledge sharing. Conservation of resource theory (COR) claims loss of psychological capital (an internal positive resource) in employees due to abusive supervision and hence decrease occurs in knowledge sharing. This study tests psychological capital as mediator and group cohesion as moderator in relationship of abusive supervision and knowledge sharing. Data was collected from 239 respondents from more than 40 different organizations and 50 different groups from all over Pakistan. Results show that abusive supervision has negative effect on knowledge sharing through reduction in psychological capital of employees, and increased group cohesion in employees reduces this negative effect improving psychological capital in employees.

Keywords: abusive supervision, knowledge sharing, psychological capital, group cohesion, conservation of resources

Procedia PDF Downloads 185
4157 Meta-Analysis of the Impact of Positive Psychological Capital on Employees Outcomes: The Moderating Role of Tenure

Authors: Hyeondal Jeong, Yoonjung Baek

Abstract:

This research examines the effects of positive psychological capital (or PsyCap) on employee’s outcomes (satisfaction, commitment, organizational citizenship behavior, innovation behavior and individual creativity). This study conducted a meta-analysis of articles published in the Republic of Korea. As a result, positive psychological capital has a positive effect on the behavior of employees. Heterogeneity was identified among the studies included in the analysis and the context factors were analyzed; the study proposes contextual factors such as team tenure. The moderating effect of team tenure was not statistically significant. The implications were discussed based on the analysis results.

Keywords: positive psychological capital , satisfaction, commitment, OCB, creativity, meta-analysis

Procedia PDF Downloads 293
4156 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 117
4155 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 505
4154 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 109
4153 Techno-Psych Serv: Technology-Based Psychological Services Extended to Adults Experiencing Symptoms of Mild Anxiety and Depression

Authors: Marissa C. Esperal

Abstract:

This university-based research project attempted to determine the relevance and effectiveness of the technology-based psychological services extended to selected adults experiencing symptoms of mild anxiety and depression. Ninety-seven participants who voluntarily availed the free online psychological services advertised through a Facebook page (Techno-Psych Serv) signed up for the Informed Consent and Psychological Services Contract Agreement form. These clients availed a maximum of 5 online sessions devoted to online assessment, online counseling and brief therapy sessions using the Google Meet App. Participants who, upon evaluation, were found to still be needing extended psychological and other services were referred to other mental health services institutions. Post-evaluations were conducted using Google Forms upon termination. Findings showed that with a mean of 4.87 (n=97), it was noted that the services provided through the online platform were effective. However, it was noted that the majority of those who availed the services were professionals and skilled workers, thus defeating the objective of extending free psychological services to the marginalized group. It was concluded that offering free technology-based psychological services, though proven effective, is found to be less relevant if the intention is to reach out to the less fortunate and marginalized group. It was further concluded that there is still a need for psychoeducation and mental health promotion among the marginalized sectors. It was recommended that if mental health services are extended to the community of marginalized group, providing physical services are still a better option.

Keywords: technology-based psychological services, adults, mild anxiety, depression

Procedia PDF Downloads 38