Search results for: emotional security
4121 The Effect of Emotional Intelligence on Performance and Motivation of Staff: A Case Study of East Azerbaijan Red Crescent
Authors: Bahram Asghari Aghdam, Ali Mahjoub
Abstract:
The purpose of this study is to evaluate the effect of emotional intelligence on the motivation and performance of East Azarbaijan the Red Crescent staff. In this study, EI is determined as the independent variable component of self awareness, self management, social awareness, and relations management, motivation and performance as dependent variables. The research method is descriptive-survey. In this study, simple random sampling method is used and research sample consists of 130 East Azarbaijan the Red Crescent staff that uses Cochran's formula 100 of them were selected and questionnaires were filled by them. Three types of questionnaires were used in this study for emotional intelligence, consisting of the Bradbury Travis and Jane Greaves standard questionnaire; and for motivation and performance a questionnaire is regulated by the researcher with help of professionals and experts in this field that consists of 33 questions about the motivation and 15 questions about performance and content validity were used to obtain the necessary credit. Reliability by using the Cronbach's alpha coefficient /948 was approved. Also, in this study to test the hypothesis of the Spearman correlation coefficient and linear regressions and determine fitness of variables' of structural equation modeling is used. The results show that emotional intelligence with coefficient /865, motivation and performance of in East Azerbaijan the Red Crescent employees has a positive effect. Based on Friedman Test ranking the most influence in motivation and performance of staff in respondents' opinion is in order of self-awareness, relations management, social awareness and self-management.Keywords: emotional intelligence, self-awareness, self-management, social awareness, relations management, motivation, performance
Procedia PDF Downloads 4854120 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria
Authors: Emmanuela Ngozi Maduka
Abstract:
In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force
Procedia PDF Downloads 1434119 Voice Signal Processing and Coding in MATLAB Generating a Plasma Signal in a Tesla Coil for a Security System
Authors: Juan Jimenez, Erika Yambay, Dayana Pilco, Brayan Parra
Abstract:
This paper presents an investigation of voice signal processing and coding using MATLAB, with the objective of generating a plasma signal on a Tesla coil within a security system. The approach focuses on using advanced voice signal processing techniques to encode and modulate the audio signal, which is then amplified and applied to a Tesla coil. The result is the creation of a striking visual effect of voice-controlled plasma with specific applications in security systems. The article explores the technical aspects of voice signal processing, the generation of the plasma signal, and its relationship to security. The implications and creative potential of this technology are discussed, highlighting its relevance at the forefront of research in signal processing and visual effect generation in the field of security systems.Keywords: voice signal processing, voice signal coding, MATLAB, plasma signal, Tesla coil, security system, visual effects, audiovisual interaction
Procedia PDF Downloads 924118 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks
Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri
Abstract:
With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi
Procedia PDF Downloads 744117 The Language of Art: Examining Emotional Expression in Drawings of Internally Displaced Persons and Town Students Amid Conflict
Authors: Lugyi No
Abstract:
This research delves into how students from two different backgrounds in a conflict-affected area, one group being internally displaced (IDP) and the other residing in permanent homes, express their emotions through art. Two experiments were conducted involving guided drawing to understand their emotional experiences. In the first experiment, where no specific instructions were given, both groups mostly used dark and dull colors, which suggests feelings of sadness and anxiety. Positive emotions were rarely depicted. In the second experiment, students were asked to express their emotions and provide reasons for their drawings. Here, we observed distinct variations: IDP students leaned towards vibrant colors, reflecting resilience, while town students tended to use monochromatic shades, likely due to their experiences with conflict. This abstract highlights the differing emotional expressions of these groups and the influence of instructions on their artwork.Keywords: art therapy, conflict-affected areas, education in conflict zones, children's drawings
Procedia PDF Downloads 584116 Validation of the Trait Emotional Intelligence Questionnaire: Adolescent Short Form (TEIQue-ASF) among Adolescents in Vietnam
Authors: Anh Nguyen, Jane Fisher, Thach Tran, Anh T. T. Tran
Abstract:
Trait Emotional Intelligence is the knowledge, beliefs, and attitudes an individual has about their own and other people’s emotions. It is believed that trait emotional intelligence is a component of personality. Petrides’ Trait Emotional Intelligence Questionnaire (TEIQue) is well regarded and well-established, with validation data about its functioning among adults from many countries. However, there is little data yet about its use among Asian populations, including adolescents. The aims were to translate and culturally verify the Trait Emotional Intelligence Adolescent Short Form (TEIQue-ASF) and investigate content validity, construct validity, and reliability among adolescents attending high schools in Vietnam. Content of the TEIQue-ASF was translated (English to Vietnamese) and back-translated (Vietnamese to English) in consultation with bilingual and bicultural health researchers and pilot tested among 51 potential respondents. Phraseology and wording were then adjusted and the final version is named the VN-TEIQue-ASF. The VN-TEIQue-ASF’s properties were investigated in a cross-sectional elf-report survey among high school students in Central Vietnam. In total 1,546 / 1,573 (98.3%) eligible students from nine high schools in rural, urban, and coastline areas completed the survey. Explanatory Factor Analysis yielded a four-factor solution, including some with facets that loaded differently compared to the original version: Well-being, Emotion in Relationships, Emotion Self-management, and Emotion Sensitivity. The Cronbach’s alpha of the global score for the VN-TEIQue-ASF was .77. The VN-TEIQue-ASF is comprehensible and has good content and construct validity and reliability among adolescents in Vietnam. The factor structure is only partly replicated the original version. The VN-TEIQue-ASF is recommended for use in school or community surveys and professional study in education, psychology, and public health to investigate the trait emotional intelligence of adolescents in Vietnam.Keywords: adolescents, construct validity, content validity, factor analysis, questionnaire validity, trait emotional intelligence, Vietnam
Procedia PDF Downloads 2684115 Chat-Based Online Counseling for Enhancing Wellness of Undergraduates with Emotional Crisis Tendency
Authors: Arunya Tuicomepee
Abstract:
During the past two decades, there have been the increasing numbers of studies on online counseling, especially among adolescents who are familiar with the online world. This can be explained by the fact that via this channel enables easier access to the young, who may not be ready for face-to-face service, possibly due to uneasiness to reveal their personal problems with a stranger, the feeling that their problems are to be shamed, or the need to protect their images. Especially, the group of teenagers prone to suicide or despair, who tend to keep things to or isolate from the society to themselves, usually prefer types of services that require no face-to-face encounter and allow their anonymity, such as online services. This study aimed to examine effectiveness of chat-based online counseling for enhancing wellness of undergraduates with emotional crisis tendency. Experimental with pretest-posttest control group design was employed. Participants were 47 undergraduates (10 males and 37 females) with high emotional crisis tendency. They were randomly assigned to experimental group (24 students) and control group (23 students). Participants in the experimental group received a 60-minute, 4-sessions of individual chat-based online counseling led by counselor. Those in control group received no counseling session. Instruments were the Emotional Crisis Scale and Wellness Scales. Two-way mixed-design multivariate analysis of variance was used for data analysis. Finding revealed that the posttest scores on wellness of those in the experimental group were higher than the scores of those in the control group. The posttest scores on emotional crisis tendency of those in the experimental group were lower than the scores of those in the control group. Hence, this study suggests chat-based online counseling services can become a helping source that increasing more adolescents would recognize and turn to in the future and that will receive more attention.Keywords: chat-based online counseling, emotional crisis, undergraduate student, wellness
Procedia PDF Downloads 2424114 The Effort of Good Governance in Enhancing Foods Security for Sustainable National Development
Authors: Egboja Simon Oga
Abstract:
One of the most important keys to the success of a nation is to ensure steady development and national economic self-sufficiency and independence. It is therefore in this regard that this paper is designed to identify food security to be crucial to all nations’ effort toward sustainable national development. Nigeria as a case study employed various effort by the successive government towards food security. Emphasis were placed on the extent to which government has boosted food security situation on the basis of the identified limitations, conclusion was drawn, recommendation/suggestions proffered, that subsidization of the process of farm inputs like fertilizer, improved seeds and agrochemical, education of farmers on modern methods of farming through extension services, improvisation of village-based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produces are necessary.Keywords: food, governance, development, security
Procedia PDF Downloads 3324113 Parenting a Child with Mental Health Problems: The Role of Self-compassion
Authors: Vered Shenaar-Golan, Nava Wald, Uri Yatzkar
Abstract:
Background: Parenting children with mental health problems poses multiple challenges, including coping with difficult behavior and negative child emotions. The impact on parents includes financial strain, negative social stigma, and negative feelings of guilt or blame, resulting in significant stress and lower levels of well-being. Given findings that self-compassion plays a significant role in reducing stress and improving well-being, the current study examined the role of self-compassion in the experience of parents raising a child with mental health problems. The study tested (1) whether child behavioral/emotional problem severity is associated with higher parental stress and lower parental well-being; (2) whether self-compassion is associated with lower parental stress and higher parental well-being; and (3) whether self-compassion is a stronger predictor of parental stress and well-being than child behavioral/emotional problem severity. Methods: Three hundred and six mothers and two hundred and fifty-six fathers of children attending a hospital child and adolescent psychiatric center were assessed at admission. Consenting parents completed four questionnaires: Child Strength and Difficulty – parent version, Self-compassion, Parent Feeling Inventory, and Well-Being. Results: Child behavioral/emotional problem severity was associated with higher parental stress and lower parental well-being, and self-compassion was a stronger predictor of parental stress and well-being levels than child behavioral/emotional problem severity. For children with internalizing but not externalizing behavioral/emotional problems, parental self-compassion was the only predictor of parental well-being beyond the severity of child behavioral/emotional problems. Conclusions: Cultivating self-compassion is important in reducing parental stress and increasing parental well-being, particularly with internalizing presentations, and should be considered when designing therapeutic interventions for parents.Keywords: parenting children with mental health problems, self-compassion, parental stress, feelings, well-being
Procedia PDF Downloads 794112 Classification of Attacks Over Cloud Environment
Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim
Abstract:
The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.Keywords: cloud computing, classification, risk, security
Procedia PDF Downloads 5484111 Tribal Food Security Assessment and Its Measurement Index: A Study of Tribes and Particularly Vulnerable Tribal Groups in Jharkhand, India
Authors: Ambika Prasad Gupta, Harshit Sosan Lakra
Abstract:
Food security is an important issue that has been widely discussed in literature. However, there is a lack of research on the specific food security challenges faced by tribal communities. Tribal food security refers to the ability of indigenous or tribal communities to consistently access and afford an adequate and nutritious supply of food. These communities often have unique cultural, social, and economic contexts that can impact their food security. The study aims to assess the food security status of all thirty-two major tribes, including Particularly Vulnerable Tribal Groups (PVTG) people living in various blocks of Jharkhand State. The methodology of this study focuses on measuring the food security index of indigenous people by developing and redefining a new Tribal Food Security Index (TFSI) as per the indigenous community-level indicators identified by the Global Food Security Index and other indicators relevant to food security. Affordability, availability, quality and safety, and natural resources were the dimensions used to calculate the overall Tribal Food Security Index. A survey was conducted for primary data collection of tribes and PVTGs at the household level in various districts of Jharkhand with a considerable tribal population. The result shows that due to the transition from rural to urban areas, there is a considerable change in TFSI and a decrease in forest dependency of tribal communities. Socioeconomic factors like occupation and household size had a significant correlation with TFSI. Tribal households living in forests have a higher food security index than tribal households residing in urban transition areas. The study also shows that alternative methodology adopted to measure specific community-level food security creates high significant impact than using commonly used indices.Keywords: indigenous people, tribal food security, particularly vulnerable tribal groups, Jharkhand
Procedia PDF Downloads 814110 Security Model for RFID Systems
Authors: John Ayoade
Abstract:
Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.Keywords: RFID, security, mutual authentication, Kerberos
Procedia PDF Downloads 4694109 Stressors Faced by Border Security Officers: The Singapore Experience
Authors: Jansen Ang, Andrew Neo, Dawn Chia
Abstract:
Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers.Keywords: border security, Singapore, stress, operations
Procedia PDF Downloads 3254108 Differentiated Ways of Supporting Social-Emotional Wellbeing and Mental Health of Children and Youth
Authors: Jolanta Jonak
Abstract:
Emotional wellbeing is crucial for healthy development of children, youth, and adolescence. Lack of healthy emotional development and functioning can lead to many challenges in academic, social, and physical domains. Unfortunately, mental health problems are steadily increasing over the past several years and significantly intensified during and after the Covid 19 pandemic. Some experts warn that globally, we are entering a mental health crisis pandemic. Prior to the Covid 19 pandemic in 2020, a considerable number of youth aged 6-17 experienced a mental health disorder each year, with half of all mental health conditions beginning by age 14. The most common mental health disorders in children are Attention-Deficit/Hyperactivity Disorder (ADHD), behavior problems, anxiety, and depression. In U.S. schools, youth with these diagnoses tend to be classified under the umbrella of Emotional Disability. Several concerning trends have been emerging about the mental health of U.S. high school students. These trends have been steadily increasing for the past decade, particularly having increasing numbers of high school students who experienced persistent feelings of sadness or hopelessness, seriously considered attempting suicide, made a suicide plan, and attempted suicide. The number of students who felt persistently sad or hopeless increased across every racial and ethnic group. Parents, educators, and mental health providers are key stakeholders that are responsible for actively and effectively supporting struggling youth. A commonly faced challenge is that mental wellbeing is not supported as effectively as it should be. When effective prevention is paired with enhanced treatment developed on a multidisciplinary approach, mental health and emotional wellbeing in young people can be positively enhanced. Major health organizations including the Center for Disease Control and the National Institutes of Health encourage health professionals and other stakeholders to focus on addressing emotional wellbeing and mental health of young people.Keywords: social emotional wellbeing, disability, learning, prevention
Procedia PDF Downloads 374107 Programming Systems in Implementation of Process Safety at Chemical Process Industry
Authors: Maryam Shayan
Abstract:
Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology
Procedia PDF Downloads 3724106 Mobile Agent Security Using Reference Monitor Based Security Framework
Authors: Sandhya Armoogum
Abstract:
In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.Keywords: security, mobile agents, reference monitor, trust
Procedia PDF Downloads 4404105 Comprehensive Review of Ultralightweight Security Protocols
Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj
Abstract:
The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP
Procedia PDF Downloads 814104 Modeling Water Inequality and Water Security: The Role of Water Governance
Authors: Pius Babuna, Xiaohua Yang, Roberto Xavier Supe Tulcan, Bian Dehui, Mohammed Takase, Bismarck Yelfogle Guba, Chuanliang Han, Doris Abra Awudi, Meishui Lia
Abstract:
Water inequality, water security, and water governance are fundamental parameters that affect the sustainable use of water resources. Through policy formulation and decision-making, water governance determines both water security and water inequality. Largely, where water inequality exists, water security is undermined through unsustainable water use practices that lead to pollution of water resources, conflicts, hoarding of water, and poor sanitation. Incidentally, the interconnectedness of water governance, water inequality, and water security has not been investigated previously. This study modified the Gini coefficient and used a Logistics Growth of Water Resources (LGWR) Model to access water inequality and water security mathematically, and discussed the connected role of water governance. We tested the validity of both models by calculating the actual water inequality and water security of Ghana. We also discussed the implications of water inequality on water security and the overarching role of water governance. The results show that regional water inequality is widespread in some parts. The Volta region showed the highest water inequality (Gini index of 0.58), while the central region showed the lowest (Gini index of 0.15). Water security is moderately sustainable. The use of water resources is currently stress-free. It was estimated to maintain such status until 2132 ± 18, when Ghana will consume half of the current total water resources of 53.2 billion cubic meters. Effectively, water inequality is a threat to water security, results in poverty, under-development heightens tensions in water use, and causes instability. With proper water governance, water inequality can be eliminated through formulating and implementing approaches that engender equal allocation and sustainable use of water resources.Keywords: water inequality, water security, water governance, Gini coefficient, moran index, water resources management
Procedia PDF Downloads 1344103 An Animation-Based Resource for Screening Emotional and Behavioural Distress in Children Aged 6 to 12
Authors: Zoe Lynch, Kirsty Zieschank
Abstract:
There are several factors that compromise the utility and wide-spread use of existing emotional and behavioural distress screening instruments. Some of these factors include lengthy administration times, high costs, feasibility issues, and a lack of self-report options for children under 12 years of age. This animation-based resource was developed to overcome as many of these factors as possible. Developed for educators and medical and mental health professionals, this resource offers children a self-guided mechanism for reporting any current emotional and behavioural distress. An avatar assistant, selected by the child, accompanies them through each stage of the screening process, offering further instruction if prompted. Children enter their age and gender before viewing comparative animations conveying common childhood emotional and behavioural difficulties. The child then selects the most relatable animations, along with the frequency with which they experience the depicted emotions. From a perspective of intellectual development, an engaging, animated format means that outcomes will not be constrained by children’s reading, writing, cognitive, or verbal expression abilities. Having been user-tested with children aged 6 to 12, this resource shows promising results as a self-guided screening instrument.Keywords: animation-based screening instrument, mental health, primary-aged children, self-guided
Procedia PDF Downloads 1584102 The Social Perception of National Security Risks: A Comparative Perspective
Authors: Nicula Valentin, Andrei Virginia
Abstract:
Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.Keywords: risk perception, Q-sort method, national security hazards, individual beliefs
Procedia PDF Downloads 3094101 Influence of Security Attributes in Component-Based Software Development
Authors: Somayeh Zeinali
Abstract:
A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component
Procedia PDF Downloads 5584100 Study on the OTP Authentication Method and Security for User Mobility in the Cloud
Authors: Jong-Won Lee
Abstract:
Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.Keywords: cloud, OTP, mobility, security, authentication
Procedia PDF Downloads 3484099 Various Perspectives for the Concept of the Emotion Labor
Authors: Jae Soo Do, Kyoung-Seok Kim
Abstract:
Radical changes in the industrial environment, and spectacular developments of IT have changed the current of managements from people-centered to technology- or IT-centered. Interpersonal emotion exchanges have long become insipid and interactive services have also come as mechanical reactions. This study offers various concepts for the emotional labor based on traditional studies on emotional labor. Especially the present day, on which human emotions are subject to being served as machinized thing, is the time when the study on human emotions comes momentous. Precedent researches on emotional labors commonly and basically dealt with the relationship between the active group who performs actions and the passive group who is done with the action. This study focuses on the passive group and tries to offer a new perspective of 'liquid emotion' as a defence mechanism for the passive group from the external environment. Especially, this addresses a concrete discussion on directions of following studies on the liquid labor as a newly suggested perspective.Keywords: emotion labor, surface acting, deep acting, liquid emotion
Procedia PDF Downloads 3464098 Emotional and Personal Characteristics of Children in Relation to the Parental Attitudes
Authors: Svetlana S. Saveysheva, Victoria E. Vasilenko
Abstract:
The purpose of the research was to study the emotional and personal characteristics of preschool children in relation to the characteristics of child-parent interaction and deviant parental attitudes. The study involved 172 mothers and 172 children (85 boys and 87 girls) aged 4,5 to 7 years (mean age 6 years) living in St. Petersburg, Russia. Methods used were, demographic questionnaire, projective drawing method 'House-Tree-Man', Test of anxiety (Temml, Dorki, Amen), technique of studying self-esteem 'Ladder', expert evaluation of sociability and aggressiveness, questionnaire for children-parent emotional interaction (E.I. Zaharova) and questionnaire 'Analysis of family relationships' (E.G. Eidemiller, V.V. Yustitsky). Results. The greatest number of links with personal characteristics have received such parental deviant attitudes as overprotection and characteristics of authoritarian style (prohibitions, sanctions). If the mother has such peculiarities of the parental relationship, the child is characterized by lower self-esteem, increased anxiety, distrust of themselves and hostility. Children have more pronounced manifestations of aggression in a conniving and unstable style of parenting. The sensitivity of the mother is positively associated with children’s self-esteem. Unconditional acceptance of the child, the predominance of a positive emotional background, orientation to the state of the child during interaction promote the development of communication skills and reduce of aggressiveness. But the excessive closeness of the mother with the child can make it difficult to develop the communicative skills. Conclusions. The greatest influence on emotional and personal characteristics is provided by such features of the parental relation as overprotection, characteristics of authoritarian style, underdevelopment of the sphere of parental feelings, sensitivity of mother and behavioral manifestations of emotional interaction. Research is supported by RFBR №18-013-00990.Keywords: characteristics of personality, child-parent interaction, children, deviant parental attitudes
Procedia PDF Downloads 2384097 Improving the Security of Internet of Things Using Encryption Algorithms
Authors: Amirhossein Safi
Abstract:
Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.Keywords: internet of things, security, hybrid algorithm, privacy
Procedia PDF Downloads 4674096 Impact of Expressive Writing on Creativity
Authors: Małgorzata Osowiecka
Abstract:
Negative emotions are rather seen as creativity inhibitor. On the other hand, it is worth noting that negative emotions may be good for our functioning. Negative emotions enhance cognitive resources and improve evaluative processes. Moreover maintaining a negative emotional state allow for cognitive reinterpretation of the emotional stimuli, what is good for our creativity, especially cognitive flexibility. Writing a diary or writing about difficult emotional experiences in general can be the way to not only improve psychical health, but also – enhance creative behaviors. Thanks to translating difficult emotions to the verbal level and giving them ‘a name’ or ‘a label’, we can get easier access to both emotional content of an experience and to the semantic content, without the need of speaking out loud. Expressive writing improves academic results and the efficiency of working memory. The classical method of writing about emotions consists in a long-term process of describing negative experiences. Present research demonstrate the efficiency of this process over a shorter period of time - one writing session, on school children sample. Participants performed writing task. Writing task had two different topics: emotions connected with their negative emotions (expressive writing) and content not connected with negative emotional state (writing about one’s typical day). Creativity was measured by Guilford’s Alternative Uses Task. Results have shown that writing about negative emotions results in the higher level of divergent thinking in all three parameters: fluency, flexibility and originality. After the writing task mood of expressive writing participants remained negative more than the mood of the controls. Taking an expressive action after a difficult emotional experience can support functioning, which can be observed in enhancement of divergent thinking. Writing about emotions connected with negative experience makes one more creative, than writing about something unrelated with difficult emotional moments. Research has shown that young people should not demonize negative emotions. Sometimes, properly applied, negative emotions can be the basis of creation. Preparation was supported by a The Young Scientist University grant titled ‘Dynamics of emotions in the creative process’ from The Polish Ministry of Science and Higher Education.Keywords: creativity, divergent thinking, emotions, expressive writing
Procedia PDF Downloads 1904095 Freedom and Resentment in Plato’s Phaedo
Authors: Chad Van Schoelandt, Chara Kokkiou
Abstract:
This paper discusses Socrates’ fundamental views of morality and freedom in Plato’s Phaedo through examining the fittingness of resentment and related emotional responses. In different parts of the dialogue there seems to be two kinds of emotional justification, which seem to explain different types of appeal that Socrates makes in order to defend his own emotional responses and make recommendations to others. The upshot of this paper is to bring out the connection between different emotional responses and beliefs. In particular, it focuses on the unfittingness of the Strawsonian resentment. If one, taking a rationalistic approach, agrees that some emotions, such as resentment, have a cognitive or belief-like component, then people reacting differently to the same situation suggests differences in their judgments and beliefs. However, at times, including in Socrates’s direction to his friends in the Phaedo, emotions are justified by pragmatic appeal, independent of the beliefs associated with the emotion. In any case, there are both fittingness-based and pragmatic factors that determine and condition the warrant of an emotional response. Overall, an emotion is fitting when the agent’s beliefs indicate that the conditions of appropriatedness are met. Socrates views resentment and sorrow as unfitting due to the mismatch with his own moral beliefs and his teaching to others. At the same time, Socrates argues that his friends’ expression of sorrow at his last moments is unseemly because it is not included in the widely accepted social practices, though the emotion itself is not necessarily unfitting. Socrates’s unexpected emotional response to his death, namely his lack of resentment and sorrow, implies a different belief system and indicates his students’ lack of understanding of the actual implications of his views. Thus, the paper will bring out how complicated Socrates’s ideas were even for people who had a sustained engagement with his ideas. Overall, the paper will illuminate how these two parties (Socrates – friends) view different moral duties, namely the individual duty to philosophy, which signifies a meaningful life, and the civic duty to obey the law, which signals Socrates’ death.Keywords: Emotions, freedom, morality, Plato
Procedia PDF Downloads 814094 Level of Grief, Emotional Impact and Coping Strategies of Internal Medicine Residents in Response to a Patient’s Death
Authors: Florge Francis A. Sy
Abstract:
Physicians develop emotional and psychological distress after facing a patient’s death. This can result in stress or burnout. Coping mechanisms in dealing with these deaths may be maladaptive. Determining grief, emotional impact, and coping strategies in physicians is necessary to identify those needing intervention. This can be done by employing validated assessment tools such as the Texas Revised Inventory of Grief (TRIG) scale, Impact of Events Scale (IES), and BriefCOPE tool, respectively. This prospective, observational study was done in a private hospital in Cebu City. Fifty-five internal medicine residents were included and tasked to answer a survey based on their most memorable patient death encounter. The TRIG, IES, and BriefCOPE scores were determined. Participants were divided into severe grief and non-severe grief based on TRIG scores, low-impact, moderate-impact, and high-impact based on IES, and low-use, moderate-use, and high-use based on the BriefCOPE. The differences in the groups’ characteristics were statistically determined, and a p-value of < 0.05 was significant. The participants’ average age was 28.45 years. Most were female and single. Most belonged to the non-severe group based on TRIG, a moderate-impact group based on the IES, and high-use group based on the BriefCOPE. However, 21.8% reported severe grief, 27.3% reported high-impact, and 10.9% had low use of coping strategies. The proportion of residents who encountered CPR prior to the patient’s death was greater in the severe group. Proportions of both high-impact and non-high impact groups were comparable. The proportion of female residents was higher in the high-use group. There were a number of residents who reported severe grief, high emotional impact, and low coping strategies. This highlights the need for interventions such as debriefing after CPR or formal training in residency programs in dealing with emotional burden to counteract maladaptive coping behaviors and prevent negative outcomes.Keywords: residents, grief, emotional impact, coping, patient death
Procedia PDF Downloads 1114093 A Study of Emotional Intelligence and Adjustment of Senior Secondary School Students in District Karnal, Haryana, India
Authors: Rooma Rani
Abstract:
The education is really important for the improvement of physical and mental well-being of the school students. It is used to express inner potential, acquire knowledge, develop skills, shape habits, attitudes, values, belief, etc. along with providing strengths and resilience to people to changing situations and allowing them to develop all those capacities which will enable individual to control surrounding environment. Education has a significant effect on the behavior of individuals which helps us in the new situations of everyday life. Educating the child is directing the child’s capacities, attitudes interest, urges, and needs into the most desirable channels. We are the part of 21st century and now a day emotional intelligence is considered more important than intelligence in the success of a person. Success depends on several intelligences and on the control of emotions too. Emotional Intelligence, like general intelligence is the product of one’s heredity and its interaction with his environmental forces. There are certain methods evolved in modern researches. Keeping in view the nature and purpose of the study, the descriptive survey method is preferred. This method is one of the important methods in education research because it describes the current position of the phenomenon under study. The term descriptive survey is generally used for the type of research which proposes to condition of practices of the present time. In the present study, a systematically random sampling method was used to select a representative sample. 50 students were selected from 2 schools. Out of 50 students, 25 were boys and 25 were girls. In the study, a) it has been found a significant difference in the level of adjustment between male and female students; b) it has been found a non-significant difference in the level of emotional intelligence between male and female students; c) it has been found a non-significant relationship between adjustment and emotional intelligence among male students; d) it has been found a significant relationship between adjustment and emotional intelligence among male students. The results of the study indicated that amongst the students those who possess high scores on emotional intelligence tests are high in level of adjustment. Measures should be adopted to improve and sustain the emotional intelligence level of students throughout their studies. Adolescent students are prone to many problems like physical, social and psychological. They need a congenial home atmosphere so that they grow into full-fledged citizens of our country. After understanding these, it helps in the development of personality which leads to a better learning situation and better thinking capacities, in turn, enhances adjustment and achievement along with a better perception of self.Keywords: adjustment, education, emotional intelligence, students
Procedia PDF Downloads 1314092 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya
Authors: Sewe Silvanus Odhiambo
Abstract:
Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.Keywords: COVID-19, corporate governance, firm performance, private security firms
Procedia PDF Downloads 160