Search results for: emotional security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4422

Search results for: emotional security

3912 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 153
3911 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 97
3910 The Promoting of Early Childhood Development in Local Government Child Center

Authors: Vorapoj Promasatayaprot, Sumattana Glangkarn

Abstract:

Background: Early childhood, the first five years of life, is a time of rapid cognitive, linguistic, social, emotional and motor development. This study was descriptive research which the main purpose of this research was to study early childhood development in Child Center of Local Government in order to emphasize the public citizen and communities participate in the Child Development Center. Method: The study designed was Action Research and divided into four steps consisted of (1) Planning (2) Acting (3) Observing and (4) Reflecting. This study was employed the areas and the subjects consisted of 10 committees of the Child Center in Thakhonyang municipality, Kantharawichai District, Maha Sarakham Province, Thailand and 50 representative parents by using the purposive sampling technique. The instrument used in this study were questionnaires. The data were analyzed using descriptive statistic; percentage, mean, standard deviation, maximum value, minimum, median. Qualitative data was collected using the observation and interview and was analysed by content analysis. Results: The results of this research were as follows: The promoting of early childhood development in child center at Thakhonyang Municipality, Kantharawichai District, Maha Sarakham Province, Thailand were 6 procedures ; (1) workshop participation (2) workshop in action plan (3) performing in action plan (4) following supervision (5) self – assessment (6) knowledge sharing seminar. The service model of the Local Fund Health Security in Thailand was passed the qualifications of local fund health security by 6 procedures to be the high potential local fund health security. Conclusion: The key success is that the commission will have to respond the performance at all process of plan to address the issue in the future. Factor of success is to community participate with transparent procedure. Coordination committee should manipulate the child center benefits among stake holders.

Keywords: child center, develop, early childhood development, local government, promote

Procedia PDF Downloads 192
3909 Present-Day Transformations and Trends in Rooftop Agriculture and Food Security

Authors: Kiara Lawrence, Nadine Ponnusamy, Clive Greenstone

Abstract:

One of the major challenges facing society today is food security. The risks to food security have increased significantly due to the evolving urban landscape, globalization, and a rising population. The cultivation of food is essential, particularly during times of crisis, such as a recession, and has long been a necessity for urban populations. In contemporary society, many urban residents are confronted with new challenges, including high levels of unemployment, which compel individuals to adopt alternative survival strategies, such as growing their own food. Recently, rooftop agriculture has made significant contributions to urban and national food security and has been utilized as a tool to mitigate the frequent and damaging disasters that many cities encounter. They have the potential to transform unused spaces into green, productive vegetable plots, while also providing urban residents with the opportunity to enjoy the benefits of gardening. Therefore, this study looks to investigate the evolving themes around rooftop agriculture and food security globally. A bibliometric review analysis was carried out on Scopus and Web of Science using the keywords “rooftop agriculture” OR “rooftop farming” OR “rooftop garden” AND “food security” between 2004 and 2024 to ensure a broader scope was covered around the chosen study. Vosviewer software was then utilized to analyze the extracted data to create network visualization maps based on keyword occurrences, co-author analysis, country analysis. There were only 37 relevant documents within the study parameters. Preliminary results indicate that much research focused on urban agriculture, food supply, green roof, sustainability and climate change. By analysing these aspects of rooftop agriculture and food security, the trends can identify gaps in literature and dictate future applications to assist in food security.

Keywords: food security, rooftop agriculture, rooftop farming, rooftop garden

Procedia PDF Downloads 16
3908 A Comparative Study of Resilience in Third Culture Kids and Non Third Culture Kids

Authors: Shahanaz Aboobacker Ahmed, P. Ajilal

Abstract:

We live in the ‘age of migration’ where global migration and repatriation is the stark reality of human lives in the contemporary world. With increasing number of people migrating and repatriating for education, work, or crisis situations, there is an ever-growing need for active research into the effects of repatriation and migration on the psychological well-being of the migrants and expatriates. Moving across borders has resulted in individual developing a third culture and hence such individual are known as Third Culture Kids (TCKs). The aim of the study was to understand the difference in the resilience between Third Culture Kids and Non- Third Culture Kids and gain an insight into how resilience is shaped by migratory experience. The sample comprised of 200 participants that included 100 TCKs and 100 Non-TCKs. The participants were in the age range group of 17-26 years and were pursuing their college education in various parts of the world. The variable of Resilience was measured using the Resilience scale developed and standardized on TCK population which included subtests; Emotional Regulation, Impulse Control, Causal Analysis, Self Efficacy, Realistic Optimism, Empathy and Reaching Out. The data was obtained from in-person sessions and over Skype. The data was analyzed using independent sample t-tests. Results indicated that there is a significant difference between TCKs and Non-TCKs on Impulse Control, Causal Analysis, Realistic Optimism, Empathy and Reaching Out. However, no significant difference was found on the sub-variables of Self Efficacy and Emotional Regulation.

Keywords: third culture kids, resilience, immigration, cross-cultural psychology, repatriation, emotional maturity, emotional regulation, impulse control, causal analysis, self-efficacy, realistic optimism, empathy, reaching out

Procedia PDF Downloads 171
3907 The Emotions in Consumers’ Decision Making: Review of Empirical Studies

Authors: Mikel Alonso López

Abstract:

This paper explores, in depth, the idea that emotions are present in all consumer decision making processes, meaning that purchase decisions have never been purely cognitive or as they traditionally have been defined, rational. Human beings, in all kinds of decisions, has "always" used neural systems related to emotions along with neural systems related to cognition, regardless of the type of purchase or the product or service in question. Therefore, all purchase decisions are, at the same time, cognitive and emotional. This paper presents an analysis of the main contributions of researchers in this regard.

Keywords: emotions, decision making, consumer behaviour, emotional behaviour

Procedia PDF Downloads 392
3906 Motherhood and Its Essence among Zimbabwean Migrant Women in Australia

Authors: Pranee Liamputtong

Abstract:

Childlessness in non-Western societies has wide-ranging social implications and profoundly affects the gender identity and well-being of women. The aspirations of women in these societies are shaped by various sociocultural expectations, encompassing social norms and their own social standing. Currently, there is limited knowledge regarding the perceptions and experiences of Zimbabwean migrant women living in Australia regarding childlessness and motherhood. This paper explores the cultural perspective on children in Zimbabwean society and investigates the personal and social consequences of infertility, as well as the cultural expectations of motherhood among Zimbabwean migrant women residing in Australia. The perceptions and experiences of this migrant community are of utmost importance in order to prevent misunderstandings about the core essence of motherhood among Zimbabwean women. Ultimately, this will lead to the provision of sensitive and culturally appropriate healthcare and social support for migrants in Australia's multicultural society. The study adopts a constructivist paradigm and employs qualitative methods, including in-depth interviews, drawings, and photo elicitation, involving 15 Zimbabwean women. Thematic analysis was employed to analyze the data. In Zimbabwean culture, the ability to bear a child holds significant meaning for women. Children not only ensure the continuity of society but also provide social security, as parents rely on their children for care in old age. Childlessness jeopardizes a woman's social status and carries social repercussions that have a profound impact on their gender identity and well-being. Cultural expectations of motherhood place the sole responsibility for the emotional and physical care of children on the mother. Despite residing in Australia, the procreative value has not diminished for Zimbabwean women. Raising awareness of the procreative needs of Zimbabwean women in a culturally sensitive manner would enhance the emotional well-being of these women.

Keywords: motherhood, culture, migrant women, Zimbabwe, Australia

Procedia PDF Downloads 87
3905 Self-Care and Risk Behaviors in Primary Caregiver of Cancer Patients

Authors: Ivonne N. Pérez-Sánchez. María L. Rascón- Gasca, Angélica Riveros-Rosas, Rebeca Robles García

Abstract:

Introduction: Primary caregivers of cancer patients have health problems related to their lack of time, stress, and fiscal strain. Their health problems could affect their patients’ health and also increase the expenses in public health. Aim: To describe self-care and risk behaviors in a sample of Mexican primary caregiver and the relation of these behaviors with emotional distress (caregiver burden, anxiety and depression symptoms), coping and sociodemographic variables. Method: Participated in this study 173 caregivers of a third level reference medical facility (age: M=49.4, SD=13.5) females 78%, males 22%, 57.5% were caregivers of patients with terminal cancer (CPTC), and 40.5% were caregivers of patients on oncology treatment (CPOT). Results: The 75.7% of caregivers reported to have had health problem in last six months as well as several symptoms which were related to emotional distress, these symptoms were more frequently between CPTC and female caregivers. A half (47.3%) of sample reported have had difficulties in caring their health; these difficulties were related to emotional distress and lower coping, more affected caregivers were who attend male patients and CPTC. The 76.8% of caregivers had health problems in last six months, but 26.5% of them waited to search medical care until they were very sick, and 11% didn't do it. Also, more than a half of sample (56.1%) admitted to have risk behaviors as drink alcohol, smoke or overeating for feeling well, these caregivers showed high emotional distress and lower coping. About caregivers healthy behaviors, 80% of them had a hobby; 27.2% do exercise usually and between 12% to 60% did medical checkups (glucose tests, blood pressure and cholesterol tests, eye exams and watched their weight), these caregivers had lower emotional distress and high coping, some variables related health behaviors were: care only one patient or a female patient and be a CPOT, social support, high educational level and experience as a caregiver in past. The half of caregivers were worrying to develop cancer in the future; this idea was 2.5 times more frequent in caregiver with problems to care their health. Conclusions: The results showed a big proportion of caregivers with medical problems. High emotional distress and low coping were related to physical symptoms, risk behaviors, and low self-care; poor self-care was frequently even in caregiver who have chronic illness.

Keywords: cancer, primary caregiver, risk behaviors, self-care

Procedia PDF Downloads 404
3904 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 569
3903 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 476
3902 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 76
3901 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 392
3900 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 334
3899 Emotional Intelligence as a Predictor of Job Satisfaction in the Nigerian Construction Industry

Authors: Adedayo Johnson Ogungbile, Ayodeji Emmanuel Oke, Oluwaseyi Alabi Awodele

Abstract:

This study examines the role of emotional intelligence (EI) as a predictor of job satisfaction within the Nigerian construction industry. Utilizing a methodology that combines mean comparison and correlation analysis, the research explores how EI influences job satisfaction across diverse demographic and professional categories. The construction industry, known for its dynamic and often challenging work environment, provides a unique context to investigate how EI contributes to employee satisfaction. The findings reveal a significant positive correlation between EI and job satisfaction across the industry. Gender-based analysis shows that male employees typically report higher EI and job satisfaction levels compared to their female counterparts, although the impact of EI on job satisfaction is more substantial among women. The study further explores the relationship between trait EI and specific job satisfaction categories, identifying a general positive association with overall job satisfaction but not with supervisor-related satisfaction. Employees are categorized into four EI classes, consistently showing that higher EI levels correspond to greater job satisfaction. These findings align with existing literature, underscoring EI's pivotal role in enhancing job satisfaction in the construction sector. The study concludes that fostering EI among construction industry professionals can lead to improved job satisfaction and performance. Consequently, organizations are encouraged to integrate EI development into their professional growth programs to cultivate a more satisfied and effective workforce. In essence, this research highlights the importance of EI as a key predictor of job satisfaction in the Nigerian construction industry, providing valuable insights for both industry stakeholders and researchers into the benefits of prioritizing emotional intelligence in this high-stakes environment.

Keywords: emotional intelligence, job satisfaction, construction industry, workforce productivity, demographics

Procedia PDF Downloads 21
3898 Effects of Music Training on Social-Emotional Development and Basic Musical Skills: Findings from a Longitudinal Study with German and Migrant Children

Authors: Stefana Francisca Lupu, Jasmin Chantah, Mara Krone, Ingo Roden, Stephan Bongard, Gunter Kreutz

Abstract:

Long-term music interventions could enhance both musical and nonmusical skills. The present study was designed to explore cognitive, socio-emotional, and musical development in a longitudinal setting. Third-graders (N = 184: 87 male, 97 female; mean age = 8.61 years; 115 native German and 69 migrant children) were randomly assigned to two intervention groups (music and maths) and a control group over a period of one school-year. At baseline, children in these groups were similar in basic cognitive skills, with a trend of advantage in the control group. Dependent measures included the culture fair intelligence test CFT 20-R; the questionnaire of emotional and social school experience for grade 3 and 4 (FEESS 3-4), the test of resources in childhood and adolescence (FRKJ 8-16), the test of language proficiency for German native and non-native primary school children (SFD 3), the reading comprehension test (ELFE 1-6), the German math test (DEMAT 3+) and the intermediate measures of music audiation (IMMA). Data were collected two times at the beginning (T1) and at the end of the school year (T2). A third measurement (T3) followed after a six months retention period. Data from baseline and post-intervention measurements are currently being analyzed. Preliminary results of all three measurements will be presented at the conference.

Keywords: musical training, primary-school German and migrant children, socio-emotional skills, transfer

Procedia PDF Downloads 245
3897 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 371
3896 A Weighted Group EI Incorporating Role Information for More Representative Group EI Measurement

Authors: Siyu Wang, Anthony Ward

Abstract:

Emotional intelligence (EI) is a well-established personal characteristic. It has been viewed as a critical factor which can influence an individual's academic achievement, ability to work and potential to succeed. When working in a group, EI is fundamentally connected to the group members' interaction and ability to work as a team. The ability of a group member to intelligently perceive and understand own emotions (Intrapersonal EI), to intelligently perceive and understand other members' emotions (Interpersonal EI), and to intelligently perceive and understand emotions between different groups (Cross-boundary EI) can be considered as Group emotional intelligence (Group EI). In this research, a more representative Group EI measurement approach, which incorporates the information of the composition of a group and an individual’s role in that group, is proposed. To demonstrate the claim of being more representative Group EI measurement approach, this study adopts a multi-method research design, involving a combination of both qualitative and quantitative techniques to establish a metric of Group EI. From the results, it can be concluded that by introducing the weight coefficient of each group member on group work into the measurement of Group EI, Group EI will be more representative and more capable of understanding what happens during teamwork than previous approaches.

Keywords: case study, emotional intelligence, group EI, multi-method research

Procedia PDF Downloads 124
3895 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 346
3894 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 337
3893 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective

Authors: Obinna Emmanuel Nkomadu

Abstract:

A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.

Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea

Procedia PDF Downloads 150
3892 Multivariate Analysis of the Relationship between Professional Burnout, Emotional Intelligence and Health Level in Teachers University of Guayaquil

Authors: Viloria Marin Hermes, Paredes Santiago Maritza, Viloria Paredes Jonathan

Abstract:

The aim of this study is to assess the prevalence of Burnout syndrome in a sample of 600 professors at the University of Guayaquil (Ecuador) using the Maslach Burnout Inventory (M.B.I.). In addition, assessment was made of the effects on health from professional burnout using the General Health Questionnaire (G.H.Q.-28), and the influence of Emotional Intelligence on prevention of its symptoms using the Spanish version of the Trait Meta-Mood Scale (T.M.M.S.-24). After confirmation of the underlying factor structure, the three measurement tools showed high levels of internal consistency, and specific cut-off points were proposed for the group of Latin American academics in the M.B.I. Statistical analysis showed the syndrome is present extensively, particularly on medium levels, with notably low scores given for Professional Self-Esteem. The application of Canonical Correspondence Analysis revealed that low levels of self-esteem are related to depression, with a lack of personal resources related to anxiety and insomnia, whereas the ability to perceive and control emotions and feelings improves perceptions of professional effectiveness and performance.

Keywords: burnout, academics, emotional intelligence, general health, canonical correspondence analysis

Procedia PDF Downloads 370
3891 Assessing Environmental Psychology and Health Awareness in Delhi: A Fundamental Query for Sustainable Urban Living

Authors: Swati Rajput

Abstract:

Environmental psychology explains that the person is a social agent that seeks to extract meaning from their built and natural environment to behave in a particular manner. It also shows the attachment or detachment of people to their environment. Assessing environmental psychology of people is imperative for planners and policy makers for urban planning. The paper investigates the environmental psychology of people living in nine districts of Delhi by calculating and assessing their Environmental Emotional Quotient (EEQ). Emotional Quotient deals with the ability to sense, understand, attach and respond according to the power of emotions. An Environmental Emotional Quotient has been formulated based upon the inventory administered to them. The respondents were asked questions related to their view and emotions about the green spaces, water resource conservation, air and environmental quality. An effort has been made to assess the feeling of belongingness among the residents. Their views were assessed on green spaces, reuse, and recycling of resources and their participation level. They were also been assessed upon health awareness level by considering both preventive and curative segments of health care. It was found that only 12 percent of the people is emotionally attached to their surroundings in the city. The emotional attachment reduces as we move away from the house to housing complex to neighbouring areas and rest of the city. In fact, the emotional quotient goes lower to lowest from house to other ends of the city. It falls abruptly after the radius of 1 km from the residence. The result also shows that nearly 54% respondents accept that there is environment pollution in their area. Around 47.8% respondents in the survey consider that diseases occur because of green cover depiction in their area. Major diseases are to airborne diseases like asthma and bronchitis. Seasonal disease prevalent, which specially occurred from last 3-4 years are malaria, dengue and chikengunya. Survey also shows that only 31 % of respondents visit government hospitals while 69% respondents visit private hospitals or small clinics for healthcare services. The paper suggests the need for environmental sensitive policies and need for green insurance in mega cities like Delhi.

Keywords: environmental psychology, environmental emotional quotient, preventive health care and curative health care, sustainable living

Procedia PDF Downloads 280
3890 Age Related Changes in the Neural Substrates of Emotion Regulation: Mechanisms, Consequences, and Interventions

Authors: Yasaman Mohammadi

Abstract:

Emotion regulation is a complex process that allows individuals to manage and modulate their emotional responses in order to adaptively respond to environmental demands. As individuals age, emotion regulation abilities may decline, leading to an increased vulnerability to mood disorders and other negative health outcomes. Advances in neuroimaging techniques have greatly enhanced our understanding of the neural substrates underlying emotion regulation and age-related changes in these neural systems. Additionally, genetic research has identified several candidate genes that may influence age-related changes in emotion regulation. In this paper, we review recent findings from neuroimaging and genetic research on age-related changes in the neural substrates of emotion regulation, highlighting the mechanisms and consequences of these changes. We also discuss potential interventions, including cognitive and behavioral approaches, that may be effective in mitigating age-related declines in emotion regulation. We propose that a better understanding of the mechanisms underlying age-related changes in emotion regulation may lead to the development of more targeted interventions aimed at promoting healthy emotional functioning in older adults. Overall, this paper highlights the importance of studying age-related changes in emotion regulation and provides a roadmap for future research in this field.

Keywords: emotion regulation, aging, neural substrates, neuroimaging, emotional functioning, healthy aging

Procedia PDF Downloads 112
3889 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 122
3888 Relationship between Perceived Level of Emotional Intelligence and Organizational Role Stress of Fire Fighters in Mumbai

Authors: Payal Maheshwari, Bansari Shah

Abstract:

The research aimed to study the level of emotional intelligence (EI) and organizational role stress (ORS) of fire-fighters and the relationship between the two variables. Hundred and twenty fire-fighters were selected from different fire stations of Mumbai by purposive sampling. The firefighters who had the basic training, a minimum experience of 2 years and had been on the field during a crisis situation were selected for the study. The firefighters selected ranged from 23-58 years of age, and the number of years of experience ranged from 2 to 33 years. The findings of the study revealed that majority of the firefighters perceived themselves to be at an above average (57) and high (58) level of EI (M=429.35, SD=38.712). Domain-wise analysis disclosed that compared to self-awareness (92) and relationship management (93), more number of participants perceived themselves in the high category in the domains of self-management (108) and social management (106). Further, examination of the subdomain scores conveyed that a large number of participants rated themselves in the average level of these skills of accurate self-assessment (50), emotional self-control (50), adaptability (56) initiative (41), influence (66), change catalyst (53), and conflict management (50). With relation to the stress variable, it was found that almost half the number of the participants (59) rated themselves as having an average level of stress (M=137.44, SD=28.800). In most of the domains, majority of the participants perceived themselves as having an average level of stress, while in the domain of role isolation, self-role distance, and role ambiguity, majority of the firefighters rated themselves as having a low level of stress. A strong negative correlation (r=-.360**, p=.000) was found between EI and ORS. This study is a contribution to the literature and has implications for fire-fighters at the personal level, for the policymakers, and the fire department.

Keywords: emotional intelligence, organizational role stress, firefighters, relationship

Procedia PDF Downloads 114
3887 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 116
3886 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 477
3885 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 167
3884 Innovative Food Related Modification of the Day-Night Task Demonstrates Impaired Inhibitory Control among Patients with Binge-Purge Eating Disorder

Authors: Sigal Gat-Lazer, Ronny Geva, Dan Ramon, Eitan Gur, Daniel Stein

Abstract:

Introduction: Eating disorders (ED) are common psychopathologies which involve distorted body image and eating disturbances. Binge-purge eating disorders (B/P ED) are characterized by repetitive events of binge eating followed by purges. Patients with B/P ED behavior may be seen as impulsive especially when relate to food stimulation and affective conditions. The current study included innovative modification of the day-night task targeted to assess inhibitory control among patients with B/P ED. Methods: This prospective study included 50 patients with B/P ED during acute phase of illness (T1) upon their admission to specialized ED department in tertiary center. 34 patients repeated the study towards discharge to ambulatory care (T2). Treatment effect was evaluated by BMI and emotional questionnaires regarding depression and anxiety by the Beck Depression Inventory and State Trait Anxiety Inventory questionnaires. Control group included 36 healthy controls with matched demographic parameters who performed both T1 and T2 assessments. The current modification is based on the emotional day-night task (EDNT) which involves five emotional stimulation added to the sun and moon pictures presented to participants. In the current study, we designed the food-emotional modification day night task (F-EDNT) food stimulations of egg and banana which resemble the sun and moon, respectively, in five emotional states (angry, sad, happy, scrambled and neutral). During this computerized task, participants were instructed to push on “day” bottom in response to moon and banana stimulations and on “night” bottom when sun and egg were presented. Accuracy (A) and reaction time (RT) were evaluated and compared between EDNT and F-EDNT as a reflection of participants’ inhibitory control. Results: Patients with B/P ED had significantly improved BMI, depression and anxiety scores on T2 compared to T1 (all p<0.001). Task performance was similar among patients and controls in the EDNT without significant A or RT differences in both T1 and T2. On F-EDNT during T1, B/P ED patients had significantly reduced accuracy in 4/5 emotional stimulation compared to controls: angry (73±25% vs. 84±15%, respectively), sad (69±25% vs. 80±18%, respectively), happy (73±24% vs. 82±18%, respectively) and scrambled (74±24% vs. 84±13%, respectively, all p<0.05). Additionally, patients’ RT to food stimuli was significantly faster compared to neutral ones, in both cry and neutral emotional stimulations (356±146 vs. 400±141 and 378±124 vs. 412±116 msec, respectively, p<0.05). These significant differences between groups as a function of stimulus type were diminished on T2. Conclusion: Having to process food related content, in particular in emotional context seems to be impaired in patients with B/P ED during the acute phase of their illness and elicits greater impulsivity. Innovative modification using such procedures seem to be sensitive to patients’ illness phase and thus may be implemented during screening and follow up through the clinical management of these patients.

Keywords: binge purge eating disorders, day night task modification, eating disorders, food related stimulations

Procedia PDF Downloads 380
3883 Decision Making, Reward Processing and Response Selection

Authors: Benmansour Nassima, Benmansour Souheyla

Abstract:

The appropriate integration of reward processing and decision making provided by the environment is vital for behavioural success and individuals’ well being in everyday life. Functional neurological investigation has already provided an inclusive image on affective and emotional (motivational) processing in the healthy human brain and has recently focused its interest also on the assessment of brain function in anxious and depressed individuals. This article offers an overview on the theoretical approaches that relate emotion and decision-making, and spotlights investigation with anxious or depressed individuals to reveal how emotions can interfere with decision-making. This research aims at incorporating the emotional structure based on response and stimulation with a Bayesian approach to decision-making in terms of probability and value processing. It seeks to show how studies of individuals with emotional dysfunctions bear out that alterations of decision-making can be considered in terms of altered probability and value subtraction. The utmost objective is to critically determine if the probabilistic representation of belief affords could be a critical approach to scrutinize alterations in probability and value representation in subjective with anxiety and depression, and draw round the general implications of this approach.

Keywords: decision-making, motivation, alteration, reward processing, response selection

Procedia PDF Downloads 477