Search results for: psychological security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4522

Search results for: psychological security

4012 A Daily Diary Study on Technology-Assisted Supplemental Work, Psychological Detachment, and Well-Being – The Mediating Role of Cognitive Coping

Authors: Clara Eichberger, Daantje Derks, Hannes Zacher

Abstract:

Technology-assisted supplemental work (TASW) involves performing job-related tasks after regular working hours with the help of technological devices. Due to emerging information and communication technologies, such behavior becomes increasingly common. Since previous research on the relationship of TASW, psychological detachment and well-being are mixed, this study aimed to examine the moderating roles of appraisal and cognitive coping. A moderated mediation model was tested with daily diary data from 100 employees. As hypothesized, TASW was positively related to negative affect at bedtime. In addition, psychological detachment mediated this relationship. Results did not confirm appraisal and cognitive coping as moderators. However, additional analyses revealed cognitive coping as a mediator of the positive relationship of TASW and positive affect at bedtime. These results suggest that, on the one hand engaging in TASW can be harmful to employee well-being (i.e., more negative affect) and on the other hand, it can also be associated with higher well-being (i.e., more positive affect) in case it is accompanied by cognitive coping.

Keywords: cognitive coping, psychological detachment, technology-assisted supplemental work, well-being

Procedia PDF Downloads 178
4011 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 382
4010 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 394
4009 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 320
4008 The Role of Hemoglobin in Psychological Well Being and Academic Achievement of College Female Students

Authors: Ramesh Adsul, Vikas Minchekar

Abstract:

The present study attempts to explore the differences in academic achievement and psychological well being and its components – satisfaction, efficiency, sociability, mental health, interpersonal relations in low and moderate level of hemoglobin of college female students. It also tries to find out how hemoglobin, psychological well –being and academic achievement correlate to each other. For this study 200 (100 low hemoglobin level and 100 moderate hemoglobin level) college female students were selected by random sampling method. This sample is collected from the project ‘Health awareness and hemoglobin improvement programme’, which is being collaboratively conducted by ‘Akshyabhasha, MESA, U.S.A. and Smt. M.G. Kanya Mahavidyalaya, Sangli, Maharashtra, India. Psychological Well-Being Scale was used to collect the data. Students’ academic achievement was collected through college record, and hemoglobin level of female students was collected from project record. Data was analyzed by using independent ‘t’ test and Pearson’s correlation coefficient. The finding of the study revealed significant differences between low hemoglobin and moderate hemoglobin groups regarding efficiency and mental health. No significant difference was observed on satisfaction, sociability and interpersonal relations. It is also found that there is significant difference between low hemoglobin and moderate hemoglobin groups on academic achievement. The study revealed positive correlation between hemoglobin and academic achievement and psychological well-being and academic achievement. Moderate hemoglobin level create more efficiency, better mental health and good academic achievement in female students. One could say that there is significant role hemoglobin plays in psychological well being and academic achievement of college female students. Anemia is widely prevalent in all the states if India among all age groups. In India, college girls contribute major portion of population. It has been reported that 80% female population has hemoglobin deficiency, due to illiteracy of female, family structure, status of women, diet habits, gender discrimination and various superstitions. The deficiency of hemoglobin affects physical and mental health, general behavior and academic performance of students. This study is useful to educational managements, counselors, parents, students and Government also. In the development of personality physical as well as psychological health is essential. This research findings will create awareness about physical and mental health among people and society.

Keywords: academic achievement, college female students, hemoglobin, psychological well-being

Procedia PDF Downloads 282
4007 Knowledge, Attitudes and Its Associated Factors on the Provision of Psychological First Aid during Response to Disasters among Public Health Midwives in Colombo

Authors: S. P. Hewagama

Abstract:

Different kinds of distressing events happen in the world causing a wide range of reactions and feelings. Psychological first aid (PFA) is humane supportive response for suffering. All health workers especially PHMs who play a major role as first responders in a disaster should be able to provide basic PFA effectively. Aim of this study was to assess the knowledge, attitudes and associated factors on the provision of PFA among PHMs during disasters. A descriptive cross-sectional study was carried out among 307 Public Health Midwives in Colombo RDHS area. In the study population, 86.6% (n=266) of the respondents were aware of the term “Psychological first aid” while 13.4% (n=41) were not aware. The total knowledge score was good in majority 85.4%(n=262) of the respondents while only 14.3%(n=45) had a poor knowledge on PFA. There was the statistically significant difference in relation to the level of education with the total knowledge score. Comprehensive desirable attitudes towards PFA was low (30.61%, n=94). According to the study, only a less than a quarter (21.82%, (n = 67)) of the study population had received training on PFA. More than half (56%, n=172) of the respondents had experience in responding to disasters. Conclusions and Recommendations: The overall knowledge and attitudes were found to be satisfactory. However, it is important to improve the knowledge level of the PHMs by providing training and workshops on PFA.

Keywords: disaster, humane supportive assistance, psychological first aid, public health midwives

Procedia PDF Downloads 248
4006 Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population

Authors: Colette Faucher

Abstract:

In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population.

Keywords: military psychological operations, social identity, social network, emotion propagation

Procedia PDF Downloads 399
4005 A Case Study of Physical and Psychological Forces in the Nigerian Criminal and Military Interrogations

Authors: Onimisi Ekuh Abdullahi, Lasbat Omoshalewa Akinsemoyin

Abstract:

In Nigeria, over two decades now, there has been a steady increase in the insecurity of human lives and physical properties. In the South-South Nigeria, there is an acute insecurity of militants destroying oil pipe-lines and kidnapping cases; in the Middle-Belt zone, insecurity centers on kidnapping and in a few states crises between Herdsmen and Farmers range like wildfire; in the South-Western zone, kidnapping is vile, in the North-East zone the issue of Boko Haram has become World-wide concern, and in North-west zone, cattle rustlers and religious crisis are of great concern. At the initial stage, the Nigerian Police Force was called upon to quell the crisis. It soon became obvious that the dimension of the crisis was beyond police force. The Nigerian Armed Forces were called to maintain peace and order because the magnitude of the crisis was threatening the national unity and cohesion. The main objective of this paper, was to examine the investigative techniques of criminal by the military in Nigeria. Specifically to examine the physical and psychological force; the abusive techniques and tactics; and suggest modern psychological techniques of interrogating criminals accepted to Human Right Activists and the rule of law. The process is to create room behaviour and practices that carefully monitored the trust and reliability of admissions produced by Psychological manipulative process in Nigeria.

Keywords: military, Nigerian criminal, physical, psychological force

Procedia PDF Downloads 146
4004 Effects of Arts-Mediated Mother-Child Dyads Mindfulness-Based Intervention for Korean Children with ADHD: On Behaviors in Children and Subjective Psychological States in Mothers

Authors: Jeongil Kim

Abstract:

The present study examined the effects of arts-mediated mother-child dyads mindfulness-based intervention for Korean children with attention deficit hyperactivity disorder (ADHD) and their mothers, on behaviors in children and subjective psychological states in mothers. Four elementary school boys with ADHD and their mothers participated in the study. Using a multiple baseline design across four mother-child dyads, data were collected on the target behaviors (disruptive behavior, on-task behavior, and compliance in class) in children using a 10-second partial interval recording system and on the subjective psychological states in mothers using four questionnaires (on perceived stress, burnout, mindfulness, and satisfaction with life). The intervention consisted of a) mindfulness training, b) mindfulness practice, and c) mindful management of body and feeling. The arts activities, making a coiled clay pot and Korean traditional music performance, were utilized to facilitate the environment to help each participant to understand the content and progress of the intervention program. The results showed that all four dyads showed improvement in adaptive behaviors in the children (increase in on-task behavior; decrease in disruptive behavior) and positive change in subjective psychological states in the mothers (increase in scores of mindfulness and satisfaction with life; decrease in scores of perceived stress and burnout). The changes in the children’s behaviors and in the mothers’ subjective psychological states were maintained when the intervention was drawn and generalized in novel settings. The results suggest that arts-mediated mother-child dyads mindfulness-based intervention would be a mutual benefiting strategy to support both children with ADHD and their mothers who experience diverse challenges in behavioral and psychological aspects.

Keywords: mindfulness, attention deficit hyperactivity disorder (ADHD), arts-mediated, behavior, psychological well-being, child-mother

Procedia PDF Downloads 170
4003 Applications of Multi-Path Futures Analyses for Homeland Security Assessments

Authors: John Hardy

Abstract:

A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.

Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning

Procedia PDF Downloads 127
4002 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 63
4001 The Utility and the Consequences of Counter Terrorism Financing

Authors: Fatemah Alzubairi

Abstract:

Terrorism financing is a theme that dramatically evolved post-9/11. Supra-national bodies, above all UN Security Council and the Financial Action Task Form (FATF), have established an executive-like mechanism, which allows blacklisting individuals and groups, freezing their funds, and restricting their travel, all of which have become part of states’ anti-terrorism frameworks. A number of problems arise from building counter-terrorism measures on the foundation of a vague definition of terrorism. This paper examines the utility and consequences of counter-terrorism financing with considering the lack of an international definition of terrorism. The main problem with national and international anti-terrorism legislation is the lack of a clear objective definition of terrorism. Most, if not all, national laws are broad and vague. Determining what terrorism remains the crucial underpinning of any successful discussion of counter-terrorism, and of the future success of counter-terrorist measures. This paper focuses on the legal and political consequences of equalizing the treatment of violent terrorist crimes, such as bombing, with non-violent terrorism-related crimes, such as funding terrorist groups. While both sorts of acts requires criminalization, treating them equally risks wrongfully or unfairly condemning innocent people who have associated with “terrorists” but are not involved in terrorist activities. This paper examines whether global obligations to counter terrorism financing focus on controlling terrorist groups more than terrorist activities. It also examines the utility of the obligations adopted by the UN Security Council and FATF, and whether they serve global security; or whether the utility is largely restricted to Western security, with little attention paid to the unique needs and demands of other regions.

Keywords: counter-terrorism, definition of terrorism, FATF, security, terrorism financing, UN Security Council

Procedia PDF Downloads 315
4000 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 74
3999 Seeking Glimmers in the Storm of Duty: The Moderating Effect of Police Officers’ Positivity on Workload and Well-Being

Authors: Shihchihsu, Yongzhang, Kenghuilin

Abstract:

Policing is a profession marked by high demands, often associated with psychological health challenges. This occupational group's unique stressors make it a significant focus in occupational psychology. Psychological resilience, defined as the ability to maintain or regain mental health despite experiencing adversity, plays a crucial role in how police officers manage job-related stress. This study employs Psychological Resilience Theory to explore the modulation of workload impacts on well-being by positive psychological resources "positivity". The objective is to comprehensively analyze how positivity, as a core component of psychological resilience, assists police officers in managing the workloads stemming from their high occupational stress and how it enhances their well-being. The study conducted a cross-sectional survey among 927 active-duty police officers. Using structured questionnaires, the research quantified workloads, assessed levels of positivity, and measured well-being. Statistical analyses, including multiple regressions and interaction term assessments, were performed to examine the relationships between these variables and the moderating effects of positivity. The results underscore a significant interaction between workload and positivity. For officers with higher levels of this positivity, there was a notable positive correlation between increased workload and enhanced well-being, suggesting that positive psychological resources "positivity" can transform potential stressors into growth opportunities. Specifically, for officers possessing robust psychological resilience, higher workloads were associated with greater levels of well-being, indicating an intriguing aspect of psychological strength in stressful occupational contexts. These findings extend previous research by highlighting the dynamic role of psychological resources in stressful work settings. Positive psychological strength "positivity" not only buffers the negative effects of high workloads but also potentially enhances well-being under stress. This dual capacity demonstrates a more complex interaction between stress and resilience than traditionally understood, where resilience factors may actively convert stress into a positive catalyst for well-being. From a theoretical perspective, this research enriches the literature on Psychological Resilience Theory by detailing how resilience mechanisms can mitigate adverse effects of occupational stress and contribute positively to well-being. Practically, the implications of this study are profound. By demonstrating the pivotal role of psychological resilience "positivity", the findings advocate for the integration of resilience-building strategies in police training and welfare programs. Such initiatives could significantly improve job satisfaction and mental health outcomes among police officers, potentially leading to more effective policing and healthier work environments. This study not only advances our understanding of psychological health in high-risk professions but also provides a blueprint for enhancing occupational resilience and well-being.

Keywords: policing, positive psychology, positivity, work stress

Procedia PDF Downloads 7
3998 Contingency Screening Using Risk Factor Considering Transmission Line Outage

Authors: M. Marsadek, A. Mohamed

Abstract:

Power system security analysis is the most time demanding process due to large number of possible contingencies that need to be analyzed.  In a power system, any contingency resulting in security violation such as line overload or low voltage may occur for a number of reasons at any time.  To efficiently rank a contingency, both probability and the extent of security violation must be considered so as not to underestimate the risk associated with the contingency. This paper proposed a contingency ranking method that take into account the probabilistic nature of power system and the severity of contingency by using a newly developed method based on risk factor.  The proposed technique is implemented on IEEE 24-bus system.

Keywords: line overload, low voltage, probability, risk factor, severity

Procedia PDF Downloads 536
3997 Multi Criteria Authentication Method in Cognitive Radio Networks

Authors: Shokoufeh Monjezi Kouchak

Abstract:

Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods.

Keywords: authentication, cognitive radio, security, radio networks

Procedia PDF Downloads 375
3996 Household Food Security and Poverty Reduction in Cameroon

Authors: Bougema Theodore Ntenkeh, Chi-bikom Barbara Kyien

Abstract:

The reduction of poverty and hunger sits at the heart of the United Nations 2030 Agenda for Sustainable Development, and are the first two of the Sustainable Development Goals. The World Food Day celebrated on the 16th of October every year, highlights the need for people to have physical and economic access at all times to enough nutritious and safe food to live a healthy and active life; while the world poverty day celebrated on the 17th of October is an opportunity to acknowledge the struggle of people living in poverty, a chance for them to make their concerns heard, and for the community to recognize and support poor people in their fight against poverty. The association between household food security and poverty reduction is not only sparse in Cameroon but mostly qualitative. The paper therefore investigates the effect of household food security on poverty reduction in Cameroon quantitatively using data from the Cameroon Household Consumption Survey collected by the Government Statistics Office. The methodology employed five indicators of household food security using the Multiple Correspondence Analysis and poverty is captured as a dummy variable. Using a control function technique, with pre and post estimation test for robustness, the study postulates that household food security has a positive and significant effect on poverty reduction in Cameroon. A unit increase in the food security score reduces the probability of the household being poor by 31.8%, and this effect is statistically significant at 1%. The result further illustrates that the age of the household head and household size increases household poverty while households residing in urban areas are significantly less poor. The paper therefore recommends that households should diversify their food intake to enhance an effective supply of labour in the job market as a strategy to reduce household poverty. Furthermore, family planning methods should be encouraged as a strategy to reduce birth rate for an equitable distribution of household resources including food while the government of Cameroon should also develop the rural areas given that trend in urbanization are associated with the concentration of productive economic activities, leading to increase household income, increased household food security and poverty reduction.

Keywords: food security, poverty reduction, SDGs, Cameroon

Procedia PDF Downloads 62
3995 Psychological Distress and Associated Factors among Patients Attending Orthopedic Unit of at Dilla University Referral Hospital in Ethiopia, 2022

Authors: Chalachew Kassaw, Henok Ababu, Bethelhem Sileshy, Lulu Abebe, Birhanie Mekuriaw

Abstract:

Background: Psychological discomfort is a state of emotional distress caused by everyday stressors and obligations that are difficult to manage. Orthopedic trauma has a wide range of effects on survivors' physical health, as well as a variety of mental health concerns that impede recovery. Psychiatric and behavioral conditions are 3-5 times more common in people who have undergone physical trauma, and they are a predictor of poor outcomes. Despite the above facts, there is a shortage of research done on the subject. Therefore, this study aimed to determine the magnitude of psychological distress and associated factor among patients attending orthopedic treatment at Gedeo zone, South Ethiopia 2022. Methods: A cross-sectional study was undertaken at Dilla University Referral Hospital from October –November 2022. The data was collected via a face-to-face interview, and the Kessler psychological distress scale (K-10) was used to assess psychological distress. A total of 386 patients receiving outpatient and inpatient services at the orthopedic unit were chosen using a simple random selection technique. A Statistical Package for the Social Science version 21 (SPSS-21) was used to enter and evaluate the data. To find related factors, bivariate, and multivariate logistic regressions were used. Variables having a p-value of less than 0.05 were deemed statistically significant. Result: A total of 386 participants with a response rate of 94.8% were included in the study. Out of all respondents, 114 (31.4%) of the individuals have experienced psychological distress. Independent variables such as Females [Adjusted odds ratio (AOR)=5.8, 95%CI=(4.6-15.6)], Average monthly income of <3500 birrs [Adjusted odds ratio (AOR) =4.8, 95% CI=(2.4-9.8) ], Current history of substance use [Adjusted odds ratio (AOR) =2.6, 95% CI=(1.66-4.7)], Strong social support [Adjusted odds ratio (AOR)=0.4, 95% CI= 0.4(0.2-0.8)], and Poor sleep quality (PSQI score>5) [Adjusted odds ratio (AOR)=2.0, 95%CI= 2.0(1.2-2.8)] were significantly associated with psychological distress. Conclusion: The prevalence of psychological distress was high. Being female, having poor social support, and having a high PSQI score were significantly associated factors with psychological distress. It is good if clinicians emphasize orthopedic patients, especially females and those having poor social support and low sleep quality symptoms.

Keywords: psychological distress, orthopedic unit, Dilla University hospital, Dilla Town, Southern Ethiopia

Procedia PDF Downloads 69
3994 Screening Psychological Wellness in a South African Banking Industry: Psychometric Properties of the Sense of Coherence-29 Questionnaire and Multifactor Leadership Questionnaire

Authors: Nisha Harry, Keshia Sing

Abstract:

Orientation: The Multifactor Leadership Questionnaire (MLF) and the sense of coherence-29 (SCS) is an effective tools to assess the prevalence and underlying structures of empirically based taxonomies related to leadership and wellbeing. Research purpose: The purpose of the study was to test the psychometric properties of the SCS and Multifactor Leadership Questionnaire (MLQ) to screen for psychological wellness indices within the banking industry in South Africa. Motivation for the study: The contribution of these two instruments for the purpose of determining psychological wellness in a banking work environment is unique. Research design, approach, or method: The sample consisted of (N = 150) financial staff employed in a South African banking organisation. The age of the sample was: 37% (30 -40 yrs), 31% (20-30 yrs), 26% (40- 50 yrs), and 6% (50+yrs), of which 52% were males, 48% were females. The white race group was the majority at 29%, African at 26%, Coloured at 23%, and Indian was 22%. Main findings: Results from the exploratory factor analysis revealed a two-factor structure as the most satisfactory. Confirmatory factor analyses revealed the two-factor model displayed better good of-fit indices. Practical implications: The factor structure of the Sense of Coherence-29 scale (SCS), and the Multifactor Leadership Questionnaire (MLQ), have a value-added focus to determine psychological wellness within banking staff. It is essential to take into account these constructs when developing employee wellness interventions. Contribution/value add: Understanding the psychometric properties of the SCS, the self-reported form, and the MLQ questionnaire contributes to screening psychological wellness indices such as coping within the banking industry in a developing country like South Africa. Leaders are an important part of the implementation process of organisational employee wellness practices.

Keywords: factorial structure, leadership, measurement invariance, psychological wellness, sense of coherence

Procedia PDF Downloads 90
3993 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 210
3992 Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology

Authors: Bala Adamu Malami

Abstract:

The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range.

Keywords: electronic, GPS, GSM modem, communication, vehicle

Procedia PDF Downloads 88
3991 Humanistic Psychology Workshop to Increase Psychological Well-Being

Authors: Nidia Thalia Alva Rangel, Ferran Padros Blazquez, Ma. Ines Gomez Del Campo Del Paso

Abstract:

Happiness has been since antiquity a concept of interest around the world. Positive psychology is the science that begins to study happiness in a more precise and controlled way, obtaining wide amount of research which can be applied. One of the central constructs of Positive Psychology is Carol Ryff’s psychological well-being model as eudaimonic happiness, which comprehends six dimensions: autonomy, environmental mastery, personal growth, positive relations with others, purpose in life, and self-acceptance. Humanistic psychology is a clear precedent of Positive Psychology, which has studied human development topics and it features a great variety of intervention techniques nevertheless has little evidence with controlled research. Therefore, the present research had the aim to evaluate the efficacy of a humanistic intervention program to increase psychological well-being in healthy adults through a mixed methods study. Before and after the intervention, it was applied Carol Ryff’s psychological well-being scale (PWBS) and the Symptom Check List 90 as pretest and posttest. In addition, a questionnaire of five open questions was applied after each session. The intervention program was designed in experiential workshop format, based on the foundational attitudes defined by Carl Rogers: congruence, unconditional positive regard and empathy, integrating humanistic intervention strategies from gestalt, psychodrama, logotherapy and psychological body therapy, with the aim to strengthen skills in the six dimensions of psychological well-being model. The workshop was applied to six volunteer adults in 12 sessions of 2 hours each. Finally, quantitative data were analyzed with Wilcoxon statistic test through the SPSS program, obtaining as results differences statistically significant in pathology symptoms between prettest and postest, also levels of dimensions of psychological well-being were increased, on the other hand for qualitative strand, by open questionnaires it showed how the participants were experiencing the techniques and changing through the sessions. Thus, the humanistic psychology program was effective to increase psychological well-being. Working to promote well-being prompts to be an effective way to reduce pathological symptoms as a secondary gain. Experiential workshops are a useful tool for small groups. There exists the need for research to count with more evidence of humanistic psychology interventions in different contexts and impulse the application of Positive Psychology knowledge.

Keywords: happiness, humanistic psychology, positive psychology, psychological well-being, workshop

Procedia PDF Downloads 404
3990 Bypassing Docker Transport Layer Security Using Remote Code Execution

Authors: Michael J. Hahn

Abstract:

Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.

Keywords: cloud, cryptography, Docker, Linux, security

Procedia PDF Downloads 184
3989 Emotional Security in Relation to Students' Emotional Efficiency

Authors: Ibtisam Mahmoud Mohammed Sultan

Abstract:

The present research aimed to identify the level of both emotional and emotional competence among students in Tikrit University aimed to know the assumptions in statistical significance for both variables as gender variables (m-f) and specialty (scientific-humanistic), as research to learn what Relationship between emotional safety and efficiency alanfaalet Tikrit University students. The researcher built emotional security measure (54) as built measure emotional competence (46), as the researcher extract full alsaykomtrih characteristics of both scales. The research sample consisted of (600) students selected by the random way and applying the scales on a basic search sample and processed statistical data using a variety of methods, including statistical test (test T.) and Pearson correlation coefficient, the researcher found a set of results. The following: 1. that the Tikrit University students possess a high level of emotional security. 2. to safely enjoy passionate males more than females. 3. that there is no difference between students of scientific and humanitarian specialization in variable emotional security. 4. that the Tikrit University students enjoy a high level of emotional competence. 5. the female-male outperforming in emotional competence level. 6. the humanitarian specialization students Excel in emotional competence for those of specialty. 7. the existence of a positive correlation between variables. Through search results, the researcher has developed a set of conclusions, proposals, and recommendations.

Keywords: relation, emotional security, students, efficiency

Procedia PDF Downloads 110
3988 Psychological Factors Affecting Breastfeeding: An Exploratory Study among Breastfeeding Moms

Authors: Marwa Abdussalam

Abstract:

Breastfeeding is a unique emotional bond between a mother and their offspring. Though breastfeeding may be natural, it is not something mothers are born with; some still struggle to breastfeed their babies. Various factors can influence the breastfeeding experience, such as the mode of delivery, the mother’s health condition, proper latching, etc. In addition, psychological factors have been known to influence breastfeeding ability, duration, and milk supply. Some mothers struggle to breastfeed their babies because they perceive they have a low milk supply and or don’t have the ability to breastfeed their babies. Most of these perceptions result either from their own past experience or from the ‘comments’ of their caregivers. So, it is of utmost essential to understand such psychological factors affecting breastfeeding so that necessary steps can be taken to educate breastfeeding mothers. The study explored the role of psychological factors that affect breastfeeding. Data were collected from fifteen breastfeeding mothers using a semi-structured interview schedule. A total of 10 questions were included in the interview schedule. Questions were sequenced in a funnel pattern, beginning with open-ended questions and then moving on to close-ended questions. Data were analyzed using Braun and Clarke’s Thematic Analysis technique. This technique involves identifying the codes, generating themes, naming them, and finally reviewing them. Results indicated that breastfeeding self-efficacy perceived insufficient milk supply, and lack of knowledge were the psychological factors affecting breastfeeding. The results of this study can be used to help mothers who are struggling with breastfeeding by developing interventions aimed at improving breastfeeding self-efficacy.

Keywords: breastfeeding, breastfeeding self-efficacy, perceived insufficient milk supply, Thematic Analysis

Procedia PDF Downloads 97
3987 Cry, the Peacock: A Psychoanalytic Feminist Study

Authors: Taira Bano

Abstract:

Cry, the Peacock is a famous novel by Anita Desai which deals with the psychic tumult of a young and sensitive female protagonist, Maya. The novel deals with the in-depth study of the psyche of Maya who is haunted by a childhood prophecy of a fatal disaster. This persistent obsession of death either for her or her husband within four years of their marriage is the main reason for Maya’s neurosis. The novel is not only concerned with the psychological aspect of Maya but is also a strong plea for the rights of women. The novel consists of both psychological as well as feministic elements. The attitude of Maya, not to submit to the authority of her husband gives perfect description of second wave feminism. Feminism is a movement which deals with the issues of inequality between men and women. Psychoanalysis is the study of the psychology of characters. It depicts how an incident in one’s life shapes the personality of an individual. This paper will deal with the study of the novel Cry, the Peacock from psychoanalytic perspective and will try to trace out the reason for such an extreme step that Maya takes in the end of the novel- crossing all the limits of a traditional submissive wife.

Keywords: psyche, psychological, mental, feminist

Procedia PDF Downloads 499
3986 The Exploration of Persuasive Skills and Participants Characteristics in Pyramid-Sale: A Qualitative Study

Authors: Xing Yan Fan, Xing Lin Xu, Man Yuan Chen, Pei Tzu Lee, Yu Ting Wang, Yi Xiao Cao, Rui Yao

Abstract:

Pyramid sales have been a widespread issue in China. Victims who are defrauded not only lose money but damage interpersonal relationship. A deeper understanding of pyramid-sale models can be beneficial to prevent potential victims from fraud and improve the property security. The goals of this study were to detect psychological characteristics of pyramid-sale sellers, and analyse persuasive skills in pyramid organizations. A qualitative study was conducted in this study. Participants (n=6) recruited by 'snowball' sampling from present pyramid-sale sellers (n=3) and imprisoned pyramid-sale sellers (n=3). All participants accepted semi-structured interview for collecting data. Content analysis was adopted for data coding and analysis. The results indicate that pyramid organizations are used to utilize their appearance packaging and celebrity effect to strengthen the positions in participants’ mind. The status gap between pyramid-sale sellers in same organization, as well as rewards to increase reputation, are used to motivate participants in pyramid. The most significant common characteristics among all participants are that they tend to possess a high sense of belongingness within the firm. Moreover, the expression of pyramid-sale sellers on gambling mentality is expected to growth as constantly losing money. Findings suggest that the psychological characteristics of pyramid-sale sellers in accordance with Maslow’s hierarchy of needs, persuasive skills of pyramid organization confront to 'attitude-behaviour change model'. These findings have implication on 'immune education' that providing guidance for victims out of stuck and protecting ordinary people from the jeopardizing of pyramid sales.

Keywords: pyramid sales, characteristics, persuasive skills, qualitative study

Procedia PDF Downloads 243
3985 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 499
3984 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 288
3983 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges

Authors: Alvite Singh Ningthoujam

Abstract:

The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.

Keywords: India, Islamic State, Muslim, Security

Procedia PDF Downloads 360