Search results for: emotional security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4422

Search results for: emotional security

3882 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s

Authors: Zunjarrao Kadam, Vikas Minchekar

Abstract:

The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.

Keywords: experimentally induced stress, facial recognition, cognition, security personnel

Procedia PDF Downloads 261
3881 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry

Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim

Abstract:

Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.

Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain

Procedia PDF Downloads 90
3880 Interconnected Market Hypothesis: A Conceptual Model of Individualistic, Information-Based Interconnectedness

Authors: James Kinsella

Abstract:

There is currently very little understanding of how the interaction between in- vestors, consumers, the firms (agents) affect a) the transmission of information, and b) the creation and transfer of value and wealth between these two groups. Employing scholarly ideas from multiple research areas (behavioural finance, emotional finance, econo-biology, and game theory) we develop a conceptual the- oretic model (the ‘bow-tie’ model) as a framework for considering this interaction. Our bow-tie model views information transfer, value and wealth creation, and transfer through the lens of “investor-consumer connection facilitated through the communicative medium of the ‘firm’ (agents)”. We confront our bow-tie model with theoretical and practical examples. Next, we utilise consumer and business confidence data alongside index data, to conduct quantitative analy- sis, to support our bow-tie concept, and to introduce the concept of “investor- consumer connection”. We highlight the importance of information persuasiveness, knowledge, and emotional categorization of characteristics in facilitating a communicative relationship between investors, consumers, and the firm (agents), forming academic and practical applications of the conceptual bow-tie model, alongside applications to wider instances, such as those seen within the Covid-19 pandemic.

Keywords: behavioral finance, emotional finance, economy-biology, social mood

Procedia PDF Downloads 126
3879 Differences in Parental Acceptance, Rejection, and Attachment and Associations with Adolescent Emotional Intelligence and Life Satisfaction

Authors: Diana Coyl-Shepherd, Lisa Newland

Abstract:

Research and theory suggest that parenting and parent-child attachment influence emotional development and well-being. Studies indicate that adolescents often describe differences in relationships with each parent and may form different types of attachment to mothers and fathers. During adolescence and young adulthood, romantic partners may also become attachment figures, influencing well being, and providing a relational context for emotion skill development. Mothers, however, tend to be remain the primary attachment figure; fathers and romantic partners are more likely to be secondary attachment figures. The following hypotheses were tested: 1) participants would rate mothers as more accepting and less rejecting than fathers, 2) participants would rate secure attachment to mothers higher and insecure attachment lower compared to father and romantic partner, 3) parental rejection and insecure attachment would be negatively related to life satisfaction and emotional intelligence, and 4) secure attachment and parental acceptance would be positively related life satisfaction and emotional intelligence. After IRB and informed consent, one hundred fifty adolescents and young adults (ages 11-28, M = 19.64; 71% female) completed an online survey. Measures included parental acceptance, rejection, attachment (i.e., secure, dismissing, and preoccupied), emotional intelligence (i.e., seeking and providing comfort, use, and understanding of self emotions, expressing warmth, understanding and responding to others’ emotional needs), and well-being (i.e., self-confidence and life satisfaction). As hypothesized, compared to fathers’, mothers’ acceptance was significantly higher t (190) = 3.98, p = .000 and rejection significantly lower t (190) = - 4.40, p = .000. Group differences in secure attachment were significant, f (2, 389) = 40.24, p = .000; post-hoc analyses revealed significant differences between mothers and fathers and between mothers and romantic partners; mothers had the highest mean score. Group differences in preoccupied attachment were significant, f (2, 388) = 13.37, p = .000; post-hoc analyses revealed significant differences between mothers and romantic partners, and between fathers and romantic partners; mothers have the lowest mean score. However, group differences in dismissing attachment were not significant, f (2, 389) = 1.21, p = .30; scores for mothers and romantic partners were similar; father means score was highest. For hypotheses 3 and 4 significant negative correlations were found between life satisfaction and dismissing parent, and romantic attachment, preoccupied father and romantic attachment, and mother and father rejection variables; secure attachment variables and parental acceptance were positively correlated with life satisfaction. Self-confidence was correlated only with mother acceptance. For emotional intelligence, seeking and providing comfort were negatively correlated with parent dismissing and mother rejection; secure mother and romantic attachment and mother acceptance were positively correlated with these variables. Use and understanding of self-emotions were negatively correlated with parent and partner dismissing attachment, and parent rejection; romantic secure attachment and parent acceptance were positively correlated. Expressing warmth was negatively correlated with dismissing attachment variables, romantic preoccupied attachment, and parent rejection; whereas attachment secure variables were positively associated. Understanding and responding to others’ emotional needs were correlated with parent dismissing and preoccupied attachment variables and mother rejection; only secure father attachment was positively correlated.

Keywords: adolescent emotional intelligence, life satisfaction, parent and romantic attachment, parental rejection and acceptance

Procedia PDF Downloads 192
3878 From a Traumatic Self to a Strong Self: Changes in Abused Women’s Emotional World After Divorcing their Violent Husbands

Authors: Eli Buchbinder

Abstract:

Women abuse life after divorce is an important issue in understanding their recovery after leaving an intimate violent relationship. The aim of this study was to describe and analyze abused women’s post-traumatic emotional changes following divorce. The study was based on semi-structured qualitative interviews, in Israel, with 12 women aged 33 to 55, at least five years after divorcing their violent husbands. The interviewees described a transformation process: from a damaged, hurting, powerless self, which coped with dissociation and emotional suppression, to a sense of recovery after the divorce. The sense of recovery was experienced as a strong self-connected to positive self-emotions, such as a sense of control and self-efficacy in coping with past pain and life’s challenges. This transformational experience was related to initiating the divorce as a necessity and/or a choice. The interviewees described a continuous dialectic process in healing: first, continuous awareness of their damaged self (post-traumatic fears and negative emotions) and second recognizing their strengths as active choicer in the face of their everyday life and their biography. The discussion of the findings focuses on abused women’s meaning-making as a basic process of healing from abusive intimate relationships.

Keywords: abused women, divorce, recovery, meaning making

Procedia PDF Downloads 80
3877 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 383
3876 Designing Program for Developing Self-Esteem of Gifted Children

Authors: Mohammad Jamalallail

Abstract:

Self-esteem implies a person’s overall self-worth, self-respect, and self-value. It helps a person to maintain good mental health, personality, and achievement. Gifted students face some emotional problems, sometimes, which cause decreases in their self-esteem. Such emotional problems include loneliness, anxiety, and depression as examples. For this reason, designing a counseling program is necessary for gifted students who need a high level of self-esteem. The available counseling programs focused on developmental aspect only to the best of the writer’s knowledge. While the proposed program focuses on both clinical and developmental counseling by applying psychoanalytic play therapy. The proposed program consists of; Theoretical background such as; Behavior, and RET. It also consists of counseling procedures and therapeutic interventions.

Keywords: self-esteem, gifted, program, design

Procedia PDF Downloads 428
3875 Data Collection Techniques for Robotics to Identify the Facial Expressions of Traumatic Brain Injured Patients

Authors: Chaudhary Muhammad Aqdus Ilyas, Matthias Rehm, Kamal Nasrollahi, Thomas B. Moeslund

Abstract:

This paper presents the investigation of data collection procedures, associated with robots when placed with traumatic brain injured (TBI) patients for rehabilitation purposes through facial expression and mood analysis. Rehabilitation after TBI is very crucial due to nature of injury and variation in recovery time. It is advantageous to analyze these emotional signals in a contactless manner, due to the non-supportive behavior of patients, limited muscle movements and increase in negative emotional expressions. This work aims at the development of framework where robots can recognize TBI emotions through facial expressions to perform rehabilitation tasks by physical, cognitive or interactive activities. The result of these studies shows that with customized data collection strategies, proposed framework identify facial and emotional expressions more accurately that can be utilized in enhancing recovery treatment and social interaction in robotic context.

Keywords: computer vision, convolution neural network- long short term memory network (CNN-LSTM), facial expression and mood recognition, multimodal (RGB-thermal) analysis, rehabilitation, robots, traumatic brain injured patients

Procedia PDF Downloads 155
3874 Neural Network Based Control Algorithm for Inhabitable Spaces Applying Emotional Domotics

Authors: Sergio A. Navarro Tuch, Martin Rogelio Bustamante Bello, Leopoldo Julian Lechuga Lopez

Abstract:

In recent years, Mexico’s population has seen a rise of different physiological and mental negative states. Two main consequences of this problematic are deficient work performance and high levels of stress generating and important impact on a person’s physical, mental and emotional health. Several approaches, such as the use of audiovisual stimulus to induce emotions and modify a person’s emotional state, can be applied in an effort to decreases these negative effects. With the use of different non-invasive physiological sensors such as EEG, luminosity and face recognition we gather information of the subject’s current emotional state. In a controlled environment, a subject is shown a series of selected images from the International Affective Picture System (IAPS) in order to induce a specific set of emotions and obtain information from the sensors. The raw data obtained is statistically analyzed in order to filter only the specific groups of information that relate to a subject’s emotions and current values of the physical variables in the controlled environment such as, luminosity, RGB light color, temperature, oxygen level and noise. Finally, a neural network based control algorithm is given the data obtained in order to feedback the system and automate the modification of the environment variables and audiovisual content shown in an effort that these changes can positively alter the subject’s emotional state. During the research, it was found that the light color was directly related to the type of impact generated by the audiovisual content on the subject’s emotional state. Red illumination increased the impact of violent images and green illumination along with relaxing images decreased the subject’s levels of anxiety. Specific differences between men and women were found as to which type of images generated a greater impact in either gender. The population sample was mainly constituted by college students whose data analysis showed a decreased sensibility to violence towards humans. Despite the early stage of the control algorithm, the results obtained from the population sample give us a better insight into the possibilities of emotional domotics and the applications that can be created towards the improvement of performance in people’s lives. The objective of this research is to create a positive impact with the application of technology to everyday activities; nonetheless, an ethical problem arises since this can also be applied to control a person’s emotions and shift their decision making.

Keywords: data analysis, emotional domotics, performance improvement, neural network

Procedia PDF Downloads 140
3873 The Principle of Methodological Rationality and Security of Organisations

Authors: Jan Franciszek Jacko

Abstract:

This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.

Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics

Procedia PDF Downloads 139
3872 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 111
3871 An Examination of Some Determinates of Work Performance in Kuwaiti Business Organizations

Authors: Ali Muhammad

Abstract:

The study investigates the effect of some determinates of work performance in Kuwaiti business organizations. The study postulates that employee attitudes (organizational commitment, job satisfaction), behaviors (organizational citizenship behavior, job involvement), and emotional intelligence will have positive effects on work performance. Survey data were collected from 204 employees working in eight Kuwaiti work organizations. Data were analyzed using descriptive statistics, Pearson correlation, Cronbach alpha, and regression analysis. Results confirmed the study hypotheses; employee attitudes of organizational commitment and job satisfaction was found to have a significant positive effect on work performance. Organizational citizenship behavior and job involvement were also found to have positive effect on work performance. Findings also revealed that an in increase in emotional intelligent will cause performance to increase. Results of the current study were compared and contrasted to findings of previous studies. The theoretical and empirical application of the findings were explained. Limitation of the current study was discussed and topics for future research were proposed.

Keywords: organizational commitment, Job satisfaction, organizational citizenship behavior, job involvement, emotional intelligence , work performance

Procedia PDF Downloads 194
3870 The Sustained Utility of Japan's Human Security Policy

Authors: Maria Thaemar Tana

Abstract:

The paper examines the policy and practice of Japan’s human security. Specifically, it asks the question: How does Japan’s shift towards a more proactive defence posture affect the place of human security in its foreign policy agenda? Corollary to this, how is Japan sustaining its human security policy? The objective of this research is to understand how Japan, chiefly through the Ministry of Foreign Affairs (MOFA) and JICA (Japan International Cooperation Agency), sustains the concept of human security as a policy framework. In addition, the paper also aims to show how and why Japan continues to include the concept in its overall foreign policy agenda. In light of the recent developments in Japan’s security policy, which essentially result from the changing security environment, human security appears to be gradually losing relevance. The paper, however, argues that despite the strategic challenges Japan faced and is facing, as well as the apparent decline of its economic diplomacy, human security remains to be an area of critical importance for Japanese foreign policy. In fact, as Japan becomes more proactive in its international affairs, the strategic value of human security also increases. Human security was initially envisioned to help Japan compensate for its weaknesses in the areas of traditional security, but as Japan moves closer to a more activist foreign policy, the soft policy of human security complements its hard security policies. Using the framework of neoclassical realism (NCR), the paper recognizes that policy-making is essentially a convergence of incentives and constraints at the international and domestic levels. The theory posits that there is no perfect 'transmission belt' linking material power on the one hand, and actual foreign policy on the other. State behavior is influenced by both international- and domestic-level variables, but while systemic pressures and incentives determine the general direction of foreign policy, they are not strong enough to affect the exact details of state conduct. Internal factors such as leaders’ perceptions, domestic institutions, and domestic norms, serve as intervening variables between the international system and foreign policy. Thus, applied to this study, Japan’s sustained utilization of human security as a foreign policy instrument (dependent variable) is essentially a result of systemic pressures (indirectly) (independent variables) and domestic processes (directly) (intervening variables). Two cases of Japan’s human security practice in two regions are examined in two time periods: Iraq in the Middle East (2001-2010) and South Sudan in Africa (2011-2017). The cases show that despite the different motives behind Japan’s decision to participate in these international peacekeepings ad peace-building operations, human security continues to be incorporated in both rhetoric and practice, thus demonstrating that it was and remains to be an important diplomatic tool. Different variables at the international and domestic levels will be examined to understand how the interaction among them results in changes and continuities in Japan’s human security policy.

Keywords: human security, foreign policy, neoclassical realism, peace-building

Procedia PDF Downloads 133
3869 Climacteric Disorder among Women: A Qualitative Review

Authors: Amandeep Kaur, Manmeet Gill

Abstract:

The climacteric is a wide phenomenon. Women of the entire world go through it at their own level. It’s a topic on which women hesitate to talk openly. It includes breast tenderness, uterine bleeding, arthralgia, hemorrhage, changes in emotional level such as facing depression, emotional breakdown, irritability and others. Other than such emotional breakdown nausea, vomiting, headache, gaining or losing weight is common problem associated with the climacteric disorder. The purpose of the present study is to assess the Climacteric disorders among women such as during menopause whatever a woman or girl faces mentally or physically. This is mainly done in women when they reached the age of 12 to 48 worldwide. For completing the study two objectives have been taken. The first objective of the study is to analyze the symptoms which lead to Climacteric among women such as Vaginal problems, Breast changes, Behavioral problems, Weight gain, Problems in the urinary tract etc. and the second Objective is to identify the variables which affect Climacteric these are Physical variables (lack of energy, joint soreness, stiffness, back pain etc.), Psychological variables (anxiety, poor memory, inability to concentrate) and Vasomotor variables (hormone estrogen fall, etc). The secondary source of method or data is used to deal with the theme of paper. Sometimes the word climacteric is interchanged with the term menopause and all these changes are high during the period of menopause among women.

Keywords: climacteric and their symposiums, disorder, reviews, in middle age

Procedia PDF Downloads 135
3868 The Dark Side of Tourism's Implications: A Structural Equation Modeling Study of the 2016 Earthquake in Central Italy

Authors: B. Kulaga, A. Cinti, F. J. Mazzocchini

Abstract:

Despite the fact that growing academic attention on dark tourism is a fairly recent phenomenon, among the various reasons for travelling death-related ones, are very ancient. Furthermore, the darker side of human nature has always been fascinated and curious regarding death, or at least, man has always tried to learn lessons from death. This study proposes to describe the phenomenon of dark tourism related to the 2016 earthquake in Central Italy, deadly for 302 people and highly destructive for the rural areas of Lazio, Marche, and Umbria Regions. The primary objective is to examine the motivation-experience relationship in a dark tourism site, using the structural equation model, applied for the first time to a dark tourism research in 2016, in a study conducted after the Beichuan earthquake. The findings of the current study are derived from the calculations conducted on primary data compiled from 350 tourists in the areas mostly affected by the 2016 earthquake, including the town of Amatrice, near the epicenter, Castelluccio, Norcia, Ussita and Visso, through conducting a Likert scale survey. Furthermore, we use the structural equation model to examine the motivation behind dark travel and how this experience can influence the motivation and emotional reaction of tourists. Expected findings are in line with the previous study mentioned above, indicating that: not all tourists visit the thanatourism sites for dark tourism purpose, tourists’ emotional reactions influence more heavily the emotional tourist experience than cognitive experiences do, and curious visitors are likely to engage cognitively by learning about the incident or related issues.

Keywords: dark tourism, emotional reaction, experience, motivation, structural equation model

Procedia PDF Downloads 144
3867 The Effect of Realizing Emotional Synchrony with Teachers or Peers on Children’s Linguistic Proficiency: The Case Study of Uji Elementary School

Authors: Reiko Yamamoto

Abstract:

This paper reports on a joint research project in which a researcher in applied linguistics and elementary school teachers in Japan explored new ways to realize emotional synchrony in a classroom in childhood education. The primary purpose of this project was to develop a cross-curriculum of the first language (L1) and second language (L2) based on the concept of plurilingualism. This concept is common in Europe, and can-do statements are used in forming the standard of linguistic proficiency in any language; these are attributed to the action-oriented approach in the Common European Framework of Reference for Languages (CEFR). CEFR has a basic tenet of language education: improving communicative competence. Can-do statements are classified into five categories based on the tenet: reading, writing, listening, speaking/ interaction, and speaking/ speech. The first approach of this research was to specify the linguistic proficiency of the children, who are still developing their L1. Elementary school teachers brainstormed and specified the linguistic proficiency of the children as the competency needed to synchronize with others – teachers or peers – physically and mentally. The teachers formed original can-do statements in language proficiency on the basis of the idea that emotional synchrony leads to understanding others in communication. The research objectives are to determine the effect of language education based on the newly developed curriculum and can-do statements. The participants of the experiment were 72 third-graders in Uji Elementary School, Japan. For the experiment, 17 items were developed from the can-do statements formed by the teachers and divided into the same five categories as those of CEFR. A can-do checklist consisting of the items was created. The experiment consisted of three steps: first, the students evaluated themselves using the can-do checklist at the beginning of the school year. Second, one year of instruction was given to the students in Japanese and English classes (six periods a week). Third, the students evaluated themselves using the same can-do checklist at the end of the school year. The results of statistical analysis showed an enhancement of linguistic proficiency of the students. The average results of the post-check exceeded that of the pre-check in 12 out of the 17 items. Moreover, significant differences were shown in four items, three of which belonged to the same category: speaking/ interaction. It is concluded that children can get to understand others’ minds through physical and emotional synchrony. In particular, emotional synchrony is what teachers should aim at in childhood education.

Keywords: elementary school education, emotional synchrony, language proficiency, sympathy with others

Procedia PDF Downloads 168
3866 Factors That Affect the Mental Health Status of Syrian Refugee Girls in Post-Resettlement Context

Authors: Vivian Khamis

Abstract:

Exposure to war and forced migration have been widely linked to child subsequent adaptation. What remains sparse is research spanning multiple risk and protective factors and examining their unique and relative implications to difficulties in mental health among refugee girls. This study investigated the mechanisms through which posttraumatic stress disorder (PTSD), emotion dysregulation , neuroticism, and behavioral and emotional disorders in Syrian refugee girls is impacted by exposure to war traumas, age, and other risk and protective factors such as coping styles, family relationships, and school environment. The sample consisted of 539 Syrian refugee girls who ranged in age from 7 to 18 years attending public schools in various governorates in Lebanon and Jordan. Two school counselors carried out the interviews with children at school. Results indicated that war trauma, older age, and a combination of negative copying style associated with conflict in the family could lead to an overall state of emotion dysregulation, neuroticism, behavioral and emotional disorders, and PTSD in refugee girls. On the other hand, lapse of time since resettlement in host country, positive copying style, cohesion, and expressiveness in the family would lead to more positive mental health status, including lower levels of emotion dysregulation, neuroticism, behavioral and emotional disorders, and PTSD . Enhanced understanding of the mechanistic role of risk and protective factors in contributing to difficulties in mental health in refugee girls may contribute to the development of effective interventions to target the psychological effects of the refugee experience.

Keywords: refugee girls, PTSD, emotion dysregulation, neuroticism, behavioral and emotional disorders

Procedia PDF Downloads 78
3865 Ethno-Religious Conflicts In Nigeria; Implications for National Security

Authors: Samuel Onyekachi Chidi

Abstract:

Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.

Keywords: ethnicity, religion, conflict, national security

Procedia PDF Downloads 76
3864 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 379
3863 Maras and Public Security in Central America in XXI Century

Authors: Michal Stelmach

Abstract:

The aim of this paper is a critical analysis of the security policy in the field of the fight against transnational criminal groups in Central America in XXI century. We are analyzing all taken issues from several perspectives: political, anthropological, sociological and legal which allows me to confront behavior and the attitudes of the political elites against official legislative changes and declared actions, strategies and policies against practice. In the first part of paper we would like to present the genesis and characteristic of transnational gangs, called maras and next we would like to present their activities and roles within chosen sectors of organized crimes. In the second part we will analyze the government’s policy towards transnational criminal groups. The analysis will be concentrated on public safety policy implemented in specific Central American countries as well as regional international cooperation. The main intention of the author is to present the state of the security in Central America in XXI century by emphasizing failures and successes in the fight against transnational criminal organizations. Additionally we want to present and define the challenges currently facing the region now and to show the prediction of the situation’s development within next future and to define the recommendations on the design of public security policies in Central American countries.

Keywords: maras, public security, human rights, Central America

Procedia PDF Downloads 332
3862 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 146
3861 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 358
3860 Emotional Intelligence in Educational Arena and Its Pragmatic Concerns

Authors: Mehar Fatima

Abstract:

This study intends to make analysis of Emotional Intelligence (EI) in the process of pedagogy and look into its repercussions in different educational institutions including school, college, and university in the capital state of India, Delhi in 2015. Field of education is a complex area with challenging issues in a modern society. Education is the breeding ground for nurturing human souls, and personalities. Since antiquity, man has been in search of truth, wisdom, contentment, peace. His efforts have brought him to acquire these through hardship, evidently through the process of teaching and learning. Computer aids and artificial intelligence have made life easy but complex. Efficient pedagogy involves direct human intervention despite the flux of technological advancements. Time and again, pedagogical practices demand sincere human efforts to understand and improve upon life’s many pragmatic concerns. Apart from the intense academic scientific approaches, EI in academia plays a vital role in the growth of education, positively achieving national progression; ‘pedagogy of pragmatic purpose.’ Use of literature is found to be one of the valuable pragmatic tools of Emotional Intelligence. This research examines the way literature provides useful influence in building better practices in teaching-learning process. The present project also scrutinizes various pieces of world literature and translation, incorporating efforts of intellectuals in promoting comprehensive amity. The importance of EI in educational arena with its pragmatic uses was established by the study of interviews, and questionnaire collected from teachers and students. In summary the analysis of obtained empirical data makes it possible to accomplish that the use Emotional Intelligence in academic scenario yields multisided positive pragmatic outcomes; positive attitude, constructive aptitude, value-added learning, enthusiastic participation, creative thinking, lower apprehension, diminished fear, leading to individual as well as collective advancement, progress, and growth of pedagogical agents.

Keywords: emotional intelligence, human efforts, pedagogy, pragmatic concerns

Procedia PDF Downloads 370
3859 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 517
3858 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 335
3857 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 297
3856 Standards of Toxicity and Food Security in Brazil

Authors: Ana Luiza Da Gama E Souza

Abstract:

This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.

Keywords: standards, indicators, human rights, food security

Procedia PDF Downloads 333
3855 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 419
3854 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 393
3853 Creativity and Expressive Interpretation of Musical Drama in Children with Special Needs (Down Syndrome) in Special Schools Yayasan Pendidikan Anak Cacat, Medan, North Sumatera

Authors: Junita Batubara

Abstract:

Children with special needs, especially those with disability in mental, physical or social/emotional interactions, are marginalized. Many people still view them as troublesome, inconvenience, having learning difficulties, unproductive and burdensome to society. This study intends to investigate; how musical drama can develop the ability to control the coordination of mental functions; how musical dramas can assist children to work together; how musical dramas can assist to maintain the child's emotional and physical health; how musical dramas can improve children creativity. The objectives of the research are: To know whether musical drama can control the coordination of mental function of children; to know whether musical drama can improve communication ability and expression of children; to know whether musical drama can help children work with people around them; to find out if musical dramas can develop the child's emotional and physical health; to find out if musical drama can improve children's creativity. The study employed a qualitative research approach. Data was collecting by listening, observing in depth through public hearings that select the key informants who were teachers and principals, parents and children. The data obtained from each public hearing was then processed (reduced), conclusion drawing/verification, presentation of data (data display). Furthermore, the model obtained was implementing for musical performance, where the benefits of the show are: musical drama can improve language skills; musical dramas are capable of developing memory and storage of information; developing communication skills and express themselves; helping children work together; assisting emotional and physical health; enhancing creativity.

Keywords: children Down syndrome, music, drama script, performance

Procedia PDF Downloads 241