Search results for: employee security behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9310

Search results for: employee security behavior

8710 Work Engagement Reducing Employee Turnover Intentions in Telecommunication Sector: The Moderator Role of Human Resource Development Climate between Work Engagement and Turnover Intentions

Authors: Pirzada Sami Ullah Sabri

Abstract:

The present study examines the relationship between work engagement (WE) and employee turnover intentions (TI) in telecommunication sector using human resource development climate (HRDC) as a moderator. Based on 538 employees of telecommunication sector Hierarchal regression analysis is employed to examine the influence of HRDC on the relationship of work engagement and turnover intentions. The result indicates the negative correlation between work engagement and turnover intentions; HRD climate support as a powerful moderator increases the work engagement and lessens the turnover intentions. The study shows the importance of favorable and supportive HRD climate which foster the work engagement of the employees in the organization. By understanding the importance of human resource development climate and work engagement in reducing the turnover intentions can increase the productivity and performance of the organization.

Keywords: turnover intentions, work engagement, human resource development, climate, hierarchal regression analysis, telecommunication sector

Procedia PDF Downloads 419
8709 Mobile Application for Construction Sites Management

Authors: A. Khelifi, M. Al Kaabi, B. Al Rawashdeh

Abstract:

The infrastructure is one of the most important pillars of the UAE, where it spends millions of dollars for investments in the construction sectors. The research done by Kuwait Finance House (KFH) Research showed clearly that the UAE investments in the construction sectors have exceeded 30 billion dollars in 2013. There are many construction companies in the UAE and each one of them is taking the responsibilities to build different infrastructures. The large scale construction projects consist of multi human activities which can affect the efficiency and productivity of the running projects. The Construction Administration System is developed to increase the efficiency and productivity at the construction sites. It runs on two platforms: web server and mobile phone and supports two main users: mobile user and institution employee. With Construction Administration Mobile Application the user can manage and control several projects, create several reports and send these reports in Portable Document Format (PDF) formats through emails, view the physical location of each project, capturing and save photos. An institution employee can use the system to view all existing workers and projects, send emails and view the progress of each project.

Keywords: construction sites, management, mobile application, Portable Document Format (PDF)

Procedia PDF Downloads 354
8708 Moderating Role of Psychological Contract in Relationship between Moral Disengagement and Counterproductive Work Behavior

Authors: Afsheen Masood, Sumaira Rashid, Nadia Ijaz, Shama Mazahir

Abstract:

The current study examined the relationship between moral disengagement, psychological contract, organizational citizenship behavior and counterproductive work behavior. It is hypothesized that there is likely to be a significant relationship between moral disengagement, psychological contract, organizational citizenship behavior and counterproductive work behavior. It is hypothesized that moral disengagement is likely to significantly predict counterproductive work behavior. It is hypothesized that psychological contract is likely to moderate the relationship between moral disengagement, and counterproductive work behavior. Cross-sectional survey research design was used for the study. The sample consisted of 500 middle managers, age ranging between 30-45 years working in private and public sector. The measures used were Moral Disengagement Scale, Psychological Contract Scale, and Counterproductive Work Behavior. Series of Correlation analyses, Regression analysis, moderation analysis and t-test was run in order to execute descriptive and inferential analyses. The findings revealed that there was a significant positive relationship between moral disengagement and counterproductive work behaviors. Psychological contract significantly mediated the relationship between moral disengagement and counterproductive work behaviors. There were significant gender differences reported in psychological contract and counterproductive work behaviors. The insightful findings carry significant implication for organizational psychologists and organizational stakeholders.

Keywords: psychological contract, moral disengagement, counterproductive work behaviors, mediation analysis

Procedia PDF Downloads 287
8707 The Principle of Methodological Rationality and Security of Organisations

Authors: Jan Franciszek Jacko

Abstract:

This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.

Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics

Procedia PDF Downloads 120
8706 Analyzing Current Transformer’s Transient and Steady State Behavior for Different Burden’s Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, D. Sharma

Abstract:

Current transformers (CTs) are used to transform large primary currents to a small secondary current. Since most standard equipment’s are not designed to handle large primary currents the CTs have an important part in any electrical system for the purpose of Metering and Protection both of which are integral in Power system. Now a days due to advancement in solid state technology, the operation times of the protective relays have come to a few cycles from few seconds. Thus, in such a scenario it becomes important to study the transient response of the current transformers as it will play a vital role in the operating of the protective devices. This paper shows the steady state and transient behavior of current transformers and how it changes with change in connected burden. The transient and steady state response will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer characteristics with changes in burden will be discussed.

Keywords: accuracy, accuracy limiting factor, burden, current transformer, instrument security factor

Procedia PDF Downloads 324
8705 Cross-Sectional Analysis of Sustainability Activities in the Pharmaceutical Companies

Authors: Kanika Saxena, Sunita Balani

Abstract:

Purpose - The aim of the study is to compare the reported sustainability activities in areas of emission, water management and gender equality, currently undertaken by the seven major pharmaceutical companies. Methodology: The published corporate sustainability activity reports for the year 2017 for seven pharmaceutical companies have been studied. The two main criteria for the inclusion of pharmaceutical companies in this study are that they are globally recognized and active in the field of sustainability reporting. Company’s actions and initiatives have been grouped under three categories: (i) Emissions (ii) Water management (iii) Gender Equality in terms of employee workforce. Findings: Based on the sustainability reports, quantification and grading of the companies showed interesting results. Johnson & Johnson and Bayer are leading their activities under emissions and water management categories. The number of activities under emission and water management in case of Eli Lily, Roche, Sanofi, Pfizer and GlaxoSmithKline were 19, 16, 16, 11 and 6 respectively. Johnson & Johnson and Eli Lily are leading in taking the initiatives to curb the problem of emissions as compared with other 5 companies. Under the category of gender equality in terms of employee workforce, Eli Lily is leading the group of sampled companies with 47% of women employee workforce globally followed by Sanofi with 46.2% (42.2% of managers) female employees. It has also been observed that in some of the reports, gender diversification in the workforce has not been mentioned though the total number of employees were mentioned. Conclusion: This study could serve as the informative material for future in-depth industry-specific studies in order to find out the participation of the pharmaceutical companies in the reporting of the sustainability activities especially in reference to emission, water management and gender equality in the workforce. In addition to it, this can be helpful as a reference point for other companies in the pharmaceutical sector who are yet to explore the field of sustainability initiatives and reporting. Due to the limited scope of this study, only seven major players of the pharmaceutical sector who are active in the field of sustainability have been considered.

Keywords: emission, gender equality workforce, pharmaceutical, sustainability, water management

Procedia PDF Downloads 131
8704 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 94
8703 Investigating the Trends in Tourism and Hospitality Industry in Nigeria at Centenary

Authors: Pius Agbebi Alaba

Abstract:

The study emphasized on the effects of contemporary and prospect trends on the development of Hospitality and Tourism in Nigeria. Specifically, the study examined globalization, safety and security, diversity, service, technology, demographic changes and price–value as contemporary trends while prospect trends such as green and Eco-lodgings, Development of mega hotels, Boutique hotels, Intelligent hotels with advanced technology using the guest’s virtual fingerprint in order to perform all the operations, increasing employee salaries in order retain the existing Staff, More emphasis on the internet and technology, Guests’ virtual and physical social network were equally examined. The methodology for the study involved review of existing related study, books, journal and internet. The findings emanated from the exercise showed clearly that the impact of both trends on the development of Hospitality and Tourism in Nigeria would bring about rapid positive transformation of her socio-economic, political and cultural environment. The implication of the study is that it will prepare both private and corporate individuals in hospitality and tourism business for the challenges inherent in both trends.

Keywords: hospitality and tourism, Nigeria's centenary, trends, implications

Procedia PDF Downloads 313
8702 Ethno-Religious Conflicts In Nigeria; Implications for National Security

Authors: Samuel Onyekachi Chidi

Abstract:

Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.

Keywords: ethnicity, religion, conflict, national security

Procedia PDF Downloads 48
8701 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 353
8700 Effectiveness of Electronic Learning for Continuing Interprofessional Education on Behavior Change of Healthcare Professionals: A Scoping Review

Authors: Kailin K. Zhang, Anne W. Thompson

Abstract:

Electronic learning for continuing professional education (CPE) and interprofessional education (IPE) in healthcare have been shown to improve learners’ satisfaction, attitudes, and performance. Yet, their impact on behavior change in healthcare professionals through continuing interprofessional education (CIPE) is less known. A scoping review of 32 articles from 2010 to 2020 was conducted using the Arksey and O’Malley framework across all healthcare settings. It focused on evaluating the effectiveness of CIPE on behavior change of healthcare professionals, as well as identifying course features of electronic CIPE programs facilitating behavior change. Eight different types of electronic learning methods, including online programs, tele-education, and social media, were identified as interventions. More than 35,542 healthcare professionals participated in the interventions. Electronic learning for CIPE led to positive behavior outcomes in 30 out of 32 studies, especially through a change in patient care practices. The most successful programs provided interactive and authentic learning experiences tailored to learners’ needs while promoting the direct application of what was learned in their clinical settings. Future research should include monitoring of sustained behavior changes and their resultant patient outcomes.

Keywords: behavior change, continuing interprofessional education, distance learning, electronic learning

Procedia PDF Downloads 121
8699 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 125
8698 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 333
8697 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 487
8696 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 312
8695 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 274
8694 A System Dynamics Approach to Exploring Personality Traits in Young Children

Authors: Misagh Faezipour

Abstract:

System dynamics is a systems engineering approach that can help address the complex challenges in different systems. Little is known about how the brain represents people to predict behavior. This work is based on how the brain simulates different personal behavior and responds to them in the case of young children ages one to five. As we know, children’s minds/brains are just as clean as a crystal, and throughout time, in their surroundings, families, and education center, they grow to develop and have different kinds of behavior towards the world and the society they live in. Hence, this work aims to identify how young children respond to various personality behavior and observes their reactions towards them from a system dynamics perspective. We will be exploring the Big Five personality traits in young children. A causal model is developed in support of the system dynamics approach. These models graphically present the factors and factor relationships that contribute to the big five personality traits and provide a better understanding of the entire behavior model. A simulator will be developed that includes a set of causal model factors and factor relationships. The simulator models the behavior of different factors related to personality traits and their impacts and can help make more informed decisions in a risk-free environment.

Keywords: personality traits, systems engineering, system dynamics, causal model, behavior model

Procedia PDF Downloads 77
8693 Standards of Toxicity and Food Security in Brazil

Authors: Ana Luiza Da Gama E Souza

Abstract:

This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.

Keywords: standards, indicators, human rights, food security

Procedia PDF Downloads 312
8692 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 393
8691 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 366
8690 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 327
8689 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 107
8688 Experimental Analysis of the Origins of the Anisotropy Behavior in the 2017 AA Aluminum Alloy

Authors: May Abdelghani

Abstract:

The present work is devoted to the study of the microstructural anisotropy in mechanical cyclic behavior of the 2017AA aluminum alloy which is widely used in the aerospace industry. The main purpose of the study is to investigate the microstructural origins of this anisotropy already confirmed in our previous work in 2017AA aluminum alloy. To do this, we have used the microstructural analysis resources such as Scanning Electron Microscope (SEM) to see the differences between breaks from different directions of cyclic loading. Another resource of investigation was used in this study is that the EBSD method, which allows us to obtain a mapping of the crystallographic texture of our material. According to the obtained results in the microscopic analysis, we are able to identify the origins of the anisotropic behavior at the macroscopic scale.

Keywords: fatigue damage, cyclic behavior, anisotropy, microstructural analysis

Procedia PDF Downloads 392
8687 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 666
8686 The Effects of Prosocial and Antisocial Behaviors on Task Cohesion and Burnout: The Role of Affect and Motivational Climate

Authors: Ali Al-Yaaribi, Maria Kavussanu

Abstract:

Prosocial and antisocial behavior occurs in sport. Prosocial behavior is voluntary behavior intended to help or benefit another individual, while antisocial behavior is behavior intended to harm or disadvantage another individual. Previous sport morality research has investigated primarily antecedents of prosocial and antisocial behavior. However, the potential consequences of these behaviors remain unexplored. The aims of this study were to examine whether: (a) perceived prosocial and antisocial teammate behavior predicts task cohesion and burnout; (b) affect mediate these relationships; and (c) motivational climate moderates any of these effects. Participants were male (n = 96) and female (n = 176) teams sport players (Mage = 21.86, SD = 4.36), who completed questionnaires measuring the aforementioned variables. Mediation analysis (Hayes, 2013) indicated that prosocial teammate behavior positively predicted task cohesion and negatively predicted burnout; these effects were mediated by positive affect. Also, mastery climate moderated the positive effect of prosocial teammate behavior on task cohesion: The effect of antisocial teammate behavior on task cohesion was stronger for players who perceived a higher mastery climate created by their coaches. Performance climate moderated the negative effect of prosocial teammate behavior on burnout: This effect was only significant for players who perceived moderate or low levels of performance team climate. Antisocial teammate behavior negatively predicted task cohesion and positively predicted burnout, and these effects were mediated by negative affect. Also, performance climate moderated the positive effect of antisocial teammate behavior on burnout, such that the effect of antisocial teammate behavior on burnout was stronger for players who perceived a lower performance climate. The research findings shed some light on the potential role of prosocial and antisocial teammate behaviors as well as coach-created motivational climate on influencing players’ affect, task cohesion, and burnout. Coaches should focus on creating a mastery motivational climate and rewarding prosocial behavior while at the same time trying to deter antisocial behavior among teammates in order to enhance positive affect, task cohesion, and prevent experience of negative affect and burnout.

Keywords: mediation, moderation, morality, teams sport

Procedia PDF Downloads 320
8685 Servant Leadership and Organizational Citizenship Behavior: The Mediating Role of Perceived Organizational Politics and the Moderating Role of Political Skill in Public Service Organizations

Authors: Debalkie Demissie Addisu, Ejigu Alemu Abebe, Tsegay Tensay Assefa

Abstract:

This study examines the indirect effect of servant leadership on organizational citizenship behavior through perceptions of organizational politics moderated by political skill. This study reports the responses of 321 respondents from six federal public service organizations in Ethiopia. A multi-stage random sampling procedure was employed to select the sampled federal public service organizations. To test hypotheses, the study employed structural equation modeling using AMOS version-26 software. The result revealed that all direct effects have a significant effect. Specifically, servant leadership has a positive effect on organizational citizenship behavior. Likewise, servant leadership has a negative effect on perceptions of organizational politics. Also, a perception of organizational politics has a negative effect on organizational citizenship behavior. Moreover, perceptions of organizational politics competitively mediated the effect of servant leadership on organizational citizenship behavior. As well, political skill moderated the effect of perceptions of organizational politics on organizational citizenship behavior but not the indirect effect. To the best of our knowledge, no one else employs perceptions of organizational politics as a mediating effect between servant leadership and organizational citizenship behavior. Furthermore, we are not aware of anyone else employing political skill as a moderating role in the indirect effect of servant leadership on organizational citizenship behavior through perceptions of organizational politics.

Keywords: servant leadership, organizational citizenship behavior, perceptions of organizational politics, political skill, public service organization, Ethiopia

Procedia PDF Downloads 38
8684 Relationship of Organizational Culture, Teacher Psychological Empowerment, and Organizational Citizenship Behavior in Universities in Bangkalan District

Authors: Iqbal Abd. Muhbir Hadi Anam

Abstract:

The purpose of the study is to discuss the relationship between organizational culture, teacher psychological empowerment, and organizational citizenship behavior at the University of Bangkalan District. The data was obtained using a survey of 100 respondents tested for validity and reliability. The analytical technique used is a hierarchical regression test. The results showed that the organizational culture of the university had a strong influence on the psychological empowerment of teachers and the psychological empowerment of teachers and that the organizational culture and psychological empowerment of teachers provided effective predictions of the psychological empowerment of the university. In addition, organizational culture directly or indirectly influences teachers' organizational citizenship behavior through psychological empowerment. Given these results, universities need to build an organizational culture that reflects the nature of the university.

Keywords: organizational behavior, teacher psychological empowerment, organizational citizenship behavior, universities

Procedia PDF Downloads 178
8683 Analysis of Users’ Behavior on Book Loan Log Based on Association Rule Mining

Authors: Kanyarat Bussaban, Kunyanuth Kularbphettong

Abstract:

This research aims to create a model for analysis of student behavior using Library resources based on data mining technique in case of Suan Sunandha Rajabhat University. The model was created under association rules, apriori algorithm. The results were found 14 rules and the rules were tested with testing data set and it showed that the ability of classify data was 79.24 percent and the MSE was 22.91. The results showed that the user’s behavior model by using association rule technique can use to manage the library resources.

Keywords: behavior, data mining technique, a priori algorithm, knowledge discovery

Procedia PDF Downloads 388
8682 Meditation-Based Interventions in the Workplace

Authors: Louise Fitzgerald, John Allman

Abstract:

Introduction: Having previously engaged in a meditation-based programme (MBP) for staff in general practice, we explore the evidence and extent to which MBPs are employed in the workplace. Aim of the study: We aim to understand the current workplace MBP intervention literature, which will help inform the suitability of these interventions within the workplace domain. Objectives: Uptake of MBPs in the workplace has grown as organizations look to support employee health, wellbeing, and performance. We will discuss the current MBP literature, including the large variability across MBPs and the associated difficulties in evaluating their efficacy. Learning points: 1) MBPs have a positive impact on cognitive function including concentration and memory and as such job performance. MBPs appear to have a positive impact on objective and subjective job satisfaction, productivity, motivation and work engagement. Meditation in the workplace may have positive impacts on mental health issues - including stress reduction and depression. 2) From our review MBPs appear to be implementable in a wide range of professions and work contexts - regardless of individual factors. Given many companies are focusing on health and wellbeing of employees, this could be included in employee wellbeing programmes. 3) Despite the benefits of mindfulness and meditation interventions in psychosocial workplace health and work performance the long-term efficacy has yet to be fully determined.

Keywords: meditation-based programmes, mindfulness, meditation, well-being

Procedia PDF Downloads 117
8681 The Consumer Behavior and the Customer Loyalty of CP Fresh Mart Consumers in Bangkok

Authors: Kanmanas Muensak, Somphoom Saweangkun

Abstract:

The objectives of this research were to study the consumer behavior that affects the customer loyalty of CP Fresh Mart in Bangkok province. The sample of the study comprised 400 consumers over 15 years old who made the purchase through CP Fresh Mart in Bangkok. The questionnaires were used as the data gathering instrument, and the data were analyzed applying Percentage, Mean, Standard Deviation, Independent Sample t-test, Two- Way ANOVA, and Least Significant Difference, and Pearson’s Correlation Coefficient also. The result of hypothesis testing showed that the respondents of different gender, age, level of education, income, marital status and occupation had differences in consumer behavior through customer loyalty of CP Fresh Mart and the factors on customer loyalty in the aspects of re-purchase, word of mouth and price sensitive, promotion, process, and personnel had positive relationship with the consumer behavior through of CP Fresh Mart in Bangkok as well as.

Keywords: consumers in Bangkok, consumer behavior, customer loyalty, CP Fresh Mart, operating budget

Procedia PDF Downloads 305