Search results for: emotional security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4422

Search results for: emotional security

3792 Security Analysis of SIMSec Protocol

Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: End-to-end encryption, key exchange, SIM card, smart card

Procedia PDF Downloads 283
3791 e-Learning Security: A Distributed Incident Response Generator

Authors: Bel G Raggad

Abstract:

An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.

Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection

Procedia PDF Downloads 437
3790 Domestic Violence against Rural Women in Haryana State of India

Authors: Jatesh Kathpalia, Subhash Chander

Abstract:

Violence against women has spread into a global epidemic. This has debilitating effect over the performance of women. Due to deep-rooted values, traditional Indian culture women fear the consequences of reporting violence and declare an unwillingness to subject themselves to the shame of being identified as battered women. Main interest was to study types of domestic violence which women face and to encourage them to report the matter. The study involved understanding the nature, extent and types of domestic violence. Two hundred rural women respondents were selected at random, interview schedule was prepared, and victims afflicted with domestic violence were identified. Data were collected and analyzed for different forms of domestic violence faced by women. 60% of the respondents faced domestic violence in different forms. Out of 120 women who were affected, 92.5% faced emotional, 90.8% faced verbal, 49.1% faced economic and 58.3% faced physical violence. 45.0% faced violence within three months of the marriage. Out of these, only 6.6% reported the violence to the police. Frequently faced forms of violence were slapping (27.1%), beating (24.3%) and starvation (25.7%). Number of women who were not allowed to spend money of their own stood at 30.5%. About 50% victims of emotional violence were facing constant criticism by their in-laws. Significant association was found between age, education and socio-economic status of the respondents and domestic violence. Rural women in Haryana face grave problem of domestic violence which need to be curbed for improving condition of women in society.

Keywords: domestic violence against women, economic, emotional, physical and verbal violence, marriage, rural women

Procedia PDF Downloads 387
3789 Effect of Cloud Computing on Enterprises

Authors: Amir Rashid

Abstract:

Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.

Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS

Procedia PDF Downloads 340
3788 Effects of the Social Work Field Practicum on the Wellbeing of Non-Traditional and Underserved Students: A Mixed-Methods Study

Authors: Dana S. Smith, Angela Goins, Shahnaz Savani

Abstract:

Using a mixed-methods approach, this study explored costs to student wellbeing generated by the social work field practicum requirement. The project was conducted by faculty at a medium-sized university in the United States. Social work educators and field practicum instructors participated in interviews. Students and former students completed surveys on the topic. The data analysis revealed emotional burdens as well as threats to student wellbeing in association with the fieldwork required for those in pursuit of a social work degree. The study includes recommendations for anti-oppressive approaches for academic programs and implications for further research.

Keywords: emotional wellbeing, field practicum, mixed-methods, social justice

Procedia PDF Downloads 101
3787 Effects of the Social Work Field Practicum on the Wellbeing of Non-traditional and Underserved Students: A Mixed-Methods Study

Authors: Dana S. Smith, Angela Goins, Shahnaz Savani

Abstract:

Using a mixed-methods approach, this study explored costs to student wellbeing generated by the social work field practicum requirement. The project was conducted by faculty at a medium sized university in the United States. Social work educators and field practicum instructors participated in interviews. Students and former students completed surveys on the topic. The data analysis revealed emotional burdens as well as threats to student wellbeing in association with the fieldwork required for those in pursuit of a social work degree. The study includes recommendations of anti-oppressive approaches for academic programs and implications for further research.

Keywords: emotional wellbeing, field practicum, mixed-methods, social justice

Procedia PDF Downloads 90
3786 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 644
3785 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 435
3784 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 357
3783 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 48
3782 Place Attachment as Basic Condition for Wellbeing and Life Satisfaction in East African Wetland Users

Authors: Sophie-Bo Heinkel, Andrea Rechenburg, Thomas Kistemann

Abstract:

The current status of wellbeing and life satisfaction of subsistence farmers in a wetland in Uganda and the contributing role of place attachment has been assessed. The aim of this study is to shed light on environmental factors supporting wellbeing in a wetland setting. Furthermore, it has been assessed, how the emotional bonding to the wetland as ‘place’ influences the peoples’ wellbeing and life satisfaction. The results shed light on the human-environment-relationship. A survey was carried out in three communities in urban and rural areas in a wetland basin in Uganda. A sample (n=235) provided information about the attachment to the wetland, the participants’ relation to the place of their residence and their emotional wellbeing. The Wellbeing Index (WHO-5) was assessed as well as the Perceived Stress Scale (PSS-10) and Rosenberg’s Self-Esteem scale (RSE). Furthermore, the Satisfaction With Life Scale (SWLS) was applied as well as the Place Attachment Inventory (PAI), which consists of the two intertwined dimensions of place identity and place dependence. Beside this, binary indicators as ‘feeling save’ and ‘feeling comfortable’ and ‘enjoying to live at the place of residence’ have been assessed. A bivariate correlation analysis revealed a high interconnectivity between all metric scales. Especially, the subscale ‘place identity’ showed significances with all other scales. A cluster analysis revealed three groups, which differed in the perception of place-related indicators and their attachment to the wetland as well as the status of wellbeing. First, a cluster whose majority is dissatisfied with their lives, but mainly had a good status of emotional well-being. This group does not feel attached to the wetland and lives in a town. Comparably less persons of this group feel safe and comfortable at their place of residence. In the second cluster, persons feel highly attached to the wetland and identify with it. This group was characterized by the high number of persons preferring their current place of residence and do not consider moving. All persons feel well and satisfied with their lives. The third group of persons is mainly living in rural areas and feels highly attached to the wetland. They are satisfied with their lives, but only a small minority is in a good emotional state of wellbeing. The emotional attachment to a place influences life satisfaction and, indirectly, the emotional wellbeing. In the present study it could be shown that subsistence farmers are attached to the wetland, as it is the source of their livelihood. While those living in areas with a good infrastructure are less dependent on the wetland and, therefore, less attached to. This feeling also was mirrored in the perception of a place as being safe and comfortable. The identification with a place is crucial for the feeling of being at “home”. Subsistence farmers feel attached to the ecosystem, but they also might be exposed to environmental and social stressors influencing their short-term emotional wellbeing. The provision of place identity is an ecosystem service provided by wetlands, which supports the status of wellbeing in human beings.

Keywords: mental health, positive environments, quality of life, wellbeing

Procedia PDF Downloads 410
3781 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 142
3780 Using Athletics to Mitigate the Negative Relational Outcomes Bullying Has On Youth with Disabilities

Authors: Kaycee Bills

Abstract:

Studies have demonstrated that middle and high school students with disabilities are more likely to experience bullying than other student groups. The high rates of bullying victimization observed among youth with disabilities can result in severe socio-emotional consequences. These socio-emotional consequences often manifest in detrimental impacts on the students’ personal relationships. Past studies have indicated that participating in extracurricular athletic activities can have several socio-emotional benefits for students with disabilities. Given the findings of past studies demonstrating the positive relationship between mental health and participation in sports among students with disabilities, it is possible that participating in athletics could have a moderating relationship on the severity of the impact that bullying has on a student’s relationships with family and friends. Using the National Crime Victimization Survey/School Crime Supplement (NCVS/SCS), this study employs an ordinal logistic regression to determine if participation in extracurricular athletic activities mitigates the damaging impact bullying has on the personal relationships with friends and family among students who have disabilities. This study identified statistically significant results suggesting that students with disabilities who participate in athletics reported reduced levels of negative personal relationships resulting from bullying compared to their peers who did not participate in athletics.

Keywords: disability, inclusion, bullying, relationships

Procedia PDF Downloads 184
3779 The Relationship between Violence against Women and Levels of Self-Esteem in Urban Informal Settlements of Mumbai, India: A Cross-Sectional Study

Authors: A. Bentley, A. Prost, N. Daruwalla, D. Osrin

Abstract:

Background: This study aims to investigate the relationship between experiences of violence against women in the family, and levels of self-esteem in women residing in informal settlement (slum) areas of Mumbai, India. The authors hypothesise that violence against women in Indian households extends beyond that of intimate partner violence (IPV), to include other members of the family and that experiences of violence are associated with lower levels of self-esteem. Methods: Experiences of violence were assessed through a cross-sectional survey of 598 women, including questions about specific acts of emotional, economic, physical and sexual violence across different time points, and the main perpetrator of each. Self-esteem was assessed using the Rosenberg self-esteem questionnaire. A global score for self-esteem was calculated and the relationship between violence in the past year and Rosenberg self-esteem score was assessed using multivariable linear regression models, adjusted for years of education completed, and clustering using robust standard errors. Results: 482 (81%) women consented to interview. On average, they were 28.5 years old, had completed 6 years of education and had been married 9.5 years. 88% were Muslim and 46% lived in joint families. 44% of women had experienced at least one act of violence in their lifetime (33% emotional, 22% economic, 24% physical, 12% sexual). Of the women who experienced violence after marriage, 70% cited a perpetrator other than the husband for at least one of the acts. 5% had low self-esteem (Rosenberg score < 15). For women who experienced emotional violence in the past year, the Rosenberg score was 2.6 points lower (p < 0.001). It was 1.2 points lower (p = 0.03) for women who experienced economic violence. For physical or sexual violence in the past year, no statistically significant relationship with Rosenberg score was seen. However, for a one-unit increase in the number of different acts of each type of violence experienced in the past year, a decrease in Rosenberg score was seen (-0.62 for emotional, -0.76 for economic, -0.53 for physical and -0.47 for sexual; p < 0.05 for all). Discussion: The high prevalence of violence experiences across the lifetime was likely due to the detailed assessment of violence and the inclusion of perpetrators within the family other than the husband. Experiences of emotional or economic violence in the past year were associated with lower Rosenberg scores and therefore lower self-esteem, but no relationship was seen between experiences of physical or sexual violence and Rosenberg score overall. For all types of violence in the past year, a greater number of different acts were associated with a decrease in Rosenberg score. Emotional violence showed the strongest relationship with self-esteem, but for all types of violence the more complex the pattern of perpetration with different methods used, the lower the levels of self-esteem. Due to the cross-sectional nature of the study causal directionality cannot be attributed. Further work to investigate the relationship between severity of violence and self-esteem and whether self-esteem mediates relationships between violence and poorer mental health would be beneficial.

Keywords: family violence, India, informal settlements, Rosenberg self-esteem scale, self-esteem, violence against women

Procedia PDF Downloads 126
3778 Discursive Psychology of Emotions in Mediation

Authors: Katarzyna Oberda

Abstract:

The aim of this paper is to conceptual emotions in the process of mediation. Although human emotions have been approached from various disciplines and perspectives, e.g. philosophy, linguistics, psychology and neurology, this complex phenomenon still needs further investigation into its discursive character with the an open mind and heart. To attain this aim, the theoretical and practical considerations are taken into account both to contextualize the discursive psychology of emotions in mediation and show how cognitive and linguistic activity expressed in language may lead to the emotional turn in the process of mediation. The double directions of this research into the discursive psychology of emotions have been partially inspired by the evaluative components of mediation forms. In the conducted research, we apply the methodology of discursive psychology with the discourse analysis as a tool. The practical data come from the recorded mediations online. The major findings of the conducted research result in the reconstruction of the emotional transformation model in mediation.

Keywords: discourse analysis, discursive psychology, emotions, mediation

Procedia PDF Downloads 156
3777 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 69
3776 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 418
3775 Correlation between Speech Emotion Recognition Deep Learning Models and Noises

Authors: Leah Lee

Abstract:

This paper examines the correlation between deep learning models and emotions with noises to see whether or not noises mask emotions. The deep learning models used are plain convolutional neural networks (CNN), auto-encoder, long short-term memory (LSTM), and Visual Geometry Group-16 (VGG-16). Emotion datasets used are Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS), Crowd-sourced Emotional Multimodal Actors Dataset (CREMA-D), Toronto Emotional Speech Set (TESS), and Surrey Audio-Visual Expressed Emotion (SAVEE). To make it four times bigger, audio set files, stretch, and pitch augmentations are utilized. From the augmented datasets, five different features are extracted for inputs of the models. There are eight different emotions to be classified. Noise variations are white noise, dog barking, and cough sounds. The variation in the signal-to-noise ratio (SNR) is 0, 20, and 40. In summation, per a deep learning model, nine different sets with noise and SNR variations and just augmented audio files without any noises will be used in the experiment. To compare the results of the deep learning models, the accuracy and receiver operating characteristic (ROC) are checked.

Keywords: auto-encoder, convolutional neural networks, long short-term memory, speech emotion recognition, visual geometry group-16

Procedia PDF Downloads 75
3774 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 497
3773 Adverse Childhood Experiences and the Sense of Effectiveness and Coping with Emotions among Adolescents Taking Drugs

Authors: Monika Szpringer, Aneta Pawlinska

Abstract:

Adverse childhood experiences are linked to various types of health and adapt problems at different stages of life. They include various types of abuse, neglect, and dysfunctional environment. They have an unfavorable impact on the development of a child and his future functioning in society. Adolescents who were exposed to bad treatment may suffer from health problems during adulthood, like chronic diseases, psychological disorders, drug addiction, and suicide attempts. Objective: The aim of the project is to assess the relationship between adverse childhood experiences and the sense of efficacy and coping with emotions among teenagers aged 16-18 taking drugs. Material And Methods: The research was carried out in the period from March to December 2018 in Mazowieckie, Świętokrzyskie, Łódzkie, and Lubelskie Voivodship. The group consisted of 600 people aged 16-18 (M=16,58; SD=0, 78), men (63,2%) aged 16-18 (M=16,60;SD= 0,78) and women (35,5%) aged 16-18 (M16,55;SD=0,79). Participants included residents from Youth Educational Centers and Youth Sociotherapy Centers. Each participant filled in Author's Questionnaire, Adverse Childhood Questionnaire, then Courtland Emotional Control Scale-CECS and Generalized Self Efficacy Scale-GSES. Results and conclusions: The most common adverse experiences, according to teenagers, were family abuse, divorce/separation/parent's death, overuse of alcohol or drugs by an inmate, and emotional neglect. Adolescents who suffered from five to twelve adverse experiences had a higher level of depression's control. Adverse childhood experiences have an importance for the level of anger and depression's control among teenagers taking drugs. The greatest importance of the level of anger's control has emotional neglect. A higher level of emotional neglect is linked to a lower ability to control anger. The greatest importance of the level of depression's control has physical abuse and emotional neglect. The higher physical abuse during childhood, and the higher frequency of emotional neglect, the bigger the depression's control. The sense of efficacy in the group of people who suffered from one to four adverse experiences is close to the sense of efficacy that suffered people from five to twelve adverse experiences. The most important factor lowering the sense of one's efficacy was the intensification of sexual abuse. It was confirmed that the intensification and frequency of adverse childhood experiences were higher among women than men. Women also characterized lower anger control and greater depression's control. The authors’ own analyses confirmed the relationship between adverse childhood experiences and the sense of efficacy and coping with emotions among teenagers aged 16-18 taking drugs.

Keywords: adolescences, adverse childhood experiences, coping with emotions, drugs

Procedia PDF Downloads 102
3772 Students’ Perception of Effort and Emotional Costs in Chemistry Courses

Authors: Guizella Rocabado, Cassidy Wilkes

Abstract:

It is well known that chemistry is one of the most feared courses in college. Although many students enjoy learning about science, most of them perceive that chemistry is “too difficult”. These perceptions of chemistry result in many students not considering Science, Technology, Engineering, and Mathematics (STEM) majors because they require chemistry courses. Ultimately, these perceptions are also thought to be related to high attrition rates of students who begin STEM majors but do not persist. Students perceived costs of a chemistry class can be many, such as task effort, loss of valued alternatives, emotional, and others. These costs might be overcome by students’ interests and goals, yet the level of perceived costs might have a lasting impact on the students’ overall perception of chemistry and their desire to pursue chemistry and other STEM careers in the future. In this mixed methods study, we investigated task effort and emotional cost, as well as a mastery or performance goal orientation, and the impact these constructs may have on achievement in general chemistry classrooms. Utilizing cluster analysis as well as student interviews, we investigated students’ profiles of perceived cost and goal orientation as it relates to their final grades. Our results show that students who are well prepared for general chemistry, such as those who have taken chemistry in high school, display less negative perceived costs and thus believe they can master the material more fully. Other interesting results have also emerged from this research, which has the potential to have an impact on future instruction of these courses.

Keywords: chemistry education, motivation, affect, perceived costs, goal orientations

Procedia PDF Downloads 90
3771 Preserving Privacy in Workflow Delegation Models

Authors: Noha Nagy, Hoda Mokhtar, Mohamed El Sherkawi

Abstract:

The popularity of workflow delegation models and the increasing number of workflow provenance-aware systems motivate the need for finding more strict delegation models. Such models combine different approaches for enhanced security and respecting workflow privacy. Although modern enterprises seek conformance to workflow constraints to ensure correctness of their work, these constraints pose a threat to security, because these constraints can be good seeds for attacking privacy even in secure models. This paper introduces a comprehensive Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegate from attacking workflow privacy as well as extending the delegation functionalities. In addition, we argue the need for exploiting workflow constraints to improve workflow security models.

Keywords: workflow delegation models, secure workflow, workflow privacy, workflow provenance

Procedia PDF Downloads 331
3770 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 532
3769 A Correlational Study between Parentification and Memory Retention among Parentified Female Adolescents: A Neurocognitive Perspective on Parentification

Authors: Mary Dorothy Roxas, Jeian Mae Dungca, Reginald Agor, Beatriz Figueroa, Lennon Andre Patricio, Honey Joy Cabahug

Abstract:

Parentification occurs when children are expected to provide instrumental or emotional caregiving within the family. It was found that parentification has the latter effect on adolescents’ cognitive and emotional vulnerability. Attachment theory helps clarify the process of parentification as it involves the relationship between the child and the parent. Carandang theory of “taga-salo” helps explain parentification in the Philippines setting. The present study examined the potential risk of parentification on adolescent’s memory retention by hypothesizing that there is a correlation between the two. The research was conducted with 249 female adolescents ages 12-24, residing in Valenzuela City. Results indicated that there is a significant inverse correlation between parentification and memory retention.

Keywords: memory retention, neurocognitive, parentification, stress

Procedia PDF Downloads 675
3768 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 125
3767 Water Security and Transboundary Issues for Food Security of Ethiopia. The Case of Nile River

Authors: Kebron Asnake

Abstract:

Water security and transboundary issues are critical concerns for countries, particularly in regions where shared water resources are significant. This Research focuses on exploring the challenges and opportunities related to water security and transboundary issues in Ethiopia, using the case of the Nile River. Ethiopia, as a riparian country of the Nile River, faces complex water security issues due to its dependence on this transboundary water resource. This abstract aims to analyze the various factors that affect water security in Ethiopia, including population growth, climate change, and competing water demands. The Study examines the challenges linked to transboundary water management of the Nile River. It delves into the complexities of negotiating water allocations and addressing potential conflicts among the downstream riparian countries. The paper also discusses the role of international agreements and cooperation in promoting sustainable water resource management. Additionally, the paper highlights the opportunities for collaboration and sustainable development that arise from transboundary water management. It explores the potential for joint investments in water infrastructure, hydropower generation, and irrigation systems that can contribute to regional economic growth and water security. Furthermore, the study emphasizes the need for integrated water management approaches in Ethiopia to ensure the equitable and sustainable use of the Nile River's waters. It highlights the importance of involving stakeholders from diverse sectors, including agriculture, energy, and environmental conservation, in decision-making processes. By presenting the case of the Nile River in Ethiopia, this Abstract contributes to the understanding of water security and transboundary issues. It underscores the significance of regional cooperation and informed policy-making to address the challenges and opportunities presented by transboundary water resources. The paper serves as a foundation for further research and policy in water management in Ethiopia and other regions facing similar challenges.

Keywords: water, health, agriculture, medicine

Procedia PDF Downloads 85
3766 The Role of Climate-Smart Agriculture in the Contribution of Small-Scale Farming towards Ensuring Food Security in South Africa

Authors: Victor O. Abegunde, Melusi Sibanda

Abstract:

There is need for a great deal of attention on small-scale agriculture for livelihood and food security because of the expanding global population. Small-scale agriculture has been identified as a major driving force of agricultural and rural development. However, the high dependence of the sector on natural and climatic resources has made small-scale farmers highly vulnerable to the adverse impact of climatic change thereby necessitating the need for embracing practices or concepts that will help absorb shocks from changes in climatic condition. This study examines the strategic position of small-scale farming in South African agriculture and in ensuring food security in the country, the vulnerability of small-scale agriculture to climate change and the potential of the concept of climate-smart agriculture to tackle the challenge of climate change. The study carried out a systematic review of peer-reviewed literature touching small-scale agriculture, climate change, food security and climate-smart agriculture, employing the realist review method. Findings revealed that increased productivity in the small-scale agricultural sector has a great potential of improving the food security of households in South Africa and reducing dependence on food purchase in a context of high food price inflation. Findings, however, also revealed that climate change affects small-scale subsistence farmers in terms of productivity, food security and family income, categorizing the impact on smallholder livelihoods into three major groups; biological processes, environmental and physical processes and impact on health. Analysis of the literature consistently showed that climate-smart agriculture integrates the benefits of adaptation and resilience to climate change, mitigation, and food security. As a result, farming households adopting climate-smart agriculture will be better off than their counterparts who do not. This study concludes that climate-smart agriculture could be a very good bridge linking small-scale agricultural sector and agricultural productivity and development which could bring about the much needed food security.

Keywords: climate change, climate-smart agriculture, food security, small-scale

Procedia PDF Downloads 241
3765 Unlocking the Power of Social Media for Tourism Marketing: How Travel Bloggers Shape Destination Trust, Travel Intention with the Moderating Role of Trustworthiness on Social Media Posts

Authors: Saad Saif

Abstract:

Tourism promotion in the digital age is significantly influenced by social media, particularly in developing travel markets such as Pakistan. This study examines how travel bloggers use social media to inspire people to plan journeys and increase trust in destinations. It examines how trustworthiness works as a moderator to enhance the legitimacy of social media posts. This study aims to comprehend the dynamics of social media's influence on the travel and tourism industry. This study investigates the influence of travel bloggers' content, with a focus on tone (positive/negative) and emotional intensity (strong/weak), on prospective Pakistani travelers' travel preferences and levels of trust toward a particular location. The study used an experimental design to validate its hypotheses. The results indicate that the emotive content and tone of bloggers influence travel intentions and that destination trust mediates this relationship. It is interesting to observe that variations in the emotional intensity of positive and negative ratings are not always accompanied by changes in destination trust and travel intent. In addition, the influence of a blogger's review tone on travel intention and destination trust is moderated by the credibility of online reviews, whereas the influence of emotional intensity on these outcomes is unaffected by review credibility.

Keywords: tourism marketing, destination trust, travel intention, trustworthiness

Procedia PDF Downloads 71
3764 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 166
3763 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 311