Search results for: information security behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14399

Search results for: information security behaviour

13739 Online Teacher Professional Development: An Extension of the Unified Theory of Acceptance and Use of Technology Model

Authors: Lovemore Motsi

Abstract:

The rapid pace of technological innovation, along with a global fascination with the internet, continues to result in a dominating call to integrate internet technologies in institutions of learning. However, the pressing question remains – how can online in-service training for teachers, support quality and success in professional development programmers. The aim of this study was to examine an integrated model that extended the Unified Theory of Acceptance and Use of Technology (UTAUT) with additional constructs – including attitude and behaviour intention – adopted from the Theory of Planned Behaviour (TPB) to answer the question. Data was collected from secondary school teachers at 10 selected schools in the Tshwane South district by means of the Statistical Package for Social Scientists (SPSS v 23.0), and the collected data was analysed quantitatively. The findings are congruent with model testing under conditions of volitional usage behaviour. In this regard, the role of facilitating condition variables is insignificant as a determinant of usage behaviour. Social norm variables also proved to be a weak determinant of behavioural intentions. Findings demonstrate that effort expectancy is the key determinant of online INSET usage. Based on these findings, the variable social influence and facilitating conditions are important factors in ensuring the acceptance of online INSET among teachers in selected secondary schools in the Tshwane South district.

Keywords: unified theory of acceptance and use of technology (UTAUT), teacher professional development, secondary schools, online INSET

Procedia PDF Downloads 214
13738 Attitude of Beef Cattle Farmers toward Biosecurity Practices

Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim

Abstract:

The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.

Keywords: attitude, beef cattle, biosecurity, farmers

Procedia PDF Downloads 292
13737 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 351
13736 Investigating the Dynamic Response of the Ballast

Authors: Osama Brinji, Wing Kong Chiu, Graham Tew

Abstract:

Understanding the stability of rail ballast is one of the most important aspects in the railways. An unstable track may cause some issues such as unnecessary vibration and ultimately loss of track quality. The track foundation plays an important role in the stabilization of the railway. The dynamic response of rail ballast in the vicinity of the rail sleeper can affect the stability of the rail track and this has not been studied in detail. A review of literature showed that most of the works focused on the area under the concrete sleeper. Although there are some theories about the shear (longitudinal) effect of the rail ballast, these have not properly been studied and hence are not well understood. The stability of a rail track will depend on the compactness of the ballast in its vicinity. This paper will try to determine the dynamic response of the ballast to identify its resonant behaviour. This preliminary research is one of several studies that examine the vibration response of the granular materials. The main aim is to use this information for future design of sleepers to ensure that any dynamic response of the sleeper will not compromise the state of compactness of the ballast. This paper will report on the dependence of damping and the natural frequency of the ballast as a function of depth and distance from the point of excitation introduced through a concrete block. The concrete block is used to simulate a sleeper and the ballast is simulated with gravel. In spite of these approximations, the results presented in the paper will show an agreement with theories and the assumptions that are used in study the mechanical behaviour of the rail ballast.

Keywords: ballast, dynamic response, sleeper, stability

Procedia PDF Downloads 498
13735 Mental Health Difficulties and Abnormal Feeding Regulation during a Crisis: A Mixed-Methods Approach

Authors: Leja Salciute

Abstract:

Mental health difficulties are one of the reasons for abnormal feeding behaviour. This is especially evident in a crisis situation. Abnormal feeding behaviour occurs when individuals use food as a method to provide relief for these negative emotions. The study aimed to discover an association between emotional regulation, mental health difficulties and disruption in feeding behaviours in the UK in times of crisis. A mixed-methods design was used. Abnormal feeding behaviour was measured using the Binge Eating Disorder Screener-7, SCOFF scale, Crisis impact scale, Difficulties in Emotion Regulation Scale and demographics. The sample comprised 342 participants with a history of excessive overeating. The participants (male= 198, female= 141 and other= 3) came from the general population and they were aged 16 and over. Participants ranged in age from 16 to 89. Findings from the survey concluded that difficulties with emotion regulation were found to be associated with abnormal feeding behaviours. Mental health difficulties correlated significantly with changes in individuals’ lives, such as work or routines. Individuals differed in their abnormal feeding behaviour in terms of their age, that is, younger individuals showed less struggle with their eating patterns while older individuals faced greater struggles with their abnormal feeding behaviour. Emotion regulation significantly influenced abnormal feeding behaviour. Results from qualitative data suggest four common themes that were identified: demonstration of gratitude, negative emotions, disruptions to social life, and financial loss. For example, participants developed and gained an awareness of being grateful for the simple things in life even when participants experienced hardships. The results also suggested that emotional eating acted like a sedative that allowed the participant to run away from their painful reality. Crisis situation negatively affected relationships among participants and induced negativity related to social interaction. Finally, the respondents highlighted that the presence of uncertainty made it hard to plan ahead and look forward to the future. Although respondents experienced negative emotions and financial losses, some of them still managed to allocate time for themselves and enjoy their time off during crisis. However, majority of respondents referred to their inability to control their external circumstances and turned to and relied upon food overconsumption instead. This had a negative effect on their mental health and presented disruptions in feeding behaviour. It was recommended for individuals in times of crisis to seek psychological support in the form of Cognitive Behavioural Therapy (CBT).

Keywords: binge eating, maladaptive eating behaviours, mental health, negative emotions in crisis

Procedia PDF Downloads 66
13734 Foamability and Foam Stability of Gelatine-Sodium Dodecyl Sulfate Solutions

Authors: Virginia Martin Torrejon, Song Hang

Abstract:

Gelatine foams are widely explored materials due to their biodegradability, biocompatibility, and availability. They exhibit outstanding properties and are currently subject to increasing scientific research due to their potential use in different applications, such as biocompatible cellular materials for biomedical products or biofoams as an alternative to fossil-fuel-derived packaging. Gelatine is a highly surface-active polymer, and its concentrated solutions usually do not require surfactants to achieve low surface tension. Still, anionic surfactants like sodium dodecyl sulfate (SDS) strongly interact with gelatine, impacting its viscosity and rheological properties and, in turn, their foaming behaviour. Foaming behaviour is a key parameter for cellular solids produced by mechanical foaming as it has a significant effect on the processing and properties of cellular materials. Foamability mainly impacts the density and the mechanical properties of the foams, while foam stability is crucial to achieving foams with low shrinkage and desirable pore morphology. This work aimed to investigate the influence of SDS on the foaming behaviour of concentrated gelatine foams by using a dynamic foam analyser. The study of maximum foam height created, foam formation behaviour, drainage behaviour, and foam structure with regard to bubble size and distribution were carried out in 10 wt% gelatine solutions prepared at different SDS/gelatine concentration ratios. Comparative rheological and viscometry measurements provided a good correlation with the data from the dynamic foam analyser measurements. SDS incorporation at optimum dosages and gelatine gelation led to highly stable foams at high expansion ratios. The viscosity increase of the hydrogel solution at SDS content increased was a key parameter for foam stabilization. In addition, the impact of SDS content on gelling time and gel strength also considerably impacted the foams' stability and pore structure.

Keywords: dynamic foam analyser, gelatine foams stability and foamability, gelatine-surfactant foams, gelatine-SDS rheology, gelatine-SDS viscosity

Procedia PDF Downloads 147
13733 Experimental and Numerical Investigation on Deformation Behaviour of Single Crystal Copper

Authors: Suman Paik, P. V. Durgaprasad, Bijan K. Dutta

Abstract:

A study combining experimental and numerical investigation on the deformation behaviour of single crystals of copper is presented in this paper. Cylindrical samples were cut in specific orientations from high purity copper single crystal and subjected to uniaxial compression loading at quasi-static strain rate. The stress-strain curves along two different crystallographic orientations were then extracted. In order to study and compare the deformation responses, a single crystal plasticity model incorporating non-Schmid effects was developed assuming cross-slip plays an important role in orientation of the material. By making use of crystal plasticity finite element method, the model was applied to investigate the orientation dependence of the stress-strain behaviour of two crystallographic orientations. Finally, details of slip activities of deformed crystals were investigated by linking the orientation of slip lines with the theoretical traces of possible crystallographic planes. The experimentally determined active slip modes were matched with those determined by simulations.

Keywords: crystal plasticity, modelling, non-Schmid effects, finite elements, finite strain

Procedia PDF Downloads 211
13732 Young Social Beings: An Investigation into the Social Interactions and Relationships of a Year Five Class

Authors: A. Sewell

Abstract:

The paper reports a research project which investigated the social interactions of nine to ten-year-olds in a mainstream primary school. The project implemented an adaption of a whole class, behavioural intervention known as 'The Good Behaviour Game (TGBG)'. TGBG is an evidence-based intervention traditionally used to reduce low-level disruptive behaviours in a classroom setting. TGBG was adapted to encourage pupil’s engagement in pro-social behaviour during lessons. A mixed methods research design was employed to evaluate intervention effects and pupil’s perceptions of their social interactions and relationships with others. Single-case research design was used to evaluate behaviour change, and Personal Construct Psychology (PCP) repertory grids were used to explore pupil’s perceptions. The findings demonstrated that TGBG could be successfully adapted to positively influence pupil’s engagement in pro-social behaviours. The findings from the PCP repertory grid interviews revealed the complexities of how children construct their social interactions and relationships with others, and how an understanding of these could be used to design better social skills interventions. It is concluded that TGBG is a cost-effective, simple to implement intervention for promoting positive social interactions and relationships at the whole class level. The paper presents the aims, design, findings, and conclusions of the study in further detail and relates limitations and potential future extensions of the research. The outcomes have direct application and relevance for practitioners interested in children’s social development and how to promote positive outcomes in this critical aspect of childhood.

Keywords: social skills, social development, social competency, the good behaviour game

Procedia PDF Downloads 166
13731 Procedural Justice and Work Outcomes in Kuwait Business Organizations

Authors: Ali Muhammad

Abstract:

The purpose of this study is to develop and test a theoretical framework which demonstrates the effect of procedural justice on four work outcomes: effective organizational commitmentو organizational trust, organizational citizenship behaviour, and adherence to rules. The new model attempts to explain how procedural justice effects work outcomes. Data were collected from 267 employees working in nine Kuwaiti business organizations. Structural equation modelling was used to analysis the data. A discussion of issues related to procedural justice is presented, as well as recommendations for future research.

Keywords: procedural justice, affective organizational commitment, organizational citizenship behaviour, organizational trust, adherence to rules

Procedia PDF Downloads 288
13730 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 68
13729 Autonomy Supportive Coaching to Achieve Health Literacy

Authors: E. Knisel, H. Rupprich, A. Heissel

Abstract:

Health Literacy is defined as the degree to which people have the capacity to obtain and understand information to make health decisions. Illustrated are three levels of health literacy: (1) Functional literacy refers to the transmission of information about e. g. physical activity and nutrition; (2) interactive literacy implies the development of personal and social skills to adopt health-related behaviour and (3) critical health literacy indicates advanced cognitive skills connected with personal empowerment to critically analyse health information, to define self-determined goals and taking action in various situations accordingly. The achievement of the third level refers to self-determination and autonomy which should be outcomes of exercise programs for overweight children as health-related behaviour change will occur and persist if it is autonomously motivated. Method: We adopted a quasi-experimental design with group (autonomy supportive coaching, control) and session (pre-test, intervention, post-test, and follow-up-test). Overweight and obese children and adolescents at the age of 8-14 years (N=40) received a 6-month (20 sessions) exercise program with autonomy supportive coaching implemented by the coaches and sandwiched between pre-test and post-test. All participants (N=92) completed the German version of the Basic Needs Satisfaction Scale Sport and Exercise. Additionally, we assessed the engagement in the exercise program by the MVPA (Moderate-to-Vigorous Physical Activity) and by the adherence and drop-out-rate. Results: Participants in the intervention group perceived their autonomy as moderate in the post-test and the follow-up-test. However, the psychological intervention failed to develop a high autonomy, as both groups show moderate perceived autonomy from the pre-test to the post-test. Participants in the intervention group were higher engaged in MVPA in the exercise program and they attend the program more regularly. Discussion: Young overweight and obese children and adolescents can acquire autonomy using autonomy supporting coaching. However, research identifying the extent they achieve critical health literacy is required to implement an autonomy-supportive coaching style into exercise programs for this target group.

Keywords: autonomy support, coaching, health literacy, health promotion

Procedia PDF Downloads 485
13728 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 400
13727 Development of Digital Twin Concept to Detect Abnormal Changes in Structural Behaviour

Authors: Shady Adib, Vladimir Vinogradov, Peter Gosling

Abstract:

Digital Twin (DT) technology is a new technology that appeared in the early 21st century. The DT is defined as the digital representation of living and non-living physical assets. By connecting the physical and virtual assets, data are transmitted smoothly, allowing the virtual asset to fully represent the physical asset. Although there are lots of studies conducted on the DT concept, there is still limited information about the ability of the DT models for monitoring and detecting unexpected changes in structural behaviour in real time. This is due to the large computational efforts required for the analysis and an excessively large amount of data transferred from sensors. This paper aims to develop the DT concept to be able to detect the abnormal changes in structural behaviour in real time using advanced modelling techniques, deep learning algorithms, and data acquisition systems, taking into consideration model uncertainties. finite element (FE) models were first developed offline to be used with a reduced basis (RB) model order reduction technique for the construction of low-dimensional space to speed the analysis during the online stage. The RB model was validated against experimental test results for the establishment of a DT model of a two-dimensional truss. The established DT model and deep learning algorithms were used to identify the location of damage once it has appeared during the online stage. Finally, the RB model was used again to identify the damage severity. It was found that using the RB model, constructed offline, speeds the FE analysis during the online stage. The constructed RB model showed higher accuracy for predicting the damage severity, while deep learning algorithms were found to be useful for estimating the location of damage with small severity.

Keywords: data acquisition system, deep learning, digital twin, model uncertainties, reduced basis, reduced order model

Procedia PDF Downloads 96
13726 Effect of Stitching Pattern on Composite Tubular Structures Subjected to Quasi-Static Crushing

Authors: Ali Rabiee, Hessam Ghasemnejad

Abstract:

Extensive experimental investigation on the effect of stitching pattern on tubular composite structures was conducted. The effect of stitching reinforcement through thickness on using glass flux yarn on energy absorption of fiber-reinforced polymer (FRP) was investigated under high speed loading conditions at axial loading. Keeping the mass of the structure at 125 grams and applying different pattern of stitching at various locations in theory enables better energy absorption, and also enables the control over the behaviour of force-crush distance curve. The study consists of simple non-stitch absorber comparison with single and multi-location stitching behaviour and its effect on energy absorption capabilities. The locations of reinforcements are 10 mm, 20 mm, 30 mm, 10-20 mm, 10-30 mm, 20-30 mm, 10-20-30 mm and 10-15-20-25-30-35 mm from the top of the specimen. The effect of through the thickness reinforcements has shown increase in energy absorption capabilities and crushing load. The significance of this is that as the stitching locations are closer, the crushing load increases and consequently energy absorption capabilities are also increased. The implementation of this idea would improve the mean force by applying stitching and controlling the behaviour of force-crush distance curve.

Keywords: through-thickness stitching, 3D enforcement​, energy absorption, tubular composite structures

Procedia PDF Downloads 261
13725 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 415
13724 An Extended Model for Sustainable Food and Nutrition Security in the Agrifood Sector

Authors: Ioannis Manikas

Abstract:

The increased consumer demand for environmentally friendly production and distribution practices and the stricter environmental regulations turned environmental aspects into important criteria in business decision-making. On the other hand, Food and Nutrition Security (FNS) has evolved dramatically during the last decades in theory and practice serving as a reference point for exchanging experiences among all agents involved in programs and projects to fostering policy and strategy development. Global pressures make it more important than ever to gain a better understanding of the contribution that agrifood businesses make to FNS and to examine ways to make them more resilient in an increasingly globalized and uncertain world. This study extends the standard three-dimensional model of sustainability to include two more dimensions: A technological dimension and a policy/political dimension. Apart from the economic, environmental and social dimensions regularly used in sustainability literature, the extended model will accurately represent the measures and policies addressing food and nutrition security.

Keywords: food and nutrition security, sustainability, food safety, resilience

Procedia PDF Downloads 335
13723 The Impacts of Cost Stickiness on the Profitability of Indonesian Firms

Authors: Dezie L. Warganegara, Dewi Tamara

Abstract:

The objectives of this study are to investigate the existence of the sticky cost behaviour of firms listed in the Indonesia Stock Exchange (IDX) and to find an evidence on the effects of sticky operating expenses (SG&A expenses) on profitability of firms. For the first objective, this study found that the sticky cost behaviour does exist. For the second objective, this study finds that the stickier the operating expenses the less future profitability of the firms. This study concludes that sticky cost affects negatively to the performance and, therefore, firms should include flexibility in designing the cost structure of their firms.

Keywords: sticky costs, Indonesia Stock Exchange (IDX), profitability, operating expenses, SG&A

Procedia PDF Downloads 313
13722 Instructional Information Resources

Authors: Parveen Kumar

Abstract:

This article discusses institute information resources. Information, in its most restricted technical sense, is a sequence of symbols that can be interpreted as message information can be recorded as signs, or transmitted as signals. Information is any kind of event that affects the state of a dynamic system. Conceptually, information is the message being conveyed. This concept has numerous other meanings in different contexts. Moreover, the concept of information is closely related to notions of constraint, communication, control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, representation, and especially entropy.

Keywords: institutions, information institutions, information services for mission-oriented institute, pattern

Procedia PDF Downloads 375
13721 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 420
13720 Consumers Perception on 'Preloved' Luxury Goods in the Malaysian Context

Authors: Noor Shakila Shaari

Abstract:

Though consumptions of luxury goods have had significant attention over the years, ‘preloved’ luxury goods remains a somewhat limited area of study especially in Asian countries such as Malaysia. This paper examines the relevancy of the framework for luxury goods in context to ‘preloved’ luxury goods and whether these two holds the same perception and purchase intention in the eyes of the consumer. A conceptualize framework was derived and findings show that self-expression, conspicuous behaviour and value-expressive and social-adjustive functions are key factors to consumers perception and buying intention of ‘preloved’ luxury goods.

Keywords: consumer behaviour, consumer perception, luxury goods, Malaysia, preloved luxury goods, purchase intention

Procedia PDF Downloads 277
13719 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income

Authors: M. Koray Cetin, Mehmet Mert

Abstract:

The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.

Keywords: exchange rate, panel data analysis, security, tourism revenues

Procedia PDF Downloads 345
13718 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 424
13717 Insecurity and Insurgency on Economic Development of Nigeria

Authors: Uche Lucy Onyekwelu, Uche B. Ugwuanyi

Abstract:

Suffice to say that socio-economic disruptions of any form is likely to affect the wellbeing of the citizenry. The upsurge of social disequilibrium caused by the incessant disruptive tendencies exhibited by youths and some others in Nigeria are not helping matters. In Nigeria the social unrest has caused different forms of draw backs in Socio Economic Development. This study has empirically evaluated the impact of insecurity and insurgency on the Economic Development of Nigeria. The paper noted that the different forms of insecurity in Nigeria are namely: Insurgency and Banditry as witnessed in Northern Nigeria; Militancy: Niger Delta area and self-determination groups pursuing various forms of agenda such as Sit –at- Home Syndrome in the South Eastern Nigeria and other secessionist movements. All these have in one way or the other hampered Economic development in Nigeria. Data for this study were collected through primary and secondary sources using questionnaire and some existing documentations. Cost of investment in different aspects of security outfits in Nigeria represents the independent variable while the differentials in the Gross Domestic Product(GDP) and Human Development Index(HDI) are the measures of the dependent variable. Descriptive statistics and Simple Linear Regression analytical tool were employed in the data analysis. The result revealed that Insurgency/Insecurity negatively affect the economic development of the different parts of Nigeria. Following the findings, a model to analyse the effect of insecurity and insurgency was developed, named INSECUREDEVNIG. It implies that the economic development of Nigeria will continue to deteriorate if insurgency and insecurity continue. The study therefore recommends that the government should do all it could to nurture its human capital, adequately fund the state security apparatus and employ individuals of high integrity to manage the various security outfits in Nigeria. The government should also as a matter of urgency train the security personnel in intelligence cum Information and Communications Technology to enable them ensure the effectiveness of implementation of security policies needed to sustain Gross Domestic Product and Human Capital Index of Nigeria.

Keywords: insecurity, insurgency, gross domestic product, human development index, Nigeria

Procedia PDF Downloads 98
13716 Piloting a Prototype Virtual Token Economy Intervention for On-Task Support within an Inclusive Canadian Classroom

Authors: Robert L. Williamson

Abstract:

A 'token economy' refers to a method of positive behaviour support whereby ‘tokens’ are delivered to students as a reward for exhibiting specific behaviours. Students later exchange tokens to ‘purchase’ items of interest. Unfortunately, implementation fidelity can be problematic as some find physical delivery of tokens while teaching difficult. This project developed and tested a prototype, iPad-based tool that enabled teachers to deliver and track tokens electronically. Using an alternating treatment design, any differences in on-task individual and/or group behaviours between the virtual versus physical token delivery systems were examined. Results indicated that while students and teachers preferred iPad-based implementation, no significant difference was found concerning on-task behaviours of students between the two methodologies. Perhaps more interesting was that the teacher found implementation of both methods problematic and suggested a second person was most effective in implementing a token economy method. This would represent a significant cost to the effective use of such a method. Further research should focus on the use of a lay volunteer regarding method implementation fidelity and associated outcomes of the method.

Keywords: positive behaviour support, inclusion, token economy, applied behaviour analysis

Procedia PDF Downloads 146
13715 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 107
13714 Electrochemical Behaviour of 2014 and 2024 Al-Cu-Mg Alloys of Various Tempers

Authors: K. S. Ghosh, Sagnik Bose, Kapil Tripati

Abstract:

Potentiodynamic polarization studies carried out on AA2024 and AA2014 Al-Cu-Mg alloys of various tempers in 3.5 wt. % NaCl and in 3.5 wt. % NaCl + 1.0 % H2O2 solution characteristic E-i curves. Corrosion potential (Ecorr) value has shifted towards more negative potential with the increase of artificial aging time. The Ecorr value for the alloy tempers has also shifted anodically in presence of H2O2 in 3.5 % NaCl solution. Further, passivity phenomenon has been observed in all the alloy tempers when tested in 3.5 wt. % NaCl solution at pH 12. Stress corrosion cracking (SCC) behaviour of friction stir weld (FSW) joint of AA2014 alloy has been studied bu slow strain rate test (SSRT) in 3.5 wt. % NaCl solution. Optical micrographs of the corroded surfaces of polarised samples showed general corrosion, extensive pitting and intergranular corrosion as well. Further, potentiodynamic cyclic polarization curves displayed wide hysteresis loop indicating that the alloy tempers are susceptible to pit growth damage. Attempts have been made to explain the variation of observed electrochemical and SCC behaviour of the alloy tempers and the electrolyte conditions with the help of microstructural features.

Keywords: AA 2014 and AA 2024 Al-C-Mg alloy, artificial ageing, potentiodynamic polarization, TEM micrographs, stress corrosion cracking (SCC)

Procedia PDF Downloads 331
13713 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 374
13712 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 84
13711 Labor Welfare and Social Security

Authors: Shoaib Alvi

Abstract:

Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.

Keywords: labor welfare, internal social responsibility, social security, international conventions

Procedia PDF Downloads 570
13710 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 241