Search results for: employee security behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9347

Search results for: employee security behavior

8477 Terrorism: A Threat in Constant Evolution Still Misunderstood

Authors: M. J. Gazapo Lapayese

Abstract:

It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.

Keywords: responses, resilience, security, terrorism

Procedia PDF Downloads 444
8476 New Employee on-Boarding Program: Effective Tool for Reducing the Prevalence of Workplace Injuries/Accidents

Authors: U. Ugochukwu, J. Lee, P. Conley

Abstract:

According to a recent survey by the UT Southwestern Workplace Safety Committee, the three most common on-the-job injuries reported by workers at the medical center are musculoskeletal injuries, slip-and-fall injuries and repetitive motion injuries. Last year alone, of the 650 documented workplace injuries and accidents, 45% were seen in employees in their first-two years of employment. UT Southwestern New Employee On-Boarding program was created and modeled to follows OSHA’s model that consist of: determining if training is needed, identifying training needs, identifying goals and objectives, developing learning activities, conducting the training, evaluating program effectiveness, and improving the program. The hospital’s management best practices were recreated to limit and control workplace injuries and accidents. Regular trainings and workshops on workplace safety and compliance were initiated for new employees. Various computer workstations were evaluated and recommendations were made to reduce musculoskeletal disorders. Post exposure protocols and workers protection programs were remodeled for infectious agents and chemicals used in the hospital, and medical surveillance programs were updated, for every emerging threat, to ensure they are in compliance with the US policy, regulatory and standard setting organizations. If ignorance of specific job hazards and of proper work practices is to blame for this higher injury rate, then training will help to provide a solution. Use of this program in training activities is just one of many ways UT Southwestern complied with the OSHA standards that relate to training while enhancing the safety and health of their employees.

Keywords: ergonomics, hazard, on-boarding, surveillance, workplace

Procedia PDF Downloads 318
8475 The Implementation of Strengthening Institutional Model of Women Farmers Group in Developing Household Food Security

Authors: Rahmadanih, Sitti Bulkis, A. Amrullah, R. M. Rukka, N. M. Viantika

Abstract:

Food security is still a global issue, including in Indonesia. In South Sulawesi, this issue also occurs in members of farmer groups/women farmer groups. This study aims to (1) describe the implementation of strengthening institutional model of Women Farmer Groups (WFG) and (2) analyzing the capacity building of WFG members in order to develop food security after the implementations on institutional model. The research was conducted in Bulukumba and Luwu Utara District, South Sulawesi, Indonesia. The research was designed with qualitative and quantitative (mixed) method. Qualitative data were collected through in-depth interview and Focus Group Discussion (FGD); while quantitative data collected through a household survey of WGF members. Two WGF were selected they are WFG in Bulukumba and WGF in Luwu Utara District. Both WGF has been selected as the case unit, which consisting of 60 households. Institutional strengthening model that been implemented is a combination model of (1) institutional support and (2) capacity development of WGF members. The model of institutional support aim is to develop food security could be achieved through facilitation on produce banana chips (initiate a business group formation) and preparation of institution rule (AD/ART). (2) The developing Model of WFG members capacity building are (a) technical training of banana chips producing process, also food and nutrition counseling as well as the utilization of the yard, (b) processing of food products from their yards. Food and nutrition knowledge of WFG members was increased about 30% - 60% and accompanied by the development of households’ food security by 6.7% - 10.0%.; when compared to last year percentage.

Keywords: food security, institutional strengthening, model implementation, women farmer group

Procedia PDF Downloads 163
8474 Effects of Safety Intervention Program towards Behaviors among Rubber Wood Processing Workers Using Theory of Planned Behavior

Authors: Junjira Mahaboon, Anongnard Boonpak, Nattakarn Worrasan, Busma Kama, Mujalin Saikliang, Siripor Dankachatarn

Abstract:

Rubber wood processing is one of the most important industries in southern Thailand. The process has several safety hazards for example unsafe wood cutting machine guarding, wood dust, noise, and heavy lifting. However, workers’ occupational health and safety measures to promote their behaviors are still limited. This quasi-experimental research was to determine factors affecting workers’ safety behaviors using theory of planned behavior after implementing job safety intervention program. The purposes were to (1) determine factors affecting workers’ behaviors and (2) to evaluate effectiveness of the intervention program. The sample of study was 66 workers from a rubber wood processing factory. Factors in the Theory of Planned Behavior model (TPB) were measured before and after the intervention. The factors of TPB included attitude towards behavior, subjective norm, perceived behavioral control, intention, and behavior. Firstly, Job Safety Analysis (JSA) was conducted and Safety Standard Operation Procedures (SSOP) were established. The questionnaire was also used to collect workers’ characteristics and TPB factors. Then, job safety intervention program to promote workers’ behavior according to SSOP were implemented for a four month period. The program included SSOP training, personal protective equipment use, and safety promotional campaign. After that, the TPB factors were again collected. Paired sample t-test and independent t-test were used to analyze the data. The result revealed that attitude towards behavior and intention increased significantly after the intervention at p<0.05. These factors also significantly determined the workers’ safety behavior according to SSOP at p<0.05. However, subjective norm, and perceived behavioral control were not significantly changed nor related to safety behaviors. In conclusion, attitude towards behavior and workers’ intention should be promoted to encourage workers’ safety behaviors. SSOP intervention program e.g. short meeting, safety training, and promotional campaign should be continuously implemented in a routine basis to improve workers’ behavior.

Keywords: job safety analysis, rubber wood processing workers, safety standard operation procedure, theory of planned behavior

Procedia PDF Downloads 176
8473 Authentic Leadership, Task Performance, and Organizational Citizenship Behavior

Authors: C. V. Chen, Y. H. Jeng, S. J. Wang

Abstract:

Leadership is essential to enhancing followers’ psychological empowerment and has an effect on their willingness to take on extra-role behavior and aim for greater performance. Authentic leadership is confirmed to promote employees’ positive affect, psychological empowerment, well-being, and performance. Employees’ spontaneous undertaking of organizationally desired behaviors allows organizations’ gaining the edge in the fiercely competitive business environment. Apart from the contextual factor of leadership, individuals’ goal orientation is found to be highly related to his/her performance. To better understand the psychological process and potential moderation of personal goal orientation, this study investigates the effect of authentic leadership on employees’ task performance and organizational citizenship behavior by including psychological empowerment as the mediating factor and goal orientation as the moderating factor.

Keywords: authentic leadership, task performance, organizational citizenship behavior, goal orientation

Procedia PDF Downloads 779
8472 Influence of Human Resource Management Practices on Agricultural Employees’ Behavior

Authors: B. G. Abiona, O. E. Fapojuwo, T. Akinlawon

Abstract:

This study assessed the influence of human resource management practices on agricultural employees’ behavior. Data were collected from 75 randomly selected respondents using a well-structured questionnaire. The mean age of the employees’ was 43.2 years. Major human resource management practices that influence employees behaviors were: In-service training are given to employees on a regular basis (average value of x=3.44), management reward employees who are committed to their job (average value of x =3.41) and reward are designed to encourage wide participation and activity (average value of x=3.41). Also, major employees’ behavior include: Managers and employees’ wants to create better job performance (average value of x=3.13) and administrator provides praise and recognition for effective performance and show appreciation for special effort (average value of x=3.05). Major factors affecting employees’ behavior were: inadequate training (average value of x=2.93), inadequate local and international training (average value of x=2.87), inadequate grants for training programmes (average value of x= 2.81). A significant relationship was found between gender (χ2 = 37.204, P<0.05), educational qualification (χ2 = 59.093, P<0.05), income (r =0.122, P<0.05) and human resource management practices (r = 0.573, P< 0.05) of the respondents and employees’ behavior. Management should encourage employees who are committed to their job through awards and recognition.

Keywords: human resources management, agricultural employees, behaviour research institutes, Nigeria

Procedia PDF Downloads 233
8471 The Analysis of the Challenge China’s Energy Transition Faces and Proposed Solutions

Authors: Yuhang Wang

Abstract:

As energy is vital to industrial productivity and human existence, ensuring energy security becomes a critical government responsibility. The Chinese government has implemented the energy transition to safeguard China’s energy security. Throughout this progression, the Chinese government has faced numerous obstacles. This article seeks to describe the causes of China’s energy transition barriers and the steps taken by the Chinese government to overcome them.

Keywords: energy transition, energy market, fragmentation, path dependency

Procedia PDF Downloads 73
8470 Effect of Ownership Structure and Financial Leverage on Corporate Investment Behavior in Tehran Stock Exchange

Authors: Shamshiri Mitra, Abedi Rahim

Abstract:

This paper investigates corporate investment behavior and its relationship with ownership structure and financial leverage for the listed company of Tehran stock exchange during 2008-2012. The results show that the concentration of ownership has s significant positive effect on corporate investment. The results for the kind of major owners show that institutional ownership had a positive significant effect and state and individual ownership had negative significant effects on the corporate investment but the effect of corporate ownership was not significant. Furthermore the effect of financial leverage was negative and significant.

Keywords: corporate investment behavior, financial leverage, ownership structure corporate investment behavior

Procedia PDF Downloads 513
8469 Towards the Reverse Engineering of UML Sequence Diagrams Using Petri Nets

Authors: C. Baidada, M. H. Abidi, A. Jakimi, E. H. El Kinani

Abstract:

Reverse engineering has become a viable method to measure an existing system and reconstruct the necessary model from tis original. The reverse engineering of behavioral models consists in extracting high-level models that help understand the behavior of existing software systems. In this paper, we propose an approach for the reverse engineering of sequence diagrams from the analysis of execution traces produced dynamically by an object-oriented application using petri nets. Our methods show that this approach can produce state diagrams in reasonable time and suggest that these diagrams are helpful in understanding the behavior of the underlying application. Finally we will discuss approachs and tools that are needed in the process of reverse engineering UML behavior. This work is a substantial step towards providing high-quality methodology for effectiveand efficient reverse engineering of sequence diagram.

Keywords: reverse engineering, UML behavior, sequence diagram, execution traces, petri nets

Procedia PDF Downloads 431
8468 Contractual Complexity and Contract Parties' Opportunistic Behavior in Construction Projects: In a Contractual Function View

Authors: Mengxia Jin, Yongqiang Chen, Wenqian Wang, Yu Wang

Abstract:

The complexity and specificity of construction projects have made common opportunism phenomenon, and contractual governance for opportunism has been a topic of considerable ongoing research. Based on TCE, the research distinguishes control and coordination as different functions of the contract to investigate their complexity separately. And in a nuanced way, the dimensionality of contractual control is examined. Through the analysis of motivation and capability of strong or weak form opportunism, the framework focuses on the relationship between the complexity of above contractual dimensions and different types of opportunistic behavior and attempts to verify the possible explanatory mechanism. The explanatory power of the research model is evaluated in the light of empirical evidence from questionnaires. We collect data from Chinese companies in the construction industry, and the data collection is still in progress. The findings will speak to the debate surrounding the effects of contract complexity on opportunistic behavior. This nuanced research will derive implications for research on the role of contractual mechanisms in dealing with inter-organizational opportunism and offer suggestions for curbing contract parties’ opportunistic behavior in construction projects.

Keywords: contractual complexity, contractual control, contractual coordinatio, opportunistic behavior

Procedia PDF Downloads 371
8467 Factors Related to Health Promotion Behavior of Older Employees in Factory

Authors: Kanda Janyam, Piyaporn Vijit

Abstract:

Background: As a consequence of sustained declines in fertility and mortality during the last three decades of the 20th century, Thailand faces a rapidly growing population of older persons. This demographic change directly affect Thailand workforce. Therefore, the study of health promotion behaviour of the older employees will benefit the employers as they can then develop the preparation for promoting well-being in older persons. Purpose: The current study aims to investigate health promotion behaviour and factors related to health promotion behaviour of older employees in factory. Methodology: The research instrument was questionnaire on health promotion behaviour and semi-structured interviews. The questionnaire was launched with 326 employees aged between 45-59 years in three factories in Songkhla Province, southern Thailand. The data collection started in December 2011. The data were analysed with mean, standard deviation, and correlation. Results: The results revealed that overall health promotion behaviour of the older employees in factory was at a high level. Moreover, when considered by aspect, it was found that their responsibility for health, nutrition, success in life, interpersonal relationship were at a high level while stress management, and exercise were at a moderate level. The results from correlation analysis indicated that the overall health promotion behaviour was positively related to knowledge of health promotion behaviour, attitude toward health promotion behaviour, health perception, the policy of health promotion, participation in health promotion activities, convenience in obtaining health promotion services, health resources, advice from people supporting health, and information received from the media. In addition, the results of the interviews with four key informants helped to confirm the factors related to health promotion behaviour of older employees in factory. Therefore, health promotion for elderly employees in factory is likely to be successful, if the support is given to the four health promotion factors that are divided into: leading factors consisting of attitude toward health promotion behaviour, and health perception, and supporting factors consisting of advice from other people, and information on health from various media. Practical implications: The results of the study identified the factors related to health promotion behaviour of older employees in factory. Such information will benefit employers as they can then develop specific strategies to increase their staffs’ well-being and, hence, presumably enhance the organization productivity.

Keywords: health promotion behavior, older, employee, factory

Procedia PDF Downloads 252
8466 Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services

Authors: Saleh Alumaran, Giampaolo Bella, Feng Chen

Abstract:

The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of research on the role and impact of an organisation’s cultural dimensions on information security. This research investigated and analysed the role and impact of cultural dimensions on information security in Saudi Arabia health service. Hypotheses were tested and two surveys were carried out in order to collect data and information from three major hospitals in Saudi Arabia (SA). The first survey identified the main cultural-dimension problems in SA health services and developed an initial information security culture framework model. The second survey evaluated and tested the developed framework model to test its usefulness, reliability and applicability. The model is based on human behaviour theory, where the individual’s attitude is the key element of the individual’s intention to behave as well as of his or her actual behaviour. The research identified six cultural dimensions: Saudi national culture, Saudi health service leadership, employees’ trust, technology, multicultural interactions and employees’ job roles. The research also identified a set of cultural sub-dimensions. These include working values and norms, tribe values and norms, attitudes towards women, power sharing, vision, social interaction, respect and understanding, hospital intra-net, hospital employees’ language(s) used, multi-national culture, communication system, employees’ job satisfaction and job security. The research identified that (a) the human behaviour towards medical information in SA is one of the main threats to information security and one of the main challenges to SA health authority, (b) The current situation of SA hospitals’ IS cultures is falling short in protecting medical information due to the current value and norms towards information security, (c) Saudi national culture and employees’ job role are the main dimensions playing major roles in the employees’ attitude, and technology is the least important dimension playing a role in the employees’ attitudes.

Keywords: cultural dimension, electronic health record, information security, privacy

Procedia PDF Downloads 338
8465 Flexural Behavior of Heat-Damaged Concrete Beams Reinforced with Fiber Reinforced Polymer (FRP) Bars

Authors: Mohammad R. Irshidat, Rami H. Haddad, Hanadi Al-Mahmoud

Abstract:

Reinforced concrete (RC) is the most common used material for construction in the world. In the past decades, fiber reinforced polymer (FRP) bars had been widely used to substitute the steel bars due to their high resistance to corrosion, high tensile capacity, and low weight in comparison with steel. Experimental studies on the behavior of FRP bar reinforced concrete beams had been carried out worldwide for a few decades. While the research on such structural members under elevated temperatures is still very limited. In this research, the flexural behavior of heat-damaged concrete beams reinforced with FRP bars is studied. Two types of FRP rebar namely, carbon fiber reinforced polymer (CFRP) and glass fiber reinforced polymer (GFRP), are used. The beams are subjected to four levels of temperature before tested to monitor their flexural behavior. The results are compared with other concrete beams reinforced with regular steel bars. The results show that the beams reinforced with CFRP bars and GFRP bars had higher flexural capacity than the beams reinforced with steel bars even if heated up to 400°C and 300°C, respectively. After that the beams reinforced with steel bars had the superiority.

Keywords: concrete beams, FRP rebar, flexural behavior, heat-damaged

Procedia PDF Downloads 429
8464 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 144
8463 Food Security from a Spatial Perspective; The Situation in Advanced and Less Advanced Economies

Authors: Kristina Thorell

Abstract:

Food security has been one of the most important policy issues on the global arena after the Second World War. The overall aim of this presentation is to describe preconditions for a sustainable food supply from a spatial perspective. Special attention is paid to the differences between advanced and less advanced economies around the world. The theoretical framework is based upon models which are explaining complex systems of factors that affect the preconditions for agricultural productions. In additions to this, theories about how population and environmental pollution change through different stages of societal development are explained. The results are based upon data of agricultural practices, population growth, hunger and nutrition levels from different countries around the world. The analysis shows that factors which affect preconditions for agricultural production are dynamic. Factors which support the food security in the near future are a decreasing population growth, technological development and innovation but the environmental crisis is associated to high risks. It is, therefore, important to develop environmental policies and improved methods for organic farming. A final conclusion is that the spatial pattern is clear; the food supply is sufficient within advanced economies but rather complicated in development countries.

Keywords: food security, agricultural geography, demography, advanced economies, population growth, agricultural practices

Procedia PDF Downloads 299
8462 Countering Terrorism through Social Media: Case Study in Indonesia

Authors: Mauly Budiyanti, Aisyah M. Anggiana

Abstract:

Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.

Keywords: Indonesia, national security, social media, terrorism.

Procedia PDF Downloads 208
8461 Climate Change, Agriculture and Food Security in Sub-Saharan Africa: What Effects and What Answers?

Authors: Abdoulahad Allamine

Abstract:

The objective of this study is to assess the impact of climate variability on agriculture and food security in 43 countries of sub-Saharan Africa. We use for this purpose the data from BADC bases, UNCTAD, and WDI FAOSTAT to estimate a VAR model on panel data. The sample is divided into three (03) agro-climatic zones, more explicitly the equatorial zone, the Sahel region and the semi-arid zone. This allows to highlight the differential impacts sustained by countries and appropriate responses to each group of countries. The results show that the sharp fluctuations in the volume of rainfall negatively affect agriculture and food security of countries in the equatorial zone, with heavy rainfall and high temperatures in the Sahel region. However, countries with low temperatures and low rainfall are the least affected. The hedging policies against the risks of climate variability must be more active in the first two groups of countries. On this basis and in general, we recommend integration of agricultural policies between countries is done to reduce the effects of climate variability on agriculture and food security. It would be logical to encourage regional and international closer collaboration on the development and dissemination of improved varieties, ecological intensification, and management of biotic and abiotic stresses facing these climate variability to sustainably increase food production. Small farmers also need training in agricultural risk hedging techniques related to climate variations; this requires an increase in state budgets allocated to agriculture.

Keywords: agro-climatic zones, climate variability, food security, Sub-Saharan Africa, VAR on panel data

Procedia PDF Downloads 362
8460 Analytical Modelling of the Moment-Rotation Behavior of Top and Seat Angle Connection with Stiffeners

Authors: Merve Sagiroglu

Abstract:

The earthquake-resistant steel structure design is required taking into account the behavior of beam-column connections besides the basic properties of the structure such as material and geometry. Beam-column connections play an important role in the behavior of frame systems. Taking into account the behaviour of connection in analysis and design of steel frames is important due to presenting the actual behavior of frames. So, the behavior of the connections should be well known. The most important force which transmitted by connections in the structural system is the moment. The rotational deformation is customarily expressed as a function of the moment in the connection. So, the moment-rotation curves are the best expression of behaviour of the beam-to-column connections. The designed connections form various moment-rotation curves according to the elements of connection and the shape of placement. The only way to achieve this curve is with real-scale experiments. The experiments of some connections have been carried out partially and are formed in the databank. It has been formed the models using this databank to express the behavior of connection. In this study, theoretical studies have been carried out to model a real behavior of the top and seat angles connections with angles. Two stiffeners in the top and seat angle to increase the stiffness of the connection, and two stiffeners in the beam web to prevent local buckling are used in this beam-to-column connection. Mathematical models have been performed using the database of the beam-to-column connection experiments previously by authors. Using the data of the tests, it has been aimed that analytical expressions have been developed to obtain the moment-rotation curve for the connection details whose test data are not available. The connection has been dimensioned in various shapes and the effect of the dimensions of the connection elements on the behavior has been examined.

Keywords: top and seat angle connection, stiffener, moment-rotation curves, analytical study

Procedia PDF Downloads 164
8459 The Functional Roles of Right Dorsolateral Prefrontal Cortex and Ventromedial Prefrontal Cortex in Risk-Taking Behavior

Authors: Aline M. Dantas, Alexander T. Sack, Elisabeth Bruggen, Peiran Jiao, Teresa Schuhmann

Abstract:

Risk-taking behavior has been associated with the activity of specific prefrontal regions of the brain, namely the right dorsolateral prefrontal cortex (DLPFC) and the ventromedial prefrontal cortex (VMPFC). While the deactivation of the rDLPFC has been shown to lead to increased risk-taking behavior, the functional relationship between VMPFC activity and risk-taking behavior is yet to be clarified. Correlational evidence suggests that the VMPFC is involved in valuation processes that involve risky choices, but evidence on the functional relationship is lacking. Therefore, this study uses brain stimulation to investigate the role of the VMPFC during risk-taking behavior and replicate the current findings regarding the role of the rDLPFC in this same phenomenon. We used continuous theta-burst stimulation (cTBS) to inhibit either the VMPFC or DLPFC during the execution of the computerized Maastricht Gambling Task (MGT) in a within-subject design with 30 participants. We analyzed the effects of such stimulation on risk-taking behavior, participants’ choices of probabilities and average values, and response time. We hypothesized that, compared to sham stimulation, VMPFC inhibition leads to a reduction in risk-taking behavior by reducing the appeal to higher-value options and, consequently, the attractiveness of riskier options. Right DLPFC (rDLPFC) inhibition, on the other hand, should lead to an increase in risk-taking due to a reduction in cognitive control, confirming existent findings. Stimulation of both the rDLPFC and the VMPFC led to an increase in risk-taking behavior and an increase in the average value chosen after both rDLPFC and VMPFC stimulation compared to sham. No significant effect on chosen probabilities was found. A significant increase in response time was observed exclusively after rDLPFC stimulation. Our results indicate that inhibiting DLPFC and VMPFC separately leads to similar effects, increasing both risk-taking behavior and average value choices, which is likely due to the strong anatomical and functional interconnection of the VMPFC and rDLPFC.

Keywords: decision-making, risk-taking behavior, brain stimulation, TMS

Procedia PDF Downloads 91
8458 Predictive Modeling of Student Behavior in Virtual Reality: A Machine Learning Approach

Authors: Gayathri Sadanala, Shibam Pokhrel, Owen Murphy

Abstract:

In the ever-evolving landscape of education, Virtual Reality (VR) environments offer a promising avenue for enhancing student engagement and learning experiences. However, understanding and predicting student behavior within these immersive settings remain challenging tasks. This paper presents a comprehensive study on the predictive modeling of student behavior in VR using machine learning techniques. We introduce a rich data set capturing student interactions, movements, and progress within a VR orientation program. The dataset is divided into training and testing sets, allowing us to develop and evaluate predictive models for various aspects of student behavior, including engagement levels, task completion, and performance. Our machine learning approach leverages a combination of feature engineering and model selection to reveal hidden patterns in the data. We employ regression and classification models to predict student outcomes, and the results showcase promising accuracy in forecasting behavior within VR environments. Furthermore, we demonstrate the practical implications of our predictive models for personalized VR-based learning experiences and early intervention strategies. By uncovering the intricate relationship between student behavior and VR interactions, we provide valuable insights for educators, designers, and developers seeking to optimize virtual learning environments.

Keywords: interaction, machine learning, predictive modeling, virtual reality

Procedia PDF Downloads 110
8457 Hydro-Mechanical Behavior of a Tuff and Calcareous Sand Mixture for Use in Pavement in Arid Region

Authors: I. Goual, M. S. Goual, M. K. Gueddouda, Taïbi Saïd, Abou-Bekr Nabil, A. Ferhat

Abstract:

The aim of the paper is to study the hydro-mechanical behavior of a tuff and calcareous sand mixture. A first experimental phase was carried out in order to find the optimal mixture. This showed that the material composed of 80% tuff and 20% calcareous sand provides the maximum mechanical strength. The second experimental phase concerns the study of the drying-wetting behavior of the optimal mixture was carried out on slurry samples and compacted samples at the MPO. Experimental results let to deduce the parameters necessary for the prediction of the hydro-mechanical behavior of pavement formulated from tuff and calcareous sand mixtures, related to moisture. This optimal mixture satisfies the regulation rules and hence constitutes a good local eco-material, abundantly available, for the conception of pavements.

Keywords: tuff, sandy calcareous, road engineering, hydro mechanical behaviour, suction

Procedia PDF Downloads 420
8456 A Literature Review of Ergonomics Sitting Studies to Characterize Safe and Unsafe Sitting Behaviors

Authors: Yoonjin Lee, Dongwook Hwang, Juhee Park, Woojin Park

Abstract:

As undesirable sitting posture is known to be a major cause of musculoskeletal disorder of office workers, sitting has attracted attention on occupational health. However, there seems to be no consensus on what are safe and unsafe sitting behaviors. The purpose of this study was to characterize safe and unsafe behaviors based on scientific findings of sitting behavior. Three objectives were as follows; to identify different sitting behaviors measure used in ergonomics studies on safe sitting, for each measure identified, to find available findings or recommendations on safe and unsafe sitting behaviors along with relevant empirical grounds, and to synthesize the findings or recommendations to provide characterizations of safe and unsafe behaviors. A systematic review of electronic databases (Google Scholar, PubMed, Web of Science) was conducted for extensive search of sitting behavior. Key terms included awkward sitting position, sedentary sitting, dynamic sitting, sitting posture, sitting posture, and sitting biomechanics, etc. Each article was systemically abstracted to extract a list of studied sitting behaviors, measures used to study the sitting behavior, and presence of empirical evidence of safety of the sitting behaviors. Finally, characterization of safe and unsafe sitting behavior was conducted based on knowledge with empirical evidence. This characterization is expected to provide useful knowledge for evaluation of sitting behavior and about postures to be measured in development of sensing chair.

Keywords: sitting position, sitting biomechanics, sitting behavior, unsafe sitting

Procedia PDF Downloads 282
8455 The Influence of the Diameter of the Flow Conducts on the Rheological Behavior of a Non-Newtonian Fluid

Authors: Hacina Abchiche, Mounir Mellal, Imene Bouchelkia

Abstract:

The knowledge of the rheological behavior of the used products in different fields is essential, both in digital simulation and the understanding of phenomenon involved during the flow of these products. The fluids presenting a nonlinear behavior represent an important category of materials used in the process of food-processing, chemical, pharmaceutical and oil industries. The issue is that the rheological characterization by classical rheometer cannot simulate, or take into consideration, the different parameters affecting the characterization of a complex fluid flow during real-time. The main objective of this study is to investigate the influence of the diameter of the flow conducts or pipe on the rheological behavior of a non-Newtonian fluid and Propose a mathematical model linking the rheologic parameters and the diameter of the conduits of flow. For this purpose, we have developed an experimental system based on the principal of a capillary rheometer.

Keywords: rhéologie, non-Newtonian fluids, experimental stady, mathematical model, cylindrical conducts

Procedia PDF Downloads 269
8454 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East

Authors: Kenneth Christie

Abstract:

Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.

Keywords: human security, migration, Syria and Iraq, conflict and development

Procedia PDF Downloads 344
8453 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 289
8452 Application Programming Interface Security in Embedded and Open Finance

Authors: Andrew John Zeller, Artjoms Formulevics

Abstract:

Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.

Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management

Procedia PDF Downloads 23
8451 Determining the Effectiveness of Dialectical Behavior Therapy in Reducing the Psychopathic Deviance of Criminals

Authors: Setareh Gerayeli

Abstract:

The present study tries to determine the effectiveness of dialectical behavior therapy in reducing the psychopathic deviance of employed criminals released from prison. The experimental method was used in this study, and the statistical population included employed criminals released from prison in Mashhad. Thirty offenders were selected randomly as the samples of the study. The MMPI-2 was used to collect data in the pre-test and post-test stages. The behavioral therapy was conducted on the experimental group during fourteen two and a half hour sessions, while the control group did not receive any intervention. Data analysis was conducted by using covariance. The results showed there is a significant difference between the post-test mean scores of the two groups. The findings suggest that dialectical behavior therapy is effective in reducing psychopathic deviance.

Keywords: criminals, dialectical behavior therapy, psychopathic deviance, prison

Procedia PDF Downloads 218
8450 Study of Crashworthiness Behavior of Thin-Walled Tube under Axial Loading by Using Computational Mechanics

Authors: M. Kamal M. Shah, Noorhifiantylaily Ahmad, O. Irma Wani, J. Sahari

Abstract:

This paper presents the computationally mechanics analysis of energy absorption for cylindrical and square thin wall tubed structure by using ABAQUS/explicit. The crashworthiness behavior of AISI 1020 mild steel thin-walled tube under axial loading has been studied. The influence effects of different model’s cross-section, as well as model length on the crashworthiness behavior of thin-walled tube, are investigated. The model was placed on loading platform under axial loading with impact velocity of 5 m/s to obtain the deformation results of each model under quasi-static loading. The results showed that model undergoes different deformation mode exhibits different energy absorption performance.

Keywords: axial loading, computational mechanics, energy absorption performance, crashworthiness behavior, deformation mode

Procedia PDF Downloads 426
8449 Moral Identity and Moral Attentiveness as Predictors of Ethical Leadership in Financial Sector

Authors: Pilar Gamarra Gamarra, Michele Girotto

Abstract:

In the expanding field of leaders’ ethical behavior research, little attention has been paid to the association between finance leaders’ ethical traits (beyond personality) and ethical leadership, and more importantly, how these ethical characteristics can be predictors of ethical behavior at the leadership level in the financial sector. In this study, we tested a theoretical model based on uponsocial cognitive theory (Bandura, 1986) and the cognitive-developmental model (Piaget, 1932) to examine leaders’ moral identity and moral attentiveness as antecedents of ethical leadership. After the 2008 economic crisis, the marketplace has awakened to the potential dangers of unethical behavior. The unethical behavior of the leaders of the financial sector was identified as guilty of this economic catastrophe. For that reason, it seems increasingly prudent for organizations to have leaders who are cognitively inclined toward ethical behavior. This evidence suggests that moral attentiveness and moral identity is perhaps one way of identifying those kinds of leaders. For leaders who are morally attentive and have a high moral identity, themes of ethics interventions are consistent with their way of seeing the word. As a result, these leaders could become critical components of change in organizations and could provide the energy and skills necessary for these efforts to be successful. Ethical behavior of leader from the financial sector and marketing sectors must be joined to manage the change. In this study, a leader’s moral identity, leader’s moral attentiveness, and self-importance of Ethical Leadership are measured for financial and marketing leaders to be compared to determine the relationship between the three variables in each sector. Other conclusion related to gender, educational level or generation are obtained.

Keywords: ethical leadership, moral identity, moral attentiveness, financial leaders, marketing leaders, ethical behavior

Procedia PDF Downloads 158
8448 An Assessment of the Effects of Social Conflicts on Tourism in Plateau State, Nigeria: Case Study of Jos Crisis on Hill Station Hotel

Authors: Audu Aly Fada, Adejoh Apeh Matthew

Abstract:

This research assesses the effects of social conflicts on tourism products in Plateau State. It was specifically set out to find out the major causes of social conflicts in Jos, evaluate the effects of social conflicts on the influx of tourists to Hill station hotel Jos, and the impact on revenue generation of the hotel. To achieve these objectives research questions were formulated and a sample of 30 hotel staff was selected as the respondents. Data collected were organized and analyzed using tables, percentages and mean statistics. It was found that the hospitality and tourism industry was adversely affected. The crisis brought about a decline in the number of tourist arrivals, increase in cancelled bookings, a decrease in the average length of stay of tourists and the average room occupancy. Peace is the best friend of travel and tourism, while war and insecurity are among its worst enemies. It is recommended that all stakeholders involved in tourism administration should device safer environment that supports continued patronage by providing modern security apparatus. In the same spirit, government as the main stake-holder in security provision should do more than paying lip service to guarantee security and safety of lives and properties.

Keywords: social conflict, crisis, security, tourism development

Procedia PDF Downloads 390