Search results for: employee security behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9347

Search results for: employee security behavior

8357 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 154
8356 Applications of Social Marketing in Road Safety of Georgia

Authors: Charita Jashi

Abstract:

The aim of the paper is to explore the role of social marketing in changing the behavior of consumers on road safety, identify critical aspects and priority needs which impede the implementation of road safety program in Georgia. Given the goals of the study, a quantitative method was used to carry out interviews for primary data collection. This research identified the awareness level of road safety, legislation base, and marketing interventions to change behavior of drivers and pedestrians. During several years the non-governmental sector together with the local authorities and media have been very intensively working on the road safety issue in Georgia, but only seat-belts campaign should be considered rather successful. Despite achievements in this field, efficiency of road safety programs far from fulfillment and needs strong empowering.

Keywords: road safety, social marketing interventions, behavior change, well-being

Procedia PDF Downloads 178
8355 Individualism/Collectivism and Extended Theory of Planned Behavior

Authors: Ela Ari, Aysi̇ma Findikoglu

Abstract:

Consumers’ switching GSM operators’ has been an important research issue since the rise of their competitive offers. Recent research has looked at consumer switching behavior through the theory of planned behavior, but not yet extended the theory with identity, psycho-social and cultural influences within the service context. This research explores an extended version of the theory of planned behavior including social and financial risks and brand loyalty. Moreover, the role of individualism and collectivism at the individual level is investigated in a collectivistic culture that moves toward to individualism due to changing family relationships, use of technology and education. Our preliminary analysis showed that financial risk and vertical individualism prove to be a significant determinant of intention to switch. The study also investigates social risk and intention, subjective norm, perceived behavioral control relationship. The effect of individualism and collectivism and attitudes relationship has been also examined within a service industry. Implications for marketing managers and scholars are also discussed.

Keywords: attitude, individualism, intention, subjective norm

Procedia PDF Downloads 436
8354 Change in Food Choice Behavior: Trend and Challenges

Authors: Gargi S. Kumar, Mrinmoyi Kulkarni

Abstract:

Food choice behavior is complex and determined by biological, psychological, socio-cultural, and economic factors. The past two decades, have seen dramatic changes in food consumption patterns among urban Indian consumers. The objective of the current study was to evaluate perceptions about changes with respect to food choice behavior. Ten participants [urban men and women] ranging in age from 40 to 65 were selected and in-depth interviews were conducted with a set of open ended questions. The recorded interviews were transcribed and thematically analyzed using inductive, open and axial coding. The results identified themes that act as drivers and consequences of change in food choice behavior. Drivers such as globalization [sub themes of urbanization, education, income, and work environment], media and advertising, changing gender roles, women in the workforce, and change in family structure have influenced food choice, both at an individual and national level. The consequences of changes in food choice were health implications, processed food consumption, food decisions driven by children and eating out among others. The study reveals that, over time, food choices change and evolve. However it is interesting to note how market forces and culture interact to influence individual behavior and the overall food environment which subsequently affects food choice and the health of the people.

Keywords: change, consequences, drivers, food choice, globalization

Procedia PDF Downloads 211
8353 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security

Authors: Katie Wood

Abstract:

Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.

Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity

Procedia PDF Downloads 225
8352 The Fadama Initiative: Implications for Human Security and Sustainable Development in Nigeria

Authors: Albert T. Akume, Yahya M. Abdullahi

Abstract:

The impact of poverty on individual and society is grave, hence the efforts by the government to eradicate or alleviate. In Nigeria the various efforts to reduce rural poverty by empowering them and making the process of their development self-sustaining have ended dismally. That notwithstanding, government determination to conquer poverty has not diminish as in the early 1990s the government with financial collaboration from the World Bank and African Development Bank introduced the fadama project. It is against this backdrop that this paper uses the documentary and analytical research methods to examine the implication the fadama development project has for community capacity development and human security in Nigeria. From the analysis it was discovered the fadama project improved household income of fadama farmers, community empowerment, participatory development planning and support for demand driven productive investment in farm and non-farm activities including community infrastructures. Despite this impressive result the fadama project is challenged by conflict especially in northern Nigeria and late delivery of necessary farm consumables that aid improved productivity. It was therefore recommended that the government should strengthen her various state security institutions to proactively mitigate conflicts and to ensure that farm consumables and other support services reach farmers timely.

Keywords: capacity development, empowerment, fadama, human security, poverty reduction, theory of change, sustainable development

Procedia PDF Downloads 467
8351 Exploring Gen Z Consumers’ Behavior Towards Sustainable Fashion

Authors: Lilia Righi

Abstract:

Recently, the fashion industry has demonstrated a keen interest in sustainability and the environment. Sustainable fashion has huge potential and appeals to environmentally conscious Generation Z shoppers. Meanwhile, Generation Z customers have attracted researchers' interest due to their overconsumption of clothing. However, most studies in this area focus on designing or producing sustainable clothing, with little exploration of consumers. To fill this gap, the present study aims to determine the important factors influencing Generation Z consumers' decisions to purchase sustainable fashion by mobilizing the theory of planned behavior (TPB). It uses deductive qualitative research based on 18 semi-structured interviews with Generation Z consumers in France. Qualitative data will be analyzed using reflective thematic analysis. On a theoretical level, this research contributes to enriching the literature by mobilizing, for the first time, the theory of planned behavior in the context of sustainable fashion. On a practical level, the results can help practitioners determine effective marketing strategies to persuade Generation Z to consume sustainable clothing.

Keywords: generation Z, qualitative methodology, sustainable fashion, theory of planned behavior (TPB).

Procedia PDF Downloads 15
8350 Strengthening the Security of the Thai-Myanmar Border Trade of the People in the Mae Sot Customs Checkpoint Area, Tak Province

Authors: Sakapas Saengchai

Abstract:

A Study on Strengthening the Security of the Thai-Myanmar Border Trade Area of the people in the Mae Sot customs checkpoint area, Tak province, was designed as a qualitative research study. Its objectives were to study the principles of strengthening border trade security and enhancing people's participation. To develop a border trade model that enhances the spatial economy and improves people's quality of life by collecting data using a participant observation method. In-depth interview group chats border checkpoint administrators, Mae Sot customs checkpoint, Tak province, private entrepreneurs, community leaders, and the opening of a community forum to exchange opinions with people in the area. The results of the study found that 1. Security development is to promote crime reduction. Reduce drug trafficking problems Smuggling and human trafficking have been reduced. Including planning and preparation to protect people from terrorism, epidemics, and communicable diseases, including cooperation with Burma on border rules for people and workers, 2. Wealth development is to promote investment. Transport links value chain logistics Cross-border goods and services on the Thai-Myanmar border Both amending regulations and laws to promote fair trade. Emphasis on convenient and fast service as well as promoting the Thai border area to be a tourist attraction that can create prosperity and income for the community in the area By using balanced natural resources, with production and consumption that are environmentally friendly, and emphasizes the participation of the public sector, the private sector, and people from all sectors in the sustainable development of the Thai border.

Keywords: security, border trade, customs, participation, people

Procedia PDF Downloads 158
8349 Energy Security and Sustainable Development: Challenges and Prospects

Authors: Abhimanyu Behera

Abstract:

Over the past few years, energy security and sustainable development have moved rapidly into the global agenda. There are two main reasons: first, the impact of high and often volatile energy prices; second, concerns over environmental sustainability particularly about the global climate. Both issues are critically important in which impressive economic growth has boosted the demand for energy and put corresponding strains on the environment. Energy security is a broad concept that focuses on energy availability and pricing. Specifically, it refers to the ability of the energy supply system i.e. suppliers, transporters, distributors and regulatory, financial and R&D institutions to deliver the amount of competitively priced energy that customers demand, within accepted standards of reliability, timeliness, quality, safety. Traditionally, energy security has been defined in the context of the geopolitical risks to external oil supplies but today it is encompassing all energy forms, all the external and internal links bringing the energy to the final consumer, and all the many ways energy supplies can be disrupted including equipment malfunctions, system design flaws, operator errors, malicious computer activities, deficient market and regulatory frameworks, corporate financial problems, labour actions, severe weather and natural events, aggressive acts (e.g. war, terrorism and sabotage), and geopolitical disruptions. In practice, the most challenging disruptions are those linked to: 1) extreme weather events; 2) mismatched electricity supply and demand; 3) regulatory failures; and 4) concentration of oil and gas resources in certain regions of the world. However, insecure energy supplies inhibit development by raising energy costs and imposing expensive cuts in services when disruptions actually occur. The energy supply sector can best advance sustainable development by producing and delivering secure and environmentally-friendly sources of energy and by increasing the efficiency of energy use. With this objective, this paper seeks to highlight the significance of energy security and sustainable development in today’s world. Moreover, it critically overhauls the major challenges towards sustainability of energy security and what are the major policies are taken to overcome these challenges by Government is lucidly explicated in this paper.

Keywords: energy, policies, security, sustainability

Procedia PDF Downloads 371
8348 Elasto-Plastic Behavior of Rock during Temperature Drop

Authors: N. Reppas, Y. L. Gui, B. Wetenhall, C. T. Davie, J. Ma

Abstract:

A theoretical constitutive model describing the stress-strain behavior of rock subjected to different confining pressures is presented. A bounding surface plastic model with hardening effects is proposed which includes the effect of temperature drop. The bounding surface is based on a mapping rule and the temperature effect on rock is controlled by Poisson’s ratio. Validation of the results against available experimental data is also presented. The relation of deviatoric stress and axial strain is illustrated at different temperatures to analyze the effect of temperature decrease in terms of stiffness of the material.

Keywords: bounding surface, cooling of rock, plasticity model, rock deformation, elasto-plastic behavior

Procedia PDF Downloads 116
8347 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 134
8346 Exploration of Abuse of Position for Sexual Gain by UK Police

Authors: Terri Cole, Fay Sweeting

Abstract:

Abuse of position for sexual gain by police is defined as behavior involving individuals taking advantage of their role to pursue a sexual or improper relationship. Previous research has considered whether it involves ‘bad apples’ - individuals with poor moral ethos or ‘bad barrels’ – broader organizational flaws which may unconsciously allow, minimize, or do not effectively deal with such behavior. Low level sexual misconduct (e.g., consensual sex on duty) is more common than more serious offences (e.g., rape), yet the impact of such behavior can have severe implications not only for those involved but can also negatively undermine public confidence in the police. This ongoing, collaborative research project has identified variables from 514 historic case files from 35 UK police forces in order to identify potential risk indicators which may lead to such behavior. Quantitative analysis using logistic regression and the Cox proportion hazard model has resulted in the identification of specific risk factors of significance in prediction. Factors relating to both perpetrator background such as a history of intimate partner violence, debt, and substance misuse coupled with in work behavior such as misusing police systems increase the risk. Findings are able to provide pragmatic recommendations for those tasked with identifying potential or investigating suspected perpetrators of misconduct.

Keywords: abuse of position, forensic psychology, misconduct, sexual abuse

Procedia PDF Downloads 179
8345 Factors Affecting Expectations and Intentions of University Students in Educational Context

Authors: Davut Disci

Abstract:

Objective: to measure the factors affecting expectations and intentions of using mobile phone in educational contexts by university students, using advanced equations and modeling techniques. Design and Methodology: According to the literature, Mobile Addiction, Parental Surveillance-Safety/Security, Social Relations, and Mobile Behavior are most used terms of defining mobile use of people. Therefore, these variables are tried to be measured to find and estimate their effects on expectations and intentions of using mobile phone in educational context. 421 university students participated in this study and there are 229 Female and 192 Male students. For the purpose of examining the mobile behavior and educational expectations and intentions, a questionnaire is prepared and applied to the participants who had to answer all the questions online. Furthermore, responses to close-ended questions are analyzed by using The Statistical Package for Social Sciences(SPSS) software, reliabilities are measured by Cronbach’s Alpha analysis and hypothesis are examined via using Multiple Regression and Linear Regression analysis and the model is tested with Structural Equation Modeling (SEM) technique which is important for testing the model scientifically. Besides these responses, open-ended questions are taken into consideration. Results: When analyzing data gathered from close-ended questions, it is found that Mobile Addiction, Parental Surveillance, Social Relations and Frequency of Using Mobile Phone Applications are affecting the mobile behavior of the participants in different levels, helping them to use mobile phone in educational context. Moreover, as for open-ended questions, participants stated that they use many mobile applications in their learning environment in terms of contacting with friends, watching educational videos, finding course material via internet. They also agree in that mobile phone brings greater flexibility to their lives. According to the SEM results the model is not evaluated and it can be said that it may be improved to show in SEM besides in multiple regression. Conclusion: This study shows that the specified model can be used by educationalist, school authorities to improve their learning environment.

Keywords: learning technology, instructional technology, mobile learning, technology

Procedia PDF Downloads 439
8344 Investigating the Relationship of Age, Annual Income, and Education on Women's Investment Behavior in the Arab Region

Authors: Razan Salem

Abstract:

This study aims to investigate the investment behavior of Arab women (in regards to their herding behavior, risk tolerance, confidence and investment literacy levels). This study aims to investigate the relationship between three demographic factors (age, income, education) and the investment behavior of Arab women. On average, women in the Arab region face several obstacles that limit them from fully participating in stocks investments. In the context, this study focuses on extending the existing literature to include Arab women individuals and their investment behaviors. To achieve the study’s objective, the researcher distributed 600 close-ended online questionnaires to a sample of Arab male and female individual investors in both Saudi Arabia and Jordan. The researcher used quantitative statistical methods (frequency distribution along with the Kruskal-Wallis H Test and the Mann-Whitney U Test) to analyze the 550 questionnaire respondents. The findings indicated that only age, educational level, and annual income level are associated with the investment behavior of Arab women, where age is only negatively associated with their financial risk tolerance levels. Additionally, income level is positively associated with Arab women‘s confidence and investment literacy levels, while educational level is only associated positively with their investment confidence levels. According to annual income, Arab women with lower incomes have lower confidence and investment literacy levels. The limited income level might prevent the sample Arab women from investing in the financial information and advisors that may help in improving their investment literacy levels. Furthermore, Arab women with lower educational levels have lower investment literacy levels and thus, this may limit their stock investments. Overall, the study contributes to the existing literature by focusing directly on examining the investment behavior of Arab women and its association with age, annual income, and education. Generally, there are scarce existing studies that investigate the association of demographic factors with the investment behavior of women only in regards to their herding behavior, risk tolerance, investment confidence, and investment literacy levels (combined), especially Arab women investors.

Keywords: Arab region, demographic factors, investment behavior, women investors

Procedia PDF Downloads 170
8343 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 23
8342 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 353
8341 Brazilian Public Security: Governability and Constitutional Change

Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari

Abstract:

Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.

Keywords: public security, governability, rule of law, federalism

Procedia PDF Downloads 658
8340 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study

Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke

Abstract:

This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.

Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management

Procedia PDF Downloads 8
8339 Knowledge and Eating Behavior of Teenage Pregnancy

Authors: Udomporn Yingpaisuk, Premwadee Karuhadej

Abstract:

The purposed of this research was to study the eating habit of teenage pregnancy and its relationship to the knowledge of nutrition during pregnancy. The 100 samples were derived from simple random sampling technique of the teenage pregnancy in Bangkae District. The questionnaire was used to collect data with the reliability of 0.8. The data were analyzed by SPSS for Windows with multiple regression technique. Percentage, mean and the relationship of knowledge of eating and eating behavior were obtained. The research results revealed that their knowledge in nutrition was at the average of 4.07 and their eating habit that they mentioned most was to refrain from alcohol and caffeine at 82% and the knowledge in nutrition influenced their eating habits at 54% with the statistically significant level of 0.001.

Keywords: teenage pregnancy, knowledge of eating, eating behavior, alcohol, caffeine

Procedia PDF Downloads 343
8338 The Effect of Taxpayer Political Beliefs on Tax Evasion Behavior: An Empirical Study Applied to Tunisian Case

Authors: Nadia Elouaer

Abstract:

Tax revenue is the main state resource and one of the important variables in tax policy. Nevertheless, this resource is continually decreasing, so it is important to focus on the reasons for this decline. Several studies show that the taxpayer is reluctant to pay taxes, especially in countries at risk or in countries in transition, including Tunisia. This study focuses on the tax evasion behavior of a Tunisian taxpayer under the influence of his political beliefs, as well as the influence of different tax compliance variables. Using a questionnaire, a sample of 500 Tunisian taxpayers is used to examine the relationship between political beliefs and taxpayer affiliations and tax compliance variables, as well as the study of the causal link between political beliefs and fraudulent behavior. The data were examined using correlation, factor, and regression analysis and found a positive and statistically significant relationship between the different tax compliance variables and the tax evasion behavior. There is also a positive and statistically significant relationship between tax evasion and political beliefs and affiliations. The study of the relationship between political beliefs and compliance variables shows that they are closely related. The conclusion is to admit that tax evasion and political beliefs are closely linked, and the government should update its tax policy and modernize its administration in order to strengthen the credibility and disclosure of information in order to restore a relationship of trust between public authorities and the taxpayer.

Keywords: fiscal policy, political beliefs, tax evasion, taxpayer behavior

Procedia PDF Downloads 134
8337 Challenges and Opportunities in Modelling Energy Behavior of Household in Malaysia

Authors: Zuhaina Zakaria, Noraliza Hamzah, Siti Halijjah Shariff, Noor Aizah Abdul Karim

Abstract:

The residential sector in Malaysia has become the single largest energy sector accounting for 21% of the entire energy usage of the country. In the past 10 years, a number of energy efficiency initiatives in the residential sector had been undertaken by the government including. However, there is no clear evidence that the total residential energy consumption has been reduced substantially via these strategies. Household electrical appliances such as air conditioners, refrigerators, lighting and televisions are used depending on the consumers’ activities. The behavior of household occupants played an important role in energy consumption and influenced the operation of the physical devices. Therefore, in order to ensure success in energy efficiency program, it requires not only the technological aspect but also the consumers’ behaviors component. This paper focuses on the challenges and opportunities in modelling residential consumer behavior in Malaysia. A field survey to residential consumers was carried out and responses from the survey were analyzed to determine the consumers’ level of knowledge and awareness on energy efficiency. The analyses will be used in determining a right framework to explain household energy use intentions and behavior. These findings will be beneficial to power utility company and energy regulator in addressing energy efficiency related issues.

Keywords: consumer behavior theories, energy efficiency, household occupants, residential consumer

Procedia PDF Downloads 315
8336 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 248
8335 Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century

Authors: Stephen L. Roberts

Abstract:

This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.

Keywords: algorithms, global health, pandemic, surveillance

Procedia PDF Downloads 166
8334 Women and Food Security: Evidence from Bangladesh Demographic Health Survey 2011

Authors: Abdullah Al. Morshed, Mohammad Nahid Mia

Abstract:

Introduction: Food security refers to the availability of food and a person’s access to it. It is a complex sustainable development issue, which is closely related to under-nutrition. Food security, in turn, can widely affect the living standard, and is rooted in poverty and leads to poor health, low productivity, low income, food shortage, and hunger. The study's aim was to identify the most vulnerable women who are in insecure positions. Method: 17,842 married women were selected for analysis from the Bangladesh Demographic and Health Survey 2011. Food security defined as dichotomous variables of skipped meals and eaten less food at least once in the last year. The outcome variables were cross-tabulated with women's socio-demographic characteristics and chi2 test was applied to see the significance. Logistic regression models were applied to identify the most vulnerable groups in terms of food security. Result: Only 18.5% of women said that they ever had to skip meals in the last year. 45.7% women from low socioeconomic status had skip meal for at least once whereas only 3.6% were from women with highest socioeconomic status. Women meal skipping was ranged from 1.4% to 34.2% by their educational status. 22% of women were eaten less food during the last year. The rate was higher among the poorest (51.6%), illiterate (39.9%) and household have no electricity connection (38.1) in compared with richest (4.4%), higher educated (2.0%), and household has electricity connection (14.0%). The logistic regression analysis indicated that household socioeconomic status, and women education show strong gradients to skip meals. Poorest have had higher odds (20.9) than richest and illiterate women had 7.7 higher odds than higher educated. In terms of religion, Christianity was 2.3 times more likely to skip their meals than Islam. On the other hand, a similar trend was observed in our other outcome variable eat less food. Conclusion: In this study we able to identify women with lower economics status and women with no education were mostly suffered group from starvation.

Keywords: food security, hunger, under-nutrition, women

Procedia PDF Downloads 360
8333 The Impact of Formulate and Implementation Strategy for an Organization to Better Financial Consequences in Malaysian Private Hospital

Authors: Naser Zouri

Abstract:

Purpose: Measures of formulate and implementation strategy shows amount of product rate-market based strategic management category such as courtesy, competence, and compliance to reach the high loyalty of financial ecosystem. Despite, it solves the market place error intention to fair trade organization. Finding: Finding shows the ability of executives’ level of management to motivate and better decision-making to solve the treatments in business organization. However, it made ideal level of each interposition policy for a hypothetical household. Methodology/design. Style of questionnaire about the data collection was selected to survey of both pilot test and real research. Also, divide of questionnaire and using of Free Scale Semiconductor`s between the finance employee was famous of this instrument. Respondent`s nominated basic on non-probability sampling such as convenience sampling to answer the questionnaire. The way of realization costs to performed the questionnaire divide among the respondent`s approximately was suitable as a spend the expenditure to reach the answer but very difficult to collect data from hospital. However, items of research survey was formed of implement strategy, environment, supply chain, employee from impact of implementation strategy on reach to better financial consequences and also formulate strategy, comprehensiveness strategic design, organization performance from impression on formulate strategy and financial consequences. Practical Implication: Dynamic capability approach of formulate and implement strategy focuses on the firm-specific processes through which firms integrate, build, or reconfigure resources valuable for making a theoretical contribution. Originality/ value of research: Going beyond the current discussion, we show that case studies have the potential to extend and refine theory. We present new light on how dynamic capabilities can benefit from case study research by discovering the qualifications that shape the development of capabilities and determining the boundary conditions of the dynamic capabilities approach. Limitation of the study :Present study also relies on survey of methodology for data collection and the response perhaps connection by financial employee was difficult to responds the question because of limitation work place.

Keywords: financial ecosystem, loyalty, Malaysian market error, dynamic capability approach, rate-market, optimization intelligence strategy, courtesy, competence, compliance

Procedia PDF Downloads 286
8332 Factors of Social Media Platforms on Consumer Behavior

Authors: Zebider Asire Munyelet, Yibeltal Chanie Manie

Abstract:

In the modern digital landscape, the increase of social media platforms has become identical to the evolution of online consumer behavior. This study investigates the complicated relationship between social media and the purchasing decisions of online buyers. Through an extensive review of existing literature and empirical research, the aim is to comprehensively analyze the multidimensional impact that social media exerts on the various stages of the online buyer's journey. The investigation encompasses the exploration of how social media platforms serve as influential channels for information dissemination, product discovery, and consumer engagement. Additionally, the study investigates into the psychological aspects underlying the role of social media in shaping buyer preferences, perceptions, and trust in online transactions. The methodologies employed include both quantitative and qualitative analyses, incorporating surveys, interviews, and data analytics to derive meaningful insights. Statistical models are applied to distinguish patterns in online buyer behavior concerning product awareness, brand loyalty, and decision-making processes. The expected outcomes of this research contribute not only to the academic understanding of the dynamic interplay between social media and online buyer behavior but also offer practical implications for marketers, e-commerce platforms, and policymakers.

Keywords: consumer Behavior, social media, online purchasing, online transaction

Procedia PDF Downloads 48
8331 Rheological Evaluation of Various Indigenous Gums

Authors: Yogita Weikey, Shobha Lata Sinha, Satish Kumar Dewangan

Abstract:

In the present investigation, rheology of the three different natural gums has been evaluated experimentally using MCR 102 rheometer. Various samples based on the variation of the concentration of the solid gum powder have been prepared. Their non-Newtonian behavior has been observed by the consistency plots and viscosity variation plots with respect to different solid concentration. The viscosity-shear rate curves of gums are similar and the behavior is shear thinning. Gums are showing pseudoplastic behavior. The value of k and n are calculated by using various models. Results show that the Herschel–Bulkley rheological model is reliable to describe the relationship of shear stress as a function of shear rate. R² values are also calculated to support the choice of gum selection.

Keywords: bentonite, Indian gum, non-Newtonian model, rheology

Procedia PDF Downloads 294
8330 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments

Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek

Abstract:

Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.

Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking

Procedia PDF Downloads 264
8329 Factors Affecting Green Consumption Behaviors of the Urban Residents in Hanoi, Vietnam

Authors: Phan Thi Song Thuong

Abstract:

This paper uses data from a survey on the green consumption behavior of Hanoi residents in October 2022. Data was gathered from a survey conducted in ten districts in the center of Hanoi, with 393 respondents. The hypothesis focuses on understanding the factors that may affect green consumption behavior, such as demographic characteristics, concerns about the environment and health, people living around, self-efficiency, and mass media. A number of methods, such as the T-test, exploratory factor analysis, and a linear regression model, are used to prove the hypotheses. Accordingly, the results show that gender, age, and education level have separate effects on the green consumption behavior of respondents.

Keywords: green consumption, urban residents, environment, sustainable, linear regression

Procedia PDF Downloads 102
8328 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 365