Search results for: social security
10719 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 6710718 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol
Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang
Abstract:
NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism
Procedia PDF Downloads 45110717 Towards an African Model: A Survey of Social Enterprises in South Africa
Authors: Kerryn Krige, Kerrin Myers
Abstract:
Social entrepreneurship offers the opportunity to simultaneously address both social and economic inequality in South Africa. Its appeal across racial groups, its attractiveness to young people, its applicability in rural and peri-urban markets, and its acceleration in middle income, large-business economies suits the South African context. However, the potential to deliver much-needed developmental benefits has not been realised because the social entrepreneurship debate lacks evidence as to who social entrepreneurs are, their goals and operations and the socio-economic results they achieve. As a result, policy development has been stunted, and legislative barriers and red tape remain. Social entrepreneurs are isolated from the mainstream economy, and struggle to access funding because of limitations in legislative and organisational structures. The objective of the study is to strengthen the ecosystem for social entrepreneurship in South Africa by producing robust, policy-rich information from and about social enterprises currently in operation across the country. The study employs a quantitative survey methodology, using online and telephonic data collection methods. A purposive sample of 1000 social enterprises was included in the first large-scale study of social entrepreneurship in South Africa. The results offer deep insight into the characteristics of social enterprises; the activities they undertake and the markets they serve; their modes of operation and funding sources as well as key challenges and support systems. The results contribute towards developing a model of social enterprise in the African context.Keywords: social enterprise, key characteristics, challenges and enablers, towards an African model
Procedia PDF Downloads 30710716 Integrating Individual and Structural Health Risk: A Social Identity Perspective on the HIV/AIDS Pandemic in Sub-Saharan Africa
Authors: Orla Muldoon, Tamaryn Nicolson, Mike Quayle, Aisling O'Donnell
Abstract:
Psychology most often considers the role of experience and behaviour in shaping health at the individual level. On the other hand epidemiology has long considered risk at the wider group or structural level. Here we use the social identity approach to integrate group-level risk with individual level behaviour. Using a social identity approach we demonstrate that group or macro-level factors impact implicitly and profoundly in everyday ways at the level of individuals, via social identities. We illustrate how identities related to race, gender and inequality intersect to affect HIV/AIDS risk and AIDS treatment behaviours; how social identity processes drive stigmatising consequences of HIV and AIDS, and promote positive and effective interventions. We conclude by arguing that the social identity approach offers the field an explanatory framework that conceptualizes how social and political forces intersect with individual identity and agency to affect human health.Keywords: social identity approach, HIV/AIDS, Africa, HIV risk, race, gender
Procedia PDF Downloads 52910715 The EU’s Role in Exporting Digital Privacy and Security Standards: A Legal Framework for Global Normative Diffusion
Authors: Yuval Reinfeld
Abstract:
This paper explores the European Union’s expanding influence as a global regulatory power, particularly in the realms of legal, security, and privacy challenges within the digital landscape. As digital regulation becomes increasingly vital, the EU has positioned itself as a leading exporter of privacy and cybersecurity standards through landmark frameworks like the General Data Protection Regulation (GDPR), the Artificial Intelligence Act (AIA), and the Digital Services Act (DSA). These regulations have set global benchmarks, extending their influence well beyond Europe’s borders by shaping legal frameworks in third countries and guiding the development of global digital governance. Central to this regulatory diffusion is the European Court of Justice (CJEU), whose rulings consistently reinforce and extend the reach of EU standards on an international scale. Through mechanisms such as trade agreements, adequacy decisions, and multilateral cooperation, the EU has constructed a regulatory ecosystem that other jurisdictions increasingly adopt. This paper investigates key CJEU cases to illustrate how the EU’s legal instruments in privacy, security, and AI contribute to its role as a global standard-setter. By examining the intersection of digital governance, international law, and normative power, this research provides a thorough analysis of the EU’s regulatory impact on global privacy, cybersecurity, and AI frameworks.Keywords: digital privacy, cybersecurity, GDPR, European Union Law, artificial intelligence, global normative power
Procedia PDF Downloads 2510714 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia
Authors: Rina Arum Prastyanti
Abstract:
Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.Keywords: mobile commerce, legal protection, consumer, effectiveness
Procedia PDF Downloads 36410713 A Comparative Study of Resilience Factors of First-Generation Students of Social Work with Their Non-first Generation Fellow Students
Authors: K. Verlinden
Abstract:
Being the first family member to study is challenging due to the lack of intergenerational support, financial challenges, etc. The often very deficit-oriented view of these first-generation students (FGS) is challenged by assuming that precisely these students have a high degree of resilience, which will be demonstrated by comparing individual resilience factors. First-generation students are disproportionately often found in courses of social work. Correspondingly, this study compares two samples from social work (FGS vs. non-FGS) with regard to certain determinants of resilience, such as grit, social support, self-efficacy, sense of coherence, and emotional intelligence. An online questionnaire was generated from valid psychological instruments and handed out to the sample. The results portray a double mediation model in which gender and being an FGS associate with lower levels of individual resources, which in then associate with social support. This tiered model supports the possibility that individual resources facilitate the recruitment and use of social support and perhaps other related social resources to better cope with academic challenges.Keywords: resilience, first generation students, grit, self-efficacy
Procedia PDF Downloads 12010712 A User Identification Technique to Access Big Data Using Cloud Services
Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy
Abstract:
Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.Keywords: design, implementation algorithms, performance, biometric approach
Procedia PDF Downloads 47610711 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy
Authors: F. Pagliara, F. Mauriello
Abstract:
The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.Keywords: tourists, overnights, high speed rail, attractions, security
Procedia PDF Downloads 15610710 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks
Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos
Abstract:
Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.Keywords: in-house networks, fiber optics, security risk, money
Procedia PDF Downloads 42010709 Linguistic Codes: Food as a Class Indicator
Authors: Elena Valeryevna Pozhidaeva
Abstract:
This linguistic case study is based on an interaction between the social position and foodways. In every culture there is a social hierarchical system in which there can be means to express and to identify the social status of a person. Food serves as a class indicator. The British being a verbal nation use the words as a preferred medium for signalling and recognising the social status. The linguistic analysis reflects a symbolic hierarchy determined by social groups in the UK. The linguistic class indicators of a British hierarchical system are detectable directly – in speech acts. They are articulated in every aspect of a national identity’s life from preferences of the food and the choice to call it to the names of the meals. The linguistic class indicators can as well be detected indirectly – through symbolic meaning or via the choice of the mealtime, its class (e.g the classes of tea or marmalade), the place to buy food (the class of the supermarket) and consume it (the places for eating out and the frequency of such practices). Under analysis of this study are not only food items and their names but also such categories as cutlery as a class indicator and the act of eating together as a practice of social significance and a class indicator. Current social changes and economic developments are considered and their influence on the class indicators appearance and transformation.Keywords: linguistic, class, social indicator, English, food class
Procedia PDF Downloads 40310708 Reflecting and Teaching on the Dialectical Nature of Social Work
Authors: Eli Buchbinder
Abstract:
Dialectics theory perceives two or more forces or themes as mutually opposed and negating on the one hand and as interdependent for their definition, existence, and resolution on the other. Such opposites might never be fully reconciled but might, simultaneously, continue to produce a higher level of integration and synthesis as well as tension, contradictions, and paradoxes. The identity of social work is constructed by poles; an understanding that emerges through key concepts that shape the profession. The key concept of person-in-environment creates dialectical tensions between the psychological versus the social pole. Important examples that reflect this focus on the psychological versus the social nature of human beings. This meta-perspective influences and constructs the implementation of values, ways of intervention, and professional relationships, e.g., creating a conflict between personal/social empowerment and social control and correction as the aims of the profession. Social work is dynamic and changing, with a unique way of perceiving and conceptualizing human behavior. Social workers must be able to face and accept the contradicting elements inherent in practicing social work. The basic philosophy for social work education is a dialectic conceptualization. In light of the above, social work students require dialectics as a critical mode of perception, reflection, and intervention. In the presentation, the focus will be on reflection on teaching students to conceptualize dialectics as a frame when training to be social workers. It is believed that the focus should emphasis two points: 1) the need to assist students to identify poles and to analyze the interrelationships created between them while coping emotionally with the tension and difficulties involved in containing these poles; 2) teaching students to integrate poles as a basis for assessment, planning, and intervention.Keywords: professional ontology, a generic social work education, skills and values of social work, reflecting on social work teaching methods
Procedia PDF Downloads 8510707 Modalmetric Fiber Sensor and Its Applications
Authors: M. Zyczkowski, P. Markowski, M. Karol
Abstract:
The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing
Procedia PDF Downloads 61910706 Combating Fake News: A Qualitative Evidence Synthesis of Organizational Stakeholder Trust in Social Media Communication during Crisis
Authors: Todd R. Walton
Abstract:
Social media would seem to be an ideal mechanism for crisis communication, yet it has been met with varied results. Natural disasters, such as hurricanes, provide a slow moving view of how social media can be leveraged to guide stakeholders and the public through a crisis. Crisis communication managers have struggled to reach target audiences with credible messaging. This Qualitative Evidence Synthesis (QES) analyzed the findings of eight studies published in the last year to determine how organizations effectively utilize social media for crisis communication. Additionally, the evidence was analyzed to note strategies for establishing credibility in a medium fraught with misinformation. Studies indicated wide agreement on the use of multiple social media channels in addition to frequent accurate messaging in order to establish credibility. Studies indicated mixed agreement on the use of text based emergency notification systems. The findings in this QES will help crisis communication professionals plan for social media use for crisis communication.Keywords: crisis communication, crisis management, emergency response, social media
Procedia PDF Downloads 20710705 Image Steganography Using Least Significant Bit Technique
Authors: Preeti Kumari, Ridhi Kapoor
Abstract:
In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.Keywords: steganography, LSB, encoding, information hiding, color image
Procedia PDF Downloads 47410704 Social Anxiety, Parental Criticism and the Mediating Role of Early Maladaptive Schemas
Authors: Tahmeena Ali, Andrew Francis, Keong Yap, Sharynn Schuster
Abstract:
Social anxiety is a chronic and debilitating condition characterized by fear and avoidance of social situations. Several risk factors have emerged, which emphasize the role of early childhood experiences in the development of this condition. As such, the current study tested the hypothesis that early maladaptive schemas (EMSs) mediate the relationship between retrospectively reported parental criticism and social anxiety whilst controlling the effects of depression. Three hundred and thirty-four non-clinical participants completed an online questionnaire consisting of self-report measures of parental criticism, EMSs of disconnection and rejection, and symptoms of social anxiety and depression. The mediation analysis confirmed the hypothesized model, indicating that EMSs mediated the relationship between parental criticism and social anxiety symptoms when controlling for depression. Whilst the current study is limited due to its cross-sectional design, the findings lend support to the developmental formulations of social anxiety and have important therapeutic implications for treatment.Keywords: early maladaptive schema, parental criticism, schema, social anxiety
Procedia PDF Downloads 27010703 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia
Authors: Logan Carmichael
Abstract:
As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis
Procedia PDF Downloads 11210702 The Developmental Model of Self-Efficacy Emotional Intelligence and Social Maturity among High School Boys and Girls
Authors: Shrikant Chavan, Vikas Minchekar
Abstract:
The present study examined the self-efficacy, emotional intelligence and social maturity of High school boys and girls. Furthermore, study aimed at to foster the self-efficacy, emotional intelligence and social maturity of high school students. The study was conducted on 100 high school students, out of which 50 boys and 50 girls were selected through simple random sampling method from the Sangli city of Maharashtra state, India. The age range of the sample is 14 to 16 years. Self-efficacy scale developed by Jesusalem Schwarzer, Emotional intelligence scale developed by Hyde, Pethe and Dhar and social maturity scale developed by Rao were administered to the sample. Data was analyzed using mean, SD and ‘t’ test further Karl Pearson’s product moment, correlation of coefficient was used to know the correlation between emotional intelligence, self-efficacy, and social maturity. Results revealed that boys and girls did not differ significantly in their self-efficacy and social maturity. Further, the analysis revealed that girls are having high emotional intelligence compared to boys, which is significant at 0.01 level. It is also found that there is a significant and positive correlation between self-efficacy and emotional intelligence, self-efficacy and social maturity and emotional intelligence and social maturity. Some developmental strategies to strengthen the self-efficacy, emotional intelligence and social maturity of high school students are suggested in the study.Keywords: self-efficacy, emotional intelligence, social maturity, developmental model and high school students
Procedia PDF Downloads 46810701 'Internationalization': Discussing the Ethics of the Global North Developing Social Work Courses for the Global South
Authors: Mary Goitom, Maria Liegghio
Abstract:
In this paper, we critically explore the ethics of Schools of Social Work from the global North developing courses for programs within the Global South. In it, we discuss our experiences of partnering with the University of Guyana to develop and teach graduate courses in a newly formed Masters of Social Work program. Under the umbrella of our university’s goal for 'internationalization', that is, developing and establishing global and local collaborations for teaching, research and scholarship, we bring into question whether a new form of academic imperialism is occurring under the guise of global citizenship and social justice.Keywords: academic imperialism, global north and south, internationalization, social work education
Procedia PDF Downloads 34310700 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand
Authors: Pichamon Chansuchai
Abstract:
The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.Keywords: audit, best practice, internet, payment
Procedia PDF Downloads 50010699 Red Green Blue Image Encryption Based on Paillier Cryptographic System
Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson
Abstract:
In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier
Procedia PDF Downloads 23810698 Correlation of Empathy with Job Satisfaction and Stress of Social Workers
Authors: Theodosios Paralikas, Evangelia Kotrotsiou, Mairy Gouva, Manolis Mentis, Stiliani Stavrotheodorou, Stiliani Kotrotsiou, Maria Malliarou
Abstract:
There is a big discussion in the international literature on empathy, job satisfaction and job occupational among various of disciplines, including social workers. Νevertheless these parameters have not been specifically studied in the Greek territory. This paper aims to study empathy of social workers, to produce results related to whether empathy is influenced by demographic factors such as gender, age, marital status, level of education and study their perceived stress levels and also the satisfaction they derive from their work. For the first time, an attempt is made to link the empathy of these professionals to their job satisfaction and their anxiety. The sample of this survey consists of 165 social workers working on providers of public and private social services. The results showed that social workers have high levels of empathy contrary to the perceived stress levels which were low to moderate. Regarding the field of the job satisfaction, the survey showed that social workers are very satisfied with their workpiece and workplace. The survey shows no significant relationship between empathy and demographic factors, but there is a significant relationship between empathy and the workpiece/job satisfaction and the feeling of success.Keywords: empathy, stress, job satisfaction, social workers
Procedia PDF Downloads 17710697 Wicking Bed Cultivation System as a Strategic Proposal for the Cultivation of Milpa and Mexican Medicinal Plants in Urban Spaces
Authors: David Lynch Steinicke, Citlali Aguilera Lira, Andrea León García
Abstract:
The proposal posed in this work comes from a researching-action approach. In Mexico, a dialogue of knowledge may function as a link between traditional, local, pragmatic knowledge, and technological, scientific knowledge. The advantage of generating this nexus lies on the positive impact in the environment, in society and economy. This work attempts to combine, on the one hand the traditional Mexican knowledge such as the usage of medicinal herb and the agroecosystem milpa; and on the other hand make use of a newly created agricultural ecotechnology which main function is to take advantage of the urban space and to save water. This ecotechnology is the wicking bed. In a globalized world, is relevant to have a proposal where the most important aspect is to revalorize the culture through the acquisition of traditional knowledge but at the same time adapting them to the new social and urbanized structures without threatening the environment. The methodology used in this work comes from a researching-action approach combined with a practical dimension where an experimental model made of three wickingbeds was implemented. In this model, there were cultivated medicinal herb and milpa components. The water efficiency and the social acceptance were compared with a traditional ground crop, all this practice was made in an urban social context. The implementation of agricultural ecotechnology has had great social acceptance as its irrigation involves minimal effort and it is economically feasible for low-income people. The wicking bed system raised in this project is attainable to be implemented in schools, urban and peri-urban environments, homemade gardens and public areas. The proposal managed to carry out an innovative and sustainable knowledge-based traditional Mexican agricultural technology, allowing regain Milpa agroecosystem in urban environments to strengthen food security in favour of nutritional and protein benefits for the Mexican fare.Keywords: milpa, traditional medicine, urban agriculture, wicking bed
Procedia PDF Downloads 38710696 From “Deafness” to “Aphasia”: A Study of Social Retreat of Families With Hearing-Impaired Children. Interviews with 12 Mothers of Hearing-Impaired Children in Beijing
Authors: Yang Jiayue, Liang Junwen
Abstract:
Case interviews with 12 mothers of hearing-impaired children in Beijing found that families with hard-of-hearing children make all-out efforts for rescue and rehabilitation until they exhaust family resources, they travel to work places, homes, and rehabilitation institutions every day, and social relations gradually shrink inward. In the stigmatized social environment, children with hearing impairment find it difficult to integrate into regular communication and gradually return to a silent world; their parents also suffer from social discrimination and affiliate stigma, and they gradually reduce contact with others. Finally, families with hearing-impaired children become invisible people in society; the "deafness" of children leads families to "loss of voice."Keywords: family with hearing-impaired children, social retreat, social exclusion, stigma
Procedia PDF Downloads 7410695 State of Emergency in Turkey (July 2016-July 2018): A Case of Utilization of Law as a Political Instrument
Authors: Neslihan Cetin
Abstract:
In this study, we will aim to analyze how the period of the state of emergency in Turkey lead to gaps in law and the formation of areas in which there was a complete lack of supervision. The state of emergency that was proclaimed following the coup attempt of July 15, 2016, continued until July 18, 2018, that is to say, 2 years, without taking into account whether the initial circumstances persisted. As part of this work, we claim that the state of emergency provided the executive power with important tools for governing, which it took constant use. We can highlight how the concern for security at the center of the basic considerations of the people in a city was exploited as a foundation by the military power in Turkey to interfere in the political, legal, and social spheres. The constitutions of 1924, 1961, and 1982 entrusted the army with the role of protector of the integrity of the state. This became an instrument at the hands of the military to legitimize their interventions in the name of public security. Its interventions in the political field are indeed politically motivated. The constitution, the legislative, and regulatory systems are modified and monopolized by the military power that dominates the legislative, regulatory, and judicial power, leading to a state of exception. With the political convulsions over a decade, the government was able to usurp the instrument called the state of exception. In particular, the decree-laws of the state of emergency, which the executive makes frequent and generally abusive use, became instruments in the hands of the government to take measures that it wishes to escape from the rules and the pre-established control mechanisms. Thus the struggle against the political opposition becomes more unbalanced and destructive. To this must also be added the ineffectiveness of ex-post controls and domestic remedies. This research allows us to stress how a legal concept, such as ‘the state of emergency’ can be politically exploited to make it a legal weapon that continues to produce victims.Keywords: constitutional law, state of emergency, rule of law, instrumentalization of law
Procedia PDF Downloads 14310694 Changing Body Ideals of Ethnically Diverse Gay and Heterosexual Men and the Proliferation of Social and Entertainment Media
Authors: Cristina Azocar, Ivana Markova
Abstract:
A survey of 565 male undergraduates examined the effects of exposure to social networking sites and entertainment media on young men’s body image. Exposure to social and to entertainment media was found to have negative effects on men’s body satisfaction, social comparison, and thin ideal internalization. Findings indicated significant differences in those men who were more exposed to social and to entertainment media than those who were not as exposed. Consistent with past studies, gay men were found to be more dissatisfied with their bodies than straight men. Gay men compared themselves to other better-looking individuals and internalized ideal body types seen in media significantly more than their straight counterparts. Surprisingly, straight men seem to care as much about their physical attractiveness/appearance as gay men do, but only in public settings such as at the beach, at athletic events (including gyms) and social events. Although on average ethnic groups were more similar than different, small but significant differences occurred with Asian men indicating significantly higher body dissatisfaction than White/European men and Middle Eastern/Arab men their counterparts. The study increases our knowledge about SNS and entertainment use and its associated body image, and body satisfaction affects among low-income ethnic minority men.Keywords: body dissatisfaction, body image, entertainment media, gay men, race and ethnicity, social economic status, social comparison, social media
Procedia PDF Downloads 13310693 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher
Authors: Okike Benjami, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 29010692 An Appraisal of the Utilisation of Social Media for Political Communication in the 2015 Nigerian Presidential Election
Authors: Tsegyu Santas
Abstract:
The aim of this study was to examine the utilization of social media for political communication during the 2011 presidential election in Nigeria. The research design adopted for the study was survey; 294 copies of questionnaire were distributed to students of mass communication in three selected universities in North Central Nigeria. Simple random sampling technique was used to select the respondents for the study. The results of the descriptive statistics show that majority of the respondents choice of presidential candidates during the 2011 presidential election was influenced by the use of social media as indicated by high value of mean (1.5805). Similarly, a large number of respondents were of the opinion that the two selected presidential candidates were popular because they used social media in their political campaign (mean value of 1.5575). In addition, the respondents affirmed that their voting pattern during the 2011 presidential elections was influenced by social media usage. This was validated by a high mean value of (1.6667). Similarly, the result of the test of hypothesis indicated that voters’ choice of political candidates was influenced by political communication on social media. In view of the findings of this study, the study, therefore, concludes that social media have redefined the landscape of political communication in Nigeria. Based on the findings of the study, it was recommended that social media should be fully integrated in Nigeria political communication system.Keywords: communication, election, politics, social media
Procedia PDF Downloads 33810691 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve
Authors: Eun-Jun Yoon
Abstract:
Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis
Procedia PDF Downloads 33210690 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive
Authors: Swapan Maiti, Dipanwita Roy Chowdhury
Abstract:
Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions
Procedia PDF Downloads 314