Search results for: emotional security
3314 Lightweight and Seamless Distributed Scheme for the Smart Home
Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
Abstract:
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.Keywords: authentication, key-session, security, wireless sensors
Procedia PDF Downloads 3183313 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States
Authors: Muhammad Jawad Hashmi
Abstract:
The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan
Procedia PDF Downloads 3563312 4P-Model of Information Terrorism
Authors: Nataliya Venelinova
Abstract:
The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.Keywords: information terrorism, mass communication cycle, public perception, security
Procedia PDF Downloads 1733311 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script
Authors: Yash Goyal, Manish Korde, Juned Siddiqui
Abstract:
Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.Keywords: responsive, accessible, attractive, interface, objective, security.
Procedia PDF Downloads 1023310 Marital Expectations, Marital Infidelity and Neuroticism as Predictors of Marital Conflict: Case Study of Igbo Spouses in Imo State, Nigeria
Authors: Ann Ukachi Madukwe, Juliana Chinwendu Njoku
Abstract:
Marital conflict, conceptualized in this study as the ongoing lack of peace and satisfaction in a marital union which threatens marital stability, has become quite prevalent in modern Igbo communities. The frequent incidences of spousal battery, spousal sexual abuse, domestic violence, long term separation and in some cases outright divorce are worrisome indicators of the endemic challenge marital conflict poses in most Igbo communities. This study examined marital expectations, marital infidelity (self and spouse), and neuroticism as predictors of marital conflict. Marital expectation was described as a married person’s appraisal of how well their pre-marital desires were being met by their spouses and within the marriage relationship. It assessed different aspects of personal and interpersonal positive outcomes in a marital union. Marital infidelity referred to the likelihood that married individuals or their spouses could have indulged in intimate activities like passionate kisses and romantic dates with someone other than their spouses. Participants reported on themselves as well as their spouses. The last predictor variable neuroticism was measured as a personality trait that addresses issues of emotional instability especially as it relates to a person’s interactions. Neurotic persons were considered to have high emotional reactivity; they would have strong emotional response to issues that emotionally stable persons might overlook. Participants comprised of Igbo male and female spouses selected from Imo state using randomized cluster sampling method. The study utilized the cross sectional survey design and Stepwise linear multiple regression for data analyses. Findings showed that though marital infidelity by spouse was generally below average and spouses marital expectations were being fulfilled; marital expectations followed by marital infidelity – spouse proved to be significant predictors of marital conflict. Marital conflict reduced as marital expectations got fulfilled and increased as the level of likelihood of marital infidelity by the spouse increased. Spouses in this study also reported an increased level of neuroticism, with males being more neurotic than females. Neuroticism was found to be the least significant predictor of marital conflict compared to marital expectations and marital infidelity – spouse. Finally, the article made recommendations to spouses and marital counsellors regarding especially the need to manage the neurotic tendencies of Igbo spouses.Keywords: Igbo spouses, marital conflict, marital expectations, Nigeria
Procedia PDF Downloads 1723309 Examining Contraceptive Ideational Disparities Among Adolescents and Young Women in Nigeria using Multivariate Analysis
Authors: Oluwayemisi D. Ishola, Lekan Ajijola
Abstract:
Nigeria faces a demographic challenge characterized by a burgeoning youth population and an escalating fertility rate. A notable decline in the use of modern contraceptives among adolescent girls and young women compounds the challenge. The youthful demographic stands at a critical juncture in the nation's pursuit to fulfill its pledge of achieving a 27% modern contraceptive rate by 2030, embodying the potential to translate this ambitious commitment into a tangible reality. This research undertook a multi-dimensional examination to scrutinize contraceptive ideational disparities among adolescents and young women in Nigeria, with a particular emphasis on ideational factors. The data underpinning this study were drawn from a cross-sectional household survey carried out in the Nigerian states of Edo, Ogun, Plateau, and Niger between October 2019 and January 2020. The survey encompassed 2,857 sexually active women aged 15-24 years. Employing an ideational framework focusing on behavior that accentuates psychosocial factors, the study dissected nine unique ideational variables into three principal domains: social, cognitive, and emotional. Multivariate logistics regression analyses were used to assess associations between ideational elements and contraceptive use within the total sample and specific age brackets (adolescents of 15-19 years and youth of 20-24 years). For this study, a p-value less than 0.05 was considered indicative of statistical significance. The study's results revealed significant associations between the ideational variables and contraceptive use in total sample and among adolescent and youth, ranging from p < .05 to p < .001. The influence of each domain's predictors on Family Planning (FP) manifested variations when assessed separately and across the different age groups. Notably, cognitive and emotional domains were found to be the strongest predictor of contraceptive use when compared with social domains in the general sample and among youth. This study’s findings highlight the complex interplay of social, cognitive, and emotional factors in contraceptive use among young individuals. Understanding these dynamics is crucial in developing effective strategies to overcome barriers and improve access to contraceptive services among young women in Nigeria.Keywords: adolescents, contraception, ideation, youth
Procedia PDF Downloads 703308 Together - A Decentralized Application Connects Ideas and Investors
Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith
Abstract:
Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding
Procedia PDF Downloads 2143307 Prevalent Affective-Cognitive Functioning of Intimate Partner Offenders: A study with Inmates
Authors: Alexandra Serra, Nair Torrão, Rui G. Serôdio, José A. Lima
Abstract:
The present study aimed to evaluate the incidence and the prevalence of domestic violence legitimatory beliefs, emotional regulation difficulties and, early maladaptive schemas regarding intimidate partner violence in a sample of 50 Portuguese inmates. As expected, results show high levels of legitimatory beliefs, significant difficulties of emotional regulation and a set of high levels of early maladaptive schemas that clearly compromise the inmates affective-cognitive functioning. The most prevalent set of maladaptive schemas are associated with depression, anxiety, hostility, reduced ability to empathize and, dependence on the approval of others, which, combined, may trigger aggressive responses towards the intimate’s partner. Being victimized in their childhood and having committing murder are not differentiating factors on the measures we analyzed, but alcohol consumption may be associated with an intensification of domestic violence legitimatory beliefs. In the discussion of our findings, we compare the pattern of the psychosocial measures we used with the equivalent results obtained with convicted individuals that attend a community compulsory program, specifically designed for domestic violence perpetrators. We also highlight the importance of implementing specialized interventions in prison settings focusing on an evidence-based-practice.Keywords: domestic violence, intimate partner offenders, incidence and prevalence of legitimatory beliefs, Portuguese inmates
Procedia PDF Downloads 5313306 Using Q Methodology to Capture Attitudes about Academic Resilience in an Online Postgraduate Psychology Course
Authors: Eleanor F. Willard
Abstract:
The attrition rate on distance learning courses can be high. This research examines how online students often react when faced with poor results. Using q methodology, it was found that the emotional response level and the type of social support sought by students were key influences on their attitude to failure. As educational and psychological researchers, we are adept at measuring learning and achievement, but examining attitudes towards barriers to learning are not so well researched. The distance learning student has differing needs from onsite learners and, as the attrition rate is notoriously high in the online student population, examining learners’ attitude towards adversity and barriers is important. Self-report measures such as questionnaires are useful in terms of ascertaining levels of constructs such as resilience and academic confidence. Interviewing, too, can gain in depth detail of the opinions of such a population, but only in individuals. The aim of this research was to ascertain what the feelings and attitudes of online students were when faced with a setback. This was achieved using q methodology due to its use of both quantitative and qualitative methodology and its suitability for exploratory research. The emphasis with this methodology is the attitudes, not the individuals. The work was focused upon a population of distance learning students who attended a school on site for one week as part of their studies. They were engaged in a psychology masters conversion course and, as such, were graduate students. The Q sort had 30 items taken from the Academic Resilience Scale (ARS-30). The scale items represent three constructs; perseverance, reflecting (including adaptive help-seeking) and negative affect. These are widely acknowledged as being relevant concepts underpinning psychological resilience. The q sort was conducted with 19 students in total. This is done by participants arranging statement cards regarding how similar to themselves they believe each statement to be. This was done after reading a vignette describing an experience of academic failure. Commonalities and differences between the sorts from all participants are then analyzed in terms of correlations and response patterns. Following data collection, the participants' responses were initially analyzed and the key perspectives (factors) to emerge were labelled ‘persevering individuals’ and ‘emotional networkers’. The differences between the two perspectives centre around the level of emotion felt when faced with barriers and the extent that students enlist the help of others inside and outside of the university. The dominant factor to emerge from the sorts of ‘persevering individuals’ demonstrated that many distance learners are tenacious. However, for other students, the level of emotional and social support is pivotal in helping them complete their studies when facing adversity. This was demonstrated by the ‘emotional networkers’ perspective. This research forms a starting point for further work on engaging and retaining online students at university and can potentially provide insight into how universities can lower attrition rates on distance learning courses.Keywords: academic resilience, distance learning, online learning, q methodology
Procedia PDF Downloads 1273305 Self-Regulation and School Adjustment of Students with Autism Spectrum Disorder in Hong Kong
Authors: T. S. Terence Ma, Irene T. Ho
Abstract:
Conducting adequate assessment of the challenges students with ASD (Autism Spectrum Disorder) face and the support they need is imperative for promoting their school adjustment. Students with ASD often show deficits in communication, social interaction, emotional regulation, and self-management in learning. While targeting these areas in intervention is often helpful, we argue that not enough attention has been paid to weak self-regulation being a key factor underlying their manifest difficulty in all these areas. Self-regulation refers to one’s ability to moderate their behavioral or affective responses without assistance from others. Especially for students with high functioning autism, who often show problems not so much in acquiring the needed skills but rather in applying those skills appropriately in everyday problem-solving, self-regulation becomes a key to successful adjustment in daily life. Therefore, a greater understanding of the construct of self-regulation, its relationship with other daily skills, and its role in school functioning for students with ASD would generate insights on how students’ school adjustment could be promoted more effectively. There were two focuses in this study. Firstly, we examined the extent to which self-regulation is a distinct construct that is differentiable from other daily skills and the most salient indicators of this construct. Then we tested a model of relationships between self-regulation and other daily school skills as well as their relative and combined effects on school adjustment. A total of 1,345 Grade1 to Grade 6 students with ASD attending mainstream schools in Hong Kong participated in the research. In the first stage of the study, teachers filled out a questionnaire consisting of 136 items assessing a wide range of student skills in social, emotional and learning areas. Results from exploratory factor analysis (EFA) with 673 participants and subsequent confirmatory factor analysis (CFA) with another group of 672 participants showed that there were five distinct factors of school skills, namely (1) communication skills, (2) pro-social behavior, (3) emotional skills, (4) learning management, and (5) self-regulation. Five scales representing these skill dimensions were generated. In the second stage of the study, a model postulating the mediating role of self-regulation for the effects of the other four types of skills on school adjustment was tested with structural equation modeling (SEM). School adjustment was defined in terms of the extent to which the student is accepted well in school, with high engagement in school life and self-esteem as well as good interpersonal relationships. A 5-item scale was used to assess these aspects of school adjustment. Results showed that communication skills, pro-social behavior, emotional skills and learning management had significant effects on school adjustment only indirectly through self-regulation, and their total effects were found to be not high. The results indicate that support rendered to students with ASD focusing only on the training of well-defined skills is not adequate for promoting their inclusion in school. More attention should be paid to the training of self-management with an emphasis on the application of skills backed by self-regulation. Also, other non-skill factors are important in promoting inclusive education.Keywords: autism, assessment, factor analysis, self-regulation, school adjustment
Procedia PDF Downloads 1063304 Immersing Socio-Affective Instruction within the Constructs of the Academic Curriculum: A Study of Gifted and Talented Programs
Authors: R. Granger-Ellis, R. B. Speaker, Jr., P. J. Austin
Abstract:
This research study examined more than 340 gifted and talented students enrolled in various gifted and talented programs in a large southeastern United States metropolitan area (creative arts, urban charters, suburban public schools) for socio-affective psychological development and whether a particular curriculum encouraged developmental growth. This study focused on students receiving distinctive gifted and talented curricula (creative arts, arts-integrated, and academic acceleration) and analyzed for (1) socio-affective development levels and (2) whether a particular curriculum encouraged developmental growth. Research questions guiding the study: (1) How do academically and artistically gifted 10th and 11th grade students perform on psychological scales of social and emotional intelligence? (2) Do adolescents receiving distinctive gifted and talented curriculum differ in their socio-affective developmental profiles? Students’ performances on psychometric scales were compared over time and by curriculum type. Over the first semester of the academic year, participants took pre- and post-tests assessing socio-affective intelligence (BarOn EQ-I: YV). Differences in growth on these psychological scales (individuals and programs) were examined. Program artifacts provided insight for curriculum correlation.Keywords: gifted and talented curriculum, social and emotional development, moral development, socio-affective curriculum
Procedia PDF Downloads 3703303 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis
Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo
Abstract:
The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.Keywords: IoT, ethical concerns, privacy, safety, security, smart devices
Procedia PDF Downloads 853302 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation
Procedia PDF Downloads 5403301 The Inception: A University-Wide Research on Alcohol Consumption
Authors: Robi Lou Logarta, Meliz Ann Marilag, Kristyl Lee Nisnisan, Felipe Lula Jr.
Abstract:
Nowadays, alcohol is consumed widely around the globe for plenty of reasons. College years are the time that the students really decide if whether they will or will not engage into alcohol, although alcohol drinking begins before students arrive at college. The reasons on why college students consume alcohol vary in many categories. The norms on alcohol drinking are addiction, emotional pain reliever, popularity purposes, socialization, and a medium of euphoria for most students; college students in particular are most likely to feel this need. After tons of requirements to be complied and courses to be reviewed, they felt a need for celebration and relaxation which ends up in drinking with college mates and a few old friends. A lot of reasons consist the consumption of alcohol and this research determined the reasons behind the students’ onset for alcohol consumption; the main reason for such action and the experiences they encountered after in-take, furthermore, the correlation of alcohol drinking to the average allowance of the involved participants; Mindanao State University-Iligan Institute of Technology Students whether it affects their spending towards alcohol or not. This study assumes that alcohol drinking for MSU-IIT students’ is done to relieve emotional pain caused by flunking in particular subjects as well as dealing with romance, as part of the student body, these acts are noticeable enough which made this hypothesis be formulated. Selected MSU-IIT students were asked about their opinions regarding reasons of alcohol consumption. There were 100 respondents consisting of first year to fifth-year students aging 17-23 years old. Choices were given to the students to mark their most favorable reason for drinking that is adult influence, curiosity, family/personal problems, peer pressure, stress. Using the bar and pie chart illustrations, the collected data was then analyzed and among the given choices, the result has invalidated the hypothesis. The outcome shows that curiosity is the topmost reason why students start to drink and not due to emotional pain. With this, another hypothesis is formulated stating that millennial is a curious generation; this generation has changed the norm of drinking. One of the characteristics of the Y generation is being adventurous which correlates to how they get curious about things and the same goes for alcohol consumption, compared to the latter, this generation can be considered early drinkers in this manner. Therefore, it is concluded that MSU-IIT students which are part of the generation Y are adventurous enough to try unfamiliar beverages to satisfy their curious minds.Keywords: adult influence, curiosity, family/personal problems, peer pressure, stress
Procedia PDF Downloads 2613300 Mental Health of Childless Couples: A Psychosocial Study
Authors: Digambar J. Darekar, Sharvari D. Darekar
Abstract:
Childlessness is a universal problem. It particularly affects the mental health of childless couple. It leads to anxiety, frustration, nervousness, depression, loneliness, helplessness, hopelessness, etc. After reviewing the literature, it is found that mental health of married couples is negatively related to childlessness. To understand emotional and psychological problems of a childless couple, researcher surveyed and interviewed 50 childless couples with the help of medical practitioner and gynecologist. Personal adjustment and mental health inventory and marital adjustment inventory along with semi-structured interview questionnaire was used. On the basis of responses from the subject, distinction is made between the problems of male subjects and female subjects and common problem separately. The researcher found that childlessness leads to the conflict between in-laws, harassment, hopelessness, feeling of emptiness and vacuumed, frustration, lack of hope and desire for life, restlessness, loss of sleep, ideas of committing suicide, increased emotional distance and disturbed marital life. The childlessness leads to sorrow for women and anger for men. Men turns towards addiction and women tend to avoid social contact and face problems of social adjustments. Childless couples are sufferers of personal and marital adjustment problems which in turn affect their mental health adversely.Keywords: childlessness, marital adjustments, mental health, social adjustment
Procedia PDF Downloads 1933299 Determinants of Mobile Banking Apps Adoption among Bank Customers in Ghana
Authors: Masud Ibrahim
Abstract:
in Ghana. The sample of the study comprised 450 bank customers from universal banks operating in Ghana. A conceptual framework was framed from a revised TAM model. A total of nine hypotheses were developed and tested using Structural Equation Modeling Technique. Findings from this study revealed that perceived ease of use and perceived usefulness are influenced positively by design and perceived security. Also, perceived ease of use, social influence and perceived security risk were found to have a strong influence on mobile banking app adoption intention. This study provides significant insights and implications for banking organizations on how to ensure the adoption and usage of their mobile banking apps.Keywords: mobile banking app, perceived ease of use, perceived usefulness, technology acceptance model
Procedia PDF Downloads 1613298 Health and Mental Health among College Students: Toward a Better Understanding of the Impact of Sexual Assault, Alcohol Use, and COVID-19
Authors: Noel Busch-Armendariz, Caitlin Sulley
Abstract:
Introduction: This study investigated the development of college experiences, COVID-19 pandemic experiences, alcohol use, and sexual violence. The longitudinal study includes 656 college students living in the same dormitory. Students' alcohol use and social network structure were investigated to better understand the relationship with sexual violence risk. Basic Methodologies: Over two years, students repeated five web-based surveys, including a pre-college survey and surveys during four consecutive semesters. Questions were added in the fourth wave to assess students’ experiences of the COVID-19 pandemic, administered from November-January 2021, including mental and behavioral health. Analyses include the impact of COVID on living arrangements, drinking behaviors, and daily life; experiences of COVID symptoms, testing, and diagnosis, responses to COVID such as social distancing, quarantining, not working, increased health care needs; experience of fear, worry, stigma, emotional well-being, loneliness, and mental health; experiences of financial loss, lack of basic supplies, receiving emotional and financial support, and comparison with academic disengagement. Concluding Statement: Findings and discussion will include strategies to strengthen mental and behavioral health programs and policies.Keywords: COVID, mental health, substance abuse, college students, sexual misconducts
Procedia PDF Downloads 793297 Structural Inequality and Precarious Workforce: The Role of Labor Laws in Destabilizing the Labor Force in Iran
Authors: Iman Shabanzadeh
Abstract:
Over the last three decades, the main demands of the Iranian workforce have been focused on three areas: "The right to a decent wage", "The right to organize" and "The right to job security". In order to investigate and analyze this situation, the present study focuses on the component of job security. The purpose of the study is to figure out what mechanisms in Iran's Labor Law have led to the destabilization and undermining of workers' job security. The research method is descriptive-analytical. To collect information, library and document sources in the field of laws related to labor rights in Iran and, semi-structured interviews with experts have been used. In the data analysis stage, the qualitative content analysis method was also used. The trend analysis of the statistics related to the labor force situation in Iran in the last three decades shows that the employment structure has been facing an increase in the active population, but in the last decade, a large part of this population has been mainly active in the service sector, and contract-free enterprises, so a smaller share of this employment has insurance coverage and a larger share has underemployment. In this regard, the results of this study show that four contexts have been proposed as the main legal and executive mechanisms of labor instability in Iran, which are: 1) temporaryization of the labor force by providing different interpretations of labor law, 2) adjustment labor in the public sector and the emergence of manpower contracting companies, 3) the cessation of labor law protection of workers in small workshops and 4) the existence of numerous restrictions on the effective organization of workers. The theoretical conclusion of this article is that the main root of the challenges of the labor society and the destabilized workforce in Iran is the existence of structural inequalities in the field of labor security, whose traces can be seen in the legal provisions and executive regulations of this field.Keywords: inequality, precariat, temporaryization, labor force, labor law
Procedia PDF Downloads 613296 Evaluating the Water Balance of Sokoto Basement Complex to Address Water Security Challenges
Authors: Murtala Gada Abubakar, Aliyu T. Umar
Abstract:
A substantial part of Nigeria is part of semi-arid areas of the world, underlain by basement complex (hard) rocks which are very poor in both transmission and storage of appreciable quantity of water. Recently, a growing attention is being paid on the need to develop water resources in these areas largely due to concerns about increasing droughts and the need to maintain water security challenges. While there is ample body of knowledge that captures the hydrological behaviours of the sedimentary part, reported research which unambiguously illustrates water distribution in the basement complex of the Sokoto basin remains sparse. Considering the growing need to meet the water requirements of those living in this region necessitated the call for accurate water balance estimations that can inform a sustainable planning and development to address water security challenges for the area. To meet this task, a one-dimensional soil water balance model was developed and utilised to assess the state of water distribution within the Sokoto basin basement complex using measured meteorological variables and information about different landscapes within the complex. The model simulated the soil water storage and rates of input and output of water in response to climate and irrigation where applicable using data from 2001 to 2010 inclusive. The results revealed areas within the Sokoto basin basement complex that are rich and deficient in groundwater resource. The high potential areas identified includes the fadama, the fractured rocks and the cultivated lands, while the low potential areas are the sealed surfaces and non-fractured rocks. This study concludes that the modelling approach is a useful tool for assessing the hydrological behaviour and for better understanding the water resource availability within a basement complex.Keywords: basement complex, hydrological processes, Sokoto Basin, water security
Procedia PDF Downloads 3193295 Victims of Imprisonment: Incarceration and Post-Release Effects of Confinement with Women with a Mental Illness
Authors: Anat Yaron Antar, Tomer Einat
Abstract:
This study explores the effects of the imprisonment of women together with females with mental disorders on the well-being of the former both during imprisonment and after their release from prison. Based on in-depth interviews with 22 women ex-prisoners who had been imprisoned for a period of at least two years in the single Israeli female correctional facility, Neve Tirza Prison, and released one to three months before the initiation of the study to a community-based agency managed by the Israeli Prisoner Rehabilitation Authority, and based on a qualitative, constructive strategy. We found that: (i) mentally ill prisoners’ conduct creates severe feelings of stress and discomfort among many of the prisoners without a mental disorder prisoners; (ii) The intimate and often long-term encounters with prisoners with a mental illness lead to increased feelings of distress, helplessness, fear, and frustration among many of the women prisoners; (iii) the damaging encounters between women prisoners and mentally-ill prisoners harmed the reintegration of the formers into society after release, and (iv) The women ex-prisoners lacked the basic mental, cognitive, and social tools necessary for dealing with female inmates with a mental illness and had received no psychological or emotional support from the prison personnel. Consequently, they suffered – and still suffer – from traumatic and upsetting memories Our findings led us to conclude that women prisoners should be imprisoned separately from female prisoners with mental disorders or be offered a wide range of psychological and emotional coping tools as well as various rehabilitative treatment programs.Keywords: women, prisoners, mentally ill, health
Procedia PDF Downloads 1273294 A Review of Ultralightweight Mutual Authentication Protocols
Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran
Abstract:
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.Keywords: RFID, Ultralightweight, UMAP, SASI
Procedia PDF Downloads 1533293 Contextual and Personal Factors as Predictor of Academic Resilience among Female Undergraduates in Boko Haram Neighbourhood in North-Eastern Nigeria
Authors: Ndidi Ofole
Abstract:
Ongoing Boko Haram crisis and instability in North-Eastern Nigeria has placed additional stress on academic resilience of female undergraduates who are already challenged by gender discrimination in educational opportunities. Students without resilience lack stress hardiness to cope with academic challenges. There is a limited study on academic resilience targeting this disadvantaged population in Nigeria. Consequently, survey research design was employed to investigate the contextual and personal factors that could predict academic resilience among female undergraduates in Boko Haram Neighbourhood in North-Eastern, Nigeria. Five hundred and thirty female students with age range of 18 to 24 years ( = 19.2; SD=6.9) were randomly drawn from 3 Universities in North-Eastern Nigeria. They responded to five instruments, namely; Academic Resilience scale (r=0.72); Social Support questionnaire (r=0. 64); Social Connectedness questionnaire (r=0.75); Self-Efficacy scale (r=0. 68) and Emotional Regulation questionnaire (r=78). Results showed that there was significant positive relationship between the four independent variables and academic resilience. The variables jointly contributed 5.9% variance in the prediction of academic resilience. In terms of magnitude, social support was most potent while self-efficacy was the least. It concluded that the factors considered in this study are academic resilience facilitators. The outcomes of the study have both theoretical and practical implications.Keywords: academic resilience, emotional regulation, school connectedness, self-efficacy , social support
Procedia PDF Downloads 2093292 Methods for Restricting Unwanted Access on the Networks Using Firewall
Authors: Bhagwant Singh, Sikander Singh Cheema
Abstract:
This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques
Procedia PDF Downloads 1013291 School Discipline Starts Early: Mindfulness as a Self-discipline Tool in the Preschool
Authors: Ioanna Koumi
Abstract:
The aim of the intervention presented is to show the positive effects a mindfulness programme can have on the behaviour of preschoolers (years 4-6). The programme was implemented as part of the psychologist's work in 5 preschool units on the Greek island of Chios. Classroom-based activities of mindfulness were shown and practiced in 5 sessions, in collaboration with teachers, in order to make preschoolers aware of how their brain affects their behaviour, as well as of how they can have more positive behaviours, especially in instances of negative feelings. The outcomes of the intervention were assessed via questionnaire completion before and after the sessions by the teachers, as well as focus groups procedures with students, teachers, and parents. Implications of how mindfulness programmes can also be implemented at home are further discussed. School year in which the programme is being implemented: 2022-23 Intervention method: based on basic mindfulness theory and practice, the 220 students (age 4-6) in 11 classes of the 5 preschools that participated were given lessons of how to become aware of their states of focusing, regulation, attention, emotional situation, as well as body and social situations. Furthermore, the preschoolers were encouraged to make more mindful choices when it came to negative situations and emotions. Assessment method: The school as a caring community Profile II – Questionnaire completed by 20 preschool teachers prior to and after the intervention, Focus group sessions with teachers, students, parents at the end of the intervention Results: the assessment will be completed in May 2023.Keywords: preschool, mindfulness training, self-awareness, social-emotional development
Procedia PDF Downloads 963290 The Neuroscience Dimension of Juvenile Law Effectuates a Comprehensive Treatment of Youth in the Criminal System
Authors: Khushboo Shah
Abstract:
Categorical bans on the death penalty and life-without-parole sentences for juvenile offenders in a growing number of countries have established a new era in juvenile jurisprudence. This has been brought about by integration of the growing knowledge in cognitive neuroscience and appreciation of the inherent differences between adults and adolescents over the last ten years. This evolving understanding of being a child in the criminal system can be aptly reflected through policies that incorporate the mitigating traits of youth. First, the presentation will delineate the structures in cognitive neuroscience and in particular, focus on the prefrontal cortex, the amygdala, and the basal ganglia. These key anatomical structures in the brain are linked to three mitigating adolescent traits—an underdeveloped sense of responsibility, an increased vulnerability to negative influences, and transitory personality traits—that establish why juveniles have a lessened culpability. The discussion will delve into the details depicting how an underdeveloped prefrontal cortex results in the heightened emotional angst, high-energy and risky behavior characteristic of the adolescent time period or how the amygdala, the emotional center of the brain, governs different emotional expression resulting in why teens are susceptible to negative influences. Based on this greater understanding, it is incumbent that policies adequately reflect the adolescent physiology and psychology in the criminal system. However, it is important to ensure that these views are appropriately weighted while considering the jurisprudence for the treatment of children in the law. To ensure this balance is appropriately stricken, policies must incorporate the distinctive traits of youth in sentencing and legal considerations and yet refrain from the potential fallacies of absolving a juvenile offender of guilt and culpability. Accordingly, three policies will demonstrate how these results can be achieved: (1) eliminate housing of juvenile offenders in the adult prison system, (2) mandate fitness hearings for all transfers of juveniles to adult criminal court, and (3) use the post-disposition review as a type of rehabilitation method for juvenile offenders. Ultimately, this interdisciplinary approach of science and law allows for a better understanding of adolescent psychological and social functioning and can effectuate better legal outcomes for juveniles tried as adults.Keywords: criminal law, Juvenile Justice, interdisciplinary, neuroscience
Procedia PDF Downloads 3273289 Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens
Authors: Michelle D. Hand, Michelle L. Kaiser
Abstract:
African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.Keywords: community kitchen gardens, food insecurity, refugees, Somali Bantu
Procedia PDF Downloads 2753288 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment
Authors: Atma Sahu
Abstract:
After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems
Procedia PDF Downloads 953287 Post Covid-19 Scenario and Contemporary International Security Challenges
Authors: Rubina Waseem
Abstract:
The research focuses on the major crises and major effects, largely unforeseen, to counter international security concerns. At the close of 2019, the Covid-19 pandemic broke out in the city of Wuhan in Hubei province, China. The coronavirus was initially seen as an inchoate danger, aimed at striking people randomly. Owing to the extraordinary transmissibility of the virus and the highly knitted nature of the international political world, the Covid-19 soon became a formidable global challenge. The once hustling and bustling avenues, city centers, and market places became deserted. Lockdown, self-isolation, hygiene and safety, social-distancing, and job losses became a new norm. The national economies gradually plunged into crisis. The pandemic has so far caused over 33 million cases and one million deaths. The virus continues to devastate social life, as there is yet no therapeutic available. While the world was preoccupied addressing the human and social toll, the pandemic has exacerbated despair, mistrust, and friction in international relations, diplomacy, and strategy. The research will discuss how the coronavirus has accelerated the trends of transition in the postwar security order constructed by the United States. China, Russia, European Union, and other lesser regional players are now increasingly changing their security orientations to undermine the United States standing and authority in world politics. The systemic level analyses will be adopted as a methodology to broaden the lens of the study, and the research will analyze the prevalent global power distribution, whether vulnerable or exposed. The trends of parochial nationalism and isolationism are increasingly replacing multilateralism and collectivism. Yet worse, military posturing is assuming a greater role in international interactions. Taken together, the pandemic has worsened the prospects of international peace and stability by mounting equal pressure across the channels of international relations, diplomacy, and strategy. It is yet unclear which country or collectivity will face the real brunt. Despite this jaded and pessimistic view, the lingering pandemic has the potential to reinforce cooperation, multilateralism, and collectivism in the realm of international politics. There is a renewed momentum for global efforts against the pandemic. States and societies are coming closer to act as a whole. Equally important, the world leaders are feeling tempted to revisit the traditional conception of national security. In this regard, they are exploring the possibility of according preference to non-traditional security issues. In essence, the research concludes that Covid-19 has put the international political system under a great trial.Keywords: covid-19, global challenges, international politics, international security
Procedia PDF Downloads 1643286 Reworking of the Anomalies in the Discounted Utility Model as a Combination of Cognitive Bias and Decrease in Impatience: Decision Making in Relation to Bounded Rationality and Emotional Factors in Intertemporal Choices
Authors: Roberta Martino, Viviana Ventre
Abstract:
Every day we face choices whose consequences are deferred in time. These types of choices are the intertemporal choices and play an important role in the social, economic, and financial world. The Discounted Utility Model is the mathematical model of reference to calculate the utility of intertemporal prospects. The discount rate is the main element of the model as it describes how the individual perceives the indeterminacy of subsequent periods. Empirical evidence has shown a discrepancy between the behavior expected from the predictions of the model and the effective choices made from the decision makers. In particular, the term temporal inconsistency indicates those choices that do not remain optimal with the passage of time. This phenomenon has been described with hyperbolic models of the discount rate which, unlike the linear or exponential nature assumed by the discounted utility model, is not constant over time. This paper explores the problem of inconsistency by tracing the decision-making process through the concept of impatience. The degree of impatience and the degree of decrease of impatience are two parameters that allow to quantify the weight of emotional factors and cognitive limitations during the evaluation and selection of alternatives. In fact, although the theory assumes perfectly rational decision makers, behavioral finance and cognitive psychology have made it possible to understand that distortions in the decision-making process and emotional influence have an inevitable impact on the decision-making process. The degree to which impatience is diminished is the focus of the first part of the study. By comparing consistent and inconsistent preferences over time, it was possible to verify that some anomalies in the discounted utility model are a result of the combination of cognitive bias and emotional factors. In particular: the delay effect and the interval effect are compared through the concept of misperception of time; starting from psychological considerations, a criterion is proposed to identify the causes of the magnitude effect that considers the differences in outcomes rather than their ratio; the sign effect is analyzed by integrating in the evaluation of prospects with negative outcomes the psychological aspects of loss aversion provided by Prospect Theory. An experiment implemented confirms three findings: the greatest variation in the degree of decrease in impatience corresponds to shorter intervals close to the present; the greatest variation in the degree of impatience occurs for outcomes of lower magnitude; the variation in the degree of impatience is greatest for negative outcomes. The experimental phase was implemented with the construction of the hyperbolic factor through the administration of questionnaires constructed for each anomaly. This work formalizes the underlying causes of the discrepancy between the discounted utility model and the empirical evidence of preference reversal.Keywords: decreasing impatience, discount utility model, hyperbolic discount, hyperbolic factor, impatience
Procedia PDF Downloads 1033285 Determination of Complexity Level in Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 344