Search results for: cyber threat intelligence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2665

Search results for: cyber threat intelligence

2485 Technological Advancement of Socratic Supported by Artificial Intelligence

Authors: Amad Nasseef, Layan Zugail, Joud Musalli, Layan Shaikan

Abstract:

Technology has become an essential part of our lives. We have also witnessed the significant emergence of artificial intelligence in so many areas. Throughout this research paper, the following will be discussed: an introduction on AI and Socratic application, we also did an overview on the application’s background and other similar applications, as for the methodology, we conducted a survey to collect results on users experience in using the Socratic application. The results of the survey strongly supported the usefulness and interest of users in the Socratic application. Finally, we concluded that Socratic is a meaningful tool for learning purposes due to it being supported by artificial intelligence, which made the application easy to use and familiar to users to deal with through a click of a button.

Keywords: Socratic, artificial intelligence, application, features

Procedia PDF Downloads 201
2484 A Collective Intelligence Approach to Safe Artificial General Intelligence

Authors: Craig A. Kaplan

Abstract:

If AGI proves to be a “winner-take-all” scenario where the first company or country to develop AGI dominates, then the first AGI must also be the safest. The safest, and fastest, path to Artificial General Intelligence (AGI) may be to harness the collective intelligence of multiple AI and human agents in an AGI network. This approach has roots in seminal ideas from four of the scientists who founded the field of Artificial Intelligence: Allen Newell, Marvin Minsky, Claude Shannon, and Herbert Simon. Extrapolating key insights from these founders of AI, and combining them with the work of modern researchers, results in a fast and safe path to AGI. The seminal ideas discussed are: 1) Society of Mind (Minsky), 2) Information Theory (Shannon), 3) Problem Solving Theory (Newell & Simon), and 4) Bounded Rationality (Simon). Society of Mind describes a collective intelligence approach that can be used with AI and human agents to create an AGI network. Information theory helps address the critical issue of how an AGI system will increase its intelligence over time. Problem Solving Theory provides a universal framework that AI and human agents can use to communicate efficiently, effectively, and safely. Bounded Rationality helps us better understand not only the capabilities of SuperIntelligent AGI but also how humans can remain relevant in a world where the intelligence of AGI vastly exceeds that of its human creators. Each key idea can be combined with recent work in the fields of Artificial Intelligence, Machine Learning, and Large Language Models to accelerate the development of a working, safe, AGI system.

Keywords: AI Agents, Collective Intelligence, Minsky, Newell, Shannon, Simon, AGI, AGI Safety

Procedia PDF Downloads 73
2483 Artificial Intelligence Ethics: What Business Leaders Need to Consider for the Future

Authors: Kylie Leonard

Abstract:

Investment in artificial intelligence (AI) can be an attractive opportunity for business leaders as there are many easy-to-see benefits. These benefits include task completion rates, overall cost, and better forecasting. Business leaders are often unaware of the challenges that can accompany AI, such as data center costs, access to data, employee acceptance, and privacy concerns. In addition to the benefits and challenges of AI, it is important to practice AI ethics to ensure the safe creation of AI. AI ethics include aspects of algorithm bias, limits in transparency, and surveillance. To be a good business leader, it is critical to address all the considerations involving the challenges of AI and AI ethics.

Keywords: artificial intelligence, artificial intelligence ethics, business leaders, business concerns

Procedia PDF Downloads 131
2482 The Evolution of Strike and Intelligence Functions in Special Operations Forces

Authors: John Hardy

Abstract:

The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations.

Keywords: counterinsurgency, counterterrorism, intelligence, irregular warfare, military operations, special operations forces

Procedia PDF Downloads 253
2481 Business Intelligence Proposal to Improve Decision Making in Companies Using Google Cloud Platform and Microsoft Power BI

Authors: Joel Vilca Tarazona, Igor Aguilar-Alonso

Abstract:

The problem of this research related to business intelligence is the lack of a tool that supports automated and efficient financial analysis for decision-making and allows an evaluation of the financial statements, which is why the availability of the information is difficult. Relevant information to managers and users as an instrument in decision making financial, and administrative. For them, a business intelligence solution is proposed that will reduce information access time, personnel costs, and process automation, proposing a 4-layer architecture based on what was reviewed by the research methodology.

Keywords: decision making, business intelligence, Google Cloud, Microsoft Power BI

Procedia PDF Downloads 85
2480 The Relationship of Emotional Intelligence, Perceived Stress, Religious Coping with Psychological Distress among Afghan Students

Authors: Mustafa Jahanara

Abstract:

The aim of present research was to study of the relationship between emotional intelligence, perceived stress, positive religious coping with psychological distress to in a sample of undergraduate students in Polytechnic University in Kabul. One hundred and fifty-tow students (102 male, 50 female) were included in this study. All participants completed the Emotional Intelligence Scale (EIS), General Health Questionnaire (GHQ 12), Perceived Stress Scale (PSS-10), and the Brief RCOPE. The results revealed that EI was negatively associated with perceived stress and psychological distress. Also emotional intelligence was positively correlated with positive religious coping. Perceived stress was positive related with psychological distress and negatively correlated with positive religious coping. Eventually positive religious coping was significantly and negatively correlated with psychological distress. However, emotional intelligence and positive religious coping could influence on mental health.

Keywords: emotional intelligence, perceived stress, positive religious coping, psychological distress

Procedia PDF Downloads 502
2479 Skills Needed Amongst Secondary School Students for Artificial Intelligence Development in Southeast Nigeria

Authors: Chukwuma Mgboji

Abstract:

Since the advent of Artificial Intelligence, robots have become a major stay in developing societies. Robots are deployed in Education, Health, Food and in other spheres of life. Nigeria a country in West Africa has a very low profile in the advancement of Artificial Intelligence especially in the grass roots. The benefits of Artificial intelligence are not fully maximised and harnessed. Advances in artificial intelligence are perceived as impossible or observed as irrelevant. This study seeks to ascertain the needed skills for the development of artificialintelligence amongst secondary schools in Nigeria. The study focused on South East Nigeria with Five states namely Imo, Abia, Ebonyi, Anambra and Enugu. The sample size is 1000 students drawn from Five Government owned Universities offering Computer Science, Computer Education, Electronics Engineering across the Five South East states. Survey method was used to solicit responses from respondents. The findings from the study identified mathematical skills, analytical skills, problem solving skills, computing skills, programming skills, algorithm skills amongst others. The result of this study to the best of the author’s knowledge will be highly beneficial to all stakeholders involved in the advancements and development of artificial intelligence.

Keywords: artificial intelligence, secondary school, robotics, skills

Procedia PDF Downloads 133
2478 Artificial Intelligence for All: Artificial Intelligence Education for K-12

Authors: Yiqiao Yin

Abstract:

Many scholars and educators have dedicated their lives in K12 education system and there has been an exploding amount of attention to implement technical foundations for Artificial Intelligence Education for high school and precollege level students. This paper focuses on the development and use of resources to support K-12 education in Artificial Intelligence (AI). The author and his team have more than three years of experience coaching students from pre-college level age from 15 to 18. This paper is a culmination of the experience and proposed online tools, software demos, and structured activities for high school students. The paper also addresses a portfolio of AI concepts as well as the expected learning outcomes. All resources are provided with online videos and Github repositories for immediate use.

Keywords: K12 education, AI4ALL, pre-college education, pre-college AI

Procedia PDF Downloads 120
2477 Cyber Bullying, Online Risks and Parental Mediation: A Comparison between Adolescent Reports and Parent Perceptions in South Africa

Authors: Masa Popovac, Philip Fine

Abstract:

Information and Communication Technologies (ICTs) have altered our social environments, and young people in particular have immersed themselves in the digital age. Despite countless benefits, younger ICT users are being exposed to various online risks such as contact with strangers, viewing of risky content, sending or receiving sexually themed images or comments (i.e. ‘sexting’) as well as cyber bullying. Parents may not be fully aware of the online spaces their children inhabit and often struggle to implement effective mediation strategies. This quantitative study explored (i) three types of online risks (contact risks, content risks and conduct risks), (ii) cyber bullying victimization and perpetration, and (iii) parental mediation among a sample of 689 South African adolescents aged between 12-17 years. Survey data was also collected for 227 of their parents relating to their perceptions of their child’s online experiences. A comparison between adolescent behaviors and parental perceptions was examined on the three variables in the study. Findings reveal various online risk taking behaviors. In terms of contact risks, 56% of adolescents reported having contact with at least one online stranger, with many meeting these strangers in person. Content risks included exposure to harmful information such as websites promoting extreme diets or self-harm as well as inappropriate content: 84% of adolescents had seen violent content and 75% had seen sexual content online. Almost 60% of adolescents engaged in conduct risks such as sexting. Eight online victimization behaviors were examined in the study and 79% of adolescents had at least one of these negative experiences, with a third (34%) defining this experience as cyber bullying. A strong connection between victimization and perpetration was found, with 63% of adolescents being both a victim and perpetrator. Very little parental mediation of ICT use was reported. Inferential statistics revealed that parents consistently underestimated their child’s online risk taking behaviors as well as their cyber bullying victimization and perpetration. Parents also overestimated mediation strategies in the home. The generational gap in the knowledge and use of ICTs is a barrier to effective parental mediation and online safety, since many negative online experiences by adolescents go undetected and can continue for extended periods of time thereby exacerbating the potential psychological and emotional distress. The study highlights the importance of including parents in online safety efforts.

Keywords: cyber bullying, online risk behaviors, parental mediation, South Africa

Procedia PDF Downloads 471
2476 Influence of Intelligence and Failure Mindsets on Parent's Failure Feedback

Authors: Sarah Kalaouze, Maxine Iannucelli, Kristen Dunfield

Abstract:

Children’s implicit beliefs regarding intelligence (i.e., intelligence mindsets) influence their motivation, perseverance, and success. Previous research suggests that the way parents perceive failure influences the development of their child’s intelligence mindsets. We invited 151 children-parent dyads (Age= 5–6 years) to complete a series of difficult puzzles over zoom. We assessed parents’ intelligence and failure mindsets using questionnaires and recorded parents’ person/performance-oriented (e.g., “you are smart” or "you were almost able to complete that one) and process-oriented (e.g., “you are trying really hard” or "maybe if you place the bigger pieces first") failure feedback. We were interested in observing the relation between parental mindsets and the type of feedback provided. We found that parents’ intelligence mindsets were not predictive of the feedback they provided children. Failure mindsets, on the other hand, were predictive of failure feedback. Parents who view failure-as-debilitating provided more person-oriented feedback, focusing on performance and personal ability. Whereas parents who view failure-as-enhancing provided process-oriented feedback, focusing on effort and strategies. Taken all together, our results allow us to determine that although parents might already have a growth intelligence mindset, they don’t necessarily have a failure-as-enhancing mindset. Parents adopting a failure-as-enhancing mindset would influence their children to view failure as a learning opportunity, further promoting practice, effort, and perseverance during challenging tasks. The focus placed on a child’s learning, rather than their performance, encourages them to perceive intelligence as malleable (growth mindset) rather than fix (fixed mindset). This implies that parents should not only hold a growth mindset but thoroughly understand their role in the transmission of intelligence beliefs.

Keywords: mindset(s), failure, intelligence, parental feedback, parents

Procedia PDF Downloads 128
2475 Environmental Impacts on Urban Agriculture in Algiers

Authors: Sara Bouzekri, Said Madani

Abstract:

In many Mediterranean cities such as Algiers, the human activity, the strong mobility the urban sprawl, the air pollution, the problems of waste management, the wasting of the resources and the degradation of the environment weaken in an unquestionable way the farming. The question of sustainable action vis-a-vis these threats arises then in order to maintain a level of desired local development. The methodology is based on a multi-criteria method based on the AFOM diagnosis, which classifies agricultural strength indicators and those of threat, according to an analytical approach. In a sustainable development perspective, it will be appropriate to link the threat factors of the case study with the factors of climate change to see their impact on the future of agriculture. This will be accompanied by a SWOT analysis, which crosses the most significant criteria to arrive at the necessary recommendations based on future projects for urban agriculture.

Keywords: Algiers, environment, urban agriculture, threat factors

Procedia PDF Downloads 279
2474 Is There Relationship between Cyberchondria and Emotional Intelligence among Omani University Students? A Descriptive Correlational Study

Authors: Mohammed Qutishat, Khaldoun Aldiabat, Khaled Bader, Mohammad Al Qadire

Abstract:

Cyberchondria refers to the irrational increase of distress about the condition of one's health as a consequence of the World Wide Web quest for medical details. The aim of this study was to examine the relationship between emotional intelligence and cyberchondria among Omani university students. A descriptive correlational design was used to collect data from eligible 370 participants using the Emotional Intelligence Questionnaire, and the short-form version of the Cyberchondria Severity Scale (CSS-12) between January and May 2020 at XX University-Oman. The participants’ age ranged between 18 and 37 years (M = 20.28). The majority of the participants were female, 59.7% (n = 221), single 99.5% (368), in their second academic year, 29.2% (n =108). The mean score of cyberchondria experiences was 32.51, and the mean score of emotional intelligence was 34.91. Linear regression indicated a strong association between cyberchondria and emotional intelligence [F (34.639) = 5.885, P=.000], with a .086 R². In conclusion, the exchange of expertise and peer networking for health-related details utilizing the Internet can benefit students with and without having health problems. Further research and methods should be developed to help students track the online medical tools effectively for the right purposes.

Keywords: emotional intelligence, cyberchondria, smartphone addiction, social media

Procedia PDF Downloads 232
2473 Impact of Mindfulness on Life Satisfaction among Chinese and Pakistani Students: The Mediating Roles of Resilience and Emotional Intelligence

Authors: Maaza Saeed

Abstract:

The current study examined the mediating roles of emotional intelligence (EI) and resilience in the relationship between mindfulness and life satisfaction among Chinese and Pakistani samples. 450 participants completed the mindful attention awareness scale, resilience scale, wong law emotional intelligence scale, and satisfaction with life scale from both cultures. Path analysis revealed that both emotional intelligence (EI) and resilience fully mediated the relationship between mindfulness and life satisfaction among participants of both cultures. Besides, a multi-group evaluation suggests that Chinese participants with significant EI scores are more likely to sustain greater life satisfaction than their Pakistani counterparts. Insinuation for prospective researches and current study pitfalls are discussed.

Keywords: mindfulness, life satisfaction, resilience, emotional intelligence

Procedia PDF Downloads 66
2472 Exploring Enabling Effects of Organizational Climate on Academicians’ Emotional Intelligence and Learning Outcomes: A Case from Chinese Higher Education

Authors: Zahid Shafait, Jiayu Huang

Abstract:

Purpose: This study is based on a trait-based theory of emotional intelligence. This study intends to explore the enabling effect of organizational climate, i.e., affiliation, innovation, and fairness, on the emotional intelligence of teachers in Chinese higher education institutes. This study, additionally, intends to investigate the direct impact of teachers’ emotional intelligence on their learning outcomes, i.e., cognitive, social, self-growth outcomes and satisfaction with the university experience. Design/methodology/approach: This study utilized quantitative research techniques to scrutinize the data. Moreover, partial least squares structural equation modeling, i.e., PLS-SEM, was used to assess the hypothetical relationships to conclude their statistical significance. Findings: Results confirmed the supposed associations, i.e., the organizational climate has an enabling effect on emotional intelligence. Likewise, emotional intelligence was concluded to have a direct and positive association with learning outcomes in higher education. Practical implications: This study has investigated abandoned research that is enabling the effects of organizational climate on teachers’ emotional intelligence in Chinese higher education. Organizational climate enables emotionally intelligent teachers to learn efficiently and, at the same time, augments their satisfaction and productivity within an institution. Originality/value: This study investigated the enabling effects of organizational climate on teachers’ emotional intelligence in Chinese higher education that is original in investigated country and sector.

Keywords: organizational climate, emotional intelligence, learning outcomes, higher education

Procedia PDF Downloads 65
2471 Understanding Tacit Knowledge and DIKW

Authors: Bahadir Aydin

Abstract:

Today it is difficult to reach accurate knowledge because of mass data. This huge data makes the environment more and more caotic. Data is a main piller of intelligence. There is a close tie between knowledge and intelligence. Information gathered from different sources can be modified, interpreted and classified by using knowledge development process. This process is applied in order to attain intelligence. Within this process the effect of knowledge is crucial. Knowledge is classified as explicit and tacit knowledge. Tacit knowledge can be seen as "only the tip of the iceberg”. This tacit knowledge accounts for much more than we guess in all intelligence cycle. If the concept of intelligence scrutinized, it can be seen that it contains risks, threats as well as success. The main purpose for all organization is to be succesful by eliminating risks and threats. Therefore, there is a need to connect or fuse existing information and the processes which can be used to develop it. By the help of process the decision-maker can be presented with a clear holistic understanding, as early as possible in the decision making process. Planning, execution and assessments are the key functions that connects to information to knowledge. Altering from the current traditional reactive approach to a proactive knowledge development approach would reduce extensive duplication of work in the organization. By new approach to this process, knowledge can be used more effectively.

Keywords: knowledge, intelligence cycle, tacit knowledge, KIDW

Procedia PDF Downloads 504
2470 Business Intelligence for Profiling of Telecommunication Customer

Authors: Rokhmatul Insani, Hira Laksmiwati Soemitro

Abstract:

Business Intelligence is a methodology that exploits the data to produce information and knowledge systematically, business intelligence can support the decision-making process. Some methods in business intelligence are data warehouse and data mining. A data warehouse can store historical data from transactional data. For data modelling in data warehouse, we apply dimensional modelling by Kimball. While data mining is used to extracting patterns from the data and get insight from the data. Data mining has many techniques, one of which is segmentation. For profiling of telecommunication customer, we use customer segmentation according to customer’s usage of services, customer invoice and customer payment. Customers can be grouped according to their characteristics and can be identified the profitable customers. We apply K-Means Clustering Algorithm for segmentation. The input variable for that algorithm we use RFM (Recency, Frequency and Monetary) model. All process in data mining, we use tools IBM SPSS modeller.

Keywords: business intelligence, customer segmentation, data warehouse, data mining

Procedia PDF Downloads 463
2469 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 202
2468 The Effect of Relationship Marketing on Service Quality and Customer Satisfaction without Service Providers' Emotional Intelligence: The Case of the Insurance Industry in Ghana

Authors: Frank Frimpong Opuni, Michael Mba Allan, Kwame Adu-Gyamfi, Michael Sarkodie Baffoe

Abstract:

This paper assesses the effect of relationship marketing on service quality and customer satisfaction from the perspective of the moderating role of emotional intelligence in the insurance industry in Ghana. A descriptive quantitative research technique was employed. A random sample of 384 each of customers and service providers in 3 insurance firms in Accra were used as the source of data. According to findings, emotional intelligence makes a strong positive effect on relationship marketing at 5% significance level, r (283) = .817, p = .000. Though relationship marketing makes a strong positive effect on service quality (r = .767, p < .05) and customer satisfaction (r = .647, p < .05), this effect becomes insignificant (p > .05) when the effect of emotional intelligence on relationship marketing is controlled for. It is therefore recommended that insurance firms give priority to equipping their relationship employees with emotional intelligence to maximise service quality and customer satisfaction.

Keywords: relationship marketing, service quality, customer satisfaction, emotional intelligence

Procedia PDF Downloads 468
2467 Intervening into the World of a Cyber-Bully

Authors: Aanshika Puri, Sakshi Mehrotra

Abstract:

Technology has always been a double edged sword. The constant rut of updating oneself to a better and newer version is the new norm. ‘Being Online’ is the latest addition to one’s everyday routine. Availability of various social online platforms being served on a platter topped with easy and cheap access to the internet makes it simple and doable for people of all social backgrounds. Interestingly, in India, a recent development is the line of demarcation between people from varied backgrounds, doing the vanishing act. One finds everybody on at least one, if not more, social platforms in a desire to stay connected. For instance, this ranges from sending a ‘WhatsApp’ message to a vegetable vendor for ordering your daily needs to vendors and small entrepreneurs. Even a rickshaw puller now has access to a mobile phone, an internet connection and apps/ platforms to stay connected. Recent observations show the extent to which everyone is hooked on to their mobile phones/ tabs/ laptops/ etc. Young mothers use them to distract their children and keep them busy while they finish the task at hand. Exposure to this part of the technology at such a tender age requires responsible and careful handling. Talking of adolescents, their self- image depends on their online social image to a large extent. There is a desire to be liked and accepted by the peer group at all times. Cyber-bullying is a by-product of the 24/7 availability of these resources. There is enough research-based evidence to prove the psychosocial and emotional impact on the development and well-being of the victim. The present paper attempts to understand the dynamics of cyber bullying vis-à-vis the developmental and mental health issues faced by the bully.

Keywords: Developmental Psychology, Empathy & Resilience Based Interventions, Mental Well-Being of Cyber Bully, Positive Psychology

Procedia PDF Downloads 240
2466 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 225
2465 Emotional Intelligence and General Self-Efficacy as Predictors of Career Commitment of Secondary School Teachers in Nigeria

Authors: Moyosola Jude Akomolafe

Abstract:

Career commitment among employees is crucial to the success of any organization. However, career commitment has been reported to be very low among teachers in the public secondary schools in Nigeria. This study, therefore, examined the contributions of emotional intelligence and general self-efficacy to career commitment of among secondary school teachers in Nigeria. Descriptive research design of correlational type was adopted for the study. It made use of stratified random sampling technique was used in selecting two hundred and fifty (250) secondary schools teachers for the study. Three standardized instruments namely: The Big Five Inventory (BFI), Emotional Intelligence Scale (EIS), General Self-Efficacy Scale (GSES) and Career Commitment Scale (CCS) were adopted for the study. Three hypotheses were tested at 0.05 level of significance. Data collected were analyzed through Multiple Regression Analysis to investigate the predicting capacity of emotional intelligence and general self-efficacy on career commitment of secondary school teachers. The results showed that the variables when taken as a whole significantly predicted career commitment among secondary school teachers. The relative contribution of each variable revealed that emotional intelligence and general self-efficacy significantly predicted career commitment among secondary school teachers in Nigeria. The researcher recommended that secondary school teachers should be exposed to emotional intelligence and self-efficacy training to enhance their career commitment.

Keywords: career commitment, emotional intelligence, general self-efficacy, secondary school teachers

Procedia PDF Downloads 368
2464 Computer Fraud from the Perspective of Iran's Law and International Documents

Authors: Babak Pourghahramani

Abstract:

One of the modern crimes against property and ownership in the cyber-space is the computer fraud. Despite being modern, the aforementioned crime has its roots in the principles of religious jurisprudence. In some cases, this crime is compatible with the traditional regulations and that is when the computer is considered as a crime commitment device and also some computer frauds that take place in the context of electronic exchanges are considered as crime based on the E-commerce Law (approved in 2003) but the aforementioned regulations are flawed and until recent years there was no comprehensive law in this regard; yet after some years the Computer Crime Act was approved in 2009/26/5 and partly solved the problem of legal vacuum. The present study intends to investigate the computer fraud according to Iran's Computer Crime Act and by taking into consideration the international documents.

Keywords: fraud, cyber fraud, computer fraud, classic fraud, computer crime

Procedia PDF Downloads 319
2463 Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems

Authors: Manpreet Kaur, Amita Rani, Sanjay Kumar

Abstract:

The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios.

Keywords: internet of things, cyber-physical systems, congestion control, priority, transmission rate

Procedia PDF Downloads 296
2462 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 51
2461 PhotoRoom App

Authors: Nouf Nasser, Nada Alotaibi, Jazzal Kandiel

Abstract:

This research study is about the use of artificial intelligence in PhotoRoom. When an individual selects a photo, PhotoRoom automagically removes or separates the background from other parts of the photo through the use of artificial intelligence. This will allow an individual to select their desired background and edit it as they wish. The methodology used was an observation, where various reviews and parts of the app were observed. The review section's findings showed that many people actually like the app, and some even rated it five stars. The conclusion was that PhotoRoom is one of the best photo editing apps due to its speed and accuracy in removing backgrounds.

Keywords: removing background, app, artificial intelligence, machine learning

Procedia PDF Downloads 186
2460 Emotional Intelligence and Sports Coaches

Authors: Stephens Oluyemi Adetunji, Nel Norma Margaret, Krogs Sozein

Abstract:

There has been a shift in the role of sports from being a form of entertainment and relaxation to becoming a huge business concern and high money spinning venture. This shift has placed a greater demand on sport coaches as regards expectations for high performance from investors as well as other stake holders. The responsibility of sports coaches in ensuring high performance of sports men and women has become increasingly more demanding from both spectators and sports organisers. Coaches are leaders who should possess soft skills such as emotional intelligence aside from employing skills and drills to ensure high performance of athletes. This study is, therefore, designed to determine the emotional intelligence of sports coaches in South Africa. An assessment of the emotional intelligence of sports coaches would enable the researchers to identify those who have low emotional intelligence and to design an intervention program that could improve their emotional intelligence. This study will adopt the pragmatic world view of research using the mixed methods research design of the quantitative and qualitative approach. The non-probability sampling technique will be used to select fifty sports coaches for the quantitative study while fifteen sports coaches will be purposively selected for the qualitative study. One research question which seeks to ascertain the level of emotional intelligence of sports coaches will be raised to guide this study. In addition, two research hypotheses stating that there will be no significant difference in the level of emotional intelligence of sports coaches on the basis of gender and type of sports will be formulated and statistically analysed at 0.05 level of significance. For the quantitative study, an emotional intelligence test will be used to measure the emotional intelligence of sport coaches. Focus group interviews and open ended questions will be used to obtain the qualitative data. Quantitative data obtained will be statistically analysed using the SPSS version 22.0 while the qualitative data will be analysed using atlas ti. Based on the findings of this study, recommendations will be made.

Keywords: emotional intelligence, high performance, sports coaches, South Africa

Procedia PDF Downloads 438
2459 Impact of Emotional Intelligence and Cognitive Intelligence on Radio Presenter's Performance in All India Radio, Kolkata, India

Authors: Soumya Dutta

Abstract:

This research paper aims at investigating the impact of emotional intelligence and cognitive intelligence on radio presenter’s performance in the All India Radio, Kolkata (India’s public service broadcaster). The ancient concept of productivity is the ratio of what is produced to what is required to produce it. But, father of modern management Peter F. Drucker (1909-2005) defined productivity of knowledge work and knowledge workers in a new form. In the other hand, the concept of Emotional Intelligence (EI) originated back in 1920’s when Thorndike (1920) for the first time proposed the emotional intelligence into three dimensions, i.e., abstract intelligence, mechanical intelligence, and social intelligence. The contribution of Salovey and Mayer (1990) is substantive, as they proposed a model for emotional intelligence by defining EI as part of the social intelligence, which takes measures the ability of an individual to regulate his/her personal and other’s emotions and feeling. Cognitive intelligence illustrates the specialization of general intelligence in the domain of cognition in ways that possess experience and learning about cognitive processes such as memory. The outcomes of past research on emotional intelligence show that emotional intelligence has a positive effect on social- mental factors of human resource; positive effects of emotional intelligence on leaders and followers in terms of performance, results, work, satisfaction; emotional intelligence has a positive and significant relationship with the teachers' job performance. In this paper, we made a conceptual framework based on theories of emotional intelligence proposed by Salovey and Mayer (1989-1990) and a compensatory model of emotional intelligence, cognitive intelligence, and job performance proposed by Stephen Cote and Christopher T. H. Miners (2006). For investigating the impact of emotional intelligence and cognitive intelligence on radio presenter’s performance, sample size consists 59 radio presenters (considering gender, academic qualification, instructional mood, age group, etc.) from All India Radio, Kolkata station. Questionnaires prepared based on cognitive (henceforth called C based and represented by C1, C2,.., C5) as well as emotional intelligence (henceforth called E based and represented by E1, E2,., E20). These were sent to around 59 respondents (Presenters) for getting their responses. Performance score was collected from the report of program executive of All India Radio, Kolkata. The linear regression has been carried out using all the E-based and C-based variables as the predictor variables. The possible problem of autocorrelation has been tested by having the Durbinson-Watson (DW) Statistic. Values of this statistic, almost within the range of 1.80-2.20, indicate the absence of any significant problem of autocorrelation. The possible problem of multicollinearity has been tested by having the Variable Inflation Factor (VIF) value. Values of this statistic, around within 2, indicates the absence of any significant problem of multicollinearity. It is inferred that the performance scores can be statistically regressed linearly on the E-based and C-based scores, which can explain 74.50% of the variations in the performance.

Keywords: cognitive intelligence, emotional intelligence, performance, productivity

Procedia PDF Downloads 149
2458 Proactive Approach to Innovation Management

Authors: Andrus Pedai, Igor Astrov

Abstract:

The focus of this paper is to compare common approaches for Systems of Innovation (SI) and identify proactive alternatives for driving the innovation. Proactive approaches will also consider short and medium term perspectives with developments in the field of Computer Technology and Artificial Intelligence. Concerning computer technology and large connected information systems, it is reasonable to predict that during current or the next century, intelligence and innovation will be separated from the constraints of human-driven management. After this happens, humans will no longer be driving the innovation and there is possibility that SI for new intelligent systems will set its own targets and exclude humans. Over long time scale, these developments could result in a scenario, which will lead to the development of larger, cross galactic (universal) proactive SI and Intelligence.

Keywords: artificial intelligence, DARPA, Moore’s law, proactive innovation, singularity, systems of innovation

Procedia PDF Downloads 466
2457 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 63
2456 A South African Perspective on Artificial Intelligence and Inventorship Status

Authors: Meshandren Naidoo

Abstract:

An artificial intelligence (AI) system named DABUS 2021 made headlines when it became the very first AI system to be listed in a patent which was then granted by the South African patent office. This grant raised much criticism. The question that this research intends to answer is (1) whether, in South African patent law, an AI can be an inventor. This research finds that despite South African law not recognizing an AI as a legal person and despite the legislation not explicitly allowing AI to be inventors, a legal interpretative exercise would allow AI inventorship.

Keywords: artificial intelligence, creativity, innovation, law

Procedia PDF Downloads 123