Search results for: D. T. Chinyio
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2

Search results for: D. T. Chinyio

2 Stress and Coping Strategies: A Correlational Analysis to Profiling Maladaptive Behaviors at Work

Authors: Silvia Riva, Ezekiel Chinyio

Abstract:

Introduction: Workers in different sectors are prone to stress at varying levels. They also respond to stress in different ways. An inspiration was to study stress development amongst workers in a work dangerous setting (Construction Industry) as well as how they cope with specific stress incidences. Objective: The overarching objective of the study was to study and correlate between stress and coping strategies. The research was conducted in an organizational industrial setting, and its findings on the coping actions of construction workers are reported in this article. Methods: An online cross-sectional survey was conducted with 80 participants aged 18-62. These were working for three different construction organizations in the West Midland region of the UK. Their coping actions were assessed using the COPE Inventory (Carver, 2013) instrument while the level of stress was assessed by the Perceived Stress Scale (Cohen, 1994). Results: Out of 80 workers (20 female, 25%, mean age 40.66), positive reinterpretation (M=4.15, SD=2.60) and active coping (M=4.18, SD=2.55) were the two most adaptive strategies reported by the workers while the most frequent maladaptive behavior was mental disengagement (M=3.62, SD=2.25). Among the maladaptive tactics, alcohol and drug abuse was a significant moderator in stress reactions (t=6.12, p=.000). Conclusion: Some maladaptive strategies are adopted by construction workers to cope with stress. So, it could be argued that programs of stress prevention and control in the construction industry have a basis to develop solutions that can improve and strengthen effective interventions when workers are stressed or getting stressed.

Keywords: coping, organization, strategies, stress

Procedia PDF Downloads 176
1 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 41