Search results for: computer security incident response team
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11044

Search results for: computer security incident response team

10954 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 500
10953 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 108
10952 Team Cognitive Heterogeneity and Strategic Decision-Making Flexibility: The Role of Transactive Memory System and Task Complexity

Authors: Rui Xing, Baolin Ye, Nan Zhou, Guohong Wang

Abstract:

Drawing upon a perspective of cognitive interaction, this study explores the relationship between team cognitive heterogeneity and team strategic decision-making flexibility, treating the transactive memory system as a mediator and task complexity as a moderator. The hypotheses were tested in linear regression models by using data gathered from 67 strategic decision-making teams in the new-energy vehicle industry. It is found that team cognitive heterogeneity has a positive impact on strategic decision-making flexibility through the mediation of specialization and coordination of the transactive memory system, which is positively moderated by task complexity.

Keywords: strategic decision-making flexibility, team cognitive heterogeneity, transactive memory system, task complexity

Procedia PDF Downloads 43
10951 Evaluation of Teaching Team Stress Factors in Two Engineering Education Programs

Authors: Kari Bjorn

Abstract:

Team learning has been studied and modeled as double loop model and its variations. Also, metacognition has been suggested as a concept to describe the nature of team learning to be more than a simple sum of individual learning of the team members. Team learning has a positive correlation with both individual motivation of its members, as well as the collective factors within the team. Team learning of previously very independent members of two teaching teams is analyzed. Applied Science Universities are training future professionals with ever more diversified and multidisciplinary skills. The size of the units of teaching and learning are increasingly larger for several reasons. First, multi-disciplinary skill development requires more active learning and richer learning environments and learning experiences. This occurs on students teams. Secondly, teaching of multidisciplinary skills requires a multidisciplinary and team-based teaching from the teachers as well. Team formation phases have been identifies and widely accepted. Team role stress has been analyzed in project teams. Projects typically have a well-defined goal and organization. This paper explores team stress of two teacher teams in a parallel running two course units in engineering education. The first is an Industrial Automation Technology and the second is Development of Medical Devices. The courses have a separate student group, and they are in different campuses. Both are run in parallel within 8 week time. Both of them are taught by a group of four teachers with several years of teaching experience, but individually. The team role stress scale items - the survey is done to both teaching groups at the beginning of the course and at the end of the course. The inventory of questions covers the factors of ambiguity, conflict, quantitative role overload and qualitative role overload. Some comparison to the study on project teams can be drawn. Team development stage of the two teaching groups is different. Relating the team role stress factors to the development stage of the group can reveal the potential of management actions to promote team building and to understand the maturity of functional and well-established teams. Mature teams indicate higher job satisfaction and deliver higher performance. Especially, teaching teams who deliver highly intangible results of learning outcome are sensitive to issues in the job satisfaction and team conflicts. Because team teaching is increasing, the paper provides a review of the relevant theories and initial comparative and longitudinal results of the team role stress factors applied to teaching teams.

Keywords: engineering education, stress, team role, team teaching

Procedia PDF Downloads 198
10950 Association of Human Immunodeficiency Virus with Incident Autoimmune Hemolytic Anemia: A Population-Based Cohort Study in Taiwan

Authors: Yung-Feng Yen, I-an Jen, Yi-Ming Arthur Chen

Abstract:

The molecular mimicry between human immunodeficiency virus (HIV) protein and red blood cell (RBC) antigens could induce the production of anti-RBC autoantibodies. However, the association between HIV infection and subsequent development of autoimmune hemolytic anemia (AIHA) remains unclear. This nationwide population-based cohort study aimed to determine the association between incident AIHA and HIV in Taiwan. From 2000–2012, we identified adult people living with HIV/AIDS (PLWHA) from the Taiwan centers for disease control HIV Surveillance System. HIV-infected individuals were defined by positive HIV-1 western blot. Age- and sex-matched controls without HIV infection were selected from the Taiwan National Health Insurance Research Database for comparison. All patients were followed until Dec. 31, 2012, and observed for occurrence of AIHA. Of 171,468 subjects (19,052 PLWHA, 152,416 controls), 30 (0.02%) had incident AIHA during a mean follow-up of 5.45 years, including 23 (0.12%) PLWHA and 7 (0.01%) controls. After adjusting for potential confounders, HIV infection was found to be an independent risk factor of incident AIHA (adjusted hazard ratio [AHR], 20.9; 95% confidence interval [CI], 8.34-52.3). Moreover, PLWHA receiving HAART were more likely to develop AIHA than those not receiving HAART (AHR, 10.8; 95% CI, 2.90-40.1). Additionally, the risk of AIHA was significantly increased in those taking efavirenz (AHR, 3.15; 95% CI, 1.18-8.43) or atazanavir (AHR, 6.58; 95% CI, 1.88-22.9) component of the HAART. In conclusion, HIV infection is an independent risk factor for incident AIHA. Clinicians need to be aware of the higher risk of AIHA in PLWHA.

Keywords: autoimmune disease , hemolytic anemia, HIV, highly active antiretroviral treatment

Procedia PDF Downloads 206
10949 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 329
10948 A Multicopy Strategy for Improved Security Wireless Sensor Network

Authors: Tuğçe Yücel

Abstract:

A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.

Keywords: MIP, sensor, telecommunications, WSN

Procedia PDF Downloads 477
10947 The Impact of Self-Viewing in Virtual Teamwork on Team Creativity: The Mediating Effect of Objective Self-Awareness and the Moderating Effect of Psychological Safety

Authors: Xueyang Li

Abstract:

This thesis investigates the impact of self-viewing on team creativity in virtual teamwork and examines the role of objective self-awareness and psychological safety in this context. The study uses a quantitative research approach and collects data from 304 participants working in virtual teams. We hypothesized that observing oneself in online meetings would lead to a heightened sense of objective self and thus lower team creativity and that psychological safety would moderate their relationship. We tested these hypotheses in a laboratory experiment manipulating whether participants were able to observe themselves during the completion of an online team creativity task and manipulating whether participants were subjected to a psychological safety intervention. The results indicate that self-observation has a negative effect on team creativity in virtual teamwork, while objective self-awareness mediates this relationship, and psychological safety plays a moderating role. We discuss several aspects of the theoretical explanation of the findings. This study contributes to the existing literature by highlighting the importance of self-observation in virtual teamwork and provides practical implications for managers and team leaders to promote creativity in virtual teams.

Keywords: objective self-awareness, psychological safety, self-viewing, team creativity, virtual teamwork

Procedia PDF Downloads 60
10946 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 440
10945 Comparative Analysis of Competitive State Anxiety among Team Sport and Individual Sport Athletes in Iran

Authors: Hossein Soltani, Zahra Hojati, Seyed Reza Attarzadeh Hossini

Abstract:

Anxiety levels before and during competition are not clear due to conflicting findings; various athletes have reported different levels of anxiety from much too low. With respect to the fact that every sport field has its own special nature, and the lack of a comprehensive theory in this field made the author to compare competitive state anxiety among team sport and individual sport athletes in Iran. The sample included 120 male athletes, 60 athletes in individual sports (taekwondo, karate, and wrestling) and 60 athletes in team sports (volleyball, basketball, futsal). All participants in this study were regularly competing at the super leagues and regional level. The research instrument employed was the Persian version of the Competitive State Anxiety Inventory-2. This inventory was distributed among the subjects about 30 minutes before the first competition. Finally, using one-way ANOVA data was analyzed. The results indicated that the mean score of cognitive and somatic anxiety among individual sport athletes was higher than that of team sport athletes (P<0.05). Self-confidence levels of individual sports athletes was higher than that of team sports athletes but the difference was not significant (P >0.05). It seems the being part of a team alleviates some of the pressure experienced by those who compete alone. Conclusion: Individual sport athletes may be more exposed to evaluation and more engaged in their own skills and abilities than team sport athletes given that responsibility for performance is not distributed across several performers.

Keywords: competitive state anxiety, cognitive anxiety, somatic anxiety, team sports, individual sports

Procedia PDF Downloads 537
10944 Room Temperature Sensitive Broadband Terahertz Photo Response Using Platinum Telluride Based Devices

Authors: Alka Jakhar, Harmanpreet Kaur Sandhu, Samaresh Das

Abstract:

The Terahertz (THz) technology-based devices are heightening at an alarming rate on account of the wide range of applications in imaging, security, communication, and spectroscopic field. The various available room operational THz detectors, including Golay cell, pyroelectric detector, field-effect transistors, and photoconductive antennas, have some limitations such as narrow-band response, slow response speed, transit time limits, and complex fabrication process. There is an urgent demand to explore new materials and device structures to accomplish efficient THz detection systems. Recently, TMDs including topological semimetals and topological insulators such as PtSe₂, MoTe₂, WSe₂, and PtTe₂ provide novel feasibility for photonic and optical devices. The peculiar properties of these materials, such as Dirac cone, fermions presence, nonlinear optical response, high conductivity, and ambient stability, make them worthy for the development of the THz devices. Here, the platinum telluride (PtTe₂) based devices have been demonstrated for THz detection in the frequency range of 0.1-1 THz. The PtTe₂ is synthesized by direct selenization of the sputtered platinum film on the high-resistivity silicon substrate by using the chemical vapor deposition (CVD) method. The Raman spectra, XRD, and XPS spectra confirm the formation of the thin PtTe₂ film. The PtTe₂ channel length is 5µm and it is connected with a bow-tie antenna for strong THz electric field confinement in the channel. The characterization of the devices has been carried out in a wide frequency range from 0.1-1 THz. The induced THz photocurrent is measured by using lock-in-amplifier after preamplifier. The maximum responsivity is achieved up to 1 A/W under self-biased mode. Further, this responsivity has been increased by applying biasing voltage. This photo response corresponds to low energy THz photons is mainly due to the photo galvanic effect in PtTe₂. The DC current is induced along the PtTe₂ channel, which is directly proportional to the amplitude of the incident THz electric field. Thus, these new topological semimetal materials provide new pathways for sensitive detection and sensing applications in the THz domain.

Keywords: terahertz, detector, responsivity, topological-semimetals

Procedia PDF Downloads 135
10943 An Empirical Analysis of the Relation between Entrepreneur's Leadership and Team Creativity: The Role of Psychological Empowerment, Cognitive Diversity, and Environmental Uncertainty

Authors: Rui Xing, Xiaowen Zhao, Hao Huang, Chang Liu

Abstract:

Creativity is regarded as vital for new ventures' development since the whole process of entrepreneurship is rooted in the creation and exploration of new ideas. The entrepreneurial leader is central to the entrepreneurial team, who plays an especially important role in this process. However, few scholars have studied the impact entrepreneurs' leadership styles on the creativity of entrepreneurial teams. In this study, we integrate the historically disjointed literatures of leadership style and team creativity under entrepreneurship circumstance to understand why and when entrepreneurs' different leadership style relates to team creativity. Focus on answering the following questions: Is humility leadership necessarily better than narcissism leadership at increasing the creativity of entrepreneurial teams? Moreover, in which situations humility leadership or narcissism leadership is more conducive to the entrepreneurial team's creativity? Based on the componential theory of creativity and entrepreneurial cognition theory, we explore the relationship between entrepreneurs' leadership style and team creativity, treating team cognitive diversity and environmental uncertainty as moderators and psychological empowerment as mediators. We tested our hypotheses using data gathered from 64 teams and 256 individual members from 53 new firms in China's first-tier cities such as Beijing and Shanghai. We found that there was a significant positive relation between entrepreneurs' humble leadership and psychological empowerment, and the more significant the positive correlation was when the environmental uncertainty was high. In addition, there was a significant negative relation between entrepreneurs' narcissistic leadership and psychological empowerment, and the negative relation was weaker in teams with a high team cognitive diversity value. Furthermore, both entrepreneurs' humble leadership and team psychological empowerment were significantly positively related to team creativity. While entrepreneurs' narcissistic leadership was negatively related to team creativity, and the negative relationship was weaker in teams with a high team cognitive diversity or a high environmental uncertainty value. This study has some implications for both scholars and entrepreneurs. Firstly, our study enriches the understanding of the role of leadership in entrepreneurial team creativity. Different from previous team creativity literatures, focusing on TMT and R&D team, this study is a significant attempt to demonstrate that entrepreneurial leadership style is particularly relevant to the core requirements of team creativity. Secondly, this study introduces two moderating variables, cognitive diversity and environmental uncertainty, to explore the different boundary conditions under which the two leadership styles play their roles, which is helpful for entrepreneurs to understand how to leverage leadership to improve entrepreneurial team creativity, how to recruit cognitively diverse employees to moderate the effects of inappropriate leadership to the team. Finally, our findings showed that entrepreneurs' humble leadership makes a unique contribution to explaining team creativity through team psychological empowerment.

Keywords: entrepreneurs’ leadership style, entrepreneurial team creativity, team psychological empowerment, team cognitive diversity, environmental uncertainty

Procedia PDF Downloads 107
10942 Enhancing of Laser Imaging by Using Ultrasound Effect

Authors: Hayder Raad Hafuze, Munqith Saleem Dawood, Jamal Abdul Jabbar

Abstract:

The effect of using both ultrasounds with laser in medical imaging of the biological tissue has been studied in this paper. Different wave lengths of incident laser light (405 nm, 532 nm, 650 nm, 808 nm and 1064 nm) were used with different ultrasound frequencies (1MHz and 3.3MHz). The results showed that, the change of acoustic intensity enhance the laser penetration of the tissue for different thickness. The existence of the ideal Raman-Nath diffraction pattern were investigated in terms of phase delay and incident angle.

Keywords: tissue, laser, ultrasound, effect, imaging

Procedia PDF Downloads 395
10941 Blockchain Solutions for IoT Challenges: Overview

Authors: Amir Ali Fatoorchi

Abstract:

Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems.

Keywords: Blockchain, security, data security, IoT

Procedia PDF Downloads 178
10940 Research Design for Developing and Validating Ice-Hockey Team Diagnostics Scale

Authors: Gergely Geczi

Abstract:

In the modern world, ice hockey (and, in a broader sense, team sports) is becoming an increasingly popular field of entertainment. Although the main element is most likely perceived as the show itself, winning is an inevitable part of the successful operation of any sports team. In this paper, the author creates a research design allowing him to develop and validate an ice-hockey team-focused diagnostics scale, which enables researchers and practitioners to identify the problems associated with underperforming teams. The construction of the scale starts with personal interviews with experts of the field, carefully chosen from the sector of Hungarian ice hockey. Based on the interviews, the author is shown to be in the position to create the categories and the relevant items for the scale. When constructed, the next step is the validation process on a Hungarian sample. Data for validation are acquired through reaching the licensed database of the Hungarian Ice-Hockey Federation involving Hungarian ice-hockey coaches and players. The Ice-Hockey Team Diagnostics Scale is to be created to orient practitioners in understanding both effective and underperforming teamwork.

Keywords: diagnostics scale, effective versus underperforming team work, ice-hockey, research design

Procedia PDF Downloads 106
10939 Case Scenario Simulation concerning Eventual Ship Sourced Oil Spill, Expansion and Response Process in Istanbul Strait

Authors: Cihat Aşan

Abstract:

Istanbul Strait is a crucial and narrow waterway, not only having a role in linking two continents but also has a crossover mission for the petroleum, which is the biggest energy resource, between its supply and demand sources. Besides its substantial features, sensitivities like around 18 million populations in surroundings, military facilities, ports, oil lay down areas etc. also brings the high risk to use of Istanbul Strait. Based on the statistics of Turkish Ministry of Transportation, Maritime and Communication, although the number of vessel passage in Istanbul Strait is declining, tonnage of hazardous and flammable cargo like oil and chemical transportation is increasing and subsequently the risk of oil pollution, loss of life and property is also rising. Based on the mentioned above; it is crucial to be prepared for the initial and subsequent response to eventual ship sourced oil spill which may cause to block the Strait for an unbearable duration. In this study; preconditioned Istanbul Strait sensitive areas studies has been taken into account and possible oil spill scenario is loaded to PISCES 2 (Potential Incident Simulation Control and Evaluation System) decision support system for the determined specific sea area. Consequences of the simulation like oil expanding process, required number and types of assets to response, had in hand and evaluated.

Keywords: Istanbul strait, oil spill, PISCES simulator, initial response

Procedia PDF Downloads 310
10938 Sudan’s Approach to Knowledge Management in Disaster Management

Authors: Mohamed Abdalla Elamein Boshara, Peter Charles Woods, Nour Eldin Mohamed Elshaiekh

Abstract:

Knowledge Management has become very important for Disaster Management response and planning. This paper proposes the implementation of a Knowledge Management System with a sustainable data collection mechanism for reliable and timely information management to support decision makers in making the right decisions in the timely manner.

Keywords: knowledge management, disaster management, incident tracking, web application

Procedia PDF Downloads 746
10937 Modeling Reflection and Transmission of Elastodiffussive Wave Sata Semiconductor Interface

Authors: Amit Sharma, J. N. Sharma

Abstract:

This paper deals with the study of reflection and transmission characteristics of acoustic waves at the interface of a semiconductor halfspace and elastic solid. The amplitude ratios (reflection and transmission coefficients) of reflected and transmitted waves to that of incident wave varying with the incident angles have been examined for the case of quasi-longitudinal wave. The special cases of normal and grazing incidence have also been derived with the help of Gauss elimination method. The mathematical model consisting of governing partial differential equations of motion and charge carriers diffusion of n-type semiconductors and elastic solid has been solved both analytically and numerically in the study. The numerical computations of reflection and transmission coefficients has been carried out by using MATLAB programming software for silicon (Si) semiconductor and copper elastic solid. The computer simulated results have been plotted graphically for Si semiconductors. The study may be useful in semiconductors, geology, and seismology in addition to surface acoustic wave (SAW) devices.

Keywords: quasilongitudinal, reflection and transmission, semiconductors, acoustics

Procedia PDF Downloads 359
10936 Seismic Response of Viscoelastic Dampers for Steel Structures

Authors: Ali Khoshraftar, S. A. Hashemi

Abstract:

This paper is focused on the advantages of Viscoelastic Dampers (VED) to be used as energy-absorbing devices in buildings. The properties of VED are briefly described. The analytical studies of the model structures exhibiting the structural response reduction due to these viscoelastic devices are presented. Computer simulation of the damped response of a multi-storey steel frame structure shows significant reduction in floor displacement levels.

Keywords: dampers, seismic evaluation, steel frames, viscoelastic

Procedia PDF Downloads 450
10935 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 95
10934 The Beneficial Effects of Hydrotherapy for Recovery from Team Sport – A Meta-Analysis

Authors: Trevor R. Higgins

Abstract:

To speed/enhance recovery from sport, cold water immersion (CWI) and contrast water therapy (CWT) have become common practice within the high-level team sport. Initially, research into CWI and CWT protocols and recovery was sparse; athletes relied solely upon an anecdotal support. However, an increase into recovery research has occurred. A number of reviews have subsequently been conducted to clarify scientific evidence. However, as the nature of physiological stress and training status of participants will impact on results, an opportunity existed to narrow the focus to a more exacting review evaluating hydrotherapy for recovery in a team sport. A Boolean logic [AND] keyword search of databases was conducted: SPORTDiscus; AMED; CINAHL; MEDLINE. Data was extracted and the standardized mean differences were calculated with 95% CI. The analysis of pooled data was conducted using a random-effect model, with Heterogeneity assessed using I2. 23 peer reviewed papers (n=606) met the criteria. Meta-analyses results indicated CWI was likely beneficial for recovery at 24h (Countermovement Jump (CMJ): p= 0.05, CI -0.004 to 0.578; All-out sprint: p=0.02, -0.056 to 0.801; DOMS: p=0.08, CI -0.092 to 1.936) and at 72h (accumulated sprinting: p=0.07, CI -0.062 to 1.209; DOMS: p=0.09, CI -0.121 to 1.555) following team sport. Whereas CWT was likely beneficial for recovery at 1h (CMJ: p= 0.07, CI -0.004 to 0.863) and at 48h (fatigue: p=0.04, CI 0.013 to 0.942) following team sport. Athlete’s perceptions of muscle soreness and fatigue are enhanced with CWI and/or CWT, however even though CWI and CWT were beneficial in attenuating decrements in neuromuscular performance 24 hours following team sport, indications are those benefits were no longer Sydney evident 48 hours following team sport.

Keywords: cold water immersion, contrast water therapy, recovery, team sport

Procedia PDF Downloads 483
10933 Virtual Marketing Team Leadership and Burnout: Literature Review, Implications for Managers, and Recommendations for Future Research

Authors: Chad A. Roberts

Abstract:

In the digitally connected world, global virtual teams are increasingly becoming the norm at large, multinational companies. Marketing managers see the positives of virtual teams. They also see the negatives. Employees who work from home may feel isolated, unorganized, and distracted by homelife. These complexities create a phenomenon that leaves virtual team members feeling burnout, a significant issue for marketing leaders and their team members. This paper examines remote worker burnout in global virtual marketing team settings. It provides an overview of the benefits and downsides to remote working marketing teams. The paper presents the literature on remote work stress and burnout, discusses ways marketing leaders can help prevent virtual employee burnout and suggests future research studies.

Keywords: burnout, COVID-19 pandemic, leadership, marketing, remote work, virtual team

Procedia PDF Downloads 181
10932 An E-Assessment Website to Implement Hierarchical Aggregate Assessment

Authors: M. Lesage, G. Raîche, M. Riopel, F. Fortin, D. Sebkhi

Abstract:

This paper describes a Web server implementation of the hierarchical aggregate assessment process in the field of education. This process describes itself as a field of teamwork assessment where teams can have multiple levels of hierarchy and supervision. This process is applied everywhere and is part of the management, education, assessment and computer science fields. The E-Assessment website named “Cluster” records in its database the students, the course material, the teams and the hierarchical relationships between the students. For the present research, the hierarchical relationships are team member, team leader and group administrator appointments. The group administrators have the responsibility to supervise team leaders. The experimentation of the application has been performed by high school students in geology courses and Canadian army cadets for navigation patrols in teams. This research extends the work of Nance that uses a hierarchical aggregation process similar as the one implemented in the “Cluster” application.

Keywords: e-learning, e-assessment, teamwork assessment, hierarchical aggregate assessment

Procedia PDF Downloads 342
10931 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 529
10930 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 335
10929 Collaborative Team Work in Higher Education: A Case Study

Authors: Swapna Bhargavi Gantasala

Abstract:

If teamwork is the key to organizational learning, productivity, and growth, then, why do some teams succeed in achieving these, while others falter at different stages? Building teams in higher education institutions has been a challenge and an open-ended constructivist approach was considered on an experimental basis for this study to address this challenge. For this research, teams of students from the MBA program were chosen to study the effect of teamwork in learning, the motivation levels among student team members, and the effect of collaboration in achieving team goals. The teams were built on shared vision and goals, cohesion was ensured, positive induction in the form of faculty mentoring was provided for each participating team and the results have been presented with conclusions and suggestions.

Keywords: teamwork, leadership, motivation and reinforcement, collaboration

Procedia PDF Downloads 346
10928 Simulating an Interprofessional Hospital Day Shift: A Student Interprofessional (IP) Collaborative Learning Activity

Authors: Fiona Jensen, Barb Goodwin, Nancy Kleiman, Rhonda Usunier

Abstract:

Background: Clinical simulation is now a common component in many health profession curricula in preparation for clinical practice. In the Rady Faculty of Health Sciences (RFHS) college leads in simulation and interprofessional (IP) education, planned an eight hour simulated hospital day shift, where seventy students from six health professions across two campuses, learned with each other in a safe, realistic environment. Learning about interprofessional collaboration, an expected competency for many health professions upon graduation, was a primary focus of the simulation event. Method: Faculty representatives from the Colleges of Nursing, Medicine, Pharmacy and Rehabilitation Sciences (Physical Therapy, Occupation Therapy, Respiratory Therapy) and Pharmacy worked together to plan the IP event in a simulation facility in the College of Nursing. Each college provided a faculty mentor to guide the same profession students. Students were placed in interprofessional teams consisting of a nurse, physician, pharmacist, and then sharing respiratory, occupational, and physical therapists across the team depending on the needs of the patients. Eight patient scenarios were role played by health profession students, who had been provided with their patient’s story shortly before the event. Each team was guided by a facilitator. Results and Outcomes: On the morning of the event, all students gathered in a large group to meet mentors and facilitators and have a brief overview of the six competencies for effective collaboration and the session objectives. The students assuming their same profession roles were provided with their patient’s chart at the beginning of the shift, met with their team, and then completed professional specific assessments. Shortly into the shift, IP team rounds began, facilitated by the team facilitator. During the shift, each patient role-played a spontaneous health incident, which required collaboration between the IP team members for assessment and management. The afternoon concluded with team rounds, a collaborative management plan, and a facilitated de-brief. Conclusions: During the de-brief sessions, students responded to set questions related to the session learning objectives and expressed many positive learning moments. We believe that we have a sustainable simulation IP collaborative learning opportunity, which can be embedded into curricula, and has the capacity to grow to include more health profession faculties and students. Opportunities are being explored in the RFHS at the administrative level, to offer this event more frequently in the academic year to reach more students. In addition, a formally structured event evaluation tool would provide important feedback and inform the qualitative feedback to event organizers and the colleges about the significance of the simulation event to student learning.

Keywords: simulation, collaboration, teams, interprofessional

Procedia PDF Downloads 102
10927 COVID-19: A Thread to the Security System of Foreign Investment

Authors: Mehdi Ghaemi

Abstract:

In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.

Keywords: foreign investment, FPS standard, host country, public health, COVID-19

Procedia PDF Downloads 69
10926 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 452
10925 Knowledge Sharing within a Team: Exploring the Antecedents and Role of Trust

Authors: Li Yan Hei, Au Wing Tung

Abstract:

Knowledge sharing is a process in which individuals mutually exchange existing knowledge and co-create new knowledge. Previous research has confirmed that trust is positively associated with knowledge sharing. However, only few studies systematically examined the antecedents of trust and these antecedents’ impacts on knowledge sharing. In order to explore and understand the relationships between trust and knowledge sharing in depth, this study proposed a relationship maintenance-based model to examine the antecedents of trust in knowledge sharing in project teams. Three critical elements within a project team were measured, including the environment, project team partner and interaction. It was hypothesized that the trust would lead to knowledge sharing and in turn result in perceived good team performance. With a sample of 200 Hong Kong employees, the proposed model was evaluated with structural equation modeling. Expected findings are trust will contribute to knowledge sharing, resulting in better team performance. The results will also offer insights into antecedents of trust that play a heavy role in the focal relationship. The present study contributes to a more holistic understanding of relationship between trust and knowledge sharing by linking the antecedents and outcomes. The findings will raise the awareness of project managers on ways to promote knowledge sharing.

Keywords: knowledge sharing, project management, team, trust

Procedia PDF Downloads 574