Search results for: emotional security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4199

Search results for: emotional security

3929 Effects of Harmful Alcohol Consumption and Gender on Academic and Personal-Emotional Adjustment in First Year University Students in Spain

Authors: M. F. Páramo, F. Cadaveira, M. S. Rodríguez

Abstract:

The first year at university is a critical period for personal-emotional and academic adjustment in emerging adults. Moreover, some studies show that alcohol consumption increases in young adults on transition to university. The main purpose of this study was to analyze the impact of hazardous alcohol consumption and gender on adjustment to university, understood as a multidimensional construct involving an array of demands. A sample of 300 first year students in Spain completed the Student Adaptation to College Questionnaire (SACQ) and the Alcohol Use Disorders Identification Test (AUDIT). Examination of the data by analysis of variance revealed that adjustment to university was lower in the students undertaking hazardous alcohol consumption than in the other students. Surprisingly, the personal-emotional adjustment of students with hazardous alcohol consumption was not lower than in the other students. Analysis of the gender effect revealed that levels of personal-emotional adjustment were higher in males than in females. This is our first study examining the influence of alcohol consumption on university adjustment. Future research should examine this relationship more closely, with the aim of designing public health strategies focused on limiting abusive consumption of alcohol in university students.

Keywords: alcohol consumption, first year university students, gender, SACQ

Procedia PDF Downloads 299
3928 The Effect of Emotional Intelligence on Performance and Motivation of Staff: A Case Study of East Azerbaijan Red Crescent

Authors: Bahram Asghari Aghdam, Ali Mahjoub

Abstract:

The purpose of this study is to evaluate the effect of emotional intelligence on the motivation and performance of East Azarbaijan the Red Crescent staff. In this study, EI is determined as the independent variable component of self awareness, self management, social awareness, and relations management, motivation and performance as dependent variables. The research method is descriptive-survey. In this study, simple random sampling method is used and research sample consists of 130 East Azarbaijan the Red Crescent staff that uses Cochran's formula 100 of them were selected and questionnaires were filled by them. Three types of questionnaires were used in this study for emotional intelligence, consisting of the Bradbury Travis and Jane Greaves standard questionnaire; and for motivation and performance a questionnaire is regulated by the researcher with help of professionals and experts in this field that consists of 33 questions about the motivation and 15 questions about performance and content validity were used to obtain the necessary credit. Reliability by using the Cronbach's alpha coefficient /948 was approved. Also, in this study to test the hypothesis of the Spearman correlation coefficient and linear regressions and determine fitness of variables' of structural equation modeling is used. The results show that emotional intelligence with coefficient /865, motivation and performance of in East Azerbaijan the Red Crescent employees has a positive effect. Based on Friedman Test ranking the most influence in motivation and performance of staff in respondents' opinion is in order of self-awareness, relations management, social awareness and self-management.

Keywords: emotional intelligence, self-awareness, self-management, social awareness, relations management, motivation, performance

Procedia PDF Downloads 443
3927 Foreign Policy and National Security Dilemma: Examining Nigerian Experience

Authors: Shuaibu Umar Abdul

Abstract:

The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.

Keywords: foreign policy, nation, national security, Nigeria, security

Procedia PDF Downloads 482
3926 Food Security of Migrants in a Regional Area of Australia: A Qualitative Study

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Rosa McManamey

Abstract:

Food security indicates the ability of individuals, households and communities to acquire food that is healthy, sustainable, affordable, appropriate and accessible. Despite Australia’s current ability to produce enough food to feed a population larger than its current population, there has been substantial evidence over the last decades to demonstrate many Australians struggle to feed themselves, including those from a cultural and linguistically diverse (CALD) background. The study aimed to investigate migrants’ perceptions and experiences on food security in Tasmania. Semi-structured interviews were conducted with 33 migrants residing in North, South and North West Tasmania, who were recruited through purposive sampling. Thematic analysis was employed to analyse the interview data. Four main themes were identified from the interview data: (1) Understanding of food security; (2) Experiences with the food security in Tasmania; (3) Factors that influence migrants’ food security in Tasmania; and (4) Acculturation strategies. Various sub-themes have emerged under each of these four major themes. Though the findings indicate participants are satisfied with their current food security in Tasmania, they still encounter some challenges in food availability, accessibility, and affordability in Tasmania. Factors that influence migrants’ food security were educational background, language barrier, socioeconomic status, geographical isolation, and cultural background. By using different acculturation strategies, migrants managed to adapt to the new food culture. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. The findings indicate migrants residing in Tasmania face different challenges on food security. They use different strategies for food security while acculturating into a new environment. The findings may provide useful information for migrants in Australia and various private organisations or relevant government departments that address food security for migrants.

Keywords: experiences, food security, migrants, perceptions

Procedia PDF Downloads 395
3925 Can Empowering Women Farmers Reduce Household Food Insecurity? Evidence from Malawi

Authors: Christopher Manyamba

Abstract:

Women in Malawi produce perform between 50-70 percent of all agricultural tasks and yet the majority remain food insecure. The aim of his paper is to build on existing mixed evidence that indicates that empowering women in agriculture is conducive to improving food security. The WEAI is used to provide evidence on the relationship between women’s empowerment in agriculture and household food security. A multinomial logistic regression is applied to the Women Empowerment in Agriculture Index (WEAI) components and the Household Hunger Scale. The overall results show that the WEAI can be used to determine household food insecurity; however it has to be contextually adapted. Assets ownership, credit, group membership and leisure time are positively associated with food security. Contrary to other literature, empowerment in having control and decisions on income indicate negative association with household food security. These results could potentially better inform public, private and civil society stakeholders’ dialogues in creating the most effective and sustainable interventions to help women attain long-term food security.

Keywords: food security, gender, empowerment, agriculture index, framework for African food security, household hunger scale

Procedia PDF Downloads 338
3924 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 323
3923 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 275
3922 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 170
3921 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 141
3920 Human Development as an Integral Part of Human Security within the Responsibility to Rebuild

Authors: Themistoklis Tzimas

Abstract:

The proposed paper focuses on a triangular relationship, between human security, human development and responsibility to rebuild. This relationship constitutes the innovative contribution to the debate about human security. Human security constitutes a generic and legally binding notion, which orientates from an integrated approach the UN Charter principles and of the collective security system. Such an approach brings at the forefront of international law and of international relations not only states but non- state actors as well. Several doctrines attempt to implement the fore-mentioned approach among which the Responsibility to Protect- hereinafter R2P- doctrine and its aspect of Responsibility to Rebuild- hereinafter R2R. In this sense, R2P in general and R2R are supposed to be guided by human security imperatives. Human security because of its human- centered approach encompasses as an integral part of it, human development. Human development constitutes part of the backbone of human security, since it deals with the social and economic root- causes of the threats, which human security attempts to confront. In this sense, doctrines which orientate from human security, such as R2P and its R2R aspect should also take into account human development imperatives, in order to improve their efficiency. On the contrary though, R2R is more often linked with market- orientated policies, which are often imposed under transitional authorities, regardless of local needs. The implementation of such policies can be identified as a cause for striking failures in the framework of R2R. In addition it is a misinterpretation of the essence of human security and subsequently of R2P as well. The findings of the article, on the basis of the fore-mentioned argument is that a change must take place from a market- orientated misinterpretation of R2R to an approach attempting to implement human development doctrines, since the latter lie at the heart of human security and can be proven more effective in dealing with the root- causes of conflicts. Methodologically, the article begins with an examination of human security and of its binding nature on the basis of its orientation from the UN Charter. It also examines its significance in the framework of the collective security system. Then, follows the analysis of why and how human development constitutes an integral part of human security. At the next part it is proven that R2P in general and R2R more specifically constitute or should constitute an attempt to implement human security doctrines within the collective security system. Having built this triangular relationship it is argued that human development is proven to be the most suitable notion, so that the spirit of human security and the scopes of R2P are successfully implemented.

Keywords: human security, un charter, responsibility to protect, responsibility to rebuild, human development

Procedia PDF Downloads 254
3919 The Language of Art: Examining Emotional Expression in Drawings of Internally Displaced Persons and Town Students Amid Conflict

Authors: Lugyi No

Abstract:

This research delves into how students from two different backgrounds in a conflict-affected area, one group being internally displaced (IDP) and the other residing in permanent homes, express their emotions through art. Two experiments were conducted involving guided drawing to understand their emotional experiences. In the first experiment, where no specific instructions were given, both groups mostly used dark and dull colors, which suggests feelings of sadness and anxiety. Positive emotions were rarely depicted. In the second experiment, students were asked to express their emotions and provide reasons for their drawings. Here, we observed distinct variations: IDP students leaned towards vibrant colors, reflecting resilience, while town students tended to use monochromatic shades, likely due to their experiences with conflict. This abstract highlights the differing emotional expressions of these groups and the influence of instructions on their artwork.

Keywords: art therapy, conflict-affected areas, education in conflict zones, children's drawings

Procedia PDF Downloads 33
3918 Validation of the Trait Emotional Intelligence Questionnaire: Adolescent Short Form (TEIQue-ASF) among Adolescents in Vietnam

Authors: Anh Nguyen, Jane Fisher, Thach Tran, Anh T. T. Tran

Abstract:

Trait Emotional Intelligence is the knowledge, beliefs, and attitudes an individual has about their own and other people’s emotions. It is believed that trait emotional intelligence is a component of personality. Petrides’ Trait Emotional Intelligence Questionnaire (TEIQue) is well regarded and well-established, with validation data about its functioning among adults from many countries. However, there is little data yet about its use among Asian populations, including adolescents. The aims were to translate and culturally verify the Trait Emotional Intelligence Adolescent Short Form (TEIQue-ASF) and investigate content validity, construct validity, and reliability among adolescents attending high schools in Vietnam. Content of the TEIQue-ASF was translated (English to Vietnamese) and back-translated (Vietnamese to English) in consultation with bilingual and bicultural health researchers and pilot tested among 51 potential respondents. Phraseology and wording were then adjusted and the final version is named the VN-TEIQue-ASF. The VN-TEIQue-ASF’s properties were investigated in a cross-sectional elf-report survey among high school students in Central Vietnam. In total 1,546 / 1,573 (98.3%) eligible students from nine high schools in rural, urban, and coastline areas completed the survey. Explanatory Factor Analysis yielded a four-factor solution, including some with facets that loaded differently compared to the original version: Well-being, Emotion in Relationships, Emotion Self-management, and Emotion Sensitivity. The Cronbach’s alpha of the global score for the VN-TEIQue-ASF was .77. The VN-TEIQue-ASF is comprehensible and has good content and construct validity and reliability among adolescents in Vietnam. The factor structure is only partly replicated the original version. The VN-TEIQue-ASF is recommended for use in school or community surveys and professional study in education, psychology, and public health to investigate the trait emotional intelligence of adolescents in Vietnam.

Keywords: adolescents, construct validity, content validity, factor analysis, questionnaire validity, trait emotional intelligence, Vietnam

Procedia PDF Downloads 236
3917 Human Security and Human Trafficking Related Corruption

Authors: Ekin D. Horzum

Abstract:

The aim of the proposal is to examine the relationship between human trafficking related corruption and human security. The proposal suggests that the human trafficking related corruption is about willingness of the states to turn a blind eye to the human trafficking cases. Therefore, it is important to approach human trafficking related corruption in terms of human security and human rights violation to find an effective way to fight against human trafficking. In this context, the purpose of this proposal is to examine the human trafficking related corruption as a safe haven in which trafficking thrives for perpetrators.

Keywords: human trafficking, human security, human rights, corruption, organized crime

Procedia PDF Downloads 440
3916 Chat-Based Online Counseling for Enhancing Wellness of Undergraduates with Emotional Crisis Tendency

Authors: Arunya Tuicomepee

Abstract:

During the past two decades, there have been the increasing numbers of studies on online counseling, especially among adolescents who are familiar with the online world. This can be explained by the fact that via this channel enables easier access to the young, who may not be ready for face-to-face service, possibly due to uneasiness to reveal their personal problems with a stranger, the feeling that their problems are to be shamed, or the need to protect their images. Especially, the group of teenagers prone to suicide or despair, who tend to keep things to or isolate from the society to themselves, usually prefer types of services that require no face-to-face encounter and allow their anonymity, such as online services. This study aimed to examine effectiveness of chat-based online counseling for enhancing wellness of undergraduates with emotional crisis tendency. Experimental with pretest-posttest control group design was employed. Participants were 47 undergraduates (10 males and 37 females) with high emotional crisis tendency. They were randomly assigned to experimental group (24 students) and control group (23 students). Participants in the experimental group received a 60-minute, 4-sessions of individual chat-based online counseling led by counselor. Those in control group received no counseling session. Instruments were the Emotional Crisis Scale and Wellness Scales. Two-way mixed-design multivariate analysis of variance was used for data analysis. Finding revealed that the posttest scores on wellness of those in the experimental group were higher than the scores of those in the control group. The posttest scores on emotional crisis tendency of those in the experimental group were lower than the scores of those in the control group. Hence, this study suggests chat-based online counseling services can become a helping source that increasing more adolescents would recognize and turn to in the future and that will receive more attention.

Keywords: chat-based online counseling, emotional crisis, undergraduate student, wellness

Procedia PDF Downloads 212
3915 Optimizing the Passenger Throughput at an Airport Security Checkpoint

Authors: Kun Li, Yuzheng Liu, Xiuqi Fan

Abstract:

High-security standard and high efficiency of screening seem to be contradictory to each other in the airport security check process. Improving the efficiency as far as possible while maintaining the same security standard is significantly meaningful. This paper utilizes the knowledge of Operation Research and Stochastic Process to establish mathematical models to explore this problem. We analyze the current process of airport security check and use the M/G/1 and M/G/k models in queuing theory to describe the process. Then we find the least efficient part is the pre-check lane, the bottleneck of the queuing system. To improve passenger throughput and reduce the variance of passengers’ waiting time, we adjust our models and use Monte Carlo method, then put forward three modifications: adjust the ratio of Pre-Check lane to regular lane flexibly, determine the optimal number of security check screening lines based on cost analysis and adjust the distribution of arrival and service time based on Monte Carlo simulation results. We also analyze the impact of cultural differences as the sensitivity analysis. Finally, we give the recommendations for the current process of airport security check process.

Keywords: queue theory, security check, stochatic process, Monte Carlo simulation

Procedia PDF Downloads 167
3914 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 295
3913 Parenting a Child with Mental Health Problems: The Role of Self-compassion

Authors: Vered Shenaar-Golan, Nava Wald, Uri Yatzkar

Abstract:

Background: Parenting children with mental health problems poses multiple challenges, including coping with difficult behavior and negative child emotions. The impact on parents includes financial strain, negative social stigma, and negative feelings of guilt or blame, resulting in significant stress and lower levels of well-being. Given findings that self-compassion plays a significant role in reducing stress and improving well-being, the current study examined the role of self-compassion in the experience of parents raising a child with mental health problems. The study tested (1) whether child behavioral/emotional problem severity is associated with higher parental stress and lower parental well-being; (2) whether self-compassion is associated with lower parental stress and higher parental well-being; and (3) whether self-compassion is a stronger predictor of parental stress and well-being than child behavioral/emotional problem severity. Methods: Three hundred and six mothers and two hundred and fifty-six fathers of children attending a hospital child and adolescent psychiatric center were assessed at admission. Consenting parents completed four questionnaires: Child Strength and Difficulty – parent version, Self-compassion, Parent Feeling Inventory, and Well-Being. Results: Child behavioral/emotional problem severity was associated with higher parental stress and lower parental well-being, and self-compassion was a stronger predictor of parental stress and well-being levels than child behavioral/emotional problem severity. For children with internalizing but not externalizing behavioral/emotional problems, parental self-compassion was the only predictor of parental well-being beyond the severity of child behavioral/emotional problems. Conclusions: Cultivating self-compassion is important in reducing parental stress and increasing parental well-being, particularly with internalizing presentations, and should be considered when designing therapeutic interventions for parents.

Keywords: parenting children with mental health problems, self-compassion, parental stress, feelings, well-being

Procedia PDF Downloads 41
3912 Assessing the Efficacy of Network Mapping, Vulnerability Scanning, and Penetration Testing in Enhancing Security for Academic Networks

Authors: Kenny Onayemi

Abstract:

In an era where academic institutions increasingly rely on information technology, the security of academic networks has emerged as a paramount concern. This comprehensive study delves into the effectiveness of security practices, including network mapping, vulnerability scanning, and penetration testing, within academic networks. Leveraging data from surveys administered to faculty, staff, IT professionals and IT students in the university, the study assesses their familiarity with these practices, perceived effectiveness, and frequency of implementation. The findings reveal that a significant portion of respondents exhibit a strong understanding of network mapping, vulnerability scanning, and penetration testing, highlighting the presence of knowledgeable professionals within academic institutions. Additionally, active scanning using network scanning tools and automated vulnerability scanning tools emerge as highly effective methods. However, concerns arise as the respondents show that the academic institutions conduct these practices rarely or never. Notably, many respondents have reported significant vulnerabilities or security incidents through these security measures within their institution. This study concludes with recommendations to enhance network security awareness and practices among faculty, staff, IT personnel, and students, ultimately fortifying the security posture of academic networks in the digital age.

Keywords: network security, academic networks, vulnerability scanning, penetration testing, information security

Procedia PDF Downloads 20
3911 Extending the AOP Joinpoint Model for Memory and Type Safety

Authors: Amjad Nusayr

Abstract:

Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.

Keywords: aspect oriented programming, programming languages, software security, memory and type safety

Procedia PDF Downloads 100
3910 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 103
3909 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework

Authors: Mayada Al Meghari

Abstract:

Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.

Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance

Procedia PDF Downloads 87
3908 Managing Education through, Effective School Community Relationships/Participation for National Security

Authors: Shehu S. Janguza

Abstract:

The need for national security cannot be over Emphasis, which should be pursued by any means. Thus the need for effective management of education through effective school community Relationship/participation. In preparing and implementing only effort to promote community involvement in manning Education, it is importance to understand the whole picture of community participation, how it works, what forms are used, what benefit it can yield and what we should expect in the process of carrying out the efforts finally emphasis will be made on how effective school community relationship/participation and lead to national security.

Keywords: community participation, managing, school community, national security

Procedia PDF Downloads 570
3907 An Animation-Based Resource for Screening Emotional and Behavioural Distress in Children Aged 6 to 12

Authors: Zoe Lynch, Kirsty Zieschank

Abstract:

There are several factors that compromise the utility and wide-spread use of existing emotional and behavioural distress screening instruments. Some of these factors include lengthy administration times, high costs, feasibility issues, and a lack of self-report options for children under 12 years of age. This animation-based resource was developed to overcome as many of these factors as possible. Developed for educators and medical and mental health professionals, this resource offers children a self-guided mechanism for reporting any current emotional and behavioural distress. An avatar assistant, selected by the child, accompanies them through each stage of the screening process, offering further instruction if prompted. Children enter their age and gender before viewing comparative animations conveying common childhood emotional and behavioural difficulties. The child then selects the most relatable animations, along with the frequency with which they experience the depicted emotions. From a perspective of intellectual development, an engaging, animated format means that outcomes will not be constrained by children’s reading, writing, cognitive, or verbal expression abilities. Having been user-tested with children aged 6 to 12, this resource shows promising results as a self-guided screening instrument.

Keywords: animation-based screening instrument, mental health, primary-aged children, self-guided

Procedia PDF Downloads 128
3906 Security Issues and Primary School Participation in Kenya

Authors: Rose Mwanza

Abstract:

This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.

Keywords: ethnicity, social media, participation in school, poverty, terrorism

Procedia PDF Downloads 31
3905 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 54
3904 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 370
3903 Various Perspectives for the Concept of the Emotion Labor

Authors: Jae Soo Do, Kyoung-Seok Kim

Abstract:

Radical changes in the industrial environment, and spectacular developments of IT have changed the current of managements from people-centered to technology- or IT-centered. Interpersonal emotion exchanges have long become insipid and interactive services have also come as mechanical reactions. This study offers various concepts for the emotional labor based on traditional studies on emotional labor. Especially the present day, on which human emotions are subject to being served as machinized thing, is the time when the study on human emotions comes momentous. Precedent researches on emotional labors commonly and basically dealt with the relationship between the active group who performs actions and the passive group who is done with the action. This study focuses on the passive group and tries to offer a new perspective of 'liquid emotion' as a defence mechanism for the passive group from the external environment. Especially, this addresses a concrete discussion on directions of following studies on the liquid labor as a newly suggested perspective.

Keywords: emotion labor, surface acting, deep acting, liquid emotion

Procedia PDF Downloads 318
3902 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 100
3901 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 348
3900 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms

Authors: Saint C. Nguedjip

Abstract:

This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.

Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women

Procedia PDF Downloads 77