Search results for: emotional security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4199

Search results for: emotional security

4049 Psychological Security and Its Relationship with Self-Esteem among Adolescent with Mild Intellectual Disability

Authors: Muneera Abdul Haleem Bukhari, Maryam I. Alshirawi, Elsayed S. Elkhamisi

Abstract:

This study aimed at understanding the relationship between psychological security and self-esteem among Adolescent with Mild Intellectual Disability, exploring the levels of psychological security and self-esteem, as well as determining the differences between genders in psychological security and self-esteem. The sample of the study contained (60) Adolescent with Mild Intellectual Disability, (34) males and (26) females who are enrolled in the Vocational and Social Rehabilitation Center and Hope Institute in the Kingdom of Bahrain. Their ages are between (15-23) years old. The Psychological Security Scale and self-Esteem Scale (prepared by James Battle) were used by the researcher. Results showed that levels of psychological security and self-esteem among Adolescents with Mild Intellectual Disability was above average; results also showed the order of the psychological security dimensions in the following manner (future outlook – mood - family security – social security) and the order of the dimensions of self-esteem in the following manner (social self-esteem – personal self-esteem – general self-esteem) among Adolescent with Mild Intellectual Disability; as for the differences between genders, the study showed that there was an increased level of psychological security among males. However, there was no difference in self-esteem between both sexes.

Keywords: psychological security, self-esteem, adolescent, intellectual disability, the Kingdom of Bahrain

Procedia PDF Downloads 360
4048 Induced Affectivity and Impact on Creativity: Personal Growth and Perceived Adjustment when Narrating an Intense Emotional Experience

Authors: S. Da Costa, D. Páez, F. Sánchez

Abstract:

We examine the causal role of positive affect on creativity, the association of creativity or innovation in the ideation phase with functional emotional regulation, successful adjustment to stress and dispositional emotional creativity, as well as the predictive role of creativity for positive emotions and social adjustment. The study examines the effects of modification of positive affect on creativity. Participants write three poems, narrate an infatuation episode, answer a scale of personal growth after this episode and perform a creativity task, answer a flow scale after creativity task and fill a dispositional emotional creativity scale. High and low positive effect was induced by asking subjects to write three poems about high and low positive connotation stimuli. In a neutral condition, tasks were performed without previous affect induction. Subjects on the condition of high positive affect report more positive and less negative emotions, more personal growth (effect size r = .24) and their last poem was rated as more original by judges (effect size r = .33). Mediational analysis showed that positive emotions explain the influence of the manipulation on personal growth - positive affect correlates r = .33 to personal growth. The emotional creativity scale correlated to creativity scores of the creative task (r = .14), to the creativity of the narration of the infatuation episode (r = .21). Emotional creativity was also associated, during performing the creativity task, with flow (r = .27) and with affect balance (r = .26). The mediational analysis showed that emotional creativity predicts flow through positive affect. Results suggest that innovation in the phase of ideation is associated with a positive affect balance and satisfactory performance, as well as dispositional emotional creativity is adaptive.

Keywords: affectivity, creativity, induction, innovation, psychological factors

Procedia PDF Downloads 81
4047 Parental Negative Emotional States, Parenting Style and Child Emotional and Behavioural Problems: Australia-Indonesia Cross-Cultural Study

Authors: Yulina E. Riany, Divna Haslam, Matthew Sanders

Abstract:

This cross-cultural study aims to compare the level of parental depression and stress, parenting style use, and child emotional and behavioural problems between parents in Australia as an example of a Western country and parents in Indonesia as an example of Asian culture. A series of hierarchical regressions were undertaken to determine two models examining the factors that predict child problems residing in Australia (Model 1) and in Indonesia (Model 2). The online survey was completed by 179 parents in Australia and 448 parents in Indonesia. Results indicated that Australian parents reported higher levels of depression, authoritative parenting and higher levels of child misbehaviours compared to Indonesian parents. In comparison, Indonesian parents reported higher authoritarian parenting. Analyses performed to examine Model 1 and 2 revealed that parental negative emotional states and parenting style predicted child emotional and behavioural problems in both countries.

Keywords: cross-cutural study, parental stress, parenting, child misbehaviour

Procedia PDF Downloads 94
4046 Relationship between Emotional Intelligence and Decision-Making Styles: A Study of Iranian Managers at Different Organizational Levels

Authors: Seyyedeh Mahdis Mousavi, Masoud Maghsoudi, Zahra Vahed

Abstract:

The purpose of this paper is to examine the relationship between emotional intelligence as conceptualized in Goleman’s competency model, and decision making styles in levels of management. To conduct this study, different level managers in Iran Broadcasting Organization completed a questionnaire on emotional intelligence and decision making styles. Researcher used descriptive and inferential statistics to describe data and analyze the two variables relationship in managers of three levels. Results revealed significant relationships for rational, dependent, avoidant, and spontaneous styles. No significant relationship was found for intuitive style. Yet the results indicate that avoidant style has negative relation to EI. Furthermore, EI has direct and strong relation to rational style.

Keywords: emotional intelligence (EI), decision making styles, Islamic Republic of Iran Broadcasting (IRIB), Iranian manager

Procedia PDF Downloads 341
4045 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 104
4044 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 470
4043 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 135
4042 The Interpretation of World Order by Epistemic Communities in Security Studies

Authors: Gabriel A. Orozco

Abstract:

The purpose of this article is to make an approach to the Security Studies, exposing their theories and concepts to understand the role that have had in the interpretation of the changes and continuities of the world order and their impact on policies or decision-making facing the problems of the 21st century. The aim is to build a bridge between the security studies as a subfield and the meaning that has been given to the world order. The idea of epistemic communities serves as a methodological proposal about the different programs of research in security studies, showing their influence in the realities of States, intergovernmental organizations and transnational forces, moving to implement, perpetuate and project a vision of the world order.

Keywords: security studies, epistemic communities, international, relations

Procedia PDF Downloads 243
4041 Women with Invisible Wounds: A Qualitative Exploration of Emotional Abuse

Authors: Mehar Pruthi, Manjula V.

Abstract:

For the longest time, Indian households have been hosts to a variety of domestic evils such as intimate partner violence, physical abuse, sexual assaults, and more commonly gender-based violence. The prevalence of such heinous acts against women is often swept under the carpet of patriarchy and leaves women scarred. Many times, these wounds are caused by more insidious and subtle acts of violence. For this study, the choice of term for these acts is Emotional Abuse. The ill effects of emotional abuse on the victim’s sense of self and psychological health have been widely established. The current study takes a qualitative approach to explore women’s experiences at the brunt of emotional abuse. To this end, six participants (N=6) were identified using purposive and snowball sampling which was followed by a pre-screening form to assess for the presence of emotional abuse. A semi-structured interview guide was employed to investigate the victim’s perception of emotional abuse, the manifestation of emotional abuse in a patriarchal society, and the reasons women remain in abusive relationships. Each interview lasted about 50-60 mins and was accompanied by extensive note-making. A preliminary analysis of the interviews was done using the Interpretative Phenomenological Approach. Initial findings reveal the emergence of themes such as feelings of loneliness, intergenerational transmission of violence, denial, justifying the partner’s behavior, staying because of children, hoping things would change, and faith in God. The study is instrumental in conceptualizing the patterns of emotional abuse keeping in mind the patriarchal context of the Indian society. It has implications for professionals in the mental health field who work with this population so they can better understand their plight. Future research could focus on rebuilding relationships for those partners who decide to sustain such relationships and focus on various coping mechanisms with special emphasis on religious beliefs.

Keywords: emotional abuse, gender-based violence, intimate partner violence, marriage, patriarchy

Procedia PDF Downloads 68
4040 The Effectiveness of Spouses' Communication Skills Training on Reducing Emotional Harassment and Adjusting Marital Expectations: Married Iranian Women

Authors: Seyed Ali Kimiaei, Reza Pishghadam, Fatemeh Hajizadeh, Marjan Entezari

Abstract:

The aim of this study was to investigate the effectiveness of the Minnesota Spouses Communication Skills Program on reducing emotional harassment and adjusting the marital expectations of married women. The research method was quasi-experimental with pretest-posttest design with waiting list group and follow-up period. The statistical population of the study consisted of married women referring to counseling and psychology centers in Mashhad, from which 30 people were selected as a sample by examining the entry criteria and questionnaire scores, and randomly divided into two experimental groups (15 people) and the waiting list group (15 people) were replaced. The experimental group was given 8 sessions of communication skills program of spouses. The emotional harassment and marital expectations questionnaire was used to collect data. The results showed a significant difference between the experimental group and the waiting list group, so that the communication skills training of the spouses reduced emotional harassment and adjusted marital expectations, and these effects continued in the follow-up period. Therefore, we can conclude that teaching the husband's communication skills program in the Minnesota method reduces emotional harassment and modifies women's marital expectations.

Keywords: spouses communication skills program, emotional harassment, marital expectations, women

Procedia PDF Downloads 98
4039 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 74
4038 Implications of Private Military Security Companies on Stewardship of the Profession of Arms

Authors: Kevin Krupski

Abstract:

Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.

Keywords: stewardship, military profession, civil-military, security

Procedia PDF Downloads 221
4037 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 203
4036 Relationships among Parentification, Self-Differentiation, and Ambivalence over Emotional Expression for Children of Migratory Families

Authors: Wan-Chun Chang, Yi-Jung Lee

Abstract:

Due to cultural factors, expressing emotions may not be encouraged in collectivist cultures, which emphasize the needs of the group over the needs of the individual. This phenomenon is more prominent for children of migratory families. Due to the absence of one parent, children were often parentified by adults, which then impacted on their self-differentiation process. It made them more difficult to express their needs and emotions freely and openly. This study aimed to investigate the meditation effect of self-differentiation between parentification, and ambivalence over emotional expression for children of migratory families in Taiwan. Participants included 460 (326 females, 134 males) Taiwanese adults (age 18-25 years). The data were collected through questionnaires and analyzed using descriptive statistics and multiple regression analysis. The questionnaire included informed consent form, 'Filial Responsibility Scale-Adult', 'Chinese version of the Differentiation of Self Inventory', 'Ambivalence over Emotion Expressiveness Questionnaire', and the demographic sheet. Results indicated that self-differentiation mediated the relationship between parentified experience and ambivalence over emotional expression. In other words, parentified experience itself does not have the power to affect ambivalence over emotional expression. Only by affecting self-differentiation can it make an actual difference. The results were as expected and confirmed the hypothesis. Implications for clinical practice, research, and training were discussed.

Keywords: ambivalence over emotional expression, children of migratory families, parentification, self-differentiation

Procedia PDF Downloads 109
4035 Relationships between Financial, Cultural, Emotional, and General Wellbeing: A Structural Equation Modeling Study

Authors: Michael Alsop, Hannah Heitz, Prathiba Natesan Batley, Marion Hambrick, Jason Immekus

Abstract:

The impacts of cultural engagement on individuals’ health and well-being have been well documented. The purposes of this study were to create an instrument to measure wellbeing constructs, including cultural wellbeing, and explore the relationships between cultural wellbeing and other wellbeing constructs (e.g., emotional, social, physical, spiritual). A sample of 358 participants attending concerts performed by a civic orchestra in the southeastern United States completed a questionnaire designed to measure eight wellbeing constructs. Split-half exploratory, confirmatory factor analyses resulted in the retention of four wellbeing constructs: general, emotional, financial, and cultural. Structural equation modeling showed statistically significant relationships between cultural wellbeing and other wellbeing constructs. In addition to the indirect effect of financial wellbeing on emotional and general wellbeing through cultural wellbeing, there were also direct statistically significant relationships (i.e., moderator). This highlights the importance of removing financial barriers to cultural engagement and the relationship between cultural wellbeing on emotional and general wellbeing. Additionally, the retained cultural wellbeing items focused primarily on community features, indicating the value of community-based cultural engagement opportunities.

Keywords: cultural wellbeing, cultural engagement, factor analysis, structural equation modeling

Procedia PDF Downloads 48
4034 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 163
4033 An Analysis of Socio-Demographics, Living Conditions, and Physical and Emotional Child Abuse Patterns in the Context of the 2010 Haiti Earthquake

Authors: Sony Subedi, Colleen Davison, Susan Bartels

Abstract:

Objective: The aim of this study is to i) investigate the socio-demographics and living conditions of households in Haiti pre- and post 2010 earthquake, ii) determine the household prevalence of emotional and physical abuse in children (aged 2-14) after the earthquake, and iii) explore the association between earthquake-related loss and experience of emotional and physical child abuse in the household while considering potential confounding variables and the interactive effects of a number of social, economic, and demographic factors. Methods: A nationally representative sample of Haitian households from the 2005/6 and 2012 phases of the Demographic and Health Surveys (DHS) was used. Descriptive analysis was summarized using frequencies and measures of central tendency. Chi-squared and independent t-tests were used to compare data that was available pre-earthquake and post-earthquake. The association between experiences of earthquake-related loss and emotional and physical child abuse was assessed using log-binomial regression models. Results: Comparing pre-post-earthquake, noteworthy improvements were observed in the educational attainment of the household head (9.1% decrease in “no education” category) and in possession of the following household items: electricity, television, mobile-phone, and radio post-earthquake. Approximately 77.0% of children aged 2-14 experienced at least one form of physical abuse and 78.5% of children experienced at least one form of emotional abuse one month prior to the 2012 survey period. Analysis regarding the third objective (association between experiences of earthquake-related loss and emotional and physical child abuse) is in progress. Conclusions: The extremely high prevalence of emotional and physical child abuse in Haiti indicates an immediate need for improvements in the enforcement of existing policies and interventions aimed at decreasing child abuse in the household.

Keywords: Haiti earthquake, physical abuse, emotional abuse, natural disasters, children

Procedia PDF Downloads 153
4032 Six Failure Points Innovators and Entrepreneurs Risk Falling into: An Exploratory Study of Underlying Emotions and Behaviors of Self- Perceived Failure

Authors: Katarzyna Niewiadomska

Abstract:

Many technology startups fail to achieve a worthwhile return on investment for their funders, founders, and employees. Failures in product development, to-market strategy, sales, and delivery are commonly recognized. Founder failures are not as obvious and harder to identify. This paper explores six critical failure points that entrepreneurs and innovators are susceptible to and aims to link their emotional intelligence and behavioral profile to the points at which they experienced self-perceived failure. A model of six failure points from the perspective of the technology entrepreneur ranging from pre-startup to maturity is provided. By analyzing emotional and behavioral profile data from entrepreneurs and recording in-person accounts, certain key emotional and behavioral clusters contributing to each failure point are determined, and several underlying factors are defined and discussed. Recommendations that support entrepreneurs and innovators stalling at each failure point are given. This work can enable stakeholders to evaluate founder emotional and behavioral profiles and to take risk-mitigating action, either through coaching or through more robust team creation, to avoid founder-related company failure. The paper will be of interest to investors funding startups, executives leading them and mentors supporting them.

Keywords: behavior, emotional intelligence, entrepreneur, failure

Procedia PDF Downloads 203
4031 The Role of Parents on Fear Acquisition of Children in COVID-19 Pandemic

Authors: Begum Serim-Yildiz

Abstract:

The aim of this study is to examine the role of parents' emotional and behavioral reactions on fears of children in the COVID-19 pandemic considering Rachman’s Three Pathways Theory. For this purpose, a phenomenological qualitative study was conducted. Thirteen participants living with their children were utilized through criterion and snowball sampling. In semi-structured interviews parents were asked about their own and their children’s beahavioral and emotional reactions in the COVID-19 pandemic, and they were expected to give detailed information about fears of their children before and in pandemic. Firstly, parents were asked about their behavioral and emotional reactions in the COVID-19 pandemic. As behavioral reactions, precautions taken by parents to protect the rest of the family from negative physical and emotional impact of the pandemic were mentioned, while emotional reactions were defined as acquisition of negative emotions like fear, anxiety, and worry. Secondly, parents were asked about their children’s behavioral and emotional reactions. Some of the parents talked about positive behavioral changes such as gaining self-control, while some others explained negative behavioral changes like increased time spent with technological tools. In the emotional changes section, all of the parents explained at least one negative emotion. All of the parents stated that their children had COVID-19 related fears. According to parents’ expressions, fears of children in pandemic were examined in two dimensions. Fears directly related to COVID-19 were fear of virus/microbes, illness or death of someone in family and death and fears. Fears indirectly related to COVID-19 were fear of going out, sleep alone at night, separation, touching stuff outside the home, and cold. Considering existing literature and based on the findings of this study, it can be concluded that children’s modelling experiences have impact on acquisition of negative emotions, especially fear, therefore, preventive interventions involving caregivers should be provided by mental health professionals working with children.

Keywords: children’s fears, COVID-19 pandemic, modelling experiences, parents’ reactions

Procedia PDF Downloads 139
4030 Emotional Intelligence: A Panacea in the Management and Marketing of Hospitality and Tourism Good and Services

Authors: M. Azugama, P. Okoro Ugo Chigozie, A. O. Nnamocha

Abstract:

Emotional Intelligence constitutes powerful psychological forces that can strongly influence performance in behaviour, interaction and relationship management. Surprisingly how emotions are interpreted and employed in marketing of hospitality experience have had limited comprehension. Marketing of hospitality experiences have important emotional dimensions which the traditional marketing techniques tend to underplay. Guest and host relationship are challenged by mutual hospitableness obligations; suggesting that the commercial practice of delivering satisfactory guest experience has much to gain from traditional understanding of hospitality. By understanding the emotion-based hospitality transaction between guests and hosts, customers’ experiences can be delivered over and against competitor pressure. In this paper, marketing strategies and tactics in hospitality and tourism are principally concerned with adjusting each of the 6P & T elements (i.e. product, place, price and promotion; and adding people, processes and Time in service contexts), to provide a competitive offer (experience) to customers.

Keywords: Emotional intelligence, hospitality and tourism, relationship management, marketing

Procedia PDF Downloads 443
4029 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 236
4028 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.

Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security

Procedia PDF Downloads 137
4027 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 779
4026 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 475
4025 Adding Security Blocks to the DevOps Lifecycle

Authors: Andrew John Zeller, Francis Pouatcha

Abstract:

Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.

Keywords: information security, data security, cybersecurity, devOps, IT management

Procedia PDF Downloads 71
4024 Inspiring Woman: The Emotional Intelligence Leadership of Khadijah Bint Khuwaylid

Authors: Eman S. Soliman, Sana Hawamdeh, Najmus S. Mahfooz

Abstract:

Purpose: The purpose of this paper was to examine various components of applied emotional intelligence as demonstrated in the leadership style of Khadijah Bint Khuwaylid in pre and post-Islamic society. Methodology: The research used a qualitative research method, specifically historical and ethnographic techniques. Data collection included both primary and secondary sources. Data from sources were analyzed to document the use of emotional intelligent leadership behaviors throughout Khadijah Bint Khuwaylid leadership experience from 596 A.D. to 621 A.D. Findings: Demonstration of four cornerstones of emotional intelligence which are self-awareness, self-management, social awareness and relationship management. Apply them on khadejah Bint Khuwaylid leadership style reveal that she possess main behavioral competences in the form of emotionally self-aware, self-.confidence, adaptability, empathy and influence. Conclusions: Khadijah Bint Khuwaylid serves as a historical model of effective leadership that included the use of emotional intelligence in her leadership behavior. The inclusion of the effective portion of the brain created a successful leadership style that can be learned by present day and future leadership. The recommendations for future leaders are to include the use of emotionally self-aware and self-confidence, adaptability, empathy and influence as components of leadership. This will then demonstrate in a leadership a basic knowledge and understanding of feelings, the keenness to be emotionally open with others, the ability to prototype beliefs and values, and the use of emotions in future communications, vision and progress.

Keywords: emotional intelligence, leadership, Khadijah Bint Khuwaylid, women

Procedia PDF Downloads 245
4023 The Effects of Cross-Border Use of Drones in Nigerian National Security

Authors: H. P. Kerry

Abstract:

Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.

Keywords: armed drones, drones, cross-border, national security

Procedia PDF Downloads 133
4022 Recognition by the Voice and Speech Features of the Emotional State of Children by Adults and Automatically

Authors: Elena E. Lyakso, Olga V. Frolova, Yuri N. Matveev, Aleksey S. Grigorev, Alexander S. Nikolaev, Viktor A. Gorodnyi

Abstract:

The study of the children’s emotional sphere depending on age and psychoneurological state is of great importance for the design of educational programs for children and their social adaptation. Atypical development may be accompanied by violations or specificities of the emotional sphere. To study characteristics of the emotional state reflection in the voice and speech features of children, the perceptual study with the participation of adults and the automatic recognition of speech were conducted. Speech of children with typical development (TD), with Down syndrome (DS), and with autism spectrum disorders (ASD) aged 6-12 years was recorded. To obtain emotional speech in children, model situations were created, including a dialogue between the child and the experimenter containing questions that can cause various emotional states in the child and playing with a standard set of toys. The questions and toys were selected, taking into account the child’s age, developmental characteristics, and speech skills. For the perceptual experiment by adults, test sequences containing speech material of 30 children: TD, DS, and ASD were created. The listeners were 100 adults (age 19.3 ± 2.3 years). The listeners were tasked with determining the children’s emotional state as “comfort – neutral – discomfort” while listening to the test material. Spectrographic analysis of speech signals was conducted. For automatic recognition of the emotional state, 6594 speech files containing speech material of children were prepared. Automatic recognition of three states, “comfort – neutral – discomfort,” was performed using automatically extracted from the set of acoustic features - the Geneva Minimalistic Acoustic Parameter Set (GeMAPS) and the extended Geneva Minimalistic Acoustic Parameter Set (eGeMAPS). The results showed that the emotional state is worse determined by the speech of TD children (comfort – 58% of correct answers, discomfort – 56%). Listeners better recognized discomfort in children with ASD and DS (78% of answers) than comfort (70% and 67%, respectively, for children with DS and ASD). The neutral state is better recognized by the speech of children with ASD (67%) than by the speech of children with DS (52%) and TD children (54%). According to the automatic recognition data using the acoustic feature set GeMAPSv01b, the accuracy of automatic recognition of emotional states for children with ASD is 0.687; children with DS – 0.725; TD children – 0.641. When using the acoustic feature set eGeMAPSv01b, the accuracy of automatic recognition of emotional states for children with ASD is 0.671; children with DS – 0.717; TD children – 0.631. The use of different models showed similar results, with better recognition of emotional states by the speech of children with DS than by the speech of children with ASD. The state of comfort is automatically determined better by the speech of TD children (precision – 0.546) and children with ASD (0.523), discomfort – children with DS (0.504). The data on the specificities of recognition by adults of the children’s emotional state by their speech may be used in recruitment for working with children with atypical development. Automatic recognition data can be used to create alternative communication systems and automatic human-computer interfaces for social-emotional learning. Acknowledgment: This work was financially supported by the Russian Science Foundation (project 18-18-00063).

Keywords: autism spectrum disorders, automatic recognition of speech, child’s emotional speech, Down syndrome, perceptual experiment

Procedia PDF Downloads 160
4021 Renewable Energy and Energy Security in Malaysia: A Quantitative Analysis

Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet

Abstract:

Robust economic growth, increasing population, and personal consumption are the main drivers for the rapid increase of energy demand in Malaysia. Increasing demand has compounded the issue of national energy security due to over-dependence on fossil fuel, depleting indigenous domestic conventional energy resources which in turns has increased the country’s energy import dependence. In order to improve its energy security, Malaysia has seriously embarked on a renewable energy journey. Many initiatives on renewable energy have been introduced in the past decade. These strategies have resulted in the exploding growth of renewable energy deployment in Malaysia. Therefore, this study investigated the impact of renewable energy deployment on energy security. Secondary data was used to calculate the energy security indicators. The study also compared the results of applying different energy security indicators namely availability, applicability, affordability and acceptability dimension of energy resources. The evaluation shows that Malaysia will experience slight improvement in availability and acceptability dimension of energy security. This study suggests that energy security level could be further enhanced by efficient utilization of energy, reducing carbon content of energy and facilitating low-carbon industries.

Keywords: energy policy, energy security, Malaysia, renewable energy

Procedia PDF Downloads 209
4020 Job Characteristics, Emotion Regulation and University Teachers' Well-Being: A Job Demands-Resources Analysis

Authors: Jiying Han

Abstract:

Teaching is widely known to be an emotional endeavor, and teachers’ ability to regulate their emotions is important for their well-being and the effectiveness of their classroom management. Considering that teachers’ emotion regulation is an underexplored issue in the field of educational research, some studies have attempted to explore the role of emotion regulation in teachers’ work and to explore the links between teachers’ emotion regulation, job characteristics, and well-being, based on the Job Demands-Resources (JD-R) model. However, those studies targeted primary or secondary teachers. So far, very little is known about the relationships between university teachers’ emotion regulation and its antecedents and effects on teacher well-being. Based on the job demands-resources model and emotion regulation theory, this study examined the relationships between job characteristics of university teaching (i.e., emotional job demands and teaching support), emotion regulation strategies (i.e., reappraisal and suppression), and university teachers’ well-being. Data collected from a questionnaire survey of 643 university teachers in China were analysed. The results indicated that (1) both emotional job demands and teaching support had desirable effects on university teachers’ well-being; (2) both emotional job demands and teaching support facilitated university teachers’ use of reappraisal strategies; and (3) reappraisal was beneficial to university teachers’ well-being, whereas suppression was harmful. These findings support the applicability of the job demands-resources model to the contexts of higher education and highlight the mediating role of emotion regulation.

Keywords: emotional job demands, teaching support, emotion regulation strategies, the job demands-resources model

Procedia PDF Downloads 125