Search results for: instrument security factor
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8554

Search results for: instrument security factor

8524 Mathematical Modeling of the Working Principle of Gravity Gradient Instrument

Authors: Danni Cong, Meiping Wu, Hua Mu, Xiaofeng He, Junxiang Lian, Juliang Cao, Shaokun Cai, Hao Qin

Abstract:

Gravity field is of great significance in geoscience, national economy and national security, and gravitational gradient measurement has been extensively studied due to its higher accuracy than gravity measurement. Gravity gradient sensor, being one of core devices of the gravity gradient instrument, plays a key role in measuring accuracy. Therefore, this paper starts from analyzing the working principle of the gravity gradient sensor by Newton’s law, and then considers the relative motion between inertial and non-inertial systems to build a relatively adequate mathematical model, laying a foundation for the measurement error calibration, measurement accuracy improvement.

Keywords: gravity gradient, gravity gradient sensor, accelerometer, single-axis rotation modulation

Procedia PDF Downloads 290
8523 Development and Validation of Sense of Humor Questionnaire in China

Authors: Yunshi Peng, Shanshan Gao, Sang Qin

Abstract:

The sense of humor is an integration of cognition, emotion and behavioral tendencies in the process of expressing humor. Previous studies evidenced the positive impact of sense of humor on promoting mental health. However, very few studies investigated this with Chinese populations. The absence of a validated questionnaire limits empirical research on sense of humor in China. This study aimed to develop a Chinese instrument to examine the sense of humor among college students in China. A pool of 72 items was developed by conducting a series of qualitative methods including open-ended questionnaire, individual interviews and literature analysis, followed by an expert rating. A total of 500 college students were recruited from 7 provinces in China to complete all 72 items. The factor structure of sense of humor was established and 25 items were eventually formed by utilizing the exploratory factor analyses (EFA). The questionnaire composed 4 subscales: humor comprehension, humor creativity, attitudes towards humor and optimism level. Confirmatory factor analyses (CFA) from a follow-up study with a different sample of 1200 colleges students showed good model fit. All subscales and the overall questionnaire display satisfying internal consistency. Correlations with criterion variables demonstrated good convergent and discriminant validity. The sense of humor questionnaire is a psychometrically-sound instrument for the population of college students in China. This is applicable for future studies to identify the structure of sense of humor and evaluate the levels of humor for individuals.

Keywords: college students, EFA and CFA, questionnaire, sense of humor

Procedia PDF Downloads 311
8522 Instrument Development and Validation for Quality Early Childhood Curriculum in the Malaysian Context

Authors: Sadiah Baharom, Che Nidzam Che Ahmad, Saipol Barin Ramli, Asmayati Yahaya, Sopia Md Yassin

Abstract:

The early childhood care and education (ECCE) in Malaysia aspire to develop children who are intellectually, emotionally, physically and spiritually balanced. This aspiration can only materialise if the early childhood program developed comprehensive and is of high quality comparable to international standards. As such, there is a pressing need to assess the quality of the program in an all-encompassing manner. The overall research project aims at developing a comprehensive and integrated model of high-quality Malaysian ECCE. One of the major objectives of this project is to assess and evaluate the scope and quality of the existing ECCE programs in Malaysia. To this end, a specific aspect of this objective is to develop and validate an instrument to assess and evaluate the ECCE curriculum of the country. Thus this paper describes the development and validation of an instrument to explore the quality of early childhood care and education curriculum currently implemented in the country’s ECCE centres. The generation of the constructs and items were based on a set of criteria mapped against existing ECCE practice, document analyses, expert interviews and panel discussions. The items went through expert validation and were field tested on 597 ECCE teachers. The data obtained went through an exploratory factor analysis to validate the constructs of the instrument followed by reliability studies on internal consistency based on the Cronbach Alpha values. The final set of items for the ECCE curriculum instrument, earmarked for the main study, consists of four constructs namely philosophy and core values, curriculum content, curriculum review and unique features. Each construct consists of between 21 to 3 items with a total of 36 items in all. The reliability coefficients for each construct range from 0.65 to 0.961. These values are within the acceptable limits for a reliable instrument to be used in the main study.

Keywords: early childhood and care education, instrument development, reliability studies, validity studies

Procedia PDF Downloads 175
8521 Protection of the Object of the Critical Infrastructure in the Czech Republic

Authors: Michaela Vašková

Abstract:

With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.

Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit

Procedia PDF Downloads 315
8520 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 393
8519 Translation and Validation of the Pediatric Quality of Life Inventory for Children in Pakistani Context

Authors: Nazia Mustafa, Aneela Maqsood

Abstract:

Pediatric Quality of Life Inventory is the most widely used instrument for assessing children and adolescent health-related quality of life and has shown excellent markers of reliability and validity. The current study was carried out with the objectives of translation and cross-language validation along with the determination of factor Structure and psychometric properties of the Urdu version. It was administered on 154 Primary School Children with age range 10 to12 years (M= 10.86, S.D = 0.62); including boys (n=92) and girls (n = 62). The sample was recruited from two randomly selected schools from the Rawalpindi district of Pakistan. Results of the pilot phase revealed that the instrument had good reliability (Urdu Version α = 0.798; English Version α = 0.795) as well as test-retest correlation coefficients over a period of 15 days (r = 0.85). Exploratory factor analysis (EFA) resulted in three factorial structures; Social/School Functioning (k = 8), Psychological Functioning (k = 7) and Physical Functioning (k = 6) considered suitable for our sample instead of four factors. Bartlett's test of sphericity showed inter-correlation between variables. However, factor loadings for items 22 and 23 of the School Functioning subscale were problematic. The model was fit to the data after their removal with Cronbach’s Alpha Reliability coefficient of the scale (k = 21) as 0.87 and for subscales as 0.75, 0.77 and 0.73 for Social/School Scale, Psychological subscale and Physical subscale, respectively. These results supported the feasibility and reliability of the Urdu version of the Pediatric Quality of Life Inventory as a reliable and effective tool for the measurement of quality of life among Pediatrics Pakistani population.

Keywords: primary school children, paediatric quality of life, exploratory factor analysis, Pakistan

Procedia PDF Downloads 111
8518 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 429
8517 Exploratory Factor Analysis of Natural Disaster Preparedness Awareness of Thai Citizens

Authors: Chaiyaset Promsri

Abstract:

Based on the synthesis of related literatures, this research found thirteen related dimensions that involved the development of natural disaster preparedness awareness including hazard knowledge, hazard attitude, training for disaster preparedness, rehearsal and practice for disaster preparedness, cultural development for preparedness, public relations and communication, storytelling, disaster awareness game, simulation, past experience to natural disaster, information sharing with family members, and commitment to the community (time of living).  The 40-item of natural disaster preparedness awareness questionnaire was developed based on these thirteen dimensions. Data were collected from 595 participants in Bangkok metropolitan and vicinity. Cronbach's alpha was used to examine the internal consistency for this instrument. Reliability coefficient was 97, which was highly acceptable.  Exploratory Factor Analysis where principal axis factor analysis was employed. The Kaiser-Meyer-Olkin index of sampling adequacy was .973, indicating that the data represented a homogeneous collection of variables suitable for factor analysis. Bartlett's test of Sphericity was significant for the sample as Chi-Square = 23168.657, df = 780, and p-value < .0001, which indicated that the set of correlations in the correlation matrix was significantly different and acceptable for utilizing EFA. Factor extraction was done to determine the number of factors by using principal component analysis and varimax.  The result revealed that four factors had Eigen value greater than 1 with more than 60% cumulative of variance. Factor #1 had Eigen value of 22.270, and factor loadings ranged from 0.626-0.760. This factor was named as "Knowledge and Attitude of Natural Disaster Preparedness".  Factor #2 had Eigen value of 2.491, and factor loadings ranged from 0.596-0.696. This factor was named as "Training and Development". Factor #3 had Eigen value of 1.821, and factor loadings ranged from 0.643-0.777. This factor was named as "Building Experiences about Disaster Preparedness".  Factor #4 had Eigen value of 1.365, and factor loadings ranged from 0.657-0.760. This was named as "Family and Community". The results of this study provided support for the reliability and construct validity of natural disaster preparedness awareness for utilizing with populations similar to sample employed.

Keywords: natural disaster, disaster preparedness, disaster awareness, Thai citizens

Procedia PDF Downloads 348
8516 Developing the Principal Change Leadership Non-Technical Competencies Scale: An Exploratory Factor Analysis

Authors: Tai Mei Kin, Omar Abdull Kareem

Abstract:

In light of globalization, educational reform has become a top priority for many countries. However, the task of leading change effectively requires a multidimensional set of competencies. Over the past two decades, technical competencies of principal change leadership have been extensively analysed and discussed. Comparatively, little research has been conducted in Malaysian education context on non-technical competencies or popularly known as emotional intelligence, which is equally crucial for the success of change. This article provides a validation of the Principal Change Leadership Non-Technical Competencies (PCLnTC) Scale, a tool that practitioners can easily use to assess school principals’ level of change leadership non-technical competencies that facilitate change and maximize change effectiveness. The overall coherence of the PCLnTC model was constructed by incorporating three theories: a)the change leadership theory whereby leading change is the fundamental role of a leader; b)competency theory in which leadership can be taught and learned; and c)the concept of emotional intelligence whereby it can be developed, fostered and taught. An exploratory factor analysis (EFA) was used to determine the underlying factor structure of PCLnTC model. Before conducting EFA, five important pilot test approaches were conducted to ensure the validity and reliability of the instrument: a)reviewed by academic colleagues; b)verification and comments from panel; c)evaluation on questionnaire format, syntax, design, and completion time; d)evaluation of item clarity; and e)assessment of internal consistency reliability. A total of 335 teachers from 12 High Performing Secondary School in Malaysia completed the survey. The PCLnTCS with six points Liker-type scale were subjected to Principal Components Analysis. The analysis yielded a three-factor solution namely, a)Interpersonal Sensitivity; b)Flexibility; and c)Motivation, explaining a total 74.326 per cent of the variance. Based on the results, implications for instrument revisions are discussed and specifications for future confirmatory factor analysis are delineated.

Keywords: exploratory factor analysis, principal change leadership non-technical competencies (PCLnTC), interpersonal sensitivity, flexibility, motivation

Procedia PDF Downloads 400
8515 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 271
8514 Enhancing Metaverse Security: A Multi-Factor Authentication Scheme

Authors: R. Chinnaiyaprabhu, S. Bharanidharan, V. Dharsana, Rajalavanya

Abstract:

The concept of the Metaverse represents a potential evolution in the realm of cyberspace. In the early stages of Web 2.0, we observed a proliferation of online pseudonyms or 'nyms,' which increased the prevalence of fake accounts and made it challenging to establish unique online identities for various roles. However, in the era of Web 3.0, particularly in the context of the Metaverse, an individual's digital identity is intrinsically linked to their real-world identity. Consequently, actions taken in the Metaverse can carry significant consequences in the physical world. In light of these considerations, we propose the development of an innovative authentication system known as 'Metasec.' This system is designed to enhance security for digital assets, online identities, avatars, and user accounts within the Metaverse. Notably, Metasec operates as a password less authentication solution, relying on a multifaceted approach to security, encompassing device attestation, facial recognition, and pattern-based security keys.

Keywords: metaverse, multifactor authentication, security, facial recognition, patten password

Procedia PDF Downloads 36
8513 Developing E-Psychological Instrument for an Effective Flood Victims' Mental Health Management

Authors: A. Nazilah

Abstract:

Floods are classified among sudden onset phenomenon and the highest natural disasters happen in Malaysia. Floods have a negative impact on mental health. Measuring the psychopathology symptoms among flood victims is an important step for intervention and treatment. However, there is a gap of a valid, reliable and an efficient instrument to measure flood victims' mental health, especially in Malaysia. This study aims to replicate the earlier studies of developing e-Psychological Instrument for Flood Victims (e-PIFV). The e-PIFV is a digital self-report inventory that has 84 items with 4 dimension scales namely stress, anxiety, depression, and trauma. Two replicated studies have been done to validate the instrument using expert judgment method. Results showed that content coefficient validity for each sub-scale of the instrument ranging from moderate to very strong validity. In study I, coefficient values of stress was 0.7, anxiety was 0.9, depression was 1.0, trauma was 0.6 and overall was 0.8. In study II, the coefficient values for two subscales and overall scale were increased. The coefficient value of stress was 0.8, anxiety was 0.9, depression was 1.0, trauma was 0.8 and overall was 0.9. This study supports the theoretical framework and provides practical implication in the field of clinical psychology and flood management.

Keywords: developing e-psychological instrument, content validity, instrument, mental health management, flood victims, psychopathology, validity

Procedia PDF Downloads 102
8512 Attitudes of Secondary School Students towards Science and Technical Education in Yauri Metropolis Kebbi State, Nigeria

Authors: Ibrahim Alhassan Libata

Abstract:

This study was carried out to assess attitude of secondary school students towards science and technical education in Yauri metropolis, Kebbi State, Nigeria. The population of the study was 200. Proportionate random sampling method was used in selecting 132 as sample size. Science and technical education is the most powerful forces for change in the world today, and students who hope to have a hand in shaping a better future must participate for their advancements. Four Null hypotheses were generated to guide the conduct of the study, questionnaire was the only instrument used in the study; the instrument was subjected to test-retest reliability. The reliability index of the instrument was 0.69. Overall scores of the Students were analyzed and a mean score was determined, the mean score of students was 85. There were no significant differences between the attitudes of male and female students towards science and technical education. The results also revealed that there was significant difference between the attitude of boding and day school students towards science and technical education, personality constraints of students is one factor militating against the participation of students in science and technical education, socio-economic status of the parents over the years have been the dominant factor of student’s inadequate representation in the field of science and technical education. Based on the findings of this study, the researcher recommended that teachers should motivate students, which they can do through their teaching styles and by showing them the relevance of the learning topics to their everyday lives. Government and the school management should create the learning environment that helps motivate students not only to come to classes but also want to learn and enjoy learning science and technical education, establishment of more Science and Technical Colleges education, more Public enlightenment campaigns to motivate parents and the entire community to support their children in studying science and technical education.

Keywords: attitude, students, science, Yauri

Procedia PDF Downloads 217
8511 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 183
8510 State of Emergency in Turkey (July 2016-July 2018): A Case of Utilization of Law as a Political Instrument

Authors: Neslihan Cetin

Abstract:

In this study, we will aim to analyze how the period of the state of emergency in Turkey lead to gaps in law and the formation of areas in which there was a complete lack of supervision. The state of emergency that was proclaimed following the coup attempt of July 15, 2016, continued until July 18, 2018, that is to say, 2 years, without taking into account whether the initial circumstances persisted. As part of this work, we claim that the state of emergency provided the executive power with important tools for governing, which it took constant use. We can highlight how the concern for security at the center of the basic considerations of the people in a city was exploited as a foundation by the military power in Turkey to interfere in the political, legal, and social spheres. The constitutions of 1924, 1961, and 1982 entrusted the army with the role of protector of the integrity of the state. This became an instrument at the hands of the military to legitimize their interventions in the name of public security. Its interventions in the political field are indeed politically motivated. The constitution, the legislative, and regulatory systems are modified and monopolized by the military power that dominates the legislative, regulatory, and judicial power, leading to a state of exception. With the political convulsions over a decade, the government was able to usurp the instrument called the state of exception. In particular, the decree-laws of the state of emergency, which the executive makes frequent and generally abusive use, became instruments in the hands of the government to take measures that it wishes to escape from the rules and the pre-established control mechanisms. Thus the struggle against the political opposition becomes more unbalanced and destructive. To this must also be added the ineffectiveness of ex-post controls and domestic remedies. This research allows us to stress how a legal concept, such as ‘the state of emergency’ can be politically exploited to make it a legal weapon that continues to produce victims.

Keywords: constitutional law, state of emergency, rule of law, instrumentalization of law

Procedia PDF Downloads 116
8509 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory

Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa

Abstract:

Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.

Keywords: laboratory, physical protection system, security culture, security function

Procedia PDF Downloads 145
8508 Labour Migration in Russia in the Context of Russia’s National Security Problem

Authors: A. V. Dolzhikova

Abstract:

The article deals with the problems of labour migration in the Russian Federation in the context of Russia's national security, provides the typology of migrants residing in the territory of the Russian Federation and analyzes the risk factors. The author considers the structure of migration flows and the terms of legal, economic and socio-cultural adaptation of migrants in the Russian Federation. In this connection, the status of the Russian migration legislation, the concept of the comprehensive exam in Russian as a foreign language, history of Russia and the basics of the Russian Federation legislation for foreign citizens which was introduced in Russia on January 1, 2015, are analyzed. The article discloses its role as the adaptation strategy and the factor of Russia's migration security.

Keywords: comprehensive exam, migration policy, migration legislation, Russia's national security

Procedia PDF Downloads 336
8507 Blockchain Solutions for IoT Challenges: Overview

Authors: Amir Ali Fatoorchi

Abstract:

Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems.

Keywords: Blockchain, security, data security, IoT

Procedia PDF Downloads 178
8506 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 364
8505 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme

Authors: Cavidan Yakupoglu, Kurt Rohloff

Abstract:

In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.

Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE

Procedia PDF Downloads 117
8504 Developing a Multidimensional Adjustment Scale

Authors: Nadereh Sohrabi Shegefti, Siamak Samani

Abstract:

Level of adjustment is the first index to check mental health. The aim of this study was developing a valid and reliable Multidimensional Adjustment Scale (MAS). The sample consisted of 150 college students. Multidimensional adjustment scale and Depression, Anxiety, and stress scale (DASS) were used in this study. Principle factor analysis, Pearson correlation coefficient, and Cornbach's Alpha were used to check the validity and reliability of the MAS. Principle component factor analysis showed a 5 factor solution for the MAS. Alpha coefficients for the MAS sub scales were ranged between .69 to .83. Test-retest reliability for MAS was .88 and the mean of sub scales- total score correlation was .88. All these indexes revealed an acceptable reliability and validity for the MAS. The MAS is a short assessment instrument with good acceptable psychometric properties to use in clinical filed.

Keywords: psychological adjustment, psychometric properties, validity, Pearson correlation

Procedia PDF Downloads 596
8503 Validity and Reliability of Competency Assessment Implementation (CAI) Instrument Using Rasch Model

Authors: Nurfirdawati Muhamad Hanafi, Azmanirah Ab Rahman, Marina Ibrahim Mukhtar, Jamil Ahmad, Sarebah Warman

Abstract:

This study was conducted to generate empirical evidence on validity and reliability of the item of Competency Assessment Implementation (CAI) Instrument using Rasch Model for polythomous data aided by Winstep software version 3.68. The construct validity was examined by analyzing the point-measure correlation index (PTMEA), in fit and outfit MNSQ values; meanwhile the reliability was examined by analyzing item reliability index. A survey technique was used as the major method with the CAI instrument on 156 teachers from vocational schools. The results have shown that the reliability of CAI Instrument items were between 0.80 and 0.98. PTMEA Correlation is in positive values, in which the item is able to distinguish between the ability of the respondent. Statistical data obtained shows that out of 154 items, 12 items from the instrument suggested to be omitted. This study is hoped could bring a new direction to the process of data analysis in educational research.

Keywords: competency assessment, reliability, validity, item analysis

Procedia PDF Downloads 410
8502 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 470
8501 Positive Psychology and the Social Emotional Ability Instrument (SEAI)

Authors: Victor William Harris

Abstract:

This research is a validation study of the Social Emotional Ability Inventory (SEAI), a multi-dimensional self-report instrument informed by positive psychology, emotional intelligence, social intelligence, and sociocultural learning theory. Designed for use in tandem with the Social Emotional Development (SEAD) theoretical model, the SEAI provides diagnostic-level guidance for professionals and individuals interested in investigating, identifying, and understanding social, emotional strengths, as well as remediating specific social competency deficiencies. The SEAI was shown to be psychometrically sound, exhibited strong internal reliability, and supported the a priori hypotheses of the SEAD. Additionally, confirmatory factor analysis provided evidence of goodness of fit, convergent and divergent validity, and supported a theoretical model that reflected SEAD expectations. The SEAI and SEAD hold potentially far-reaching and important practical implications for theoretical guidance and diagnostic-level measurement of social, emotional competency across a wide range of domains. Strategies researchers, practitioners, educators, and individuals might use to deploy SEAI in order to improve quality of life outcomes are discussed.

Keywords: emotion, emotional ability, positive psychology-social emotional ability, social emotional ability, social emotional ability instrument

Procedia PDF Downloads 208
8500 COVID-19: A Thread to the Security System of Foreign Investment

Authors: Mehdi Ghaemi

Abstract:

In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.

Keywords: foreign investment, FPS standard, host country, public health, COVID-19

Procedia PDF Downloads 69
8499 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 248
8498 Secured Power flow Algorithm Including Economic Dispatch with GSDF Matrix Using LabVIEW

Authors: Slimane Souag, Amel Graa, Farid Benhamida

Abstract:

In this paper we present a new method for solving the secured power flow problem by the economic dispatch using DC power flow method and Generation Shift Distribution Factor (GSDF), in this work we create a graphical interface in LabVIEW as a virtual instrument. Hence the dc power flow reduces the power flow problem to a set of linear equations, which make the iterative calculation very fast and the GSFD matrix present the effects of single and multiple generator MW change on the transmission line. The effectiveness of the method developed is identified through its application to an IEEE-14 bus test system. The calculation results show excellent performance of the proposed method, in regard to computation time and quality of results.

Keywords: electrical power system security, economic dispatch, sensitivity matrix, labview

Procedia PDF Downloads 456
8497 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 452
8496 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria

Authors: Anyaogu Paul

Abstract:

The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.

Keywords: child labour, family income, national security, survey research

Procedia PDF Downloads 391
8495 Assessment of Politeness Behavior on Communicating: Validation of Scale through Exploratory Factor Analysis and Confirmatory Factor Analysis

Authors: Abdullah Pandang, Mantasiah Rivai, Nur Fadhilah Umar, Azam Arifyadi

Abstract:

This study aims to measure the validity of the politeness behaviour scale and obtain a model that fits the scale. The researcher developed the Politeness Behavior on Communicating (PBC) scale. The research method uses descriptive quantitative by developing the PBC scale. The population in this study were students in three provinces, namely South Sulawesi, West Sulawesi, and Central Sulawesi, recorded in the 2022/2023 academic year. The sampling technique used stratified random sampling by determining the number of samples using the Slovin formula. The sample of this research is 1200 students. This research instrument uses the PBC scale, which consists of 5 (five) indicators: self-regulation of compensation behaviour, self-efficacy of compensation behaviour, fulfilment of social expectations, positive feedback, and no strings attached. The PBC scale consists of 34 statement items. The data analysis technique is divided into two types: the validity test on the correlated item values and the item reliability test referring to Cronbach's and McDonald's alpha standards using the JASP application. Furthermore, the data were analyzed using confirmatory factor analysis (CFA) and exploratory factor analysis (EFA). The results showed that the adaptation of the Politeness Behavior on Communicating (PBC) scale was on the Fit Index with a chi-square value (711,800/375), RMSEA (0.53), GFI (0.990), CFI (0.987), GFI (0.985).

Keywords: polite behavior in communicating, positive communication, exploration factor analysis, confirmatory factor analysis

Procedia PDF Downloads 76