Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1472

Search results for: malware behaviour

1472 Automatic Intelligent Analysis of Malware Behaviour

Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato

Abstract:

In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: malware behaviour, modelling, parsing, search, pattern matching

Procedia PDF Downloads 197
1471 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 73
1470 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 297
1469 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 125
1468 Malware Detection in Mobile Devices by Analyzing Sequences of System Calls

Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes.

Keywords: android, information security, intrusion detection systems, malware, mobile devices

Procedia PDF Downloads 175
1467 Research on Malware Application Patterns of Using Permission Monitoring System

Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim

Abstract:

This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.

Keywords: malware patterns, application permission, application analysis, security

Procedia PDF Downloads 386
1466 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 314
1465 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls

Authors: Xiaoqing Wang, Junfeng Wang, Xiaolan Zhu

Abstract:

Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.

Keywords: android, API Calls, machine learning, permissions combination

Procedia PDF Downloads 203
1464 A Comparative Study of Malware Detection Techniques Using Machine Learning Methods

Authors: Cristina Vatamanu, Doina Cosovan, Dragos Gavrilut, Henri Luchian

Abstract:

In the past few years, the amount of malicious software increased exponentially and, therefore, machine learning algorithms became instrumental in identifying clean and malware files through semi-automated classification. When working with very large datasets, the major challenge is to reach both a very high malware detection rate and a very low false positive rate. Another challenge is to minimize the time needed for the machine learning algorithm to do so. This paper presents a comparative study between different machine learning techniques such as linear classifiers, ensembles, decision trees or various hybrids thereof. The training dataset consists of approximately 2 million clean files and 200.000 infected files, which is a realistic quantitative mixture. The paper investigates the above mentioned methods with respect to both their performance (detection rate and false positive rate) and their practicability.

Keywords: ensembles, false positives, feature selection, one side class algorithm

Procedia PDF Downloads 179
1463 Shopping Behaviour of Ethnic Groups in Indian Culture

Authors: Hari Govindmishra, Sarabjot Singh

Abstract:

The study offers an approach to understand different determinants of shopping behaviour, and the effect of ethnicity on shopping behaviour. The results reveal that the Indian culture is composite in nature and because of which there is no difference between different ethnic groups in their preference for three shopping behaviour determinants, viz., status consciousness, need for touch and companion opinion. The research model investigates the relevant relationship between these constructs by using a structural equation modelling approach, which reveals that status consciousness, need for touch and companion opinion are significant determinants of shopping behaviour. Consequently, the shopping behaviour managers have to understand the collective nature of Indian ethnic consumers in their shopping behaviour.

Keywords: ethnic groups, status consciousness, companion opinion, need for touch, shopping behaviour

Procedia PDF Downloads 219
1462 Personal Characteristics Related to Hasty Behaviour in Korea

Authors: Sun Jin Park, Kyung-Ja Cho

Abstract:

This study focused on characteristics related to hasty behaviour. To investigate the relation between personal characteristics and hasty behaviour, 601 data were collected, 335 males and 256 females answered their own 'social avoidance and distress’, ‘anxiety’, ‘sensation seeking', 'hope', and ' hasty behaviour. And then 591 data were used for the analysis. The factor analysis resulted hasty behaviour consisted of 5 factors, time pressure, isolation, uncomfortable situation, boring condition, and expectation of reward. The result showed anxiety, sensation seeking, and hope related to hasty behaviour. Specifically, anxiety was involved in every hasty behaviour. This result means that psychological tension and worry are related to hasty behaviour in common. 'Social avoidance and distress', 'sensation seeking' and 'hope' influenced on hasty behaviour under time pressure, in isolation, in expectation of rewards respectively. This means that each factor of hasty behaviour has anxiety as its basis, expressed through a varied nature.

Keywords: hasty behaviour, social avoidance and distress, anxiety, sensation seeking, hope

Procedia PDF Downloads 184
1461 Behaviour of Rc Column under Biaxial Cyclic Loading-State of the Art

Authors: L. Pavithra, R. Sharmila, Shivani Sridhar

Abstract:

Columns severe structural damage needs proportioning a significant portion of earthquake energy can be dissipated yielding in the beams. Presence of axial load along with cyclic loading has a significant influence on column. The objective of this paper is to present the analytical results of columns subjected to biaxial cyclic loading.

Keywords: RC column, Seismic behaviour, cyclic behaviour, biaxial testing, ductile behaviour

Procedia PDF Downloads 214
1460 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 264
1459 Assessing the Factors Mediating the Attitude-Behaviour Gap in Sustainable Fashion Consumerism

Authors: A. Bardey, P. James

Abstract:

With the rise of fast-fashion, over consumerism and overproduction, the fashion industry is believed to be one of the most polluting industry. It is a matter of importance today to further understand the factors involved in green consumerism to enhance sustainable fashion. One of the critical issues in also evaluating green consumerism, particularly in fashion, is the attitude-behaviour gap. Indeed, many consumers report a positive attitude towards sustainable fashion consumerism, but this attitude is not always actioned into behaviour. This study aims to further investigate the attitude-behaviour gap in sustainable fashion consumerism. S triangulation of qualitative and quantitative methods was used. Focus groups were used to gain opinions and understanding of the barriers to sustainable fashion consumption. A quantitative online questionnaire was then used to quantify the barriers identified in Study 1 and measure their influence on the attitude-behaviour gap. The results suggest that knowledge about sustainable fashion is the key factor in the attitude-behaviour gap in sustainable fashion consumerism. Accessibility was also identified as a factor, but this relationship is more complex. It is suggested that knowledge is the main factor in the attitude-behaviour gap and that once knowledge is controlled for, accessibility will become a main factor. The present study is the first one to identify the factors involved in sustainable fashion consumerism.

Keywords: fashion, consumer behaviour, sustainable consumerism, attitude-behavioural gap

Procedia PDF Downloads 21
1458 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 217
1457 Serious Gaming for Behaviour Change: A Systematic Review

Authors: Ramy Hammady, Sylvester Arnab

Abstract:

Through the years, there has been a significant increase in the adoption of game-based interventions for nurturing and changing behaviours associated to many disciplines such as health, education and psychology. This is due to the intrinsic motivation that games afford and the substantial impact they can have on the players. Many review papers highlight and measure the effectiveness of game interventions on changing behaviours, however, most of these studies neglected the game features and elements that are involved in the game design process which have an impact of stimulating behaviour change. Therefore, this paper aims to identify game design mechanics and features that are reported to commonly or mostly influence behaviour change during and/or after the interventions. This paper also sheds light on the theories of behaviour change that can inform the game design process, providing insights that can be adapted and adopted by game designers for informing considerations on the use of game features and mechanics for moderating behaviour in their own games.

Keywords: behaviour change, game design, gamification, serious gaming

Procedia PDF Downloads 44
1456 Muslim Consumer Purchase Behavior on Doubtful Halal Packed Food

Authors: Aliffaizi Arsat, Nur Ida Fatihah, Che Shalifullizam

Abstract:

Malaysia is well known as a Muslim country and is quickly becoming a Global Halal-hub of Halal business in promoting Halal food products in both Muslim countries and non-Muslim countries. The objective of this study is to analyse the Muslim consumer purchased behaviour on doubtful Halal packed food by using theory of planned behaviour, to examine the mediating effects between certification, and Muslim consumer purchased behaviour on doubtful Halal packed food. The relevant questionnaires have been distributed in Kuala Selangor. Among the 300 Muslim participants from Kuala Selangor, Selangor, Malaysia, only 107 of them have returned the questionnaire with complete answers. The respondent’s rate was discovered to be at 35.67%. The data have been analysed by using SPSS version 22 and Structural equation modelling Partial Least Square SEM-PLS. There are three dimensions needed to identify Muslim consumer purchased behaviour on doubtful Halal packed food. They are attitude towards behaviour, subjective norm and perceived behavioural. All the results from this study show that the hypothesis has been supported. However, subjective norm had shown that there is a negative relationship towards Muslim consumer purchased behaviour on doubtful Halal packed food.

Keywords: Muslim consumer purchase behaviour, theory planned behaviour, doubtful Halal, certification

Procedia PDF Downloads 146
1455 A Preliminary Investigation on Factors that Influence Malaysian Road User’s Close Following Behaviour

Authors: Siti Hikmah Musthar, Ahmad Saifizul, Mohamed Rehan Karim, Jamilah Mohamad, Farah Fazlinda Mohamad

Abstract:

This paper aims to look at the situation of close following behaviour from the introductory phase before conducting a profound investigation and discussion on this subject. Close following behaviour is known as behaviour during when drivers follow front vehicle with headways lower than two-second. As such, the study of close-following is important due to the degree of negative consequences this behaviour can cause commonly identified as rear-end collision especially when road safety is concerned. This paper presents a preliminary results of close-following behaviour among selected respondents (n=515) in Peninsular Malaysia at selected highways and federal roads. Respondents were interviewed with survey questions tending to examine their actual driving behaviour related to close-following and their perception towards the subject of close following. Selected findings (four selected questions) are discussed in this paper of which identified as essential for deliberation (as opposed to other questions in the survey questionnaire) as far as a preliminary discussion is concerned. Through the statistical test of one-way ANOVA, study found that gender of drivers is not significant to influence drivers to close follow but instead, type of vehicle the respondent drives had more significant to influence drivers to have tendency to perform close following behaviour.

Keywords: close-following, driver behaviour, rear-end crash, road safety

Procedia PDF Downloads 272
1454 Study Regarding Effect of Isolation on Social Behaviour in Mice

Authors: Ritu Shitak

Abstract:

Humans are social mammals, of the primate order. Our biology, behaviour, and pathologies are unique to us. In our desire to understand, reduce solitary confinement one source of information is the many reports of social isolation of other social mammals, especially primates. A behavioural study was conducted in the department of pharmacology at Indira Gandhi Medical College, Shimla in Himachal Pradesh province in India using white albino mice. Different behavioural parameters were observed by using open field, tail suspension, tests for aggressive behaviour and social interactions and the effect of isolation was studied. The results were evaluated and the standard statistics were applied. The said study was done to establish facts that isolation itself impairs social behaviour and can lead to alcohol dependence as well as related drug dependence.

Keywords: social isolation, albino mice, drug dependence, isolation on social behaviour

Procedia PDF Downloads 315
1453 A Study of Lurking Behavior: The Desire Perspective

Authors: Hsiu-Hua Cheng, Chi-Wei Chen

Abstract:

Lurking behaviour is common in information-seeking oriented communities. Transferring users with lurking behaviour to be contributors can assist virtual communities to obtain competitive advantages. Based on the ecological cognition framework, this study proposes a model to examine the antecedents of lurking behaviour in information-seeking oriented virtual communities. This study argues desire for emotional support, desire for information support, desire for performance-approach, desire for performance -avoidance, desire for mastery-approach, desire for mastery-avoidance, desire for ability trust, desire for benevolence trust, and desire for integrity trust effect on lurking behaviour. This study offers an approach to understanding the determinants of lurking behaviour in online contexts.

Keywords: lurking behaviour, the ecological cognition framework, Information-seeking oriented virtual communities, desire

Procedia PDF Downloads 167
1452 Dealing the Disruptive Behaviour amongst Students with Autism through Circus

Authors: K. A. Razhiyah

Abstract:

Disruptive behavior is a problem that is usually associated with those with autism. There is a need to overcome this behavioral problem because the negative impact of this problem does not only effect the social relation of the students but also can cause uneasiness to those around them. This condition will be worse if the techniques used failed to motivate students to change the behaviour. The purpose of this study was to determine the effect of the circus games technique on the disruptive behavior amongst students with autism. The positive results of the intervention that was carried out for three months show the reduction in disruptive behaviour, and also improvement in the turn-taking and focusing ability aspect. Positive changes shown by the students had an encouraging effect and in a way are helping them in the teaching and learning process.

Keywords: autism, desruptive behaviour, circus, effect

Procedia PDF Downloads 103
1451 Stress and Personality as Predictors of Aggressive Behaviour among Nurses of Private Hospitals in Imo State, Nigeria

Authors: Ngozi N. Sydney-Agbor, Chioma N. Ihegboro

Abstract:

Stress and personality as factors influencing nurses’ aggressive behaviour were investigated. The participants comprised of one hundred and fifty nurses selected through convenience sampling technique from four (4) private hospitals in Imo State, Nigeria; namely: Eastern Summit Specialist Clinics and Maternity, St. David Hospital, New Cross Hospital, and Christian Teaching Hospital. The nurses were all females with ages between 20–35 and a mean age of 25.10 years and a standard deviation of 4.15. The participants were administered with Job Related Tension Scale, Type A Behaviour Scale and Buss- Perry Aggressive Behaviour Scale. Two hypotheses were postulated and tested. Cross- sectional survey and Regression Analysis were adopted as design and statistics respectively. Results showed that as stress increased, nurses aggression also increased. Personality also predicted nurses aggressive behaviour with Type As’ exhibiting higher aggression than Type Bs’.The study recommended that hospital management board should improve the welfare of the nurses and their morale should be boosted by involving them in policy-making concerning their welfare and care of their patients, this will help minimise situations capable of increasing aggressive behaviour. There should also be sensitization on the negative impact of aggressive behaviour to patients especially amongst the personality Type A’s who are more susceptible to aggression.

Keywords: aggressive behaviour, nurses, personality, stress

Procedia PDF Downloads 233
1450 Drivers of Energy Saving Behaviour: The Relative Influence of Normative, Habitual, Intentional, and Situational Processes

Authors: Karlijn Van Den Broek, Ian Walker, Christian Klöckner

Abstract:

Campaigns aiming to induce energy-saving behaviour among householders use a wide range of approaches that address many different drivers thought to underpin this behaviour. However, little research has compared the relative importance of the different factors that influence energy behaviour, meaning campaigns are not informed about where best to focus resources. Therefore, this study applies the Comprehensive Action Determination Model (CADM) to compare the role of normative, intentional, habitual, and situational processes on energy-saving behaviour. An online survey on a sample of households (N = 247) measured the CADM variables and the data was analysed using structural equation modelling. Results showed that situational and habitual processes were best able to account for energy saving behaviour while normative and intentional processes had little predictive power. These findings suggest that policymakers should move away from motivating householders to save energy and should instead focus their efforts on changing energy habits and creating environments that facilitate energy saving behaviour. These findings add to the wider development in social and environmental psychology that emphasizes the importance of extra-personal variables such as the physical environment in shaping behaviour.

Keywords: energy consumption, behavioural modelling, environmental psychology theory, habits, values

Procedia PDF Downloads 95
1449 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 150
1448 A Study of the Relationship between Time Management Behaviour and Job Satisfaction of Higher Education Institutes in India

Authors: Sania K. Rao, Feza T. Azmi

Abstract:

The purpose of the present study is to explore the relationship between time management behaviour and job satisfaction of academicians of higher education institutes in India. The analyses of this study were carried out with AMOS (version 20.0); and Confirmatory Factor Analysis (CFA) and Structural Equation Modelling (SEM) were conducted. The factor analysis and findings show that perceived control of time serves as the partial mediating factor to have a significant and positive influence on job satisfaction. Further, at the end, a number of suggestions to improve one’s time management behaviour were provided.

Keywords: time management behaviour, job satisfaction, higher education, India, mediation analysis

Procedia PDF Downloads 261
1447 Inappropriate Job Behaviour and Performance of Employees

Authors: Prakash Singh

Abstract:

The focus of this paper is on the impact of internal organizational factors on the inappropriate job performance and behaviour of employees. The Buffalo City Metropolitan Municipality (BCMM) in South Africa has been experiencing inappropriate job behaviour and performance of some of its workers. They include misappropriation of resources, maladministration, mismanagement, lack of service delivery, fraud, and corruption. Since many workers in this organization have various levels of formal education, such practices are not expected, because the structural-functionalist assumption is that formal education is a solution to societal challenges. Since inappropriate job behaviour and performance continue to be reported in spite of the formal education of BCMM workers, this study seeks to investigate how the two phenomena co-exist. It thus seeks to put into perspective the paradoxical co-existence of formal education with inappropriate job behaviour and performance, by focusing on the BCMM as a case-study. For data collection, this study used the mixed method approach; that is, a combination of qualitative and quantitative methods. The findings revealed structural, systemic and human impediments to labour productivity in the organization. By and large, the unquestioning acceptance of the assumption that the skills shortage is responsible for inappropriate workers’ job performance and behaviour is discredited by the evidence of skilled personnel who exercise their responsibilities in a manner that undermines their occupational requirements. Therefore, this exploratory study affirms that the narrow conception of skills, that privileges job-specific capabilities, is not enough for cultivating a workforce with appropriate job behaviour and performance practices.

Keywords: inappropriate job behaviour, labour productivity, mismanagement, skills shortage

Procedia PDF Downloads 244
1446 The Effectiveness of the Counselling Module in Counseling Interventions for Low Performance Employees

Authors: Hazaila Hassan

Abstract:

This research aims and discusses about the effectiveness of the Psynnova i-Behaviour Modification Technique (iBMT) module towards the change in behaviour of low-performing employees. The purpose of the study is to examine the effectiveness of the Psynnova Module on changing behaviour through five factors among low-performing employees in the public sector. The five main factors/constructs were cognitive enhancement and rationality, emotional stability, attitude alignment and adjustment, social skills development and psycho-spirituality enhancement. In this research, 5 main constructs will be using to indicate behaviour changing performance of the employees after attending The Psynnova Program that using this Psynnova IBMT Module. The respondents are among those who have low scores in terms of annual performance through annual performance value reports and have gone through various stages before being required to attend Psynnova Program. Besides that, the research plan was also to critically examine and understand the change in behaviour among the low-performing employees through the five dimensions in the Psynnova Module. A total of 50 respondent will purposively sampled to be the respondents of this research. This study will use the Experimental Method to One Group Purposively Pre and Post Test using the Time Series Design. Experimental SPSS software version 22.0 will be used to analyse this data. Hopefully this research can see the changing of their behaviour in five factors as an indicator to the respondent after attending the Psynnova Programme. Findings from this study are also used to propose to assisting psychologist to see the changes that occurred to the respondents with the best framework of behaviour changing for them.

Keywords: five dimension of behaviour changing, among adult, low performance, modul effectiveness

Procedia PDF Downloads 47
1445 Teaching Ethical Behaviour: Conversational Analysis in Perspective

Authors: Nikhil Kewalkrishna Mehta

Abstract:

In the past researchers have questioned the effectiveness of ethics training in higher education. Also, there are observations that support the view that ethical behaviour (range of actions)/ethical decision making models used in the past make use of vignettes to explain ethical behaviour. The understanding remains in the perspective that these vignettes play a limited role in determining individual intentions and not actions. Some authors have also agreed that there are possibilities of differences in one’s intentions and actions. This paper makes an attempt to fill those gaps by evaluating real actions rather than intentions. In a way this study suggests the use of an experiential methodology to explore Berlo’s model of communication as an action along with orchestration of various principles. To this endeavor, an attempt was made to use conversational analysis in the pursuance of evaluating ethical decision making behaviour among students and middle level managers. The process was repeated six times with the set of an average of 15 participants. Similarities have been observed in the behaviour of students and middle level managers that calls for understanding that both the groups of individuals have no cognizance of their actual actions. The deliberations derived out of conversation were taken a step forward for meta-ethical evaluations to portray a clear picture of ethical behaviour among participants. This study provides insights for understanding demonstrated unconscious human behaviour which may fortuitously be termed both ethical and unethical.

Keywords: ethical behaviour, unethical behavior, ethical decision making, intentions and actions, conversational analysis, human actions, sensitivity

Procedia PDF Downloads 124
1444 Effect of Hooked-End Steel Fibres Geometry on Pull-Out Behaviour of Ultra-High Performance Concrete

Authors: Sadoon Abdallah, Mizi Fan, Xiangming Zhou

Abstract:

In this study, a comprehensive approach has been adopted to examine in detail the effect of various hook geometries on bond-slip characteristics. Extensive single fibre pull-out tests on ultra-high performance matrix with three different W/B ratios and embedded lengths have been carried out. Test results showed that the mechanical deformation of fibre hook is the main mechanism governing the pull-out behaviour. Furthermore, the quantitative analyses have been completed to compare the hook design contribution of 3D, 4D and 5D fibres to assess overall pull-out behaviour. It was also revealed that there is a strong relationship between the magnitude of hook contribution and W/B ratio (i.e. matrix strength). Reducing the W/B ratio from 0.20 to 0.11 greatly optimizes the interfacial transition zone (ITZ) and enables better mobilization, straightening of the hook and results in bond-slip-hardening behaviour.

Keywords: bobond mechanisms, fibre-matrix interface, hook geometry, pullout behaviour and water to binder ratio

Procedia PDF Downloads 186
1443 The Overload Behaviour of Reinforced Concrete Flexural Members

Authors: Angelo Thurairajah

Abstract:

The parameters governing the overload behaviour of redundant reinforced concrete flexural member is investigated in this paper. The ultimate deflection is readily observable and hence is a better measure of the overload behaviour than the conventionally used ultimate support rotation. The ultimate deflection is dependent on the slenderness (span to depth ratio), the ductility of the reinforcing steel, and the degree of moment redistribution, type of loading, and the end fixity. While sufficient ultimate deflection is necessary to demonstrate the system’s ductility, the softening process by which the concrete cracking form plastic hinges is also a desired characteristic prior to failure. The ultimate deflection exceeding the desired limit is used to benchmark the overload behaviour and evaluate the degree of moment redistribution in this paper. The ultimate deflection ratio and the degree of moment redistribution from the parametric study are in good agreement with the experimental results and the moment redistribution provisions of the Australian Standards AS3600 Concrete Code.

Keywords: ductility, softening, ultimate deflection, overload behaviour, moment redistribution

Procedia PDF Downloads 18