Search results for: security culture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6028

Search results for: security culture

5788 Programming Systems in Implementation of Process Safety at Chemical Process Industry

Authors: Maryam Shayan

Abstract:

Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.

Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology

Procedia PDF Downloads 338
5787 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 412
5786 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 23
5785 A Model of Knowledge Management Culture Change

Authors: Reza Davoodi, Hamid Abbasi, Heidar Norouzi, Gholamabbas Alipourian

Abstract:

A dynamic model shaping a process of knowledge management (KM) culture change is suggested. It is aimed at providing effective KM of employees for obtaining desired results in an organization. The essential requirements for obtaining KM culture change are determined. The proposed model realizes these requirements. Dynamics of the model are expressed by a change of its parameters. It is adjusted to the dynamic process of KM culture change. Building the model includes elaboration and integration of interconnected components. The “Result” is a central component of the model. This component determines a desired organizational goal and possible directions of its attainment. The “Confront” component engenders constructive confrontation in an organization. For this reason, the employees are prompted toward KM culture change with the purpose of attaining the desired result. The “Assess” component realizes complex assessments of employee proposals by management and peers. The proposals are directed towards attaining the desired result in an organization. The “Reward” component sets the order of assigning rewards to employees based on the assessments of their proposals.

Keywords: knowledge management, organizational culture change, employee, result

Procedia PDF Downloads 377
5784 Modeling Water Inequality and Water Security: The Role of Water Governance

Authors: Pius Babuna, Xiaohua Yang, Roberto Xavier Supe Tulcan, Bian Dehui, Mohammed Takase, Bismarck Yelfogle Guba, Chuanliang Han, Doris Abra Awudi, Meishui Lia

Abstract:

Water inequality, water security, and water governance are fundamental parameters that affect the sustainable use of water resources. Through policy formulation and decision-making, water governance determines both water security and water inequality. Largely, where water inequality exists, water security is undermined through unsustainable water use practices that lead to pollution of water resources, conflicts, hoarding of water, and poor sanitation. Incidentally, the interconnectedness of water governance, water inequality, and water security has not been investigated previously. This study modified the Gini coefficient and used a Logistics Growth of Water Resources (LGWR) Model to access water inequality and water security mathematically, and discussed the connected role of water governance. We tested the validity of both models by calculating the actual water inequality and water security of Ghana. We also discussed the implications of water inequality on water security and the overarching role of water governance. The results show that regional water inequality is widespread in some parts. The Volta region showed the highest water inequality (Gini index of 0.58), while the central region showed the lowest (Gini index of 0.15). Water security is moderately sustainable. The use of water resources is currently stress-free. It was estimated to maintain such status until 2132 ± 18, when Ghana will consume half of the current total water resources of 53.2 billion cubic meters. Effectively, water inequality is a threat to water security, results in poverty, under-development heightens tensions in water use, and causes instability. With proper water governance, water inequality can be eliminated through formulating and implementing approaches that engender equal allocation and sustainable use of water resources.

Keywords: water inequality, water security, water governance, Gini coefficient, moran index, water resources management

Procedia PDF Downloads 96
5783 The Social Perception of National Security Risks: A Comparative Perspective

Authors: Nicula Valentin, Andrei Virginia

Abstract:

Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.

Keywords: risk perception, Q-sort method, national security hazards, individual beliefs

Procedia PDF Downloads 278
5782 Influence of Security Attributes in Component-Based Software Development

Authors: Somayeh Zeinali

Abstract:

A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.

Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component

Procedia PDF Downloads 518
5781 Development of an Indigenous Motorized Planter for the Sustainable Production of Grain Crops in Nigeria

Authors: Babatunde Oluwamayokun Soyoye

Abstract:

This technology, whose development revolves round culture, tradition, and prevailing needs of the people, is seen as a solution in promoting development in poor rural communities in many parts of Nigeria. The research was based on one of the food security agenda of the Federal Government of Nigeria by developing a motorized multi-grain crop planter suitable for planting operations in tropical soils. The ergonomic design is tailored towards the ease of planting operations for would-be users, improve crop yields and profitability by minimizing the cost of production. Some properties of the grain crops were determined and were used to develop and assemble the locally-made motorized planter. These properties were used in establishing the design criteria of various components of the planter. The geometric mean diameter of the maize, cowpea, groundnut, and soybean were 8.26 mm, 8.72 mm, 9.51 mm and 6.52 mm respectively, with respective groove depths of 8 mm, 7 mm, 9 mm and 6 mm. The results obtained from the evaluation of the planter confirmed that the planter has a uniform discharge and application rates. The field capacity of the planter was determined to be 0.187 ha/h. Also, the average performance efficiency of the planter was 95.5%, with the average discharge and application rates of 7.86 kg/h and 42.1 kg/ha, respectively. The motorized multi-grain planter can be used in increasing food production, reduce time, cost of production, and can become a major tool to fast-track the food security agenda of the government of Nigeria.

Keywords: design and fabrication, food security, grain crop, motorized planter

Procedia PDF Downloads 106
5780 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 329
5779 The Socio-Cultural Aspect of Food in Ceremonial Turkey

Authors: Suheyla Saritas

Abstract:

No matter who we are or where we live, our lives revolve around food, which is much more than a merely sustenance. As a part of the human culture, food carries complex significance and symbolic meanings. Turkish people attribute great value to food and its usage specifically tied to rites of passages of human life. Traditions, especially the ones practiced during rites of passages, such as birth, circumcisions, weddings and funerals, have always been accompanied by food in Turkish culture. Since food celebrates and symbolizes human progress in life in the culture, it also surrounds by aspects of belief, custom, magic, ritual and religion and has always been used in ceremonial context during such rites. Even though that context may be different depending on the religious, economic and social nuances of the various Turkish regions, like wheat, meat and bread, certain kinds of food play key roles during Turkish rites, generally upholding traditions. This paper highlights the sociocultural aspect of food in the rites of passages in the Turkish culture. The importance of this work also is how the ceremonial food represents the identity of Turkish people.

Keywords: food, culture, rites of passages, ritual and identity

Procedia PDF Downloads 387
5778 Interdependencies of Culture, Economy, and Resource Availability ’ as 'Determinants of Spatial Inequality in Cities

Authors: Shahna K. C., Belay Menon, Taniya Joshua

Abstract:

As globalization in the era progresses, spatial inequality is turned to be one of the major concerns; the main intent of the Study is to focus on if there is any interdependencies of culture economy and resource availability on creating spatial inequality in cities. The paper tries to establish the relationship between spatial inequality – the quality of life – the DETERMINANT TRIAD (culture, economy, resource availability). Slum area of Dharavi is taken to evaluate the influence of these determinants on the quality of life as spatial inequality is evident there. Interdependencies of the determinants on creating spatial inequality is evaluated. For this, It is understood that these three parameters, i.e., culture, economy, resource availability, are determinants of urban design, each from the social, economic, environmental domains of sustainability, respectively. And there are studies individually on each of these aspects, how they determine the urban spaces, and how influential on the whole process of urbanization. Now extending the study towards the interdependencies of these three so as to find out how these trilogy shapes the urban form and space.

Keywords: spatial inequality, culture, economy, resource availability, quality of life

Procedia PDF Downloads 176
5777 Quiet Ego and Its Predictors: Comparing Turkey and the US

Authors: Ece Akca, Nebi Sumer, Heidi A. Wayment, Meliksah Demir

Abstract:

This study compares a typical individualistic culture (the USA) and a relatively collectivist culture (Turkey) on the levels and personality predictors of the quiet ego. A total of 248 Turkish and 683 American university students completed the Quiet Ego Scale and the Big Five Personality Inventory. The moderating role of culture on the relationship between quiet ego and personality characteristics was investigated. Openness to experience was the strongest predictor of the quiet ego among both Turkish and the US samples. Whereas extraversion, conscientiousness, and agreeableness significantly predicted quiet ego in the US, lower levels of neuroticism were related to the quiet ego in Turkey. Results revealed that the effect of personality characteristics on quiet ego varied across cultures. Agreeableness in the US and neuroticism in Turkey seemed to be the critical predictor of quite ego. Results were discussed considering cultural values in Turkish and the USA context.

Keywords: agreeableness, big five personality, culture, neuroticism, quiet ego

Procedia PDF Downloads 362
5776 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 428
5775 Positivism Legal Controversy: Dilemma Carok as Madura’s Culture through Indigenous Dispute Settlement in Indonesia

Authors: M. Yasin Al-Arif, Mohammad Faisol Soleh

Abstract:

The Indonesia’s Constitution in Article 18b explained that the state recognizes and respects indigenous peoples and their traditional rights that are guaranteed by the law. Despite already guaranteed its existence; in practice such indigenous law is often considered contrary to positive law by legal experts. It is because of legal positivism paradigm which requires the written law as the main reference for the settlement of legal disputes. Carok’s culture is one of the indigenous cultures of Madura to resolve legal disputes that still thrives until today. Carok’s culture is in outside the legal process, and through a fight between the disputing parties until one dies. On the other hand, the legal positivism does not give place to accommodate Carok as indigenous dispute settlement, until it must be solved through trial. This way of settlement has not been successfully satisfying the indigenous people, thus although it has been done through its verdict in the trial, but Carok still be used by them. From the explanation above, Carok’s culture must be accommodated as the main settlement process and legal process of law as the alternative to the effectiveness of dispute resolution in Madura Indonesia.

Keywords: carok, dispute settlement, legal positivism, madura’s culture

Procedia PDF Downloads 314
5774 The Strategy of Traditional Religious Culture Tourism: Taking Taiwan Minhsiung Infernal Lord Festival for Example

Authors: Ching-Yi Wang

Abstract:

The purpose of this study is to explore strategies for integrate Minhsiung environments and cultural resources for Infernal Lord Festival. Minhsiung Infernal Lord Festival is one of the famous religious event in Chia-Yi County, Taiwan. This religious event and the life of local residents are inseparable. Minhsiung Infernal Lord Festival has a rich cultural ceremonies meaning and sentiment of local concern. This study apply field study, document analysis and interviews to analyze Minhsiung Township’s featured attractions and folklore events. The research results reveal the difficulties and strategies while incorporating culture elements into culture tourism. This study hopes to provide innovative techniques for the purpose of prolonging the feasibility of future development of the tradition folk culture.

Keywords: Taiwan folk culture, Minhsiung Infernal Lord Festival, religious tourism, folklore, cultural tourism

Procedia PDF Downloads 316
5773 Maternal Mind-Mindedness and Its Association with Attachment: The Case of Arab Infants and Mothers in Israel

Authors: Gubair Tarabeh, Ghadir Zriek, David Oppenheim, Avi Sagi-Schwartz, Nina Koren-Karie

Abstract:

Introduction: Mind-Mindedness (MM) focuses on mothers' attunement to their infant's mental states as reflected in their speech to the infant. Appropriate MM comments are associated with attachment security in individualistic Western societies where parents value their children’s autonomy and independence, and may therefore be more likely to engage in mind-related discourse with their children that highlights individual thoughts, preferences, emotions, and motivations. Such discourse may begin in early infancy, even before infants are likely to understand the semantic meaning of parental speech. Parents in collectivistic societies, by contrast, are thought to emphasize conforming to social norms more than individual goals, and this may lead to parent-child discourse that emphasizes appropriate behavior and compliance with social norms rather than internal mental states of the self and the other. Therefore, the examination of maternal MM and its relationship with attachment in Arab collectivistic culture in Israel was of particular interest. Aims of the study: The goal of the study was to examine whether the associations between MM and attachment in the Arab culture in Israel are the same as in Western samples. An additional goal was to examine whether appropriate and non-attuned MM comments could, together, distinguish among mothers of children in the different attachment classifications. Material and Methods: 76 Arab mothers and their infants between the ages of 12 and 18 months were observed in the Strange Situation Procedure (49 secure (B), 11 ambivalent (C), 14 disorganized (D), and 2 avoidant (A) infants). MM was coded from an 8-minute free-play sequence. Results: Mothers of B infants used more appropriate and less non-attuned MM comments than mothers of D infants, with no significant differences with mothers of C infants. Also, mothers of B infants used less non-attuned MM comments than both mothers of D infants and mothers of C infants. In addition, Mothers of B infants were most likely to show the combination of high appropriate and low non-attuned MM comments; Mothers of D infants were most likely to show the combination of high non-attuned and low appropriate MM comments; and a non-significant trend indicated that mothers of C infants were most likely to show a combination of high appropriate and high non-attuned MM comments. Conclusion: Maternal MM was associated with attachment in the Arab culture in Israel with combinations of appropriate and non-attuned MM comments distinguishing between different attachment classifications.

Keywords: attachment, maternal mind-mindedness, Arab culture, collectivistic culture

Procedia PDF Downloads 126
5772 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya

Authors: Sewe Silvanus Odhiambo

Abstract:

Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.

Keywords: COVID-19, corporate governance, firm performance, private security firms

Procedia PDF Downloads 133
5771 International and Intercultural Communication Design: Case Study of Manipulative Advertising

Authors: Faiqa Jalal

Abstract:

The purpose of the following research paper is to discuss the differentiating meanings of culture and how popular culture has maintained a great impact on intercultural and international behavior. The following discussion leads to the notion of communicating cultural impact on behavior through advertising and sub-cultural theory in advertising. Although towards the end of the research, the complexities that develop through the above discussion, lead to the solution that ‘advertising gives meaning to the otherwise meaningless and identical objects through linking them to our basic needs’. In today’s fast paced digital world, it is difficult to define culture, literally, since its meaning tends to shift through series of different perceptions such as ‘how’ and ‘why’ it should be used. This notion can be taken towards another notion of popular culture. It is dependent on ‘attitudes, ideas, images, perspectives and other phenomena within the mainstream of a given culture’. Since popular culture is influenced by mass media, it has a way of influencing an individual’s attitude towards certain topics. For example, tattoos are a form of human decorations, that have historic significance, and a huge spectrum of meanings. Advertising is one aspect of marketing that has evolved from the time when it was ‘production oriented’, up till the time it started using different mediums to make its impact more effective. However, this impact has confused us between our needs and desires. The focus in this paper is ‘we consume to acquire a sense of social identity and status, not just for the sake of consumption’. Every culture owns different expressions, which are then used by advertisers to create its impact on the behavior of people sub-culturally and globally, as culture grows through social interaction. Advertisers furthermore play a smart role in highlighting quality of life ranging from ‘survival to well-being’. Hence, this research paper concludes by highlighting that culture is considered as a ‘basic root’ of any community that also provides solution to certain problems; however, advertisers play their part in manipulating society’s literacy and beliefs by rationalizing how relevant certain products/brands are to their beliefs.

Keywords: mass media, popular culture, production oriented, sub-culture

Procedia PDF Downloads 190
5770 The Impact of Culture in Teaching English, the Case Study of Preparatory School of Sciences and Techniques

Authors: Nouzha Yasmina Soulimane-Benhabib

Abstract:

Language is a medium of communication and a means of expression that is why today the learning of foreign languages especially the English language has become a basic necessity for every student who is ambitious. It is known that culture and language are inseparable and complementary, however, in the process of teaching a foreign language, teachers used to focus mainly on preparing adequate syllabi for ESP students, yet, some parameters should be considered. For instance; the culture of the target language may play an important role since students attitudes towards a foreign language enhance their learning or vice versa. The aim of this study is to analyse how culture could influence the teaching of a foreign language, we have taken the example of the English language as it is considered as the second foreign language in Algeria after French. The study is conducted at the Preparatory School of Sciences and Techniques, Tlemcen where twenty-five students participated in this research. The reasons behind learning the English language are various, and since English is the most widely-spoken language in the world, it is the language of research and education and it is used in many other fields, we have to take into consideration one important factor which is the social distance between the culture of the Algerian learner and the culture of the target language, this gap may lead to a culture shock. Two steps are followed in this research: The first one is to collect data from those students who are studying at the Preparatory School under the form of questionnaire and an interview is submitted to six of them in order to reinforce our research and get effective and precise results, and the second step is to analyse these data taking into consideration the diversity of the learners within this institution. The results obtained show that learners’ attitudes towards the English community and culture are mixed and it may influence their curiosity and attention to learn. Despite of big variance between Algerian and European cultures, some of the students focused mainly on the benefits of the English language since they need it in their studies, research and a future carrier, however, the others manifest their reluctance towards this language and this is mainly due to the profound impact of the English culture which is different from the Algerian one.

Keywords: Algeria, culture, English, impact

Procedia PDF Downloads 360
5769 Relationship between Strategic Management and Organizational Culture in Sport Organization (Case Study: Selected Sport Federations of Islamic Republic of Iran)

Authors: Mohammad Ali Ghareh, Habib Honari, Alireza Ahmadi

Abstract:

The aim of this study was to investigate the relationship between strategic management and organizational culture in sport federations of Islamic Republic of Iran. Strategic management is a set of decisions and actions which define the long term performance of an organization. Organizational culture can be considered as an identity for every organization and somehow gives an identification to organization members. Organizational culture result in a certain commitments in organization members which is more valuable than individual profits and interests. The method of research was descriptive and correlational, conducted as a field study. The statistical population consisted of the employees of 10 sports federations and 170 persons were selected as sample. For data gathering, Barringer and Bluedorn’s strategic management questionnaire (1999) and Sakyn’s organizational culture questionnaire (2001) were used. The reliability of the questionnaires were 0.82 and 0.80 respectively, and the validity was approved by 8 experienced professors in sport management. To analyze data, KS (Kolmogorov–Smirnov) test and Pearson's coefficient were used. The results have shown that there is a significant meaningful relationship between strategic management and organizational culture (p < 0.05, r= 0.62). Beside this, there is a positive relationship between strategic management variables including scanning intensity, planning flexibility, locus of planning, planning horizon, strategic controls, and organizational culture (p < 0.05). Based on this research result it can be derived that strategic management planning and operation in terms of appropriate organizational culture is more applicable. By agreeing on their values and beliefs, adaptation to changes, caring about the individualities, coordination in tasks, modifying the individual and organizational goals, the federations will be able to achieve their strategic goals.

Keywords: strategic management, organizational culture, sports federations, Islamic Republic of Iran

Procedia PDF Downloads 335
5768 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 64
5767 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 24
5766 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 341
5765 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 344
5764 The Relationship between Organizational Culture and the Establishment of Knowledge Management in the Central Insurance of Iran

Authors: Alireza Assareh, Fatemeh Havas Beigi, Mohammad Vafaee Yeganeh

Abstract:

The present study is conducted to investigate the relationship between organizational culture and the establishment of knowledge management in the Central Insurance of Iran. The research results revealed that there is a significant positive relationship between organizational culture and its elements that include management support, organizational belonging, individual innovation, and leadership style and the establishment of knowledge management in the central insurance of Iran and that there isn’t any significant relationship between conflict resolution and the establishment of knowledge management in the central insurance of Iran.

Keywords: organizational culture, knowledge management, central insurance of Iran, individual innovation

Procedia PDF Downloads 455
5763 The Roles of Organizational Culture, Participative Leadership, Employee Satisfaction and Work Motivation Towards Organizational Capabilities

Authors: Inezia Aurelia, Soebowo Musa

Abstract:

Many firms still fail to develop organizational agility. There are more than 40% of organizations think that they are low/not agile in facing market change. Organizational culture plays an important role in developing the organizations to be adaptive in order to manage the VUCA effectively. This study examines the relationships of organizational culture towards participative leadership, employee satisfaction, employee work motivation, organizational learning, and absorptive capacity in developing organizational agility in managing the VUCA environment. 263 employees located from international chemical-based company offices across the globe who have worked for more than three years were the respondents in this study. This study showed that organizational clan culture promotes the development of participative leadership, which it has an empowering effect on people in the organization resulting in employee satisfaction. The study also confirms the role of organizational culture in creating organizational behavior within the organization that fosters organizational learning, absorptive capacity, and organizational agility, while the study also found that the relationship between participative leadership and employee work motivation is not significant.

Keywords: absorptive capacity, employee satisfaction, employee work motivation, organizational agility, organizational culture, organizational learning, participative leadership

Procedia PDF Downloads 92
5762 The Impact of Perception of Transformational Leadership and Factors of Innovation Culture on Innovative Work Behavior in Junior High School's Teacher

Authors: Galih Mediana

Abstract:

Boarding school can helps students to turn all good qualities into habits. The process of forming one's personality can be done in various ways. In addition to gaining general knowledge at school during learning hours, teachers can instill values in students which can be done while in the dormitory when the learning process has ended. This shows the important role that must be played by boarding school’s teachers. Transformational leadership and a culture of innovation are things that can instill innovative behavior in teachers. This study aims to determine the effect of perceptions of transformational leadership and a culture of innovation on innovative work behavior among Islamic boarding school teachers. Respondents in this study amounted to 70 teachers. To measure transformational leadership, a modified measuring tool is used, namely the Multifactor Leadership Questionnaire (MLQ) by Bass (1985). To measure innovative work behavior, a measurement tool based on dimensions from Janssen (2000) is used. The innovation culture in this study will be measured using the innovation culture factor from Dobni (2008). This study uses multiple regression analysis to test the hypothesis. The results of this study indicate that there is an influence of perceptions of transformational leadership and innovation culture factors on innovative work behavior in Islamic boarding school’s teachers by 57.7%.

Keywords: transformational leadership, innovative work behavior, innovation culture, boarding school, teacher

Procedia PDF Downloads 66
5761 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 399
5760 Vantage Point–Visual Culture, Popular Media, and Contemporary Educational Practice

Authors: Elvin Karaaslan Klose

Abstract:

In the field of Visual Culture, Art Education students are given the opportunity to discuss topics of interest that are closer to their own social life and media consumption habits. In contrast to the established corpus of literature and sources about Art History, educators are challenged to find topics and examples from Popular Culture and Contemporary Art that provide familiarity, depth and inspiration for students’ future practice, both as educators as well as artists. In order to establish a welcoming and fruitful discussion environment at the beginning of an introductory Visual Culture Education course with fourth year Art Education students, the class watched and subsequently discussed the movie “Vantage Point”. Using the descriptive method and content analysis; video recordings, discussion transcripts and learning diaries were summarized to highlight students’ critical points of view towards commonly experienced but rarely reflected on topics of Popular and Visual Culture. As an introduction into more theory-based forms of discussion, watching and intensely discussing a movie has proven useful by proving a combination of a familiar media type with an unfamiliar educational context. Resulting areas of interest have served as a starting point for later research, discussion and artistic production in the scope of an introductory Visual Culture Education course.

Keywords: visual culture, critical pedagogy, media literacy, art education

Procedia PDF Downloads 636
5759 Inclusivity in Public Spaces through Architecture: A Case of Transgender Community in India

Authors: Sakshi Dhruve, Ar. Sarang Barbarwar

Abstract:

Public spaces are the locus of activity and interaction in any urban area. Such spaces provide identity to cities, towns or neighborhoods and define the people and culture over there. Inclusiveness is one of the core aspects of public or community spaces. With its humongous population and rapidly expanding urban areas, India needs more inclusivity in public spaces to attain true equitable development. The aim of the paper is to discuss the sensitivity of public spaces in India to the transgender community. The study shows how this community was legally included as ‘Third Gender’ in country’s legislation yet lacks social acceptance and security. It shows the challenges and issues faced by them at public spaces. The community was studied on ethnographic basis to understand their culture, lifestyle, requirements, etc. The findings have indicated towards a social stigma from people and insensitivity in designing of civic spaces. The larger objective of the study is also to provide recommendations on the design aspects and interventions in public places to increase their inclusiveness towards the transgender society.

Keywords: community spaces, ethnographic, stigma, Third Gender community

Procedia PDF Downloads 243