Search results for: threat avoidance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1261

Search results for: threat avoidance

1171 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 183
1170 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level

Authors: Afroza Akhter Tina

Abstract:

This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.

Keywords: communicative strategies, competency, attitude, frequency

Procedia PDF Downloads 382
1169 Experimental Pain Study Investigating the Distinction between Pain and Relief Reports

Authors: Abeer F. Almarzouki, Christopher A. Brown, Richard J. Brown, Anthony K. P. Jones

Abstract:

Although relief is commonly assumed to be a direct reflection of pain reduction, it seems to be driven by complex emotional interactions in which pain reduction is only one component. For example, termination of a painful/aversive event may be relieving and rewarding. Accordingly, in this study, whether terminating an aversive negative prediction of pain would be reflected in a greater relief experience was investigated, with a view to separating apart the effects of the manipulation on pain and relief. We use aversive conditioning paradigm to investigate the perception of relief in an aversive (threat) vs. positive context. Participants received positive predictors of a non-painful outcome which were presented within either a congruent positive (non-painful) context or an incongruent threat (painful) context that had been previously conditioned; trials followed by identical laser stimuli on both conditions. Participants were asked to rate the perceived intensity of pain as well as their perception of relief in response to the cue predicting the outcome. Results demonstrated that participants reported more pain in the aversive context compared to the positive context. Conversely, participants reported more relief in the aversive context compares to the neutral context. The rating of relief in the threat context was not correlated with pain reports. The results suggest that relief is not dependant on pain intensity. Consistent with this, relief in the threat context was greater than that in the positive expectancy condition, while the opposite pattern was obtained for the pain ratings. The value of relief in this study is better appreciated in the context of an impending negative threat, which is apparent in the higher pain ratings in the prior negative expectancy compared to the positive expectancy condition. Moreover, the more threatening the context (as manifested by higher unpleasantness/higher state anxiety scores), the more the relief is appreciated. The importance of the study highlights the importance of exploring relief and pain intensity in monitoring separately or evaluating pain-related suffering. The results also illustrate that the perception of painful input may largely be shaped by the context and not necessarily stimulus-related.

Keywords: aversive context, pain, predictions, relief

Procedia PDF Downloads 97
1168 Effects of Vitexin on Scopolamine-Induced Memory Impairment in Rats

Authors: Mehdi Sheikhi, Marjan Nassiri-Asl, Esmail Abbasi, Mahsa Shafiee

Abstract:

Various synthetic derivatives of natural flavonoids are known to have neuroactive properties. The present study aimed to investigate the effects of vitexin (5, 7, 4-trihydroxyflavone-8-glucoside), a flavonoid found in such plants as tartary buckwheat sprouts, wheat leaves phenolome, Mimosa pudica Linn and Passiflora spp, on scopolamine-induced memory impairment in rats. To achieve this goal, we assessed the effects of vitexin on memory retrieval in the presence or absence of scopolamine using a step-through passive avoidance trial. In the first part of the study, vitexin (25, 50, and 100 μM) was administered intracerebroventricularly (i.c.v.) before acquisition trials. In the second part, vitexin, at the same doses, was administered before scopolamine (10 μg, i.c.v.) and before the acquisition trials. During retention tests, vitexin (100 μM) in the absence of scopolamine significantly increased the stepthrough latencies compared to scopolamine. In addition, vitexin (100 μM) significantly reversed the shorter step-through latencies induced by scopolamine (P < 0.05). These results indicate that vitexin has a potential role in enhancing memory retrieval. A possible mechanism is modulation of cholinergic receptors; however, other mechanisms may be involved in its effects in acute exposure.

Keywords: flavonoid, memory retrieval, passive avoidance, scopolamine, vitexin

Procedia PDF Downloads 318
1167 Approach-Avoidance and Intrinsic-Extrinsic Motivation of Adolescent Computer Games Players

Authors: Monika Paleczna, Barbara Szmigielska

Abstract:

The period of adolescence is a time when young people are becoming more and more active and conscious users of the digital world. One of the most frequently undertaken activities by them is computer games. Young players can choose from a wide range of games, including action, adventure, strategy, and logic games. The main aim of this study is to answer the question about the motivation of teenage players. The basic question is what motivates young players to play computer games and what motivates them to play a particular game. Fifty adolescents aged 15-17 participated in the study. They completed a questionnaire in which they determined what motivates them to play, how often they play computer games, and what type of computer games they play most often. It was found that entertainment and learning English are among the most important motives. The most important specific features related to a given game are the knowledge of its previous parts and the ability to play for free. The motives chosen by the players will be described in relation to the concepts of internal and external as well as approach and avoidance motivation. An additional purpose of this study is to present data concerning preferences regarding the type of games and the amount of time they spend playing.

Keywords: computer games, motivation, game preferences, adolescence

Procedia PDF Downloads 150
1166 Analysing Implementation of Best Practices in Construction Contracts for Dispute Avoidance

Authors: K. C. Iyer, Yogita Manan Bindal, Sumit Kumar Bakshi

Abstract:

Disputes and litigation are becoming inherent to the construction industry in India, and despite construction being one of the major drivers of growth, there have not been many reforms in the government construction contracts. Many of the disputes arising from the government contracts, can be avoided by the proper drafting of contracts and their administration. This study aims to 1) identify the best practices in the construction contract as reviewed from the research papers and additional literature on contract management, 2) obtain perspectives from the industry experts on the implementation of these best practices with regards to likely challenges and relative benefits for implementing the best practices in construction contracts. The best practices for disputes arising due to delay events have been identified through extensive literature survey. The industry perspective is gathered by way of a questionnaire survey to understand the applicability of the identified best practices, the benefits that are likely to be obtained and the challenges that are likely to be faced in the implementation of these practices. The study concludes with the recommended best practices that can be implemented based on the perspectives obtained from the survey. The findings of the study can be used by the industry professionals while drafting construction contracts with a view to avoid disputes related to delay events.

Keywords: best practices, construction contract, delay, dispute avoidance

Procedia PDF Downloads 158
1165 Cognitive Function and Coping Behavior in the Elderly: A Population-Based Cross-Sectional Study

Authors: Ryo Shikimoto, Hidehito Niimura, Hisashi Kida, Kota Suzuki, Yukiko Miyasaka, Masaru Mimura

Abstract:

Introduction: In Japan, the most aged country in the world, it is important to explore predictive factors of cognitive function among the elderly. Coping behavior relieves chronic stress and improves lifestyle, and consequently may reduce the risk of cognitive impairment. One of the most widely investigated frameworks evaluated in previous studies is approach-oriented and avoidance-oriented coping strategies. The purpose of this study is to investigate the relationship between cognitive function and coping strategies among elderly residents in urban areas of Japan. Method: This is a part of the cross-sectional Arakawa geriatric cohort study for 1,099 residents (aged 65 to 86 years; mean [SD] = 72.9 [5.2]). Participants were assessed for cognitive function using the Mini-Mental State Examination (MMSE) and diagnosed by psychiatrists in face-to-face interviews. They were then investigated for their each coping behaviors and coping strategies (approach- and avoidance-oriented coping) using stress and coping inventory. A multiple regression analysis was used to investigate the relationship between MMSE score and each coping strategy. Results: Of the 1,099 patients, the mean MMSE score of the study participants was 27.2 (SD = 2.7), and the numbers of the diagnosis of normal, mild cognitive impairment (MCI), and dementia were 815 (74.2%), 248 (22.6%), and 14 (1.3%), respectively. Approach-oriented coping score was significantly associated with MMSE score (B [partial regression coefficient] = 0.12, 95% confidence interval = 0.05 to 0.19) after adjusting for confounding factors including age, sex, and education. Avoidance-oriented coping did not show a significant association with MMSE score (B [partial regression coefficient] = -0.02, 95% confidence interval = -0.09 to 0.06). Conclusion: Approach-oriented coping was clearly associated with neurocognitive function in the Japanese population. A future longitudinal trial is warranted to investigate the protective effects of coping behavior on cognitive function.

Keywords: approach-oriented coping, cognitive impairment, coping behavior, dementia

Procedia PDF Downloads 103
1164 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 242
1163 Design, Analysis and Obstacle Avoidance Control of an Electric Wheelchair with Sit-Sleep-Seat Elevation Functions

Authors: Waleed Ahmed, Huang Xiaohua, Wilayat Ali

Abstract:

The wheelchair users are generally exposed to physical and psychological health problems, e.g., pressure sores and pain in the hip joint, associated with seating posture or being inactive in a wheelchair for a long time. Reclining Wheelchair with back, thigh, and leg adjustment helps in daily life activities and health preservation. The seat elevating function of an electric wheelchair allows the user (lower limb amputation) to reach different heights. An electric wheelchair is expected to ease the lives of the elderly and disable people by giving them mobility support and decreasing the percentage of accidents caused by users’ narrow sight or joystick operation errors. Thus, this paper proposed the design, analysis and obstacle avoidance control of an electric wheelchair with sit-sleep-seat elevation functions. A 3D model of a wheelchair is designed in SolidWorks that was later used for multi-body dynamic (MBD) analysis and to verify driving control system. The control system uses the fuzzy algorithm to avoid the obstacle by getting information in the form of distance from the ultrasonic sensor and user-specified direction from the joystick’s operation. The proposed fuzzy driving control system focuses on the direction and velocity of the wheelchair. The wheelchair model has been examined and proven in MSC Adams (Automated Dynamic Analysis of Mechanical Systems). The designed fuzzy control algorithm is implemented on Gazebo robotic 3D simulator using Robotic Operating System (ROS) middleware. The proposed wheelchair design enhanced mobility and quality of life by improving the user’s functional capabilities. Simulation results verify the non-accidental behavior of the electric wheelchair.

Keywords: fuzzy logic control, joystick, multi body dynamics, obstacle avoidance, scissor mechanism, sensor

Procedia PDF Downloads 107
1162 Adaptive Envelope Protection Control for the below and above Rated Regions of Wind Turbines

Authors: Mustafa Sahin, İlkay Yavrucuk

Abstract:

This paper presents a wind turbine envelope protection control algorithm that protects Variable Speed Variable Pitch (VSVP) wind turbines from damage during operation throughout their below and above rated regions, i.e. from cut-in to cut-out wind speed. The proposed approach uses a neural network that can adapt to turbines and their operating points. An algorithm monitors instantaneous wind and turbine states, predicts a wind speed that would push the turbine to a pre-defined envelope limit and, when necessary, realizes an avoidance action. Simulations are realized using the MS Bladed Wind Turbine Simulation Model for the NREL 5 MW wind turbine equipped with baseline controllers. In all simulations, through the proposed algorithm, it is observed that the turbine operates safely within the allowable limit throughout the below and above rated regions. Two example cases, adaptations to turbine operating points for the below and above rated regions and protections are investigated in simulations to show the capability of the proposed envelope protection system (EPS) algorithm, which reduces excessive wind turbine loads and expectedly increases the turbine service life.

Keywords: adaptive envelope protection control, limit detection and avoidance, neural networks, ultimate load reduction, wind turbine power control

Procedia PDF Downloads 106
1161 Cross Cultural Challenges in International Projects: A Comparative Study between Indian and French

Authors: Niranjani Ruba Pandian

Abstract:

In today’s multicultural global business community, most of the businesses and industries are linked with various countries in which different nationalities have different roles and responsibilities throughout the project. The purpose of this research is to examine the cross-cultural challenges between Indian and French and the ways to minimize these challenges to manage effectively the cross-cultural aspect of human resources for the success of global business in an automotive industry. The conducted study utilized quantitative methodology to analyze the data on Indian and French employees' perceptions of 6 cultural dimensions such as power versus distance, individualism versus collectivism, masculinity versus femininity, uncertainty versus avoidance, pragmatic versus normative and indulgence versus restraint. Employees of 4 multinational companies filled in the questionnaire based on the 5-point Likert scale to present quantitative results. The data was analysed with the correlation and multiple regression statistical analyses. It was found that Indian and French have major gap in uncertainty versus avoidance followed by individualism versus collectivism. However, this article highlights the way to minimize these gaps by adopting certain sequenced methodologies.

Keywords: automotive industry, cross cultural challenges, globalization, global business

Procedia PDF Downloads 443
1160 Design of Target Selection for Pedestrian Autonomous Emergency Braking System

Authors: Tao Song, Hao Cheng, Guangfeng Tian, Chuang Xu

Abstract:

An autonomous emergency braking system is an advanced driving assistance system that enables vehicle collision avoidance and pedestrian collision avoidance to improve vehicle safety. At present, because the pedestrian target is small, and the mobility is large, the pedestrian AEB system is faced with more technical difficulties and higher functional requirements. In this paper, a method of pedestrian target selection based on a variable width funnel is proposed. Based on the current position and predicted position of pedestrians, the relative position of vehicle and pedestrian at the time of collision is calculated, and different braking strategies are adopted according to the hazard level of pedestrian collisions. In the CNCAP standard operating conditions, comparing the method of considering only the current position of pedestrians and the method of considering pedestrian prediction position, as well as the method based on fixed width funnel and variable width funnel, the results show that, based on variable width funnel, the choice of pedestrian target will be more accurate and the opportunity of the intervention of AEB system will be more reasonable by considering the predicted position of the pedestrian target and vehicle's lateral motion.

Keywords: automatic emergency braking system, pedestrian target selection, TTC, variable width funnel

Procedia PDF Downloads 131
1159 Identifying Reforms Required in Construction Contracts from Resolved Disputed Cases

Authors: K. C. Iyer, Yogita Manan Bindal, Sumit Kumar Bakshi

Abstract:

The construction industry is plagued with disputes and litigation in India with many stalled projects seeking dispute resolution. This has an adverse effect on the performance and overall project delivery and impacts future investments within the industry. While construction industry is the major driver of growth, there has not been major reforms in the government construction contracts. The study is aimed at identifying the proactive means of dispute avoidance, focusing on reforms required within the construction contracts, by studying 49 arbitration awards of construction disputes. The claims presented in the awards are aggregated to study the causes linked to the contract document and are referred against the prospective recommendation and practices as surveyed from literature review of research papers. Within contract administration, record keeping has been a major concern as they are required by the parties to substantiate the claims or the counterclaims and therefore are essential in any dispute redressal process. The study also observes that the right judgment is inhibited when the record keeping is improper and due to lack of coherence between documents, the dispute resolution period is also prolonged. The finding of the research will be relevant to industry practitioners in contract drafting with a view to avoid disputes.

Keywords: construction contract, contract administration, contract management, dispute avoidance

Procedia PDF Downloads 236
1158 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 322
1157 Probabilistic Study of Impact Threat to Civil Aircraft and Realistic Impact Energy

Authors: Ye Zhang, Chuanjun Liu

Abstract:

In-service aircraft is exposed to different types of threaten, e.g. bird strike, ground vehicle impact, and run-way debris, or even lightning strike, etc. To satisfy the aircraft damage tolerance design requirements, the designer has to understand the threatening level for different types of the aircraft structures, either metallic or composite. Exposing to low-velocity impacts may produce very serious internal damages such as delaminations and matrix cracks without leaving visible mark onto the impacted surfaces for composite structures. This internal damage can cause significant reduction in the load carrying capacity of structures. The semi-probabilistic method provides a practical and proper approximation to establish the impact-threat based energy cut-off level for the damage tolerance evaluation of the aircraft components. Thus, the probabilistic distribution of impact threat and the realistic impact energy level cut-offs are the essential establishments required for the certification of aircraft composite structures. A new survey of impact threat to civil aircraft in-service has recently been carried out based on field records concerning around 500 civil aircrafts (mainly single aisles) and more than 4.8 million flight hours. In total 1,006 damages caused by low-velocity impact events had been screened out from more than 8,000 records including impact dents, scratches, corrosions, delaminations, cracks etc. The impact threat dependency on the location of the aircraft structures and structural configuration was analyzed. Although the survey was mainly focusing on the metallic structures, the resulting low-energy impact data are believed likely representative to general civil aircraft, since the service environments and the maintenance operations are independent of the materials of the structures. The probability of impact damage occurrence (Po) and impact energy exceedance (Pe) are the two key parameters for describing the statistic distribution of impact threat. With the impact damage events from the survey, Po can be estimated as 2.1x10-4 per flight hour. Concerning the calculation of Pe, a numerical model was developed using the commercial FEA software ABAQUS to backward estimate the impact energy based on the visible damage characteristics. The relationship between the visible dent depth and impact energy was established and validated by drop-weight impact experiments. Based on survey results, Pe was calculated and assumed having a log-linear relationship versus the impact energy. As the product of two aforementioned probabilities, Po and Pe, it is reasonable and conservative to assume Pa=PoxPe=10-5, which indicates that the low-velocity impact events are similarly likely as the Limit Load events. Combing Pa with two probabilities Po and Pe obtained based on the field survey, the cutoff level of realistic impact energy was estimated and valued as 34 J. In summary, a new survey was recently done on field records of civil aircraft to investigate the probabilistic distribution of impact threat. Based on the data, two probabilities, Po and Pe, were obtained. Considering a conservative assumption of Pa, the cutoff energy level for the realistic impact energy has been determined, which provides potential applicability in damage tolerance certification of future civil aircraft.

Keywords: composite structure, damage tolerance, impact threat, probabilistic

Procedia PDF Downloads 283
1156 Investigating Knowledge Management in Financial Organisation: Proposing a New Model for Implementing Knowledge Management

Authors: Ziba R. Tehrani, Sanaz Moayer

Abstract:

In the age of the knowledge-based economy, knowledge management has become a key factor in sustainable competitive advantage. Knowledge management is discovering, acquiring, developing, sharing, maintaining, evaluating, and using right knowledge in right time by right person in organization; which is accomplished by creating a right link between human resources, information technology, and appropriate structure, to achieve organisational goals. Studying knowledge management financial institutes shows the knowledge management in banking system is not different from other industries but because of complexity of bank’s environment, the implementation is more difficult. The bank managers found out that implementation of knowledge management will bring many advantages to financial institutes, one of the most important of which is reduction of threat to lose subsequent information of personnel job quit. Also Special attention to internal conditions and environment of the financial institutes and avoidance from copy-making in designing the knowledge management is a critical issue. In this paper, it is tried first to define knowledge management concept and introduce existing models of knowledge management; then some of the most important models which have more similarities with other models will be reviewed. In second step according to bank requirements with focus on knowledge management approach, most major objectives of knowledge management are identified. For gathering data in this stage face to face interview is used. Thirdly these specified objectives are analysed with the response of distribution of questionnaire which is gained through managers and expert staffs of ‘Karafarin Bank’. Finally based on analysed data, some features of exiting models are selected and a new conceptual model will be proposed.

Keywords: knowledge management, financial institute, knowledge management model, organisational knowledge

Procedia PDF Downloads 333
1155 Member States 'Perception of Threat' to Migration Crises as a Determinant Factor of Change in Cooperation: A Comparison between the Yugoslav Migration Crisis and the Syrian Refugees' Crisis

Authors: Diego Caballero Vélez

Abstract:

In 1997 the Schengen Convention was incorporated in the mainstream of EU law by the Amsterdam Treaty. It came into effect in 1999 with the abolition of internal border controls in the EU, a milestone in the European integration project. In the meantime, due to the Yugoslav wars, nearly 700,000 asylum applications were filed in the European countries provoking a major refugee crisis. During this period, the opening of Eastern Europe fostered more cooperation and policy-making at the EU level in migration issues. Currently, a similar migratory crisis is taking place in Europe. The Syrian war has caused the most massive influx of immigrants in Europe since World War II. Nevertheless, the EU is adopting different migration policies from those implemented during the Yugoslav migration crisis. The current crisis has not led to a common European position but national responses have been offered on migration policies and responsibility for border security and asylum-seekers. A lot of factors can explain this change from a cooperation scenario to a no cooperation one, such as the economic crisis, but this research is focused on the premise that 'threat perception' lies at the core of some states grand strategies towards migration and it also influences in multilateral or unilateral responses. Migration rests at the nexus of three dimensions of security, including geopolitical interests, material production, and internal security. According to some scholars, migration policy is an 'integral instrument' of state grand strategy in that context. Political integration at the EU might be altered with the emergence of existential threats. In other words, some areas of the European cooperation can be transformed when a 'critical juncture' occurs, for instance a migration crisis. In that instance, Member states could see migration as a matter of threat that modifies their national interests and willingness to embrace international cooperation. This research will focus on EU Member states´ perceptions of the 90´s migration crisis and the current one. The goal is to evaluate to what extent the perceptions of threat are one of the main factors for explaining the transition from a cooperation scenario to a no-cooperation one in European asylum and security policies. To analyze threat perception in both migration crisis, some relevant Member states are treated as cases of study and a comparative analysis is carried out based on public opinion polls, public and policy discourse in migration, voting practices and deconstruction of the migration policies themselves both at EU level and a national one.

Keywords: cooperation, migration crisis, national responses, threat perception

Procedia PDF Downloads 214
1154 Predictors of Rumination and Co-Rumination: The Role of Attachment Dimensions, Self-Compassion and Self-Esteem

Authors: Asli Bugay Sökmez, Elif Manuoglu, Muhammet Coskun, Nebi̇ Sümer

Abstract:

Decades of research have searched out the relationships between self-esteem, self-compassion, attachment, and rumination. Yet, unique mediated and moderated predictor power of these correlates of rumination has not been discovered yet. Moreover, no study examined whether these critical correlates of rumination specifically predict sub-dimensions of rumination that are reflection and brooding. Despite the broad range of study regarding predictors of rumination, a huge gap exists for the possible predictors of co-rumination. To address these issues, the present study mainly investigates the predictor roles of self-esteem, self-compassion, and attachment on dimensions of rumination (brooding and reflection) and co-rumination, especially the mediating and moderating roles of these predictor variables. 510 undergraduate and graduate students from different departments of a major state university in Turkey participated in the current study. The mean age of the participants was 21.8 (SD = 2.29) and 57.3% of them were female. Overall analyses revealed that self-compassion and attachment anxiety was negatively correlated with both co-rumination and brooding. Surprisingly, while attachment anxiety significantly and positively predicted reflection, attachment avoidance predicted reflection negatively. Moreover, anxiety, avoidance and self-compassion all were found to be significant predictor variables of co-rumination. Finally, as expected, a moderating effect of self-compassion revealed in predicting reflection and showed as a mediator in predicting brooding and co-rumination. All findings were discussed in light of the related literature.

Keywords: rumination, co-rumination, attachment, self-compassion, self-esteem

Procedia PDF Downloads 122
1153 Understanding and Measuring Stigma, Barriers and Attitudes Associated with Seeking Psychological Help Among Young Adults in Czech Republic

Authors: Tereza Hruskova

Abstract:

200 million people globally experience serious mental health problems, and only one third seek professional help, and help-seeking is described as a last resort. Adolescents and young adults have a high prevalence of mental illness. Mental stigma is a key element in the decision to seek help and is divided into (i) self-stigma (self-stigmatization), including internal beliefs, low self-esteem, and lower quality of life, and (ii) public stigma (social stigma) containing stereotypes, beliefs and society's disapproval of help-seeking having a negative effect on help-seeking and our attitudes. Previous research has mainly focused on examining the construct of help seeking, avoidance, and delaying separately and trying to find out why people do not seek help in time and what obstacles stand in the way. Barriers are not static and may change over time and the stage of help-seeking. Attitudes are closely related to self-stigma and social stigma and predict whether a person will seek help. Barriers (stigmatization, a sense of humiliation, insufficient recognition of the problem, preferences, solving it alone, and distrust of a professional) and facilitators (previous experience with mental problems, social support, and help from others) are factors influencing help-seeking. The current research on the Czech population of young adults responds to the gap between a person with mental health problems and actually seeking professional help. The aim of the study is to describe in detail the individual constructs and factors, to understand the person seeking help, and to define possible obstacles on this path of seeking help. A sample of approximately 250 participants (age 18-35) would take part in the online questionnaire, conducted in May-June 2023, and would be administered a demographic questionnaire and four scales measuring attitudes (Attitudes Toward Seeking Professional Psychological Help – Short form), barriers (Barrier to Help Seeking Scale), self-stigma (Self Stigma of Seeking Help) and stigmatization (Perceptions of Stigmatization by Others for seeking help). Firstly, all four scales would be translated into the Czech language. The aim is (I) to determine the validity and reliability of the Czech translation of the scales, (II) to examine the factors of the scales on the Czech population and compare them retrospectively with the results of reliability and validity from the original language of the scales and (III) to examine the connections between attitudes towards seeking, avoidance or delaying the search for professional psychological help due to the demographic and individual differences of the participants, barriers, self-stigmatization and social stigmatization. We expect to carry out the first study on the given topic in the Czech Republic, to identify and better understand the factors leading to the avoidance of seeking professional help and to reveal the relationships between stigmatization, attitudes and barriers leading to the avoidance or postponement of seeking professional help. The belief is to find out whether the Czech population of young adults differs from the data found on the foreign population in individual constructs, as cultural differences in individual countries were found.

Keywords: mental health, stigma, problems, seeking psychological help

Procedia PDF Downloads 49
1152 A Study on How Insider Fraud Impacts FinTechs

Authors: Claire Norman-Maillet

Abstract:

Insider fraud is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including Board members and part-time staff. Insider fraud can take many forms, including an employee working alone or in collusion with others. Insider fraud has been on the rise since the Coronavirus pandemic and shows no signs of slowing. The objective of the research is to better understand how FinTechs are impacted by insider fraud and, therefore, how to stop it. This research will make an original contribution to the financial crime field, given the timing of this research being intertwined with the cost-of-living crisis in the UK and the global Coronavirus pandemic. This research focuses on insider fraud within FinTechs specifically, as they are arguably a modern phenomenon in the financial institutions space and have cutting-edge technology at their disposal. To achieve the research objective, the researcher held semi-structured interviews with over 20 individuals who deal with insider fraud perpetration in a practitioner, recruitment, or advisory capacity. The interviews were subsequently transcribed and analysed thematically. Main findings in the research suggest that FinTechs are arguably in the best position to combat insider fraud, given their focus on using recent technologies, as this can be used to combat the threat. However, insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer, as well as the idea that external fraud is the most important threat. The research concludes that, whilst the technology is understandably prioritised by FinTechs for providing an agreeable customer experience, insider fraud needs to be given a platform upon which to be recognised as a significant threat to any company. Moreover, insider fraud needs to be given the same level of weighting and attention by Executive Committees and Boards as the customer experience.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, Coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 31
1151 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 111
1150 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware

Authors: Azita Ramezani, Atousa Ramezani

Abstract:

In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.

Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection

Procedia PDF Downloads 35
1149 COVID-19: A Thread to the Security System of Foreign Investment

Authors: Mehdi Ghaemi

Abstract:

In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.

Keywords: foreign investment, FPS standard, host country, public health, COVID-19

Procedia PDF Downloads 69
1148 Pose-Dependency of Machine Tool Structures: Appearance, Consequences, and Challenges for Lightweight Large-Scale Machines

Authors: S. Apprich, F. Wulle, A. Lechler, A. Pott, A. Verl

Abstract:

Large-scale machine tools for the manufacturing of large work pieces, e.g. blades, casings or gears for wind turbines, feature pose-dependent dynamic behavior. Small structural damping coefficients lead to long decay times for structural vibrations that have negative impacts on the production process. Typically, these vibrations are handled by increasing the stiffness of the structure by adding mass. That is counterproductive to the needs of sustainable manufacturing as it leads to higher resource consumption both in material and in energy. Recent research activities have led to higher resource efficiency by radical mass reduction that rely on control-integrated active vibration avoidance and damping methods. These control methods depend on information describing the dynamic behavior of the controlled machine tools in order to tune the avoidance or reduction method parameters according to the current state of the machine. The paper presents the appearance, consequences and challenges of the pose-dependent dynamic behavior of lightweight large-scale machine tool structures in production. The paper starts with the theoretical introduction of the challenges of lightweight machine tool structures resulting from reduced stiffness. The statement of the pose-dependent dynamic behavior is corroborated by the results of the experimental modal analysis of a lightweight test structure. Afterwards, the consequences of the pose-dependent dynamic behavior of lightweight machine tool structures for the use of active control and vibration reduction methods are explained. Based on the state of the art on pose-dependent dynamic machine tool models and the modal investigation of an FE-model of the lightweight test structure, the criteria for a pose-dependent model for use in vibration reduction are derived. The description of the approach for a general pose-dependent model of the dynamic behavior of large lightweight machine tools that provides the necessary input to the aforementioned vibration avoidance and reduction methods to properly tackle machine vibrations is the outlook of the paper.

Keywords: dynamic behavior, lightweight, machine tool, pose-dependency

Procedia PDF Downloads 430
1147 A Diagnostic Comparative Analysis of on Simultaneous Localization and Mapping (SLAM) Models for Indoor and Outdoor Route Planning and Obstacle Avoidance

Authors: Seyed Esmail Seyedi Bariran, Khairul Salleh Mohamed Sahari

Abstract:

In robotics literature, the simultaneous localization and mapping (SLAM) is commonly associated with a priori-posteriori problem. The autonomous vehicle needs a neutral map to spontaneously track its local position, i.e., “localization” while at the same time a precise path estimation of the environment state is required for effective route planning and obstacle avoidance. On the other hand, the environmental noise factors can significantly intensify the inherent uncertainties in using odometry information and measurements obtained from the robot’s exteroceptive sensor which in return directly affect the overall performance of the corresponding SLAM. Therefore, the current work is primarily dedicated to provide a diagnostic analysis of six SLAM algorithms including FastSLAM, L-SLAM, GraphSLAM, Grid SLAM and DP-SLAM. A SLAM simulated environment consisting of two sets of landmark locations and robot waypoints was set based on modified EKF and UKF in MATLAB using two separate maps for indoor and outdoor route planning subject to natural and artificial obstacles. The simulation results are expected to provide an unbiased platform to compare the estimation performances of the five SLAM models as well as on the reliability of each SLAM model for indoor and outdoor applications.

Keywords: route planning, obstacle, estimation performance, FastSLAM, L-SLAM, GraphSLAM, Grid SLAM, DP-SLAM

Procedia PDF Downloads 410
1146 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 357
1145 Securitization of Illegal Fishing Cases in Natuna Waters by Indonesian Government: Study Case of Chinese Vessels Shootouts 2016

Authors: Ray Maximillian, Idil Syawfi

Abstract:

Indonesia’s Exclusive Economic Zone and the infamous China’s nine-dash line are intersected in Natuna waters. Even though from Indonesia perspective, that line does not possess any legal basis, China treat that line as their national boundaries, therefore allowing Chinese fishermen to fish in the area. Under President Joko Widodo leadership, Indonesia which now focusing to suppress illegal fishing cases while emphasizing their maritime sovereignty is facing an imminent threat from China’s presence in Natuna. Tension between these countries spiked after three incident happened on 2016, especially after Indonesian navy shot Chinese fishermen vessel that suspected doing illegal fishing activity. This action seen as an attempt to secure Indonesia’s law enforcement in their waters after several months before such attempt was intervened by Chinese coast guard. Indonesia tries to securitize this issue to justify the shooting they done to Chinese vessels. In the process of securitization, it is imperative to identify the existential threat that leads to implementation of emergency measures which responded by units in the cases. Chinese coast guard presence in Natuna perceived as an existential threat to Indonesia, therefore, responded by shooting to Chinese vessels on the next encounter. This action then responded by Chinese government who said that there is overlapping claim between them and Indonesia in Natuna.

Keywords: China, illegal fishing, Indonesia, natuna, securitization

Procedia PDF Downloads 190
1144 Protecting Privacy and Data Security in Online Business

Authors: Bilquis Ferdousi

Abstract:

With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.

Keywords: privacy, data security, legislation, online business

Procedia PDF Downloads 74
1143 In vitro And in vivo Anticholinesterase Activity of the Volatile Oil of the Aerial Parts of Ocimum Basilicum L. and O. africanum Lour. Growing in Egypt

Authors: Mariane G. Tadros, Shahira M. Ezzat, Maha M. Salama, Mohamed A. Farag

Abstract:

In this study, the in vitro anticholinesterase activity of the volatile oils of both O. basilicum and O. africanum was investigated and both samples showed significant activity. As a result, the major constituents of the two oils were isolated using several column chromatography. Linalool, 1,8-cineol and eugenol were isolated from the volatile oil of O. basilicum and camphor was isolated from the volatile oil of O. africanum. The anticholinesterase activity of the isolated compounds were also evaluated where 1,8-cineol showed the highest inhibitory activity followed by camphor. To confirm these activities, learning and memory enhancing effects were tested in mice. Memory impairment was induced by scopolamine, a cholinergic muscarinic receptor antagonist. Anti-amnesic effects of both volatile oils and their terpenoids were investigated by the passive avoidance task in mice. We also examined their effects on brain acetylcholinesterase activity. Results showed that scopolamine-induced cognitive dysfunction was significantly attenuated by administration of the volatile oils and their terpenoids, eugenol and camphor, in the passive avoidance task and inhibited brain acetylcholinesterase activity. These results suggest that O. basilicum and O. africanum volatile oils can be good candidates for further studies on Alzheimer’s disease via their acetylcholinesterase inhibitory actions.

Keywords: Ocimum baselicum, Ocimum africanum, GC/MS analysis, anticholinesterase

Procedia PDF Downloads 427
1142 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 235