Search results for: proxy efficacy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 304

Search results for: proxy efficacy

304 A New Proxy Signature Scheme As Secure As ElGamal Signature

Authors: Song Han, Elizabeth Chang, Jie Wang, Wanquan Liu

Abstract:

Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.

Keywords: ElGamal signature, Proxy signature, Security, Hash function, Fair privacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1550
303 New Proxy Signatures Preserving Privacy and as Secure as ElGamal Signatures

Authors: Song Han, Elizabeth Chang, Jie Wang, Wanquan Liu

Abstract:

Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.

Keywords: ElGamal signature, proxy signature, security, hash function, fair privacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1769
302 A Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation

Authors: Pei-yih Ting, Dream-Ming Huang, Xiao-Wei Huang

Abstract:

Frequently a group of people jointly decide and authorize a specific person as a representative in some business/poitical occasions, e.g., the board of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, an integrated proxy multi-signature scheme that allows anonymously vetoable delegation is proposed. This protocol integrates mechanisms of private veto, distributed proxy key generation, secure transmission of proxy key, and existentially unforgeable proxy multi-signature scheme. First, a provably secure Guillou-Quisquater proxy signature scheme is presented, then the “zero-sharing" protocol is extended over a composite modulus multiplicative group, and finally the above two are combined to realize the GQ proxy multi-signature with anonymously vetoable delegation. As a proxy signature scheme, this protocol protects both the original signers and the proxy signer. The modular design allows simplified implementation with less communication overheads and better computation performance than a general secure multi-party protocol.

Keywords: GQ proxy signature, proxy multi-signature, zero-sharing protocol, secure multi-party protocol, private veto protocol

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1494
301 An Efficient Proxy Signature Scheme Over a Secure Communications Network

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.

Keywords: Proxy signature, warrant partial delegation, key agreement, discrete logarithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1215
300 Proxisch: An Optimization Approach of Large-Scale Unstable Proxy Servers Scheduling

Authors: Xiaoming Jiang, Jinqiao Shi, Qingfeng Tan, Wentao Zhang, Xuebin Wang, Muqian Chen

Abstract:

Nowadays, big companies such as Google, Microsoft, which have adequate proxy servers, have perfectly implemented their web crawlers for a certain website in parallel. But due to lack of expensive proxy servers, it is still a puzzle for researchers to crawl large amounts of information from a single website in parallel. In this case, it is a good choice for researchers to use free public proxy servers which are crawled from the Internet. In order to improve efficiency of web crawler, the following two issues should be considered primarily: (1) Tasks may fail owing to the instability of free proxy servers; (2) A proxy server will be blocked if it visits a single website frequently. In this paper, we propose Proxisch, an optimization approach of large-scale unstable proxy servers scheduling, which allow anyone with extremely low cost to run a web crawler efficiently. Proxisch is designed to work efficiently by making maximum use of reliable proxy servers. To solve second problem, it establishes a frequency control mechanism which can ensure the visiting frequency of any chosen proxy server below the website’s limit. The results show that our approach performs better than the other scheduling algorithms.

Keywords: Proxy server, priority queue, optimization approach, distributed web crawling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2859
299 A Social Cognitive Investigation in the Context of Vocational Training Performance of People with Disabilities

Authors: Majid A. AlSayari

Abstract:

The study reported here investigated social cognitive theory (SCT) in the context of Vocational Rehab (VR) for people with disabilities. The prime purpose was to increase knowledge of VR phenomena and make recommendations for improving VR services. The sample consisted of 242 persons with Spinal Cord Injuries (SCI) who completed questionnaires. A further 32 participants were Trainers. Analysis of questionnaire data was carried out using factor analysis, multiple regression analysis, and thematic analysis. The analysis suggested that, in motivational terms, and consistent with research carried out in other academic contexts, self-efficacy was the best predictor of VR performance. The author concludes that that VR self-efficacy predicted VR training performance.

Keywords: Social cognitive theory, vocational rehab, self-efficacy, proxy efficacy, people with disabilities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 703
298 Improving the Performance of Proxy Server by Using Data Mining Technique

Authors: P. Jomsri

Abstract:

Currently, web usage make a huge data from a lot of user attention. In general, proxy server is a system to support web usage from user and can manage system by using hit rates. This research tries to improve hit rates in proxy system by applying data mining technique. The data set are collected from proxy servers in the university and are investigated relationship based on several features. The model is used to predict the future access websites. Association rule technique is applied to get the relation among Date, Time, Main Group web, Sub Group web, and Domain name for created model. The results showed that this technique can predict web content for the next day, moreover the future accesses of websites increased from 38.15% to 85.57 %. This model can predict web page access which tends to increase the efficient of proxy servers as a result. In additional, the performance of internet access will be improved and help to reduce traffic in networks.

Keywords: Association rule, proxy server, data mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3012
297 Secure Proxy Signature Based on Factoring and Discrete Logarithm

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.

Keywords: Discrete logarithm, factoring, proxy signature, key agreement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1159
296 Web Proxy Detection via Bipartite Graphs and One-Mode Projections

Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo

Abstract:

With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.

Keywords: Bipartite graph, clustering, one-mode projection, web proxy detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 693
295 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: Proxy signature, fault tolerance, improved RSA, key agreement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1218
294 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: Proxy signature, fault tolerance, RSA, key agreement protocol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1433
293 The Effect of Self-Efficacy on Emotional Intelligence and Well-Being among Tour Guides

Authors: Jennifer Chen-Hua Min

Abstract:

The concept of self-efficacy refers to people’s beliefs in their ability to perform certain behaviors and cope with environmental demands. As such, self-efficacy plays a key role in linking ability to performance. Therefore, this study examines the relationships of self-efficacy, emotional intelligence (EI), and well-being among tour guides, who act as intermediaries between tourists and an unfamiliar environment and significantly influence tourists’ impressions of a destination. Structural equation modeling (SEM) is used to identify the relationships between these factors. The results found that self-efficacy is positively associated with EI and well-being, and a positive link was seen between EI and well-being. This study has practical implications, as the results can facilitate the development of interventions for enhancing tour guides’ EI and self-efficacy competencies, which will benefit them in terms of both enhanced achievements and improved psychological happiness and well-being.

Keywords: Self-efficacy, tour guides, tourism, emotional intelligence.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1408
292 Authenticated Mobile Device Proxy Service

Authors: W. Adi, Khaled E. A. Negm, A. Mabrouk, H. Ghraieb

Abstract:

In the current study we present a system that is capable to deliver proxy based differentiated service. It will help the carrier service node to sell a prepaid service to clients and limit the use to a particular mobile device or devices for a certain time. The system includes software and hardware architecture for a mobile device with moderate computational power, and a secure protocol for communication between it and its carrier service node. On the carrier service node a proxy runs on a centralized server to be capable of implementing cryptographic algorithms, while the mobile device contains a simple embedded processor capable of executing simple algorithms. One prerequisite is needed for the system to run efficiently that is a presence of Global Trusted Verification Authority (GTVA) which is equivalent to certifying authority in IP networks. This system appears to be of great interest for many commercial transactions, business to business electronic and mobile commerce, and military applications.

Keywords: Mobile Device Security, Identity Authentication, Mobile Commerce Security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1579
291 Empowering Student Success: Innovative Modelling Techniques for Enhancing Self-Efficacy in Education

Authors: Aldrin R. Logdat, Marianne Christine Jane B. Capio

Abstract:

The study aimed to investigate the impact of modelling techniques on the self-efficacy of first year Bachelor of Science Major in Hospitality Management (BSHM) college students at City College of Calapan, Oriental Mindoro. The research utilized a ten-point general self-efficacy scale and collected responses from a sample of 107 students across five BSHM sections. The study found that the majority of students had a moderate level of self-efficacy, with 49.53% of total respondents falling within this category. However, 35.51% of students had high self-efficacy, and 14.95% had low self-efficacy levels. The two-tailed t-test for independent samples indicated a significant difference between the mean post-test scores of the experimental and control groups. Furthermore, Wilcoxon test showed that there were significant differences in the experimental group's self-efficacy before and after treatment, while no such difference was observed in the control group. Thus, the modelling technique proved to be effective in improving the self-efficacy levels of first year BSHM college students. Ultimately, the use of modelling techniques helped to elevate students’ self-efficacy levels into higher categories.

Keywords: Self-efficacy, counselling, modelling techniques, hospitality management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 314
290 Next Generation IP Address Transition Mechanism for Web Application System

Authors: Mohd. Khairil Sailan, Rosilah Hassan, Zuhaizal Zulkifli

Abstract:

Internet Protocol version 4 (IPv4) address is decreasing and a rapid transition method to the next generation IP address (IPv6) should be established. This study aims to evaluate and select the best performance of the IPv6 address network transitionmechanisms, such as IPv4/IPv6 dual stack, transport Relay Translation (TRT) and Reverse Proxy with additional features. It is also aim to prove that faster access can be done while ensuring optimal usage of available resources used during the test and actual implementation. This study used two test methods such asInternet Control Message Protocol (ICMP)ping and ApacheBenchmark (AB) methodsto evaluate the performance.Performance metrics for this study include aspects ofaverageaccessin one second,time takenfor singleaccess,thedata transfer speed and the costof additional requirements.Reverse Proxy with Caching featureis the most efficientmechanism because of it simpler configurationandthe best performerfrom the test conducted.

Keywords: IPv4, IPv6, network transition, apache benchmark andreverse proxy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2047
289 How Team Efficacy Beliefs Impact Project Performance: An Empirical Investigation of Team Potency in Capital Projects in the Process Industries

Authors: C. Scott-Young, D. Samson

Abstract:

Team efficacy beliefs show promise in enhancing team performance. Using a model-based quantitative research design, we investigated the antecedents and performance consequences of generalized team efficacy (potency) in a sample of 56 capital projects executed by 15 Fortune 500 companies in the process industries. Empirical analysis of our field survey identified that generalized team efficacy beliefs were positively associated with an objective measure of project cost performance. Regression analysis revealed that team competence, empowering leadership, and performance feedback all predicted generalized team efficacy beliefs. Tests of mediation revealed that generalized team efficacy fully mediated between these three inputs and project cost performance.

Keywords: Team efficacy, Potency, Leadership, Feedback, Project cost.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2112
288 Measuring the Academic Self-Efficacy of Undergraduates: The Role of Gender and Academic Year Experience

Authors: Vilani Sachitra, Udari Bandara

Abstract:

Self-efficacy beliefs provide the foundation for human motivation, well-being, and personal accomplishment. This study measured the levels of academic self-efficacy of undergraduates and also examined whether there any differences in academic self-efficacy with respect to gender and academic year. A structured questionnaire was employed to collect data from undergraduates who enrolled the Bachelor of Commerce degree programme at the University of Sri Jayewardenepura. The outcome of the study revealed that undergraduates lacked the confidence to ask and answer questions, seek help from lecturers, have a study plan and engage in academic discussion and note-taking. However, the findings also demonstrated that undergraduates were not hesitant about seeking help from friends, had confidence on meeting the deadlines and completing the degree within four years. Interestingly, females displayed higher academic self-efficacy than males. Specifically, the data were supported to conclude that there were significant differences in academic self-efficacy with respect to academic years.

Keywords: Academic year, bachelor of commerce undergraduates, gender, self-efficacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2517
287 A Study on the Differences of Academic Achievement, Self-Efficacy, and Engineering Self-Efficacy with Gender of Engineering Students

Authors: Seung hee Kang, Jee-Hong Kim, Ji Seong Jang,

Abstract:

The purpose of this study was to investigate relationships between satisfaction with major and career decision efficacy and career attitude maturity of engineering college students by performing correlation analysis. Gender differences in between satisfaction with major and career decision efficacy and career attitude maturity were also examined by T-test. The results T-test revealed gender differences in only career decision efficacy. Male Students scored significantly higher than did female students on career decision efficacy and satisfaction with major. The results of correlation analysis showed a) satisfaction with major were significantly associated with career decision efficacy, b) satisfaction with major were significantly associated with career attitude maturity, and c) career decision efficacy were significantly associated with career attitude maturity. As a result,we found the importance of satisfaction in engineering college students- major studies when deciding their career.

Keywords: Satisfaction with major, career decision efficacy, career attitude maturity, engineering college student.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1712
286 The Relation of College Students- Process of Study and Creativity: The Mediating Effect of Creative Self-Efficacy

Authors: Chih-Feng Chuang, Shih-Ching Shiu, Chao-Jen Cheng

Abstract:

The purpose of this study was to investigate the relationships among students- process of study, creative self-efficacy and creativity while attending college. A total of 60 students enrolled in Hsiuping Institute of Technology in central Taiwan were selected as samples for the study. The instruments for this study included three questionnaires to explore the aforesaid aspects. This researchers tested creative self-efficacy and process of study, and creativity with Pearson correlation and hierarchical regression analyses. The major findings of this research are (1) the process of study had direct positive predictability on creativity, and (2) the relationship between process of study and creativity is partially mediated by creative self-efficacy.

Keywords: Process of study, Creative self-efficacy, Creativity

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1669
285 The Effect of Contrived Success in Calculation Tasks on the Self-efficacy of Junior High School Students

Authors: Akitoshi Uchida, Kazuo Mori

Abstract:

This study examines whether contrived success on a task closely related to school subjects would promote students- self-efficacy. In our previous study, junior high school students who experienced contrived success on anagram tasks raised their sense of self-efficacy and kept it high for a year.We tried to replicate that study, substituting calculation tasks for the anagrams. One hundred eighteen junior high school students participated in this study, 18 of whom were surreptitiously given easier tasks than their classmates. Those students with easier tasks outperformed their peers and thereby raised their sense of self-efficacy. However, elevated self-efficacy did not persist, falling to the starting level after only three months.

Keywords: self-efficacy, contrived success, junior high schoolstudents, calculation tasks

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1394
284 Factors that Contribute to the Improvement of the Sense of Self-Efficacy of Special Educators in Inclusive Settings in Greece

Authors: Sotiria Tzivinikou, Dimitra Kagkara

Abstract:

Teacher’s sense of self-efficacy can affect significantly both teacher’s and student’s performance. More specific, self-efficacy is associated with the learning outcomes as well as student’s motivation and self-efficacy. For example, teachers with high sense of self-efficacy are more open to innovations and invest more effort in teaching. In addition to this, effective inclusive education is associated with higher levels of teacher’s self-efficacy. Pre-service teachers with high levels of self-efficacy could handle student’s behavior better and more effectively assist students with special educational needs. Teacher preparation programs are also important, because teacher’s efficacy beliefs are shaped early in learning, as a result the quality of teacher’s education programs can affect the sense of self-efficacy of pre-service teachers. Usually, a number of pre-service teachers do not consider themselves well prepared to work with students with special educational needs and do not have the appropriate sense of self-efficacy. This study aims to investigate the factors that contribute to the improvement of the sense of self-efficacy of pre-service special educators by using an academic practicum training program. The sample of this study is 159 pre-service special educators, who also participated in the academic practicum training program. For the purpose of this study were used quantitative methods for data collection and analysis. Teacher’s self-efficacy was assessed by the teachers themselves with the completion of a questionnaire which was based on the scale of Teacher’s Sense of Efficacy Scale. Pre and post measurements of teacher’s self-efficacy were taken. The results of the survey are consistent with those of the international literature. The results indicate that a significant number of pre-service special educators do not hold the appropriate sense of self-efficacy regarding teaching students with special educational needs. Moreover, a quality academic training program constitutes a crucial factor for the improvement of the sense of self-efficacy of pre-service special educators, as additional for the provision of high quality inclusive education.

Keywords: Inclusive education, pre-service, self-efficacy, training program.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 849
283 The Role of Classroom Management Efficacy in Predicting Teacher Burnout

Authors: Yalçın Ozdemir

Abstract:

The purpose of this study was to examine to what extend classroom management efficacy, marital status, gender, and teaching experience predict burnout among primary school teachers. Participants of this study were 523 (345 female, 178 male) teachers who completed inventories. The results of multiple regression analysis indicated that three dimensions of teacher burnout (Emotional Exhaustion, Depersonalization, Personal Accomplishment) were affected differently from four predictor variables. Findings indicated that for the emotional exhaustion, classroom management efficacy, marital status and teaching experience; for depersonalization dimension, classroom management efficacy and marital status and finally for the personal accomplishment dimension, classroom management efficacy, gender, and teaching experience were significant predictors.

Keywords: Classroom management efficacy, teacher burnout.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4882
282 Academic Achievement Differences in Grandiose and Vulnerable Narcissists and the Mediating Effects of Self-Esteem and Self-Efficacy

Authors: Amber L. Dummett, Efstathia Tzemou

Abstract:

Narcissism is a personality trait characterised by selfishness, entitlement, and superiority. Narcissism is split into two subtypes, grandiose narcissism (GN) and vulnerable narcissism (VN). Grandiose narcissists are extraverted and arrogant, while vulnerable narcissists are introverted and insecure. This study investigates the psychological mechanisms that lead to differences in academic achievement (AA) between grandiose and vulnerable narcissists, specifically the mediating effects of self-esteem and self-efficacy. While narcissism is considered to be a negative trait, this study considers if better AA is one of them. Moreover, further research into VN is essential to fully compare and contrast it with GN. We hypothesise that grandiose narcissists achieve higher marks due to having high self-esteem which in turn boosts their sense of self-efficacy. In comparison, we hypothesise that vulnerable narcissists underperform due to having low self-esteem which limits their self-efficacy. Two online surveys were distributed to undergraduate university students. The first was a collection of scales measuring the mentioned dimensions, and the second investigated end of year AA. Sequential mediation analyses were conducted using the gathered data. Our analysis shows that neither self-esteem nor self-efficacy mediate the relationship between GN and AA. GN positively predicts self-esteem but has no relationship with self-efficacy. Self-esteem does not mediate the relationship between VN and AA. VN has a negative indirect effect on AA via self-efficacy, and VN negatively predicts self-esteem. Self-efficacy positively predicts AA. GN does not affect AA through the mediation of self-esteem and then self-efficacy, and neither does VN in this way. Overall, having grandiose or vulnerable narcissistic traits does not affect students’ AA. However, being highly efficacious does lead to academic success, therefore, universities should employ methods to improve the self-efficacy of their students.

Keywords: Academic achievement, grandiose narcissism, self-efficacy, self-esteem, vulnerable narcissism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 372
281 Self-efficacy, Self-reliance, and Motivation inan Asynchronous Learning Environment

Authors: Linda H. Meyer, Carol S. Sternberger

Abstract:

Self-efficacy, self-reliance, and motivation were examined in a quasi-experimental study with 178 sophomore university students. Participants used an interactive cardiovascular anatomy and physiology CD-ROM, and completed a 15-item questionnaire. Reliability of the questionnaire was established using Cronbach-s alpha. Post-tests and course grades were examined using a t-test, demonstrating no significance. Results of an item-to-item analysis of the questionnaire showed overall satisfaction with the teaching methodology and varied results for self-efficacy, selfreliance, and motivation. Kendall-s Tau was calculated for all items in the questionnaire.

Keywords: Asynchronous learning environments, motivation, self-efficacy, self-reliance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3603
280 EUDIS-An Encryption Scheme for User-Data Security in Public Networks

Authors: S. Balaji, M. Rajaram

Abstract:

The method of introducing the proxy interpretation for sending and receiving requests increase the capability of the server and our approach UDIV (User-Data Identity Security) to solve the data and user authentication without extending size of the data makes better than hybrid IDS (Intrusion Detection System). And at the same time all the security stages we have framed have to pass through less through that minimize the response time of the request. Even though an anomaly detected, before rejecting it the proxy extracts its identity to prevent it to enter into system. In case of false anomalies, the request will be reshaped and transformed into legitimate request for further response. Finally we are holding the normal and abnormal requests in two different queues with own priorities.

Keywords: IDS, Data & User authentication, UDIS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1799
279 The Effectiveness of Lesson Study via Learning Communities in Increasing Instructional Self-Efficacy of Beginning Special Educators

Authors: David D. Hampton

Abstract:

Lesson study is used as an instructional technique to promote both student and faculty learning. However, little is known about the usefulness of learning communities in supporting results of lesson study on the self-efficacy and development for tenure-track faculty. This study investigated the impact of participation in a lesson study learning community on 34 new faculty members at a mid-size Midwestern University, specifically regarding implementing lesson study evaluations by new faculty on their reported self-efficacy. Results indicate that participation in a lesson study learning community significantly increased faculty members’ lesson study self-efficacy as well as grant and manuscript production over one academic year. Suggestions for future lesson study around faculty learning communities are discussed.

Keywords: Lesson study, learning community, lesson study self-efficacy, new faculty.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 340
278 Associations between Game Users and Life Satisfaction: Role of Self-Esteem, Self-Efficacy and Social Capital

Authors: Hye Rim Lee, Eui Jun Jeong

Abstract:

This study makes an integrated investigation on how life satisfaction is associated with the Korean game users' psychological variables (self-esteem, game and life self- efficacy), social variables (bonding and bridging social capital), and demographic variables (age, gender). The data used for the empirical analysis came from a representative sample survey conducted in South Korea. Results show that self-esteem and game efficacy were an important antecedent to the degree of users’ life satisfaction. Both bonding social capital and bridging social capital enhance the level of the users’ life satisfaction. The importance of perspectives as well as their implications for the game users and further associated research is explored.

Keywords: Life satisfaction, self-esteem, game efficacy, life-efficacy, social capital.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2716
277 Self-Efficacy Perceptions and the Attitudes of Prospective Teachers towards Assessment and Evaluation

Authors: Münevver Başman, Ezel Tavşancıl

Abstract:

Making the right decisions about students depends on teachers’ use of the assessment and evaluation techniques effectively. In order to do that, teachers should have positive attitudes and adequate self-efficacy perception towards assessment and evaluation. The purpose of this study is to investigate relationship between self-efficacy perception and the attitudes of prospective teachers towards assessment and evaluation and what kind of differences these issues have in terms of a variety of demographic variables. The study group consisted of 277 prospective teachers who have been studying in different departments of Marmara University, Faculty of Education. In this study, ‘Personal Information Form’, ‘A Perceptual Scale for Measurement and Evaluation of Prospective Teachers Self-Efficacy in Education’ and ‘Attitudes toward Educational Measurement Inventory’ are applied. As a result, positive correlation was found between self-efficacy perceptions and the attitudes of prospective teachers towards assessment and evaluation. Considering different departments, there is a significant difference between the mean score of attitudes of prospective teachers and between the mean score of self-efficacy perceptions of them. However, considering variables of attending statistics class and the class types at the graduated high school, there is no significant difference between the mean score of attitudes of prospective teachers and between the mean score of self-efficacy perceptions of them.

Keywords: Attitude, perception, prospective teacher, self-efficacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1516
276 Maternal Health Outcome and Economic Growth in Sub-Saharan Africa: A Dynamic Panel Analysis

Authors: Okwan Frank

Abstract:

Maternal health outcome is one of the major population development challenges in Sub-Saharan Africa. The region has the highest maternal mortality ratio, despite the progressive economic growth in the region during the global economic crisis. It has been hypothesized that increase in economic growth will reduce the level of maternal mortality. The purpose of this study is to investigate the existence of the negative relationship between health outcome proxy by maternal mortality ratio and economic growth in Sub-Saharan Africa. The study used the Pooled Mean Group estimator of ARDL Autoregressive Distributed Lag (ARDL) and the Kao test for cointegration to examine the short-run and long-run relationship between maternal mortality and economic growth. The results of the cointegration test showed the existence of a long-run relationship between the variables considered for the study. The long-run result of the Pooled Mean group estimates confirmed the hypothesis of an inverse relationship between maternal health outcome proxy by maternal mortality ratio and economic growth proxy by Gross Domestic Product (GDP) per capita. Thus increasing economic growth by investing in the health care systems to reduce pregnancy and childbirth complications will help reduce maternal mortality in the sub-region.

Keywords: Economic growth, maternal mortality, pool mean group, Sub-Saharan Africa.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 506
275 Self-Efficacy, Anxiety, and Performance in the English Language among Middle-School Students in English Language Program in Satri Si Suriyothai School, Bangkok

Authors: Christopher C. Anyadubalu

Abstract:

This study investigated students- perception of self efficacy and anxiety in acquiring English language, and consequently examined the relationship existing among the independent variables, confounding variables and students- performances in the English language. The researcher tested the research hypotheses using a sample group of 318 respondents out of the population size of 400 students. The results obtained revealed that there was a significant moderate negative relationship between English language anxiety and performance in English language, but no significant relationship between self-efficacy and English language performance, among the middle-school students. There was a significant moderate negative relationship between English language anxiety and self-efficacy. It was discovered that general self-efficacy and English language anxiety represented a significantly more powerful set of predictors than the set of confounding variables. Thus, the study concluded that English language anxiety and general self-efficacy were significant predictors of English language performance among middle-school students in Satri Si Suriyothai School.

Keywords: Anxiety, English Language Anxiety, Performance inEnglish Language, Self Efficacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4618