• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.038 seconds

The Status of Teachers of Students with Intellectual Disabilities in Practicing Strategies for the Modification of Aggressive Behaviour in Saudi Arabia

  • Alqurashi, Yasser O.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.241-247
    • /
    • 2022
  • This study examines teachers' implementation of strategies to modify the aggressive behavior of students with intellectual disabilities in Saudi Arabia, to determine the obstacles to their real-world execution. In addition, it presents potential approaches to overcome the obstacles to implementing strategies with this group of students. The research employed a qualitative design using semi-structured interviews as a data collection tool and applied a thematic analysis. The study population comprised 35 teachers of students with intellectual disabilities and the study sample numbered six teachers. The interviews were conducted via different methods: three by phone, two face-to face, and one using the Zoom platform. The results revealed inadequate understanding among teachers of intellectual disability and behaviour modification strategies, and this affected their capacity to develop plans that were compatible with the needs of students with intellectual disability. The findings also identified multiple obstacles that impede teachers' implementation of strategies to modify aggressive behaviour among students with intellectual disabilities; the most important being the lack of input from a psychological specialist when developing programs to modify aggressive behaviour. In general, it is apparent that programs for modifying aggressive behaviour are neither structured nor complementary, due to the scarcity of administrators with sufficient knowledge and familiarity with the characteristics and personalities of students with intellectual disabilities. This study presents several recommendations, the most important of which is that teachers of students with intellectual disability should develop themselves through training courses to enable them to deal with these students and create treatment plans that include strategies and clear steps to modify the aggressive behaviour of students with intellectual disabilities. To support teachers, it is also necessary to remove the obstacles facing education centres by providing financial support to create an environment in which they can access the required devices and equipment in their classes.

Study on Fish-friendly Flow Characteristic in Stepped Fishway (계단식 어도에서의 어류 친화적 흐름 특성 연구)

  • Chanjin Jeong;Dong Hyun Kim;Hyung Suk Kim;Seung Oh Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.65-73
    • /
    • 2023
  • Fishways are essential structures that must be installed in rivers to facilitate the movement of fish between upstream and downstream areas. However, the efficiency of fish passage varies depending on the flow conditions within the fishway. Therefore, this study examined the fish-friendly flow characteristics within a stepped fishway at different overflow depths using FLOW-3D, and conducted experiments for model validation. The key parameters affecting fish swimming ability include velocity, turbulent kinetic energy, and energy dissipation rate. These factors were assessed using a simulated fish species, the zacco platypus, to evaluate the suitability of fish-friendly flow condition. It was confirmed that overflow depth significantly influences fish behavior, and an appropriate overflow depth is required for stepped fishway design. The results of this study are expected to serve as fundamental data for the design of stepped fishways in the future.

Computational Impact Analysis of Mental Health and Stress Coping of University Students amid COVID-19 Pandemic

  • Hussain Saleem;Kiran Fatima Mehboob Ali Bana;Samina Saleem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.216-222
    • /
    • 2024
  • Objectives: To compare the levels of anxiety on GAD-7 scale among undergraduates of dental, medical and engineering students during COVID-19. The secondary objectives were to correlate the factors influencing level of anxiety and to assess the coping strategies practiced by undergraduates' students of Karachi duri.ng COVID-19 outbreak. Methodology: The cross-sectional based survey was conducted online among the medical, dental and engineering undergraduates' university students of private sector in Karachi through purposive sampling technique during COVID-19 lock down period. The GAD-7 validated tool was used along with the demographic variables, related stress factors and the coping skills practiced during this outbreak. Total 571 questionnaires were found completed in all sections. The data was analyzed on SPSS version 23. P-value <0.05 was considered as statistically significant. Results: The mental health of the students was assessed on GADS-7 scale as normal, mild, moderate and severe levels. From the total (n=18-3.2%) were normal, (n=132-23.1%) had mild, (n=343-60.1%) had moderate and (n=78-13.7%) had severe anxiety level on GADS-7. The levels of anxiety on GAD-7 scale were all positively associated with the related stressors at p-value of 0.000. Moreover the results depicted that there was a moderate and positive correlation found (0.456, 0.447, 0.512 and 0.452) for all related stressors and GAD-7 scale. Taking breaks from watching, reading news regarding the outbreak of COVID-19, meditation and engaging in some other activities were the most frequently used coping strategies for all levels of anxiety among three cohorts of undergraduates'. Conclusion: Undergraduates has shown 96.9% drastically increased level of anxiety during the outbreak of COVID 19 pandemic. Taking breaks from watching, reading news regarding the outbreak of COVID-19 was the most frequent behavior practiced by the students.

Understanding the Japanese History Problem on Trust in Technology Adoption of Workplace Surveillance Cameras: A Moderated Mediation Model in Korean and Chinese Context (한 · 중 데이터로 살펴본 직장 내 CCTV 도입 신뢰에 대한 일본 과거사의 점화효과 연구: 보안 취약성 지각의 조절된 매개 모형)

  • Sungwon Choi;Lifang Chang;Mijeong Kim;Jonghyun Park
    • Asia-Pacific Journal of Business
    • /
    • v.14 no.4
    • /
    • pp.49-65
    • /
    • 2023
  • Purpose - In the Korean and Chinese social landscape, it is vital to appreciate the significance of the Japanese history problem. The current study investigated whether the perception of the Japanese history problem affects decisions regarding technology adoption in organizations by comparing South Korea and China. Design/methodology/approach - The study involved 305 Korean and 379 Chinese participants who responded to scenarios and surveys regarding the adoption of workplace surveillance cameras supplied by a Japanese company. Findings - Using a moderated mediation model based on protection motivation theory (PMT), we found that past experiences of privacy invasion significantly reduced trust in the adoption of surveillance cameras at work. This relationship was mediated by respondents' perceptions of security vulnerability. The current study, however, did not confirm any significant moderating effect of the Japanese history problem priming on trust in the adoption of workplace surveillance cameras. Research implications - This suggests that the Japanese history problem may have a limited impact on organizational technology adoption decisions, different from the political consumerism behavior driven by public anti-Japanese affectivity. The current study reaffirms the validity and applicability of PMT and provides both theoretical insights and practical recommendations.

Exploring the Feasibility of Neural Networks for Criminal Propensity Detection through Facial Features Analysis

  • Amal Alshahrani;Sumayyah Albarakati;Reyouf Wasil;Hanan Farouquee;Maryam Alobthani;Someah Al-Qarni
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.11-20
    • /
    • 2024
  • While artificial neural networks are adept at identifying patterns, they can struggle to distinguish between actual correlations and false associations between extracted facial features and criminal behavior within the training data. These associations may not indicate causal connections. Socioeconomic factors, ethnicity, or even chance occurrences in the data can influence both facial features and criminal activity. Consequently, the artificial neural network might identify linked features without understanding the underlying cause. This raises concerns about incorrect linkages and potential misclassification of individuals based on features unrelated to criminal tendencies. To address this challenge, we propose a novel region-based training approach for artificial neural networks focused on criminal propensity detection. Instead of solely relying on overall facial recognition, the network would systematically analyze each facial feature in isolation. This fine-grained approach would enable the network to identify which specific features hold the strongest correlations with criminal activity within the training data. By focusing on these key features, the network can be optimized for more accurate and reliable criminal propensity prediction. This study examines the effectiveness of various algorithms for criminal propensity classification. We evaluate YOLO versions YOLOv5 and YOLOv8 alongside VGG-16. Our findings indicate that YOLO achieved the highest accuracy 0.93 in classifying criminal and non-criminal facial features. While these results are promising, we acknowledge the need for further research on bias and misclassification in criminal justice applications

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

Investigating the Influence of NFT ART Characteristics on Consumer Perceived Value: Insights from Purchasing Experience (NFT ART의 특성이 지각된 가치에 미치는 영향에 관한 연구)

  • Jeong, Young Soon;Jeong, Ji Eun;Lee, Chae Hyun;Park, Jong Woo
    • Journal of Korean Society for Quality Management
    • /
    • v.52 no.2
    • /
    • pp.255-274
    • /
    • 2024
  • Purpose: Non-Fungible Token (NFT) ART, based on NFT technology, represents a novel form of art that has recently garnered significant attention in the art market. NFT technology enables the assertion of ownership over digital data, introducing the concept of ownership into the digital realm. As digital data gains ownership, NFT ART is anticipated to be positively viewed as an investment and expected to become more active due to the characteristics of this new technology. Therefore, this study aims to verify the influence of NFT ART characteristics on perceived value. This study contributes to extracting the distinctive characteristics of NFT ART compared to other forms of art and to understanding the perceived value of NFT ART among consumers with purchasing experience. Methods: This study applied structural equation modeling to explore the relationships among the variables using SPSS 26.0 and R program version 4.2.3. A total of 320 questionnaires were retrieved, all of which were adopted as valid analytical samples without missing values. Results: The findings indicate that the decentralization, transparency, and scarcity of NFT ART positively influence the perceived usefulness and enjoyment among consumers, while security does not have a significant impact. This suggests that higher levels of decentralization, transparency, and scarcity in NFT ART enhance perceived usefulness and enjoyment for consumers, significantly influencing the perceived value. Furthermore, it was confirmed that these characteristics are considered important values and perceptions from the consumer's perspective. Conclusion: The research presents positive factors for the activating of purchases among consumers considering buying NFT ART. It emphasizes the necessity of benefits for all participants to activate the art market. Additionally, the perceived value provides crucial insights for inducing active purchasing behavior in the NFT ART market and serves as a foundational study for further research.

Estimating the Determinants for the Sales of Retail Trade:A Panel Data Model Approach (페널 데이터모형을 적용한 소매업 매출액 결정요인 추정에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.83-92
    • /
    • 2008
  • In respect complication of group and period, the sales of retail trade is composed of various factors. This paper studies focus on estimating the determinants of the sales of retail trade. The volume of analysis consist of 7 groups. Analyzing period be formed over a 36 point(2005. 1$\sim$2007. 12). In this paper dependent variable setting up sales of retail trade, explanatory(independent) variables composed of composite stock price index, the number of the consumer's online buying behavior company, the coincident composite index, the index of trading price of APT, employment rate, an average of the rate of operation(the manufacturing industry), the consumer price index. The result of estimating the determinants of sales of retail trade provides empirical evidences of significance positive relationships between the coincident composite index, the index of trading price of APT, employment rate, an average of the rate of operation(the manufacturing industry). However this study provides empirical evidences of significance negative relationships between the consumer price index. The explanatory variables, that is, composite stock price and the number of the consumer's online buying behavior company, are non-significance variables. Implication of these findings are discussed for content research and practices.

  • PDF

Study on Changes in Military Negotiations under the Kim Jeong-eun Regime through Working-Level Talks for Gaeseong Industrial Complex (김정은시대 개성공단 실무회담 분석을 통한 군사협상 변화 연구)

  • Lee, Sung Choon
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.3-10
    • /
    • 2013
  • This study is trying to suggest the continuity and changes that would be made in inter-Korean military negotiations in the future under the Kim Jeong-eun regime by analyzing the recent inter-Korean Working-Level Talks for Gaeseong Industrial Complex based on 'anti-Japanese guerilla style negotiation model, the military negotiation model under Kim Jeong-il era. Especially, through analysis of the inter-Korean Working-Level Talks for Gaeseong Industrial Complex, it is verified that behavior similar to that in the military talks in the past is found even in the economic negotiations. Such analysis leads to an assumption that negotiations under the Kim Jeong-eun regime would be made within the category of the military negotiations under the Kim Jeong-il era. Fundamentally North Korea will change but try to achieve its objectives in the military talks within the existing frame of strategic culture rather than changing it. Such phenomenon will continue for some time. In the future inter-Korean military talks, however, North Korea will try to change its behavior to cope with its financial difficulties. Accordingly, the South Korea's government will have to have paradigm shift toward inter-Korean military negotiations. Especially, Kim Jeong-eun's studying abroad in the past will make him change in the negotiations. At this moment, the South Korean government must make continuous efforts to induce dialogue and negotiation. In order to induce the North Korea to change, the development of economic norm logic with the united front applied in the strategic culture of military negotiation and the formation of a value system in the North Korea's military negotiation policy makers will lead to the creation of a new military negotiation framework.

A Study on the Responsibility Judgment and Mental Disorder of Criminal Psychology (책임능력판단에 관한 범죄심리학적 이론과 정신장애 항변 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.293-322
    • /
    • 2005
  • The culpability of a person, as determined by due process of law, for any of his actions that are defined as criminal. Determination of such responsibility is a legal function, not a psychiatric one, although a psychiatrist may be called upon to present evidence to the court in order to aid the judge or jury in reaching a decision as to responsibility. Determination of responsibility varies with the laws of the state in which the accused is being tried, but in general all states base their laws on three famous judicial decisions concerning criminal responsibility. 1. the M'Naghten(McNaughton) rule(a. to establish such a defense the accused, at the time the act was committed, must be shown to have been laboring under such defect of reason as not to know the nature and quality of the act he was doing, b. if he did know it, he did or know that what he was doing was wrong). 2. the irresistible impulse test. 3. the Durham decision. Under the Durham test, however, the psychiatrist may give any relevant testmony concerning the mental illness at issue. The psychological and behavioral appearance of a person, in clinical psychiatry this term is commonly used to refer to the results of the mental examination of a patient. The written report of the mental status usually contains specific references to the following areas: I. Attitude and General Behavior (1)General health and appearance. (2)General habits of dress. (3)Personal habits. (4)General mood. (5)Use of leisure time. (6)Degree of sociability. (7)Speech. II. Attitude and Behavior during interview (1)Co-operativeness. (2)Poise. (3)Facial expression. (4)Motor activity. (5)Mental activity. (6)Emotional reactions. (7)Trend of thought. III. Sensorium, mental grasp, and capacity (1)Orientation. (2)Memory and retention. (3)Estimate of intelligence. (4)Abstraction ability. (5)Tests of absurdity, interpretation of proverbs. (6)Judgment.

  • PDF