work security
Recently Published Documents


TOTAL DOCUMENTS

52
(FIVE YEARS 22)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 12 ◽  
Author(s):  
Anna Wojtkowska ◽  
Ernest Tyburski ◽  
Katarzyna Skalacka ◽  
Agata Gasiorowska

The coronavirus disease 2019 (COVID-19) pandemic has reduced the sense of security of people in everyday life. The efforts of managers in the workplace to minimize the health risks and economic damage, however, can provide the employees with a greater sense of security. The aim of this study was to identify the types of workplace responses to the pandemic outbreak with respect to the characteristics of employees and their employers accomplishing the differences in subjective sense of workplace security before the pandemic and during the outbreak. Three hundred and thirty-seven Polish employees completed an online survey during the first 2 weeks of the COVID-19 pandemic in March 2020. Using the cluster analysis, we identified four subgroups of employees differing in their sense of workplace security, work-related psychological factors, and perceived management styles of their supervisors. Employees led by developers and executive managers sustained a high sense of work security and positive attitude to work, while those led by compromisers and deserter managers suffered from the highest drop of subjective security. In this study, we proposed how employees can be protected from overreactions and unnecessary panic in a time of global crisis by virtue of the psychological competences of their supervisors and employers.


2021 ◽  
pp. 1-13
Author(s):  
Dongping Hu ◽  
Aihua Yin

In cloud computing, enabling search directly over encrypted data is an important technique to effectively utilize encrypted data. Most of the existing techniques are focusing on fuzzy keyword search as it helps achieve more robust search performance by tolerating misspelling or typos of data users. Existing works always build index without classifying keywords in advance. They suffer from efficiency issue. Furthermore, Euclidean distance or Hamming distance is often chosen to evaluate strings’ similarity, ignoring prefixes matching and the influence of strings’ length on the accuracy. We propose an efficient fuzzy keyword search scheme with lower computation cost and higher accuracy to address the aforementioned problems. We employ the sub-dictionaries technique and the Bed-tree structure to build an index with three layers for achieving better search efficiency. With this index structure, the server could locate the keyword and could narrow the search scope quickly. The Jaro-Winkler distance is introduced to qualify the strings’ similarity by considering the prefixes matching and string length. The secure privacy mechanism is incorporated into the design of our work. Security analysis and performance evaluation demonstrate our scheme is more efficient compared to the existing one while guaranteeing security.


Author(s):  
Maisarah Mohamed Saat ◽  
Nurul Syazlin Abdul Halim ◽  
Shazaitul Azreen Rodzalan

The purpose of this research is to examine job satisfaction among auditors and the relationships between internal as well as external factors and job satisfaction. The research also examines internal and external factors of motivation; dimensions for internal factors include achievements, advancement, work itself, recognition and growth while for external, the dimensions are company policy, relationship with peers, work security, supervisory relationship, money, and working conditions. This research is guided by Herzberg’s Two Factor Theory which explains the difference between motivation and hygiene factors that can lead to job satisfaction. Data were collected using an online questionnaire distributed to auditors in Johor state audit firms with diverse personal and professional backgrounds. The results show that both internal and external factors of motivation have significant positive relationships with job satisfaction. ‘Achievement’ and ‘Growth’ are dominant internal factors of motivation towards job satisfaction while ‘Company policy’ and ‘Relationship with Supervisors’ are dominant external factors of motivation. The results of this research provide indicators to the employers, particularly audit firms, on the factors that influence job satisfaction, thus these employers could take appropriate actions in ensuring the well-being of their employees who are in this context are auditors.


2021 ◽  
Vol 4 (1) ◽  
pp. 37-45
Author(s):  
I Nyoman Artayasa

Leadership Style In Organization is to know how to lead a group or organization.It can also know the influence of leadership styles used by a leader in dealing with certain situations and conditions. There are a wide range of lead styles. All of these leadership styles each have their own traits and that's what makes a leader able to lead his or her group in his or her own way that will surely aim just like a leader in general who wants to influence people to take actions that benefit the organization and itself to achieve certain goals. Whatever form his leadership style will affect the way people work as individuals or as a group.In reality leaders can influence the spirit and excitement of work, security, quality of working life and especially the level of achievement of an organization


2021 ◽  
Vol 328 ◽  
pp. 03005
Author(s):  
Suwarjono Suwarjono ◽  
Lilik Sumaryanti ◽  
Lusia Lamalewa

Electronic voting is done by recording election data centrally and presenting it into fast digital information. E-voting is an internet technology, which aims to improve the performance of the voting process, and is expected to be a breakthrough in technological development that helps human work. Security constraints in e-voting include the distribution of voting, for example voters who distribute voting rights, are illegitimate and can abuse voters’ rights, because they know the voter’s account to access the system. This study implements cryptographic methods as a password security for voter accounts, and the results of voting, so that the secrecy of the voters’ data and the results of voting are maintained. RSA algorithm to implement cryptographic techniques based on two mathematical problems, namely factorization and modulo operations on composite numbers, which use two different keys for encryption and decryption processes. The public key is used encryption process to encode text, and the private key is used description process, namely translating ciphertext into plaintext.


Author(s):  
Neeta Baporikar

The goal of all organizations is success in the current economic environment, which is increasingly uncertain and competitive. Companies, irrespective of size or industry, make every effort to motivate employees, recognizing their roles and influence on organizational effectiveness. Hence, the objective of this study is to explore the impacts of rewards on work motivation and job satisfaction at a mining company. The methodology is descriptive cross-sectional research. Data collection is by Likert-scaled questionnaire on a randomly selected population of 201 permanent employees and SPSS analysis for Cronbach's Alpha and multi regression analysis is undertaken. Findings reveal 59.3% of employees prefer both intrinsic and extrinsic motivation while 32.8% prefer only extrinsic motivation. A statistically significant form of intrinsic work motivation and job satisfaction is Herzberg's motivator factor ‘Achievement' (Beta= 0.272) and extrinsic work motivation and job satisfaction is hygiene factors of ‘Work security; (Beta= 0.442) trailed by peers and supervisors relationship.


Author(s):  
Charlene A. VanLeeuwen ◽  
George Veletsianos ◽  
Olga Belikov ◽  
Nicole Johnson

As digital education at the post-secondary level continues to grow, robust professional development that prepares faculty to teach in online and blended settings is necessary. In this study we analyze open-ended comments from the Canadian Digital Learning Research Association’s annual survey of Canadian post-secondary institutions (2017-2019) to deepen our understanding of faculty training and support for digital education as articulated by higher education institutions. We find that 1) digital education orientation or on-boarding processes for faculty vary widely; 2) institutions employ an extensive array of professional development practices for digital education; 3) institutions report culture change, work security, and unclear expectations as challenges in providing digital education training and support; and 4) institutions articulate aspirations and hopes around professional development investments in order to build digital education capacity. These findings have significant implications for research and practice and we describe these in the article.


Sign in / Sign up

Export Citation Format

Share Document