Search results
1 – 2 of 2Literature on psychology highlights four traits that shape an amoral and antisocial personality: Machiavellianism, narcissism, psychopathy and sadism. Together, these personality…
Abstract
Purpose
Literature on psychology highlights four traits that shape an amoral and antisocial personality: Machiavellianism, narcissism, psychopathy and sadism. Together, these personality traits form the Dark Tetrad. In this study, the standard intertemporal utility maximization model is reassessed from the point of view of a representative economic agent endowed with the Dark Tetrad personality traits.
Design/methodology/approach
The approach followed in this paper consists of identifying how each of the Dark Tetrad traits might be logically associated with the dynamic utility problem, as well as exploring, in the context of the model, the implications, for consumption and utility, of admitting the presence of such traits in individuals’ personalities.
Findings
It is found that, typically, dark personalities penalize consumption growth, even when such traits are interpreted directly and positively contributing to the utility of the agent. It is also found that in economies with two or more interacting agents, the dark traits might have a mutually destructive nature.
Originality/value
Economics is going through a smooth revolution in the direction of becoming an eminently behavioral science. Most of the traditional economic models, based on the idea of the hyper-rational agent, are being replaced or complemented by a different view of the homo-economicus, in which, among other things, personality matters. This paper offers a novel contribution in this direction.
Details
Keywords
Embedded systems, Internet of Things (IoT) and mobile computing devices are used in various domains which include public-private infrastructure, industrial installation and…
Abstract
Embedded systems, Internet of Things (IoT) and mobile computing devices are used in various domains which include public-private infrastructure, industrial installation and critical environment. Generally, information handled by these devices is private and critical. Therefore, it must be appropriately secured from different attacks and hackers. Lightweight cryptography is an aspiring field which investigates the implementation of cryptographic primitives and algorithms for resource constrained devices. In this paper, a new compact hybrid lightweight encryption technique has been proposed. Proposed technique uses the fastest bit permutation instruction PERMS with S-box of PRESENT block cipher for non-linearity. An arbitrary n-bit permutation is performed using PERMS instruction in less than log (n) number of instructions. This new hybrid system has been analyzed for software performance on Advanced RISC Machine (ARM) and Intel processor whereas Cadens tool is used to analyze the hardware performance. The result of the proposed technique is improved by the factor of eight as compared to the PRESENT-GRP hybrid block cipher. Moreover, PERMS instruction bit permutation properties result a very good avalanche effect and compact implementation in the both hardware and software environment.
Details