Search results

1 – 2 of 2
Open Access
Article
Publication date: 19 July 2024

Orlando Gomes

Literature on psychology highlights four traits that shape an amoral and antisocial personality: Machiavellianism, narcissism, psychopathy and sadism. Together, these personality…

Abstract

Purpose

Literature on psychology highlights four traits that shape an amoral and antisocial personality: Machiavellianism, narcissism, psychopathy and sadism. Together, these personality traits form the Dark Tetrad. In this study, the standard intertemporal utility maximization model is reassessed from the point of view of a representative economic agent endowed with the Dark Tetrad personality traits.

Design/methodology/approach

The approach followed in this paper consists of identifying how each of the Dark Tetrad traits might be logically associated with the dynamic utility problem, as well as exploring, in the context of the model, the implications, for consumption and utility, of admitting the presence of such traits in individuals’ personalities.

Findings

It is found that, typically, dark personalities penalize consumption growth, even when such traits are interpreted directly and positively contributing to the utility of the agent. It is also found that in economies with two or more interacting agents, the dark traits might have a mutually destructive nature.

Originality/value

Economics is going through a smooth revolution in the direction of becoming an eminently behavioral science. Most of the traditional economic models, based on the idea of the hyper-rational agent, are being replaced or complemented by a different view of the homo-economicus, in which, among other things, personality matters. This paper offers a novel contribution in this direction.

Details

Journal of Economics, Finance and Administrative Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2077-1886

Keywords

Open Access
Article
Publication date: 4 May 2018

C.G. Thorat and V.S. Inamdar

Embedded systems, Internet of Things (IoT) and mobile computing devices are used in various domains which include public-private infrastructure, industrial installation and…

1185

Abstract

Embedded systems, Internet of Things (IoT) and mobile computing devices are used in various domains which include public-private infrastructure, industrial installation and critical environment. Generally, information handled by these devices is private and critical. Therefore, it must be appropriately secured from different attacks and hackers. Lightweight cryptography is an aspiring field which investigates the implementation of cryptographic primitives and algorithms for resource constrained devices. In this paper, a new compact hybrid lightweight encryption technique has been proposed. Proposed technique uses the fastest bit permutation instruction PERMS with S-box of PRESENT block cipher for non-linearity. An arbitrary n-bit permutation is performed using PERMS instruction in less than log (n) number of instructions. This new hybrid system has been analyzed for software performance on Advanced RISC Machine (ARM) and Intel processor whereas Cadens tool is used to analyze the hardware performance. The result of the proposed technique is improved by the factor of eight as compared to the PRESENT-GRP hybrid block cipher. Moreover, PERMS instruction bit permutation properties result a very good avalanche effect and compact implementation in the both hardware and software environment.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

1 – 2 of 2