Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5

Attributes Related Abstracts

5 User Satisfaction Survey Based Facility Performance Evaluation

Authors: Gopikrishnan Seshadhri, V. M. Topkar

Abstract:

Facility management post occupation is a facet that has gained tremendous ground in the recent times. While the efficiency of expenditure and utilization of all types of resources are monitored to ensure timely completion with minimum cost and acceptable quality during construction phase, value for money comes out only when the facility performs satisfactorily post occupation, meeting aspirations and expectations of users of the facility. It is more so for the public facilities. Due to the paradigm shift in focus to outcome based performance evaluation, user satisfaction obtained mainly through questionnaires has become the single important criterion in performance evaluation. Questionnaires presently being used to gauge user satisfaction being subjective, the feedback obtained do not necessarily reflect actual performance. Hence, there is a requirement of developing a survey instrument that can gauge user satisfaction as objectively as possible and truly reflects the ground reality. A near correct picture of actual performance of the built facility from the user point of view will enable facility managers to address pertinent issues. This paper brings out the need for an effective survey instrument that will elicit more objective user response. It also lists steps involved in formulation of such an instrument.

Keywords: Statistical Methods, Attributes, Performance Indicators, facility performance evaluation, attribute descriptors, user satisfaction surveys

Procedia PDF Downloads 172
4 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Yan Wang, Ming Lun Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: Attributes, cloud storage security, sharing storage, Hash algorithm

Procedia PDF Downloads 207
3 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: Value, Attributes, private information, perceived risk, users, online information privacy

Procedia PDF Downloads 106
2 Decades of Educational Excellence: Case Studies of Successful Family-Owned Higher Educational Institutions

Authors: Maria Luz Macasinag

Abstract:

This study aims to determine and to examine critically successful family-owned higher educational institutions towards identifying the attributes and practices that may likely have led to their success. This research is confined to private, non-sectarian, family-owned higher institutions of learning that have been operating for more than fifty years, had only one founder and had at least two transitions in terms of generation. The criteria for selecting family-owned universities to be part of the cases under investigation include institutions (1) with increasing enrollment over the past five years, with level III accreditation status, (3) with good performance in the Board examinations in most of its programs and (4) with high employability of graduates. The study uses the multiple case study method. A model based on the cross-case analysis of the attributes and practices of all the case studies of successful family- owned higher institutions of learning is the output. The paper provides insights to current and future school owners and administrators in the management of their institutions for competitiveness, sustainability and advancement. This research encourages the evaluation of how the ideas that may lead to the success of schools owned by families in developing a sense of community, a reciprocal relationship among colleagues, the students and other stakeholders will result to the attainment of the vision and mission of the school. The study is beneficial to entrepreneurs and to business students whose know-how may provide insights that would be helpful in guiding prospective school owners. The commission on higher education and the Department of Education stand to benefit from this academic paper for the guidance that they provide to family-owned educational institutions. Banks and other financial institutions may find valuable ideas from this academic paper for the purpose of providing financial assistance to colleges and universities that are family-owned. Researchers in the field of educational management and administration may be able to extract from this study related topics for future research.

Keywords: Attributes, success factors, administration practices, family-owned schools

Procedia PDF Downloads 160
1 Attributes of Employee Engagement Best Practices: A Guideline for SMEs

Authors: Kanwal Gul, Ghazanfar Bozai

Abstract:

In Pakistan, SMEs are the major source of contribution to the economy, but due to lack of proper HR practices (lack of employee engagement), these fast growing business shut down with in few years of startup. The purpose of this study is to conduct a comprehensive literature survy of the major best practices used for employee engagement globally. This paper could be used as employee engagement best practices guide for SME’s in developing countries. This article is focused on identifying the attributes of employee engagement in different countries/ cultures and organizations. It will provide a summary of employee engagement models used globally and how SMEs could pick suitable attributes of employee engagement as per their structural culture. This article will add valuable literature on employee engagement in developing countries for new startups and small, medium business.

Keywords: Employee Engagement, Attributes, small medium enterprises, human resources practices

Procedia PDF Downloads 80