Search results for: private information
11915 Potentiality of a Community of Practice between Public Schools and the Private Sector for Integrating Sustainable Development into the School Curriculum
Authors: Aiydh Aljeddani, Fran Martin
Abstract:
The critical time in which we live requires rethinking of many potential ways in order to make the concept of sustainability and its principles an integral part of our daily life. One of these potential approaches is how to attract community institutions, such as the private sector, to participate effectively in the sustainability industry by supporting public schools to fulfill their duties. A collaborative community of practice can support this purpose and can provide a flexible framework, which allows the members of the community to participate effectively. This study, conducted in Saudi Arabia, aimed to understand the process of a collaborative community of practice of involving the private sector as a member of this community to integrate the sustainability concept in school activities and projects. This study employed a qualitative methodology to understand this authentic and complex phenomenon. A case study approach, ethnography and some elements of action research were followed in this study. The methods of unstructured interviews, artifacts, observation, and teachers’ field notes were used to collect the data. The participants were three secondary teachers, twelve chief executive officers, and one school administrative officer. Certain contextual conditions, as shown by the data, should be taken into consideration when policy makers and school administrations in Saudi Arabia desire to integrate sustainability into school activities. The first of these was the acknowledgement of the valuable role of the members’ personality, efforts, abilities, and experiences, which played vital roles in integrating sustainability. Second, institutional culture, which was not expected to emerge as an important factor in this study, has a significant role in the integration of sustainability. Credibility among the members of the community towards the integration of the sustainability concept and its principles through school activities is another important condition. Fourth, some chief executive officers’ understanding of Corporate Social Responsibility (CSR) towards contribution to sustainability agenda was shallow and limited and this could impede the successful integration of sustainability. Fifth, a shared understanding between the members of the community about integrating sustainability was a vital condition in the integration process. The study also revealed that the integration of sustainability could not be an ongoing process if implemented in isolation of the other community institutions such as the private sector. The study finally offers a number of recommendations to improve on the current practices and suggests areas for further studies.Keywords: community of practice, public schools, private sector, sustainable development
Procedia PDF Downloads 20811914 Fraud in the Higher Educational Institutions in Assam, India: Issues and Challenges
Authors: Kalidas Sarma
Abstract:
Fraud is a social problem changing with social change and it has a regional and global impact. Introduction of private domain in higher education along with public institutions has led to commercialization of higher education which encourages unprecedented mushrooming of private institutions resulting in fraudulent activities in higher educational institutions in Assam, India. Presently, fraud has been noticed in in-service promotion, fake entry qualification by teachers in different levels of work-place by using fake master degrees, master of philosophy and doctor of philosophy degree certificates. The aim and objective of the study are to identify grey areas in maintenance of quality in higher educational institutions in Assam and also to draw the contour for planning and implementation. This study is based on both primary and secondary data collected through questionnaire and seeking information through Right to Information Act 2005. In Assam, there are 301 undergraduate and graduate colleges distributed in 27 (Twenty seven) administrative districts with 11000 (Eleven thousand) college teachers. Total 421 (Four hundred twenty one) college teachers from the 14 respondent colleges have been taken for analysis. Data collected has been analyzed by using 'Hypertext Pre-processor' (PhP) application with My Sequel Structure Query Language (MySQL) and Google Map Application Programming Interface (APIs). Graph has been generated by using open source tool Chart.js. Spatial distribution maps have been generated with the help of geo-references of the colleges. The result shows: (i) the violation of University Grants Commission's (UGCs) Regulation for the awards of M. Phil/Ph.D. clearly exhibits. (ii) There is a gap between apex regulatory bodies of higher education at national and as well as state level to check fraud. (iii) Mala fide 'No Objection Certificate' (NOC) issued by the Government of Assam have played pivotal role in the occurrence of fraudulent practices in higher educational institutions of Assam. (iv) Violation of verdict of the Hon'ble Supreme Court of India regarding territorial jurisdiction of Universities for the awards of Ph.D. and M. Phil degrees in distance mode/study centre is also a responsible factor for the spread of these academic frauds in Assam and other states. The challenges and mitigation of these issues have been discussed.Keywords: Assam, fraud, higher education, mitigation
Procedia PDF Downloads 16711913 A Survey of Feature-Based Steganalysis for JPEG Images
Authors: Syeda Mainaaz Unnisa, Deepa Suresh
Abstract:
Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography
Procedia PDF Downloads 21611912 The Impact of Training on Commitment, Retention, Job Satisfaction and Performance of Private Sector Banks in Bangladesh
Authors: Md. Arifur Rahman, Ummya Salma, Nazrul Islam
Abstract:
Private sector banking business is one of the leading businesses of Bangladesh as it is profitable and directly attached with the economic development of the country. Training has got very high importance in this sector for increasing the performance of the banks. It has a long term impact on a number of aspects of the bank employees and their performances. It is an investment of the organization that is permanent in nature. Study shows that there are positive relationships between training and the employee commitment, job retention, job satisfaction and company performance. Training is also concerned with promotion, compensation, work-life policies, career development, task and contextual performance of the employees. As such, this paper aims at identifying the impact of training on employee commitment, job retention, job satisfaction and the performance of the private sector banks in Bangladesh. Both primary and secondary data were used to conduct the study. Data were collected from the bank officers who were trained in their banks. Both descriptive and inferential statistics were used to analyze the data. Descriptive statistics were used to describe the present situation of the banks and their employees. Inferential statistics were used to identify the factors and their significance concerned with training. Results show that there is a significant relationship between the performance and the training of the employees. It also shows that the training can motivate employees and encourage them to work hard. However, this study did not find any relationship between the commitment of the employees and the training. This study suggests that for increasing the performance of the banks, training is a must which is to be given deliberately for improving the specific skills of the bank employees.Keywords: training, promotion, compensation, work-life policies
Procedia PDF Downloads 28611911 Measuring Strategic Management Maturity: An Empirical Study in Turkish Public and Private Sector Organizations
Authors: F. Demir
Abstract:
Strategic Management is highly critical for all types of organizations. This paper examines maturity level of strategic management practices of public and private sector organizations in Turkey, and presents a conceptual model for assessing the maturity of strategic management in any organization. This research focuses on R&D intensive organizations (RDO) because it is claimed that such organizations are more innovative and innovation is a critical part of the model. The Strategic management maturity model (S-3M) is basically composed of six maturity levels with five different dimensions. Based on 63 organizations, the findings reveal that the average maturity of all organizations in the sample group is three out of five. It corresponds to the stage of ‘performed’. Results simply show that the majority of organizations from various industries and sectors implement strategic management activities; however, they experience multiple challenges to optimize strategic management processes and integrate organizational components with business strategies. Briefly, they struggle to become an innovative organization.Keywords: strategic management maturity, innovation, developing countries, research and development
Procedia PDF Downloads 28711910 Towards A New Maturity Model for Information System
Authors: Ossama Matrane
Abstract:
Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation.Keywords: information system, maturity models, information security management, OPM3, IT governance
Procedia PDF Downloads 44711909 Factors Affecting eHealth Literacy among Nursing Students in Jordan
Authors: Laila Habiballah, Ahmad Tubaishat
Abstract:
Background: with the development of information and communication technology, using the internet as a source to obtain health information is increasing. Nursing students as future health care providers should have the skills of locating, evaluating and using online health information. This will enable them to help their patients and families to make informed decisions. Aim: this study has a two-fold aim. The first is to assess the eHealth literacy among nursing students in Jordan. The second aim is to explore the factors that have an effect on the eHealth literacy. Methods: this is a descriptive cross-sectional survey that conducted in two universities in Jordan; public and private one. A number of 541 students from both universities were completed the eHEALS scale, which is an instrument designed to measure the eHealth literacy. Some additional personal and demographical variable were collected to explore its effect on eHealth literacy. Results: Students have a high perceived level of e-Health literacy (M=3.62, SD=0.58). They are aware of the available online health resources, know how to search, locate, and use these resources. But, they do not have the skills to evaluate these resources and cannot differentiate between the high and low-quality resources. The results showed as well that type of university, type of students' admission, academic level, students' skills of using the internet, and the perception of usefulness and importance of internet have an effect on the eHealth literacy. While the age, gender, GPA, and the frequency of using the internet was no significant factors. Conclusion: This study represents a baseline reference for the eHealth literacy in Jordan. Students have some skills of eHealth literacy and other skills need to be improved. Nursing educators and administrators should integrate and incorporate the skills of eHealth literacy in the curriculum.Keywords: eHealth, literacy, nursing, students, Jordan
Procedia PDF Downloads 39511908 Cloud Computing in Jordanian Libraries: An Overview
Authors: Mohammad A. Al-Madi, Nagham A. Al-Madi, Fanan A. Al-Madi
Abstract:
The current concept of the technology of cloud computing libraries has been increasing where users can store their data in a virtual space and can be retrieved from anywhere whilst using the network. By using cloud computing technology, industries and individuals save money, time, and space. Moreover, data and information about libraries can be placed in the cloud. This paper discusses the meaning of cloud computing along with its types. Further, the focus has been given to the application of cloud computing in modern libraries. Additionally, the advantages of cloud computing and the areas in which cloud computing be applied with current usage are discussed. Finally, the present situation of the Jordanian libraries is considered and discussed in further detail.Keywords: cloud computing, community cloud, hybrid cloud, private cloud, public cloud
Procedia PDF Downloads 22111907 A Comparative Study of School Choice: China and the United States
Authors: Huizi Zeng
Abstract:
This paper delineates the historical retrospective and current status of school choice in China. Focusing on analyzing the similarities and differences in origin, evolution, public dispute, policy dynamics between China and the United States, the article depicts a panorama and explores possible causes. Both China and the United States continue to learn from historical legacy and invent new programs to perfect school choice policy but the outcomes are so different. On the one hand, the percentage of public schools in China remains high all along, while there is a considerably significant reduction in the United States. On the other hand, there is more governmental intervention in the United States with continuous and constant policy updates and adjustment. Finally, this article adopts public-private partnerships (PPP) to seek to provide insights into differences between the two countries and argue that school choice is not only the production of education marketization and corporation but also driven by political mechanism.Keywords: China, United States, school choice, comparative analysis, policy, public private partnerships
Procedia PDF Downloads 18911906 How Does Paradoxical Leadership Enhance Organizational Success?
Authors: Wageeh A. Nafei
Abstract:
This paper explores the role of Paradoxical Leadership (PL) in enhancing Organizational Success (OS) at private hospitals in Egypt. Based on the collected data from employees in private hospitals (doctors, nursing staff, and administrative staff). The researcher has adopted a sampling method to collect data for the study. The appropriate statistical methods, such as Alpha Correlation Coefficient (ACC), Confirmatory Factor Analysis (CFA), and Multiple Regression Analysis (MRA), are used to analyze the data and test the hypotheses. The research has reached a number of results, the most important of which are (1) there is a statistical relationship between the independent variable represented by PL and the dependent variable represented by Organizational Success (OS). The paradoxical leader encourages employees to express their opinions and builds a work environment characterized by flexibility and independence. Also, the paradoxical leader works to support specialized work teams, which leads to the creation of new ideas, on the one hand, and contributes to the achievement of outstanding performance on the other hand. (2) the mentality of the paradoxical leader is flexible and capable of absorbing all suggestions from all employees. Also, the paradoxical leader is interested in enhancing cooperation among them and provides an opportunity to transfer experience and increase knowledge-sharing. Also, the sharing of knowledge creates the necessary diversity that helps the organization to obtain rich external information and enables the organization to deal with a rapidly changing environment. (3) The PL approach helps in facing the paradoxical demands of employees. A paradoxical leader plays an important role in reducing the feeling of instability in the work environment and lack of job security, reducing negative feelings for employees, restoring balance in the work environment, improving the well-being of employees, and increasing the degree of job satisfaction of employees in the organization. The study referred to a number of recommendations, the most important of which are (1) the leaders of the organizations must listen to the views of employees and their needs and move away from the official method of control. The leader should give sufficient freedom to employees to participate in decision-making and maintain enough space among them. The treatment between the leaders and employees must be based on friendliness, (2) the need for organizational leaders to pay attention to sharing knowledge among employees through training courses. The leader should make sure that every information provided by the employee is valuable and useful, which can be used to solve a problem that may face his/her colleagues at work, (3) the need for organizational leaders to pay attention to sharing knowledge among employees through brainstorming sessions. The leader should ensure that employees obtain knowledge from their colleagues and share ideas and information among them. This is in addition to motivating employees to complete their work in a new creative way, which leads to employees’ not feeling bored of repeating the same routine procedures in the organization.Keywords: paradoxical leadership, organizational success, human resourece, management
Procedia PDF Downloads 5811905 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning
Authors: Angela Mathias Kavishe
Abstract:
Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.Keywords: cyberstalking, embodiment, gender-based violence, internet
Procedia PDF Downloads 5011904 A Physical Theory of Information vs. a Mathematical Theory of Communication
Authors: Manouchehr Amiri
Abstract:
This article introduces a general notion of physical bit information that is compatible with the basics of quantum mechanics and incorporates the Shannon entropy as a special case. This notion of physical information leads to the Binary data matrix model (BDM), which predicts the basic results of quantum mechanics, general relativity, and black hole thermodynamics. The compatibility of the model with holographic, information conservation, and Landauer’s principles are investigated. After deriving the “Bit Information principle” as a consequence of BDM, the fundamental equations of Planck, De Broglie, Beckenstein, and mass-energy equivalence are derived.Keywords: physical theory of information, binary data matrix model, Shannon information theory, bit information principle
Procedia PDF Downloads 17111903 Introduction of Knowledge Management in a Public Sector Organization in India
Authors: Siddharth Vashisth, Varun Mathur
Abstract:
This review provides an overview of the impact that implementation of various Knowledge Management (KM) strategies has had on the growth of a department in a Public Sector Company in India. In a regulated utility controlled by the government, the growth of an organization such as Hindustan Petroleum Corporation Limited (HPCL) had depended largely on the efficiencies of the systems and its people. However, subsequent to the de-regularization & to the entry of the private competition, the need for a ‘systematic templating’ of knowledge was recognized. This necessitated the introduction of Knowledge Management Centre (KMC). Projects & Pipelines Department (P&P) of HPCL introduced KMC that contributed significantly towards KM by adopting various strategies such as standardization, leveraging information system, competency enhancement, and improvements & innovations. These strategies gave both tangible as well as intangible benefits towards KM. Knowledge, technology & people are the three pillars that need to be catered for effective knowledge management in any organization. In HPCL, the initiative of KMC has served as an intermediary between these three major pillars as each activity of the strategy was centered on them and contributed significantly to their growth and up-gradation, ensuring overall growth of KM in the department.Keywords: knowledge, knowledge management, public sector organization, standardization, technology, people, skill, information system, innovation, competency, impact
Procedia PDF Downloads 45411902 The Effect of Supply Chain Integration on Information Sharing
Authors: Khlif Hamadi
Abstract:
Supply chain integration has become a potentially valuable way of securing shared information and improving supply chain performance since competition is no longer between organizations but among supply chains. This research conceptualizes and develops three dimensions of supply chain integration (integration with customers, integration with suppliers, and the interorganizational integration) and tests the relationships between supply chain integration, information sharing, and supply chain performance. Furthermore, the four types of information sharing namely; information sharing with customers, information sharing with suppliers, inter-functional information sharing, and intra-organizational information sharing; and the four constructs of Supply Chain Performance represents expenses of costs, asset utilization, supply chain reliability, and supply chain flexibility and responsiveness. The theoretical and practical implications of the study, as well as directions for future research, are discussed.Keywords: supply chain integration, supply chain management, information sharing, supply chain performance
Procedia PDF Downloads 26111901 Exploring the Effectiveness and Challenges of Implementing Self-Regulated Learning to Improve Spoken English
Authors: Md. Shaiful Islam, Mahani Bt. Stapa
Abstract:
To help learners overcome their struggle in developing proficiency in spoken English, self-regulated learning strategies seem to be promising. Students in the private universities in Bangladesh are expected to communicate with the teachers, peers, and staff members in English, but most of them suffer from their inadequate oral communicative competence in English. To address this problem, the researchers adopted a qualitative research approach to answer the research questions. They employed the learner diary method to collect data from the first-semester undergraduate students of a reputed private university in Bangladesh who were involved in writing weekly diaries about their use of self-regulated learning strategies to improve speaking in an English speaking course. The learners were provided with prompts for writing the diaries. The thematic analysis method was applied to analyze the entries of the diaries for the identification of themes. Seven strategies related to the effectiveness of SRL for the improvement of spoken English were identified from the data, and they include goal-setting, strategic planning, identifying the sources of self-motivation, help-seeking, environmental restructuring, self-monitoring, and self-evaluation. However, the students reported in their diaries that they faced challenges that impeded their SRL strategy use. Five challenges were identified, and they entail the complex nature of SRL, lack of literacy on SRL, teachers’ preference for controlling the class, learners’ past habit of learning, and students’ addiction to gadgets. The implications the study addresses include revising the syllabus and curriculum, facilitating SRL training for students and teachers, and integrating SRL in the lessons.Keywords: private university in Bangladesh, proficiency, self-regulated learning, spoken English
Procedia PDF Downloads 16011900 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 19111899 Factors Affecting Human Resource Managers Information Behavior
Authors: Sevim Oztimurlenk
Abstract:
This is an exploratory study on the information behavior of human resource managers. This study is conducted by using a questionnaire survey and an interview. The data is gathered from 140 HR managers who are members of the People Management Association of Turkey (PERYÖN), and the 15 interviewees were chosen among those 140 survey participants randomly. The goal of this exploratory study is to investigate the impact of some factors (i.e., gender, age, work experience, number of employee reporting, company size, industry type) on HR managers’ information behavior. More specifically, it examines if there is a relationship between those factors and HR managers’ information behavior in terms of what kind of information sources they consult and reviews and whom they prefer to communicate with for information sharing. It also aims to find out additional factors influencing the information behavior of HR managers. The results of the study show that age and industry type are the two factors affecting the information behavior of HR managers, among other factors investigated in terms of information source, use and share. Moreover, personality, technology, education, organizational culture, and culture are the top five factors among the 24 additional factors suggested by HR managers who participated in this study.Keywords: information behavior, information use, information source, information share, human resource managers
Procedia PDF Downloads 14511898 Models of Start-Ups Created in Cooperation with a State University
Authors: Roman Knizek, Denisa Knizkova, Ludmila Fridrichova
Abstract:
The academic environment in Central Europe has recently been transforming itself and is trying to link its research and development with the private sector. However, compared to Western countries, there is a lack of history and continuity because of the centrally controlled economy from the end of the Second World War until the early 1990s. There are two basic models of how to carry out technology transfer between the academic and the business world. The first is to develop something new and then find a suitable private sector partner; the second is to find a partner who has the basic idea and then develop something new in collaboration. This study, unlike some other ones, describes two specific cases that took place in cooperation with the Technical University of Liberec, Faculty of Textiles. As was said before, in one case, a product was first developed, and after that, an investor was sought, and in the other case, there was an investor who wanted a specific product and wanted to help with its development. The study describes the various advantages and disadvantages, including a practical example of the creation of a subsequent start-up.Keywords: start-up, state university, academic environment, licensing agreement
Procedia PDF Downloads 1511897 To Cloudify or Not to Cloudify
Authors: Laila Yasir Al-Harthy, Ali H. Al-Badi
Abstract:
As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors. The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter. This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services. Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change. The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.Keywords: cloud computing, cloud deployment models, cloud service models, deciding factors
Procedia PDF Downloads 29711896 Information Technologies in Automotive Assembly Industry in Thailand
Authors: Jirarat Teeravaraprug, Usawadee Inklay
Abstract:
This paper gave an attempt in prioritizing information technologies that organizations should give concentration. The case study was organizations in the automotive assembly industry in Thailand. Data were first collected to gather all information technologies known and used in the automotive assembly industry in Thailand. Five experts from the industries were surveyed based on the concept of fuzzy DEMATEL. The information technologies were categorized into six groups, which were communication, transaction, planning, organization management, warehouse management, and transportation. The cause groups of information technologies for each group were analysed and presented. Moreover, the relationship between the used and the significant information technologies was given. Discussions based on the used information technologies and the research results are given.Keywords: information technology, automotive assembly industry, fuzzy DEMATEL
Procedia PDF Downloads 34511895 Assessment the Manner of Obtaining Hierarchies and Privacy of Traditional Houses Entrance in Providing a Safe Place-Case Study: Traditional Houses in Shiraz
Authors: Zahra A. Barzegar, Maryam B. Golboo
Abstract:
In this paper, the manner of obtaining hierarchies and privacy entry of traditional houses in providing a safe place in the city of Shiraz will be evaluated by qualitative–descriptive methods and 6 old houses are the case study. The houses of Shiraz, as the houses in other cities in Iran are a response to climate and physical features. The old part of Shiraz has a compressed and dense texture in which the houses are in narrow and tight alleys. In this regard, the principles of traditional house entrance design have been introduced. The results show that every house has a private entrance. Direction of the entry of most houses is toward the south and with a turn to the South-East side. Entrance to yard path in all the cases is not straight, and this had been done by using 90 degrees rotates of the corridor leading to the yard. Vestibule provides a private place for the house and entrance stairway to the rooftop is located inside it.Keywords: entrance, components of entrance, hierarchy, frontage, Shiraz houses
Procedia PDF Downloads 30911894 Composite Distributed Generation and Transmission Expansion Planning Considering Security
Authors: Amir Lotfi, Seyed Hamid Hosseini
Abstract:
During the recent past, due to the increase of electrical energy demand and governmental resources constraints in creating additional capacity in the generation, transmission, and distribution, privatization, and restructuring in electrical industry have been considered. So, in most of the countries, different parts of electrical industry like generation, transmission, and distribution have been separated in order to create competition. Considering these changes, environmental issues, energy growth, investment of private equity in energy generation units and difficulties of transmission lines expansion, distributed generation (DG) units have been used in power systems. Moreover, reduction in the need for transmission and distribution, the increase of reliability, improvement of power quality, and reduction of power loss have caused DG to be placed in power systems. On the other hand, considering low liquidity need, private investors tend to spend their money for DGs. In this project, the main goal is to offer an algorithm for planning and placing DGs in order to reduce the need for transmission and distribution network.Keywords: planning, transmission, distributed generation, power security, power systems
Procedia PDF Downloads 48011893 Policy Imperatives for Privatisation of Higher Education in India
Authors: Roli Pradhan
Abstract:
All over the globe, the resources of the government are declining, and the funding requirements in education are on a constant rise. The governments are desperately increasing the budgetary allocation for higher education, the economic plans have been labeling investment in higher education to be immensely vital for development of the nation. Still the fact is that the government of the developing nations like India lacks the potential to fund the rising demands of this sector. In the face of declining government funding for higher education, there are the growing needs and justifiable pressure for direct beneficiaries to bear a reasonable part of the cost of higher education. The supply-demand gap in higher education in India is on the increase. This paper evaluates the Indian National Education Policy over the past three decades, furnishes the need of financing of education by private players. The paper also covers the aspects of incorporating the different forms of financing in education and also focuses on the regulations pertaining to quality maintenance in the education system. The paper also targets to suggest policy imperatives for the future education policy for India.Keywords: national education policy, privatisation, private financing, government funding
Procedia PDF Downloads 32611892 Hepatitis B Vaccination Status and Its Determinants among Primary Health Care Workers in Northwest Pakistan
Authors: Mohammad Tahir Yousafzai, Rubina Qasim
Abstract:
We assessed Hepatitis B vaccination and its determinants among health care workers (HCW) in Northwest Pakistan. HCWs from both public and private clinics were interviewed about hepatitis B vaccination, socio-demographic, hepatitis B virus transmission modes, disease threat and benefits of vaccination. Logistic regression was performed. Hepatitis B vaccination was 40% (Qualified Physicians: 86% and non-qualified Dispensers:16%). Being Qualified Physician (Adj. OR 26.6; 95%CI 9.3-73.2), Non-qualified Physician (Adj.OR 1.9; 95%CI 0.8-4.6), qualified Dispensers (Adj. OR 3.6; 95%CI 1.3-9.5) compared to non-qualified Dispensers, working in public clinics (Adj. OR 2.5; 95%CI 1.1-5.7) compared to private, perceived disease threat after exposure to blood and body fluids (Adj. OR 1.1; 95%CI 1.1-1.2) and perceived benefits of vaccination (Adj. OR 1.1; 95%CI 1.1-1.2) were significant predictors of hepatitis B vaccination. Improved perception of disease threat and benefits of vaccination and qualification of HCWs are associated with hepatitis B vaccination.Keywords: Hepatitis B vaccine, immunization, healthcare workers, primary health
Procedia PDF Downloads 31511891 Organizational Culture of a Public and a Private Hospital in Brazil
Authors: Fernanda Ludmilla Rossi Rocha, Thamiris Cavazzani Vegro, Silvia Helena Henriques Camelo, Carmen Silvia Gabriel, Andrea Bernardes
Abstract:
Introduction: Organizations are cultural, symbolic and imaginary systems composed by values and norms. These values and norms represent the organizational culture, which determines the behavior of the workers, guides the work practices and impacts the quality of care and the safety culture of health services worldwide. Objective: To analyze the organizational culture of a public and a private hospital in Brazil. Method: Descriptive study with quantitative approach developed in a public and in a private hospital of Brazil. Sample was composed by 281 nursing workers, of which 73 nurses and 208 nursing auxiliaries and technicians. The data collection instrument comprised the Brazilian Instrument for Assessing Organizational Culture. Data were collected from March to December 2013. Results: At the public hospital, the results showed an average score of 2.85 for the values concerning cooperative professionalism (CP); 3.02 for values related to hierarchical rigidity and the centralization of power (HR); 2.23 for individualistic professionalism and competition at work (IP); 2.22 for values related to satisfaction, well-being and motivation of workers (SW); 3.47 for external integration (EI); 2.03 for rewarding and training practices (RT); 2.75 for practices related to the promotion of interpersonal relationships (IR) About the private hospital, the results showed an average score of 3.24 for the CP; 2.83 for HR; 2.69 for IP; 2.71 for SW; 3.73 for EI; 2.56 for RT; 2.83 for IR at the hospital. Discussion: The analysis of organizational values of the studied hospitals shows that workers find the existence of hierarchical rigidity and the centralization of power in the institutions; believed there was cooperation at workplace, though they perceived individualism and competition; believed that values associated with the workers’ well-being, satisfaction and motivation were seldom acknowledged by the hospital; believed in the adoption of strategic planning actions within the institution, but considered interpersonal relationship promotion, continuous education and the rewarding of workers to be little valued by the institution. Conclusion: This work context can lead to professional dissatisfaction, compromising the quality of care and contributing to the occurrence of occupational diseases.Keywords: nursing management, organizational culture, quality of care, interpersonal relationships
Procedia PDF Downloads 44011890 Information Seekers vs. Information Providers: New Vistas and New Challenges for the Libraries Today; A Case Study of the Panjab University Library, Chandigarh, India
Authors: Neeru Bhatia
Abstract:
This article presents the results of a case study designed to analyze and deduce Information seekers and the Information Providers in today’s context, wherein we come across a sea of change in the provision of Information services due to the changing electronic environment. The Panjab University Library is one of the biggest libraries of India and was inaugurated in 1963 by Pt. Jawaharlal Nehru, the then Prime Minister of India. The library always thrives to assimilate new technology for the provision of Information services. As we know that the Information seekers today are a whole lot different, they are tech savvy, like to be on their electronic gadgets most of the time, and their Information seeking patterns are also different, the challenge that lies before the libraries is to be always ready for these day to day challenges. The study explores the current status of the Information Services being provided by the Panjab University Library (the Information Providers) vs. the evaluation of these Information services by the users of Library (the Information Seekers). The present study aimed at finding out whether Panjab University Library is able to achieve its mission to be an innovative and user-oriented library by exploring all the new vistas and reach up to the expectations of the information seekers by taking up all the challenges being posed by the ever changing technological scenario.Keywords: electronic environment, information seekers, information providers, new technology
Procedia PDF Downloads 26211889 Electronic Resources and Information Literacy in Higher Education Library
Authors: Nirmal Singh, Rajesh Kumar
Abstract:
Abstract- Information literacy aims to develop both critical understanding and active participation in scholars. It enables scholars to interpret and make informed judgments as users of information sources, and it also enables them to become producers of information in their own right, and thereby to become more powerful participants in society. Information literacy is about developing people‘s critical and creative abilities. Digital media – and particularly the Internet – significantly increase the potential for such active participation of the individual, provided scholars have the means and training to effectively access and use them. This paper provides definition, standards and importance of information literacy (IL). Keywords: Information literacy, Digital Media, Training, Communications Technologies.Keywords: Information literacy, Digital Media, Training, , Communications Technologies
Procedia PDF Downloads 15811888 Use of Information and Communication Technologies in Enhancing Health Care Delivery for Human Immunodeficiency Virus Patients in Bamenda Health District
Authors: Abanda Wilfred Chick
Abstract:
Background: According to World Health Organization (WHO), the role of Information and Communication Technologies (ICT) in health sectors of developing nations has been demonstrated to have had a great improvement of fifty percent reduction in mortality and or twenty-five-fifty percent increase in productivity. The objective of this study was to assess the use of information and communication technologies in enhancing health care delivery for Human Immunodeficiency Virus (HIV) patients in Bamenda Health District. Methods: This was a descriptive-analytical cross-sectional study in which 388 participants were consecutively selected amongst health personnel and HIV patients from public and private health institutions involved in Human Immunodeficiency Virus management. Data on socio-demographic variables, the use of information and communication technologies tools, and associated challenges were collected using structured questionnaires. Descriptive statistics with a ninety-five percent confidence interval were used to summarize findings, while Cramer’s V test, logistic regression, and Chi-square test were used to measure the association between variables, Epi info version7.2, MS Excel, and SPSS version 25.0 were utilized for data entry and statistical analysis respectively. Results: Of the participants, one-quarter were health personnel, and three-quarters were HIV patients. For both groups of participants, there was a significant relationship between the use of ICT and demographic information such as level of education, marital status, and age (p<0.05). For the impediments to using ICT tools, a greater proportion identified the high cost of airtime or internet bundles, followed by an average proportion that indicated inadequate training on ICT tools; for health personnel, the majority said inadequate training on ICT tools/applications and half said unavailability of electricity. Conclusion: Not up to half of the HIV patients effectively make use of ICT tools/applications to receive health care. Of health personnel, three quarters use ICTs, and only one quarter effectively use mobile phones and one-third of computers, respectively, to render care to HIV patients.Keywords: ICT tools, HIV patients, health personnel, health care delivery
Procedia PDF Downloads 8411887 Investment Adjustments to Exchange Rate Fluctuations Evidence from Manufacturing Firms in Tunisia
Authors: Mourad Zmami Oussema BenSalha
Abstract:
The current research aims to assess empirically the reaction of private investment to exchange rate fluctuations in Tunisia using a sample of 548 firms operating in manufacturing industries between 1997 and 2002. The micro-econometric model we estimate is based on an accelerator-profit specification investment model increased by two variables that measure the variation and the volatility of exchange rates. Estimates using the system the GMM method reveal that the effects of the exchange rate depreciation on investment are negative since it increases the cost of imported capital goods. Turning to the exchange rate volatility, as measured by the GARCH (1,1) model, our findings assign a significant role to the exchange rate uncertainty in explaining the sluggishness of private investment in Tunisia in the full sample of firms. Other estimation attempts based on various sub samples indicate that the elasticities of investment relative to the exchange rate volatility depend upon many firms’ specific characteristics such as the size and the ownership structure.Keywords: investment, exchange rate volatility, manufacturing firms, system GMM, Tunisia
Procedia PDF Downloads 41011886 Anthropometric Parameters of Classroom Furniture in Public and Private Universities of Karachi
Authors: Farhan Iqbal
Abstract:
Ergonomics has its implication in classroom. Present study aimed at finding out the comfort level of students at university level due to classroom furniture which may affect students learning. Two public and one private institution was targeted. Purposive sampling was done. Four hundred and seventy five students volunteered to reply to a questionnaire. Different furniture were measured and descriptively compared with ISO 5970 standard. Overall discomfort was found to be statistically significant as compared to comfort. Comfort and discomfort were found to be negatively correlated. Gender did not differ on upper body discomfort, though, the median score found men to be more comfortable at upper body. GPA was found to be independent of comfort level. Most afflicted areas were neck, shoulder, upper back, lower back and pelvic. The present study will be helpful for all educational institutions of Pakistan. Future studies may be carried out with structural and functional anthropometric data of students for redesigning of the classroom furniture.Keywords: anthropometry, classroom furniture, comfort, discomfort, learning
Procedia PDF Downloads 310