Search results for: business transformation
1570 The Constitutional Rights of a Child to a Clean and Healthy Environment: A Case Study in the Vaal Triangle Region
Authors: Christiena Van Der Bank, Marjone Van Der Bank, Ronelle Prinsloo
Abstract:
The constitutional right to a healthy environment and the constitutional duty imposed on the state actively to protect the environment fulfill the specific duties to prevent pollution and ecological degradation and to promote conservation. The aim of this paper is to draw attention to the relationship between child rights and the environment. The focus is to analyse government’s responses as mandated with section 24 of the Bill of Rights for ensuring the right to a clean and healthy environment. The principle of sustainability of the environment encompasses the notion of equity and the harm to the environment affects the present as well as future generations. Section 24 obliges the state to ensure that the legacy of future generations is protected, an obligation that has been said to be part of the common law. The environment is an elusive and wide concept that can mean different things to different people depending on the context in which it is used for example clean drinking water or safe food. An extensive interpretation of the term environment would include almost everything that may positively or negatively influence the quality of human life. The analysis will include assessing policy measures, legislation, budgetary measures and other measures taken by the government in order to progressively meet its constitutional obligation. The opportunity of the child to grow up in a healthy and safe environment is extremely unjustly distributed. Without a realignment of political, legal and economic conditions this situation will not fundamentally change. South Africa as a developing country that needs to meet the demand of social transformation and economic growth whilst at the same time expediting its ability to compete in global markets, the country will inevitably embark on developmental programmes as a measure for sustainable development. The courts would have to inquire into the reasonableness of those measures. Environmental threats to children’s rights must be identified, taking into account children’s specific needs and vulnerabilities, their dependence and marginalisation. Obligations of states and violations of rights must be made more visible to the general public.Keywords: environment, children rights, pollution, healthy, violation
Procedia PDF Downloads 1751569 Sustainable Approach in Textile and Apparel Industry: Case Study Applied to a Medium Enterprise
Authors: Maged Kamal
Abstract:
Previous research papers have suggested that enhancing the environmental performance in textiles and apparel industry would affect positively on the overall enterprise competitiveness. However, there is a gap in the literature regarding simplifying the available theory to get it practically implemented with more confidence of the expected results, especially for small and medium enterprises. The aim of this paper is to simplify and best use of the concerned international norms to produce a systematic approach that could be used as a guideline for practical application of the main sustainable principles in medium size textile business. The increasing in efficiency which has been resulted from the implementation of the suggested approach/model originated from reduction in raw materials usage, energy, and water savings, in addition to the risk reduction for the people and the environment. The practical case study has been implemented in a textile factory producing knitted fabrics, readymade garments, dyed and printed fabrics. The results were analyzed to examine the effect of the suggested change on the enterprise profitability.Keywords: apparel industry, environmental management, sustainability, textiles
Procedia PDF Downloads 2961568 The Key Factors in Shipping Company's Port Selection for Providing Their Supplies
Authors: Sedigheh Zarei
Abstract:
The aim of this research is to identify the key factors in shipping company’s port selection in order to providing their requirement. To identify and rank factors that are play the main role in selecting port for providing the ship supplies. At the first step, Data were collected via Semi-structured interviews, The aim was to generate knowledge on how shipping company select the port and suppliers for providing their needs. 37 port selection factors were chosen from the previous researches and field interviews and have been categorized into two groups of port's factor and the factors of services of suppliers companies. The current study adopts a questionnaire survey to the main shipping companies' operators in Iran. Their responses reveal that level of services of supplying companies and customs rules play the important role in selecting the ports. Our findings could affect decisions made by port authorities to consider that supporting the privet sections for ship chandelling business could have the best result in attracting ships.Keywords: ship supplier, port selection, ship chandler, provision
Procedia PDF Downloads 4581567 Solar-Powered Smart Irrigation System as an Adaptation Strategy under Climate Change: A Case Study to Develop Medicinal Security Based on Ancestral Knowledge
Authors: Luisa Cabezas, Karol Leal, Harold Mendoza, Fabio Trochez, Angel Lozada
Abstract:
According to the 2030 Agenda for Sustainable Development Goals (SDG) in which equal importance is given to economic, social, and environmental dimensions where the equality and dignity of each human person is placed at the center of discussion, changing the development concept for one with more responsibility with the environment. It can be found that the energy and food systems are deeply entangled, and they are transversal to the 17 proposed SDG. In this order of ideas, a research project is carried out at Unidad Central del Valle del Cauca (UCEVA) with these two systems in mind, on one hand the energy transition and, on the other hand the transformation of agri-food systems. This project it could be achieved by automation and control irrigation system of medicinal, aromatic, and condimentary plants (MACP) area within the UCEVA Agroecological Farm and located in rural area of Tulua municipality (Valle del Cauca Department, Colombia). This system have allowed to stablish a remote monitoring of MACP area, including MACP moisture measurement, and execute the required system actions. In addition, the electrical system of irrigation control system is powered by a scalable photovoltaic solar energy system based on its specifications. Thus, the developed system automates and control de irrigation system, which is energetically self-sustainable and allows to satisfy the MACP area requirements. Is important to highlight that at MACP area, several medicinal, aromatic, and condimentary plants species are preserved to become primary sources for the pharmaceutical industry and, in many occasions, the only medicines for many communities. Therefore, preserve medicinal plants area would generates medicinal security and preserve cultural heritage as these plants are part of ancestral knowledge that penetrate academic and research communities at UCEVA campus to other society sectors.Keywords: ancestral knowledge, climate change, medicinal plants, solar energy
Procedia PDF Downloads 2401566 An Efficient Hardware/Software Workflow for Multi-Cores Simulink Applications
Authors: Asma Rebaya, Kaouther Gasmi, Imen Amari, Salem Hasnaoui
Abstract:
Over these last years, applications such as telecommunications, signal processing, digital communication with advanced features (Multi-antenna, equalization..) witness a rapid evaluation accompanied with an increase of user exigencies in terms of latency, the power of computation… To satisfy these requirements, the use of hardware/software systems is a common solution; where hardware is composed of multi-cores and software is represented by models of computation, synchronous data flow (SDF) graph for instance. Otherwise, the most of the embedded system designers utilize Simulink for modeling. The issue is how to simplify the c code generation, for a multi-cores platform, of an application modeled by Simulink. To overcome this problem, we propose a workflow allowing an automatic transformation from the Simulink model to the SDF graph and providing an efficient schedule permitting to optimize the number of cores and to minimize latency. This workflow goes from a Simulink application and a hardware architecture described by IP.XACT language. Based on the synchronous and hierarchical behavior of both models, the Simulink block diagram is automatically transformed into an SDF graph. Once this process is successfully achieved, the scheduler calculates the optimal cores’ number needful by minimizing the maximum density of the whole application. Then, a core is chosen to execute a specific graph task in a specific order and, subsequently, a compatible C code is generated. In order to perform this proposal, we extend Preesm, a rapid prototyping tool, to take the Simulink model as entry input and to support the optimal schedule. Afterward, we compared our results to this tool results, using a simple illustrative application. The comparison shows that our results strictly dominate the Preesm results in terms of number of cores and latency. In fact, if Preesm needs m processors and latency L, our workflow need processors and latency L'< L.Keywords: hardware/software system, latency, modeling, multi-cores platform, scheduler, SDF graph, Simulink model, workflow
Procedia PDF Downloads 2711565 China's Role in Promoting Regionalism in East Asia in Post-Maoist Era: An Analysis through Uneven and Combined Development
Authors: Ali Jibran
Abstract:
China was considered as a revisionist state by the countries of East Asia during Maoist era; but China’s role changed from a revisionist state to a constructive member of East Asian Community in post-Maoist era. This research will mainly investigate the two phenomena: what were reasons of behavioral change of China in East Asia and what role has China played to promote regionalism in East Asia since Open Door Policy of Deng Xiaoping. To understand these two phenomena, this study applies the international relations theory of Uneven and Combined Development (U&CD). The central finding of this study is that ‘whip of external necessity’ posed by the Western dominance during the Chinese ‘century of ignominy’ resulted in a Maoist regime in China in 1948 which was hostile to its neighbors due to ideological tensions. Maoist regime in China could not solve the challenges posed by the ‘international’; therefore after Mao’s death, a new economic approach was introduced in China to deal with the challenges postured by the ‘international’. Due to Deng Xiaoping’s 'Open Door Policy' era, China used its ‘privilege of historic backwardness’ and witnessed unprecedented economic growth. As the societies are multiple and exist in real time, therefore interaction among societies is pertinent. Export oriented domestic policy pushed China to concentrate less on class struggle and improve its relations with its neighbors in East Asia. As China soon become a global hub of trade after market oriented reforms, therefore friendly relations with the states of East Asia was pertinent. This study will investigate Chinese role in regionalism in East Asia in three area: Chinese role in promoting regionalism in East Asia, China’s role in economic integration in East Asia and China’s role in combatting terrorism in East Asia. This study will be divided in two section. The first section will deal with the transformation in Chinese behavior in East Asia in post Maoist era, and the second section will analyze China’s role in East Asia by looking at Chinese role in institutional mechanism, economic integration and combatting terrorism in East Asia.Keywords: East Asia, regionalism, institutionlism, economic integration
Procedia PDF Downloads 3781564 Designing User Interfaces for Just in Time Enterprise Solution
Authors: Romi Dey
Abstract:
Introduction: One of the most important criteria for technology to sustain and grow is through it’s elaborate and intuitive design methodology and design thinking. Designing for enterprise applications that cater to Just in Time Technology is one of the most challenging and detailed processes any User Experience Designer would come across. Description: The basic principles of Design, when applied to tailor to these technologies, creates an immense challenge and that’s how a set of redefined and revised design principles that can be applied to designing any Just In Time manufacturing solution. Findings: The thorough process of understanding the end user, their existing pain points which they’ve faced in the real world, their responsibilities and expectations, the core needs and last but not the least the demands, creates havoc nurturing of the design methodologies for the Just in Time solutions. With respect to the business aspect, design and design principles play a strong role in any form of innovation. Conclusion: Innovation and knowledge about the latest technologies are the keywords in the manufacturing industry. It becomes crucial for the product development team to be precise in their understanding of the technology and being sure of end users expectation.Keywords: design thinking, enterprise application, Just in Time, user experience design
Procedia PDF Downloads 1721563 Examining Effects of Electronic Market Functions on Decrease in Product Unit Cost and Response Time to Customer
Authors: Maziyar Nouraee
Abstract:
Electronic markets in recent decades contribute remarkably in business transactions. Many organizations consider traditional ways of trade non-economical and therefore they do trade only through electronic markets. There are different categorizations of electronic markets functions. In one classification, functions of electronic markets are categorized into classes as information, transactions, and value added. In the present paper, effects of the three classes on the two major elements of the supply chain management are measured. The two elements are decrease in the product unit cost and reduction in response time to the customer. The results of the current research show that among nine minor elements related to the three classes of electronic markets functions, six factors and three factors influence on reduction of the product unit cost and reduction of response time to the customer, respectively.Keywords: electronic commerce, electronic market, B2B trade, supply chain management
Procedia PDF Downloads 3931562 Surface Motion of Anisotropic Half Space Containing an Anisotropic Inclusion under SH Wave
Authors: Yuanda Ma, Zhiyong Zhang, Zailin Yang, Guanxixi Jiang
Abstract:
Anisotropy is very common in underground media, such as rock, sand, and soil. Hence, the dynamic response of anisotropy medium under elastic waves is significantly different from the isotropic one. Moreover, underground heterogeneities and structures, such as pipelines, cylinders, or tunnels, are usually made by composite materials, leading to the anisotropy of these heterogeneities and structures. Both the anisotropy of the underground medium and the heterogeneities have an effect on the surface motion of the ground. Aiming at providing theoretical references for earthquake engineering and seismology, the surface motion of anisotropic half-space with a cylindrical anisotropic inclusion embedded under the SH wave is investigated in this work. Considering the anisotropy of the underground medium, the governing equation with three elastic parameters of SH wave propagation is introduced. Then, based on the complex function method and multipolar coordinates system, the governing equation in the complex plane is obtained. With the help of a pair of transformation, the governing equation is transformed into a standard form. By means of the same methods, the governing equation of SH wave propagation in the cylindrical inclusion with another three elastic parameters is normalized as well. Subsequently, the scattering wave in the half-space and the standing wave in the inclusion is deduced. Different incident wave angle and anisotropy are considered to obtain the reflected wave. Then the unknown coefficients in scattering wave and standing wave are solved by utilizing the continuous condition at the boundary of the inclusion. Through truncating finite terms of the scattering wave and standing wave, the equation of boundary conditions can be calculated by programs. After verifying the convergence and the precision of the calculation, the validity of the calculation is verified by degrading the model of the problem as well. Some parameters which influence the surface displacement of the half-space is considered: dimensionless wave number, dimensionless depth of the inclusion, anisotropic parameters, wave number ratio, shear modulus ratio. Finally, surface displacement amplitude of the half space with different parameters is calculated and discussed.Keywords: anisotropy, complex function method, sh wave, surface displacement amplitude
Procedia PDF Downloads 1231561 Achieving Success in NPD Projects
Authors: Ankush Agrawal, Nadia Bhuiyan
Abstract:
The new product development (NPD) literature emphasizes the importance of introducing new products on the market for continuing business success. New products are responsible for employment, economic growth, technological progress, and high standards of living. Therefore, the study of NPD and the processes through which they emerge is important. The goal of our research is to propose a framework of critical success factors, metrics, and tools and techniques for implementing metrics for each stage of the new product development (NPD) process. An extensive literature review was undertaken to investigate decades of studies on NPD success and how it can be achieved. These studies were scanned for common factors for firms that enjoyed success of new products on the market. The paper summarizes NPD success factors, suggests metrics that should be used to measure these factors, and proposes tools and techniques to make use of these metrics. This was done for each stage of the NPD process, and brought together in a framework that the authors propose should be followed for complex NPD projects. While many studies have been conducted on critical success factors for NPD, these studies tend to be fragmented and focus on one or a few phases of the NPD process.Keywords: new product development, performance, critical success factors, framework
Procedia PDF Downloads 4001560 The Antecedents of Customer-to-Customer Interaction to Brand and Communication Strategy: A Marketer’s Perspective
Authors: Kartina Sury Kariman
Abstract:
Brand-to-customer (B2C) engagement has been well established through the traditional platform such as direct sales, advertising, customer service center, customer hotline as well as brand usage experiences. Increasingly, interest to B2C has evolved to include customer-to-customer (C2C) interaction analysis aligned with the vast growth of web 2.0. Hence, discussion on C2C interaction and brand strategy have captured social media as it enables brands and C2C interaction to be connected in various ways, providing opportunities for marketers to shape their brand engagement strategy while reaching C2C as the targeted outcomes. The objective here is to provide a preliminary review of C2C interaction consisting the antecedents and consequences while highlighting areas of research interest within the context from marketers perspective and the business outcomes. This paper discusses how C2C interaction defines marketers’ brand and communication strategy and how social media trend shapes the strategy when promoting the awareness of life insurance industry and educating the target market.Keywords: social media, brand engagement, customer interaction, customer engagement, brand strategy, life insurance
Procedia PDF Downloads 4611559 An East-West Trans-Cultural Study: Zen Enlightenment in Asian and John Cage's Visual Arts
Authors: Yu-Shun Elisa Pong
Abstract:
American composer John Cage (1912-1992) is an influential figure in musical, visual and performing arts after World War II and has also been claimed as a forerunner of the western avant-garde in the artistic field. However, the crucial factors contributed to his highly acclaimed achievements include the Zen enlightenment, which he mainly got from Japanese Zen master D. T. Suzuki (1870-1966). As a kind of reflection and afterthought of the Zen inspiration, John Cage created various forms of arts in which visual arts have recently attracted more and more attention and discussion, especially from the perspectives of Zen. John Cage had started to create visual art works since he was 66 years old and the activity had lasted until his death. The quality and quantity of the works are worthy of in-depth study— the 667 pieces of print, 114 pieces of water color, and about 150 pieces of sketch. Cage’s stylistic changes during the 14 years of creation are quite obvious, and the Zen elements in the later works seem to be omnipresent. Based on comparative artistic study, a historical and conceptual view of Zen art that was formed initially in the traditional Chinese and Japanese visual arts will be discussed. Then, Chinese and Japanese representative Zen works will be mentioned, and the technique aspect, as well as stylistic analysis, will be revealed. Finally, a comprehensive comparison of the original Oriental Zen works with John Cage’s works and focus on the influence, and art transformation will be addressed. The master pieces from Zen tradition by Chinese artists like Liang Kai (d. 1210) and Ma Yuan (1160-1225) from Southern Sung Dynasty, the Japanese artists like Sesshū (1420-1506), Miyamoto Musashi (1584-1645) and some others would be discussed. In the current study, these art works from different periods of historical development in Zen will serve as the basis of analogy, interpretation, and criticism to Cage's visual art works. Through the perspectives of the Zen authenticity from Asia, we see how John Cage appropriated the eastern culture to his innovation, which changed the art world forever. And it is believed that through a transition from inter-, cross-, toward trans-cultural inspiration, John Cage set up a unique pathway of art innovations.Keywords: John Cage, Chinese Zen art, Japanese Zen art, visual art
Procedia PDF Downloads 5251558 High Culture or Low Culture: The Propagation and Popularization of the Classic of Poetry in Modern China
Authors: Fang Tang
Abstract:
A major Confucian masterpiece and the earliest-known poetry anthology (composed approximately 1046-771 BCE), The Classic of Poetry, reflects different cultures in ancient China. It is regarded as a Chinese classic and one of the world’s most significant written works, an essential part of our global cultural heritage. This paper explores how the ancient Chinese classic became transformed into part of popular culture, found in folk songs circulated in Fangxian county, a mountainous location in Hubei province in central mainland China. It is the hometown of one of the most well-known authors of The Classic of Poetry, whose name is Yin Jifu. Local villagers process, refine, and recreate these poems into popular folk songs, which have been handed down from generation to generation. The folk songs based on The Classic of Poetry vividly reflect local customs, life styles, and various cultural activities. After thousands of years of singing these traditional songs, the region has become an important area to maintain part of Chinese cultural heritages; here, the original high culture is converted into a popular culture that is absorbed into people’s daily life. Based on a year’s field research and many interviews with local singers, this paper explores the ways in which locals have transformed the contents of The Classic of Poetry. It examines how today these popular folk songs become part of much-treasured culture heritage, illustrating the transformation of traditional high culture into popular culture. The paper argues that the modern adaptations of the traditional poems of The Classic of Poetry combine both oral and written cultural heritage and reflects the interaction between ancient Chinese official literature and folk literature. The paper also explores the reasons why the folk songs of The Classic of Poetry are so popular in the area, including the influences of its author Yin Jifu, the impact of ancient diasporic culture from the political centre to remote rural areas, and the interactions of local cultures (famous as Chu culture) and Chinese mainstream cultural policies.Keywords: high/low culture, The Classic of Poetry, the functions of media, cultural policy
Procedia PDF Downloads 1061557 Higher Education in India Strength, Weakness, Opportunities and Threats
Authors: Renu Satish Nair
Abstract:
Indian higher education system is the third largest in the world next to United States and China. India is experiencing a rapid growth in higher education in terms of student enrollment as well as establishment of new universities, colleges and institutes of national importance. Presently about 22 million students are being enrolled in higher education and more than 46 thousand institutions’ are functioning as centers of higher education. Indian government plays a 'command and control' role in higher education. The main governing body is University Grants Commission, which enforces its standards, advises the government, and helps coordinate between the centre and the state. Accreditation of higher learning is over seen by 12 autonomous institutions established by the University Grants Commission. The present paper is an effort to analyze the strength, weakness, opportunities and threat (SWOT Analysis) of Indian Higher education system. The higher education in India is progressing ahead by virtue of its strength which is being recognized at global level. Several institutions of India, such as Indian Institutes of Technology (IITs), Indian Institutes of Management (IIMs) and National Institutes of Technology (NITs) have been globally acclaimed for their standard of education. Three Indian universities were listed in the Times Higher Education list of the world’s top 200 universities i.e. Indian Institutes of Technology, Indian Institute of Management and Jawahar Lal Nehru University in 2005 and 2006. Six Indian Institutes of Technology and the Birla Institute of Technology and Science - Pilani were listed among the top 20 science and technology schools in Asia by the Asia Week. The school of Business situated in Hyderabad was ranked number 12 in Globe MBA ranking by the Financial Times of London in 2010 while the All India Institute of Medical Sciences has been recognized as a global leader in medical research and treatment. But at the same time, because of vast expansion, the system bears several weaknesses. The Indian higher education system in many parts of the country is in the state of disrepair. In almost half the districts in the country higher education enrollment are very low. Almost two third of total universities and 90% of colleges are rated below average on quality parameters. This can be attributed to the under prepared faculty, unwieldy governance and other obstacles to innovation and improvement that could prohibit India from meeting its national education goals. The opportunities in Indian higher education system are widely ranged. The national institutions are training their products to compete at global level and make them capable to grab opportunities worldwide. The state universities and colleges with their limited resources are giving the products that are capable enough to secure career opportunities and hold responsible positions in various government and private sectors with in the country. This is further creating opportunities for the weaker section of the society to join the main stream. There are several factors which can be defined as threats to Indian higher education system. It is a matter of great concern and needs proper attention. Some important factors are -Conservative society, particularly for women education; -Lack of transparency, -Taking higher education as a means of businessKeywords: Indian higher education system, SWOT analysis, university grants commission, Indian institutes of technology
Procedia PDF Downloads 8991556 Measuring Government’s Performance (Services) Oman Service Maturity Model (OSMM)
Authors: Angie Al Habib, Khalid Al Siyabi
Abstract:
To measure or asses any government’s efficiency we need to measure the performance of this government in regards to the quality of the service it provides. Using a technological platform in service provision became a trend and a public demand. It is also a public need to make sure these services are aligned to values and to the whole government’s strategy, vision and goals as well. Providing services using technology tools and channels can enhance the internal business process and also help establish many essential values to government services like transparency and excellence, since in order to establish e-services many standards and policies must be put in place to enable the handing over of decision making to a mature system oriented mechanism. There was no doubt that the Sultanate of Oman wanted to enhance its services and move it towards automation and establishes a smart government as well as links its services to life events. Measuring government efficiency is very essential in achieving social security and economic growth, since it can provide a clear dashboard of all projects and improvements. Based on this data we can improve the strategies and align the country goals to them.Keywords: government, maturity, Oman, performance, service
Procedia PDF Downloads 3691555 Advancing the Hi-Tech Ecosystem in the Periphery: The Case of the Sea of Galilee Region
Authors: Yael Dubinsky, Orit Hazzan
Abstract:
There is a constant need for hi-tech innovation to be decentralized to peripheral regions. This work describes how we applied design science research (DSR) principles to define what we refer to as the Sea of Galilee (SoG) method. The goal of the SoG method is to harness existing and new technological initiatives in peripheral regions to create a socio-technological network that can initiate and maintain hi-tech activities. The SoG method consists of a set of principles, a stakeholder network, and actual hi-tech business initiatives, including their infrastructure and practices. The three cycles of DSR, the Relevance, Design, and Rigor cycles, layout a research framework to sharpen the requirements, collect data from case studies, and iteratively refine the SoG method based on the existing knowledge base. We propose that the SoG method can be deployed by regional authorities that wish to be considered smart regions (an extension of the notion of smart cities).Keywords: design science research, socio-technological initiatives, Sea of Galilee method, periphery stakeholder network, hi-tech initiatieves
Procedia PDF Downloads 1321554 Estimation of the Upper Tail Dependence Coefficient for Insurance Loss Data Using an Empirical Copula-Based Approach
Authors: Adrian O'Hagan, Robert McLoughlin
Abstract:
Considerable focus in the world of insurance risk quantification is placed on modeling loss values from lines of business (LOBs) that possess upper tail dependence. Copulas such as the Joe, Gumbel and Student-t copula may be used for this purpose. The copula structure imparts a desired level of tail dependence on the joint distribution of claims from the different LOBs. Alternatively, practitioners may possess historical or simulated data that already exhibit upper tail dependence, through the impact of catastrophe events such as hurricanes or earthquakes. In these circumstances, it is not desirable to induce additional upper tail dependence when modeling the joint distribution of the loss values from the individual LOBs. Instead, it is of interest to accurately assess the degree of tail dependence already present in the data. The empirical copula and its associated upper tail dependence coefficient are presented in this paper as robust, efficient means of achieving this goal.Keywords: empirical copula, extreme events, insurance loss reserving, upper tail dependence coefficient
Procedia PDF Downloads 2841553 Forecasting Future Society to Explore Promising Security Technologies
Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim
Abstract:
Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.Keywords: future society, information and communication technology, security technology, technology forecasting
Procedia PDF Downloads 4691552 Impact of Preksha Meditation on Academic Anxiety of Female Teenagers
Authors: Neelam Vats, Madhvi Pathak Pillai, Rajender Lal, Indu Dabas
Abstract:
The pressure of scoring higher marks to be able to get admission in a higher ranked institution has become a social stigma for school students. It leads to various social and academic pressures on them, causing psychological anxiety. This undue stress on students sometimes may even steer to aggressive behavior or suicidal tendencies. Human mind is always surrounded by the some desires, emotions and passions, which usually disturbs our mental peace. In such a scenario, we look for a solution that helps in removing all the obstacles of mind and make us mentally peaceful and strong enough to be able to deal with all kind of pressure. Preksha meditation is one such technique which aims at bringing the positive changes for overall transformation of personality. Hence, the present study was undertaken to assess the impact of Preksha Meditation on the academic anxiety on female teenagers. The study was conducted on 120 high school students from the capital city of India. All students were in the age group of 13-15 years. They also belonged to similar social as well as economic status. The sample was equally divided into two groups i.e. experimental group (N = 60) and control group (N = 60). Subjects of the experimental group were given the intervention of Preksha Meditation practice by the trained instructor for one hour per day, six days a week, for three months for the first experimental stage and another three months for the second experimental stage. The subjects of the control group were not assigned any specific type of activity rather they continued doing their normal official activities as usual. The Academic Anxiety Scale was used to collect data during multi-level stages i.e. pre-experimental stage, post-experimental stage phase-I, and post-experimental stage phase-II. The data were statistically analyzed by computing the two-tailed-‘t’ test for inter group comparison and Sandler’s ‘A’ test with alpha = or p < 0.05 for intra-group comparisons. The study concluded that the practice for longer duration of Preksha Meditation practice brings about very significant and beneficial changes in the pattern of academic anxiety.Keywords: academic anxiety, academic pressure, Preksha, meditation
Procedia PDF Downloads 1331551 The Association between Corporate Social Responsibility Disclosure, Assurance, and Tax Aggressiveness: Evidence from Indonesia
Authors: Eko Budi Santoso
Abstract:
There is a growing interest in Corporate Social Responsibility (CSR) issues in developing countries such as Indonesia. Firms disclose their CSR activities, and some provide assurance to gain recognition as socially responsible firms. However, several of those socially responsible firms involve in tax scandals and raise a question of whether CSR disclosure is used to disguise firm misconduct or as a reflection of socially responsible firms. Specifically, whether firms engage in CSR disclosure and its assurance also responsible for their tax matters. This study examines the association between CSR disclosure and tax aggressiveness and the role of sustainability reporting assurance to the association. This research develops a modified index according to global reporting initiatives to measure CSR disclosure and various measurement for tax aggressiveness. Using a sample of Indonesian go public companies issued CSR disclosure, the empirical result shows that there is an association between CSR disclosure and tax aggressiveness. In addition, results also indicate sustainability reporting assurance moderate those association. The findings suggest that stakeholder in developing countries should examine carefully firms with active CSR disclosure before label it as socially responsible firms. JEL Classification: M14Keywords: CSR disclosure, tax aggressiveness, assurance, business ethics
Procedia PDF Downloads 1411550 Multiscale Analysis of Shale Heterogeneity in Silurian Longmaxi Formation from South China
Authors: Xianglu Tang, Zhenxue Jiang, Zhuo Li
Abstract:
Characterization of shale multi scale heterogeneity is an important part to evaluate size and space distribution of shale gas reservoirs in sedimentary basins. The origin of shale heterogeneity has always been a hot research topic for it determines shale micro characteristics description and macro quality reservoir prediction. Shale multi scale heterogeneity was discussed based on thin section observation, FIB-SEM, QEMSCAN, TOC, XRD, mercury intrusion porosimetry (MIP), and nitrogen adsorption analysis from 30 core samples in Silurian Longmaxi formation. Results show that shale heterogeneity can be characterized by pore structure and mineral composition. The heterogeneity of shale pore is showed by different size pores at nm-μm scale. Macropores (pore diameter > 50 nm) have a large percentage of pore volume than mesopores (pore diameter between 2~ 50 nm) and micropores (pore diameter < 2nm). However, they have a low specific surface area than mesopores and micropores. Fractal dimensions of the pores from nitrogen adsorption data are higher than 2.7, what are higher than 2.8 from MIP data, showing extremely complex pore structure. This complexity in pore structure is mainly due to the organic matter and clay minerals with complex pore network structures, and diagenesis makes it more complicated. The heterogeneity of shale minerals is showed by mineral grains, lamina, and different lithology at nm-km scale under the continuous changing horizon. Through analyzing the change of mineral composition at each scale, random arrangement of mineral equal proportion, seasonal climate changes, large changes of sedimentary environment, and provenance supply are considered to be the main reasons that cause shale minerals heterogeneity from microcosmic to macroscopic. Due to scale effect, the change of shale multi scale heterogeneity is a discontinuous process, and there is a transformation boundary between homogeneous and in homogeneous. Therefore, a shale multi scale heterogeneity changing model is established by defining four types of homogeneous unit at different scales, which can be used to guide the prediction of shale gas distribution from micro scale to macro scale.Keywords: heterogeneity, homogeneous unit, multiscale, shale
Procedia PDF Downloads 4551549 A Sociopreneur Based on Creative Services of Merchandise (Kedaikampus)
Authors: Wildan Maulana, M. Machfudz Sa'idi
Abstract:
Special Region of Yogyakarta (DIY) has more than one hundred campuses of State Universities, and private sector amounted to 137, of course, is not a small amount, from 137 universities in the province there are hundreds of thousands of students, therefore, many kinds of businesses and business opportunities can provide support facilities supporting the needs of students ranging from life support classes or students who come from various regions in Indonesia and Abroad can be fulfilled during his education in DI Yogyakarta including the need for primary and secondary needs. KedaiKampus present to facilitate the needs of students in providing secondary needs such as clothing Students and merchandise or trinkets typical college respectively, but the difference with the other, KedaiKampus is to provide distinctive products and clothing and merchandise every college respectively. One goal KedaiKampus presence is to create a culture of confidence in every student who is proud of the college with the products of KedaiKampus because not a few students who are not accepted at State Universities have not been able to forget. In producing a wide range of products, we work with young entrepreneurs engaged in creative services and souvenirs. In addition, we are also working with various designers reliable to make the best design.Keywords: markedplace, sociopreneur, merchandise, creative services
Procedia PDF Downloads 2581548 Cuban's Supply Chains Development Model: Qualitative and Quantitative Impact on Final Consumers
Authors: Teresita Lopez Joy, Jose A. Acevedo Suarez, Martha I. Gomez Acosta, Ana Julia Acevedo Urquiaga
Abstract:
Current trends in business competitiveness indicate the need to manage businesses as supply chains and not in isolation. The use of strategies aimed at maximum satisfaction of customers in a network and based on inter-company cooperation; contribute to obtaining successful joint results. In the Cuban economic context, the development of productive linkages to achieve integrated management of supply chains is considering a key aspect. In order to achieve this jump, it is necessary to develop acting capabilities in the entities that make up the chains through a systematic procedure that allows arriving at a management model in consonance with the environment. The objective of the research focuses on: designing a model and procedure for the development of integrated management of supply chains in economic entities. The results obtained are: the Model and the Procedure for the Development of the Supply Chains Integrated Management (MP-SCIM). The Model is based on the development of logistics in the network actors, the joint work between companies, collaborative planning and the monitoring of a main indicator according to the end customers. The application Procedure starts from the well-founded need for development in a supply chain and focuses on training entrepreneurs as doers. The characterization and diagnosis is done to later define the design of the network and the relationships between the companies. It takes into account the feedback as a method of updating the conditions and way to focus the objectives according to the final customers. The MP-SCIM is the result of systematic work with a supply chain approach in companies that have consolidated as coordinators of their network. The cases of the edible oil chain and explosives for construction sector reflect results of more remarkable advances since they have applied this approach for more than 5 years and maintain it as a general strategy of successful development. The edible oil trading company experienced a jump in sales. In 2006, the company started the analysis in order to define the supply chain, apply diagnosis techniques, define problems and implement solutions. The involvement of the management and the progressive formation of performance capacities in the personnel allowed the application of tools according to the context. The company that coordinates the explosives chain for construction sector shows adequate training with independence and opportunity in the face of different situations and variations of their business environment. The appropriation of tools and techniques for the analysis and implementation of proposals is a characteristic feature of this case. The coordinating entity applies integrated supply chain management to its decisions based on the timely training of the necessary action capabilities for each situation. Other cases of study and application that validate these tools are also detailed in this paper, and they highlight the results of generalization in the quantitative and qualitative improvement according to the final clients. These cases are: teaching literature in universities, agricultural products of local scope and medicine supply chains.Keywords: integrated management, logistic system, supply chain management, tactical-operative planning
Procedia PDF Downloads 1551547 Constructing a Semi-Supervised Model for Network Intrusion Detection
Authors: Tigabu Dagne Akal
Abstract:
While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.Keywords: intrusion detection, data mining, computer science, data mining
Procedia PDF Downloads 2981546 Issues and Challenges of Planning in Commercial Business Districts of Farukh Nagar in Gurugram, Harayana, India
Authors: Adedayo Jeremiah Adeyekun, Samuel Oluwagbemiga Ishola
Abstract:
This research paper focuses on the study of the master plan of rural Farrukhnagar, a town in Gurugram with an aim to proffer solutions to the problems associated with the planning of the town. The commercial zone has been selected for the case study. The findings from the case studies will reveal problems that will require a proposed design of a new ultra-modern market to position traders selling along the road in well-deserved stalls, waste disposal/incinerator system for proper management of waste and cleanliness within the market square, design of stormwater drainage to avoid flood during the rainy season and the design of car/auto – tricycle parks to create more space in the existing market cycle and thereby avoiding congestion. The research proposes urban and architectural solutions to improve the rural commercial service settings in Farrukhnagar which is a study area in Gurugram, Haryana, India.Keywords: management, commercial, service, planning, congestion
Procedia PDF Downloads 2351545 Liquidity and Cash Management Practices of Owner-Managed Firms-A Case of South East, Nigeria
Authors: Ugbor Raphael Oluchukwu
Abstract:
The survey research design was adopted to examine whether liquidity and cash management practices of owner-managed firms in South East Nigeria influence their profitability, growth and survival. Four independent variables (accounting systems, working capital management, budgetary control, and managerial planning) were used in the evaluation which was restricted to eight small firms. Results indicate that one variable, working capital management alone dominate the liquidity perception of owner managers. As a result, owner managers find it difficult to meet maturing business obligations as growth sets in. The study also reveals that the four independent variables have significant impact on the profitability, growth and survival of owner managed firms. Owner managers are therefore advised to undertake regular entrepreneurship training in order to upgrade their liquidity and cash management knowledge and practices to enhance their overall performance.Keywords: liquidity management, owner-managed firm, profitability, survival
Procedia PDF Downloads 4341544 Participation Motivation and Financing Approach of Small and Medium Enterprises in Mergers and Acquisitions in Vietnam from the Viewpoint of Intermediaries
Authors: Nguyen Thi Hoang Hieu
Abstract:
Mergers and Acquisitions (M&A) activities have increasingly become popular in both developed and developing countries. It is also an attractive topic for researchers to exploit in various sectors such as business, economies or finance. However, activities of Small and Medium Enterprises (SMEs) in M&A activities for a long time have not been sufficiently studied to provide the complete picture of what has been really, particularly in the developing market like Vietnam. The study employs semi-structured in-depth interviews with experts who have worked for years in the M&A sector to explore the participation motivation of both buy side and sell side of M&A activities. In addition, through the interviews, the study attempts to explain how firms finance their M&A deals. The collected data then will be content-analyzed to reflect the study's expectations based on the theories and practices reviews. In addition, limitations and recommendations are given in the hope that the M&A performance in Vietnam can be improved in the future.Keywords: mergers and acquisitions, Vietnam, small and medium enterprises, content-analysis, semi-structure in-depth interview
Procedia PDF Downloads 2641543 Community Product Development of Basket Handicraft-Bag, Ang Thong Province, Thailand
Authors: Patsara Sirikamonsin
Abstract:
The purposes of this study were I) to study development guidelines of community product which was basket handicraft-bag of Ang Thong province; II) to study consumer demand for the community of basket handicraft-bag products of Ang Thong province. Data were collected via group interview of the community of basket handicraft-bag and consumer in order to obtain information related to product development guidelines in line with consumer demand. The study revealed that development guidelines of community product which was basket handicraft-bag of Ang Thong province caused by the demand of consumers changed by the era which made community of basket handicraft-bag products of Ang Thong province might develop community products to be novel, stylish and accessible. The consumer demand for the product came from the need to consume goods that are like local symbols. Most of them were foreigners and tourists. The advantage of this research was that it would lead to policy implementation and lead to the development of basket handicraft-bag community products of Ang Thong to meet the needs of consumers.Keywords: community product, product development, basket handicraft-bag, business research
Procedia PDF Downloads 1821542 Using the Notion of Terrorism Irrespective of the Principle of Legality While Countering Terrorism
Authors: Tugce Duygu Koksal
Abstract:
In recent years, given the fact that the acts of terrorism and the threat of the latter are taking place without any border and distinction, it has led the states to deal with the terrorism as a priority issue. More recently, as seen in different countries during state of emergency, the adoption of anti-terrorism measures motivated by the sole need of the prevention of terrorism targets directly the fundamental rights of individuals. Therefore, a contribution to the understanding of the value of the principle of legality is becoming more and more important nowadays. This paper aims to reflect the probable effects of the adoption of anti-terrorism measures regardless of the principle of legality, on the fundamental rights. In this respect, this paper will first discuss the margin of appreciation of the national authorities by countering terrorism, and then, the importance of the respect of the legality of the anti-terrorism measures will be examined in the light of actual examples. Indeed, one of the major findings of this study is the fact that the anti-terrorism laws and measures were taken in this framework must be subject to close scrutiny in democracies, which adopted the principle of the rule of law and respect human rights. Although the state's margin of appreciation in the field of counter-terrorism is broad, these measures which are based on the legitimate aim of a democracies’ legitimate right to protect itself against the activities of terrorist organizations should have the legal basis and be strictly required by the exigencies of the fight against terrorism. While combating terrorism, the legal basis shall only be achieved if the legal consequences of an individuals’ actions related to terrorism shall be clear and foreseeable by the individuals of a society. On the other hand, particularly during the state of emergency, the ambiguity of the law might be used to include a wide range of actions under acts of terrorism. This is becoming more dangerous where freedom of expression, freedom of the press, freedom of association and the right to information is in the substance of these actions. Disregarding the principle of legality is susceptible to create a chilling effect on the exercise of human rights, and therefore, the fight against terrorism can be transformed into a repressive regime on opponents. As a result, the efforts to counter terrorism of the national authorities irrespective of the principle of legality are susceptible to cause a transformation of the rule of law to a state of law which cannot be appreciated in a democratic society.Keywords: anti-terrorism measures, chilling effect, predictability, the principle of legality, state of emergency
Procedia PDF Downloads 2051541 IT/IS Organisation Design in the Digital Age: A Literature Review
Authors: Dominik Krimpmann
Abstract:
Information technology and information systems are currently at a tipping point. The digital age fundamentally transforms a large number of industries in the ways they work. Lines between business and technology blur. Researchers have acknowledged that this is the time in which the IT/IS organisation needs to re-strategise itself. In this paper, the author provides a structured review of the IS and organisation design literature addressing the question of how the digital age changes the design categories of an IT/IS organisation design. The findings show that most papers just analyse single aspects of either IT/IS relevant information or generic organisation design elements but miss a holistic ‘big-picture’ onto an IT/IS organisation design. This paper creates a holistic IT/IS organisation design framework bringing together the IS research strand, the digital strand and the generic organisation design strand. The research identified four IT/IS organisation design categories (strategy, structure, processes and people) and discusses the importance of two additional categories (sourcing and governance). The authors findings point to a first anchor point from which further research needs to be conducted to develop a holistic IT/IS organisation design framework.Keywords: IT/IS strategy, IT/IS organisation design, digital age, organisational effectiveness, literature review
Procedia PDF Downloads 412