Search results for: internet financial reporting
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4902

Search results for: internet financial reporting

1752 'Light up for All': Building Knowledge on Universal Design through Direct User Contact in Design Workshops

Authors: E. Ielegems, J. Herssens, J. Vanrie

Abstract:

Designers require knowledge and data about a diversity of users throughout the design process to create inclusive design solutions which are usable, understandable and desirable by everyone. Besides understanding users’ needs and expectations, the ways in which users perceive and experience the built environment contain valuable knowledge for architects. Since users’ perceptions and experiences are mainly tacit by nature, they are much more difficult to express in words and therefore more difficult to externalise. Nevertheless, literature confirms the importance of articulating embodied knowledge from users throughout the design process. Hence, more insight is needed into the ways architects can build knowledge on Universal Design through direct user contact. In a project called ‘light up for all’ architecture students are asked to design a light switch and socket, elegant, usable and understandable to the greatest extent possible by everyone. Two workshops with user/experts are organised in the first stages of the design process in which students could gain insight into users’ experiences through direct contact. Three data collection techniques are used to analyse the teams’ design processes. First, students were asked to keep a design diary, reporting design activities, personal experiences, and thoughts about users throughout the design process. Second, one of the authors observed workshops taking field notes. Finally, focus groups are conducted with the design teams after the design process was finished. By means of analysing collected qualitative data, we first identify different design aspects that make the teams’ proposals more inclusive than standard design solutions. For this paper, we specifically focus on aspects that externalise embodied user knowledge from users’ experiences. Subsequently, we look at designers’ approaches to learn about these specific aspects throughout the design process. Results show that in some situations, designers perceive contradicting knowledge between observations and verbal conversations, which shows the value of direct user contact. Additionally, findings give indications on values and limitations of working with selected prototypes as ‘boundary objects’ when externalising users’ experiences. These insights may help researchers to better understand designers’ process of eliciting embodied user knowledge. This way, research can offer more effective support to architects, which may result in better incorporating users’ experiences so that the built environment gradually can become more inclusive for all.

Keywords: universal design, architecture, design process, embodied user knowledge

Procedia PDF Downloads 123
1751 Assessment of Drainage Water Quality in South Africa: Case Study of Vaal-Harts Irrigation Scheme

Authors: Josiah A. Adeyemo, Fred A. O. Otieno, Olumuyiwa I. Ojo

Abstract:

South Africa is water-stressed being a semi-arid country with limited annual rainfall supply and a lack of perennial streams. The future implications of population growth combined with the uncertainty of climate change are likely to have significant financial, human and ecological impacts on already scarce water resources. The waste water from the drainage canals of the Vaal-Harts irrigation scheme (VHS) located in Jan Kempdorp, a farming community in South Africa, were investigated for possible irrigation re-use and their effects on the immediate environment. Three major drains within the scheme were identified and sampled. Drainage water samples were analysed to determine its characteristics. The water samples analyzed had pH values in the range of 5.5 and 6.4 which is below the normal range for irrigation water and very low to moderate salinity (electrical conductivity 0.09-0.82 dS/m). The adjusted sodium adsorption ratio values in all the samples were also very low (<0.2), indicating very low sodicity hazards. The nitrate concentration in most of the samples was high, ranging from 4.8 to 53 mg/l. The reuse of the drainage water for irrigation is possible, but with further treatment. Some suggestions were offered in the safe management of drainage water in VHS.

Keywords: drainage canal, water quality, irrigation, pollutants, environment

Procedia PDF Downloads 322
1750 Evaluating the Efficacy of Tasquinimod in Covid-19

Authors: Raphael Udeh, Luis García De Guadiana Romualdo, Xenia Dolje-Gore

Abstract:

Background: Quite disturbing is the huge public health impact of COVID-19: As at today [25th March 2021, the COVID-19 global burden shows over 123 million cases and over 2.7 million deaths worldwide. Rationale: Recent evidence shows calprotectin’s potential as a therapeutic target, stating that tasquinimod, from the Quinoline-3-Carboxamide family is capable of blocking the interaction between calprotectin and TLR4. Hence preventing the cytokine release syndrome, that heralds the functional exhaustion in COVID-19. Early preclinical studies showed that tasquinimod inhibit tumor growth and prevent angiogenesis/cytokine storm. Phase I – III clinical studies in prostate cancer showed it has a good safety profile with good radiologic progression free survival but no effect on overall survival. Rationale/hypothesis: Strategic endeavors have been amplified globally to assess new therapeutic interventions for COVID-19 management – thus the clinical and antiviral efficacy of tasquinimod in COVID-19 remains to be explored. Hence the primary objective of this trial will be to evaluate the efficacy of tasquinimod in the treatment of adult patients with severe COVID-19 infections. Therefore, I hypothesise that among adults with COVID19 infection, tasquinimod will reduce the severe respiratory distress associated with COVID-19 compared to placebo, over a 28-day study period. Method: The setting is in Europe. Design – a randomized, placebo-controlled, phase II double-blinded trial. Trial lasts for 28 days from randomization, Tasquinimod capsule given as 0.5mg daily 1st fortnight, then 1mg daily 2nd fortnight. I0 outcome - assessed using six-point ordinal scale alongside eight 20 outcomes. 125 participants to be enrolled, data collection at baseline and subsequent data points, and safety reporting monitored via serological profile. Significance: This work could potentially establish tasquinimod as an effective and safe therapeutic agent for COVID-19 by reducing the severe respiratory distress, related time to recovery, time on oxygen/admission. It will also drive future research – as in larger multi-centre RCT.

Keywords: Calprotectin, COVID-19, Phase II Trial, Tasquinimod

Procedia PDF Downloads 178
1749 Dental Pathologies and Diet in Pre-hispanic Populations of the Equatorial Pacific Coast: Literature Review

Authors: Ricardo Andrés Márquez Ortiz

Abstract:

Objective. The objective of this literature review is to compile updated information from studies that have addressed the association between dental pathologies and diet in prehistoric populations of the equatorial Pacific coast. Materials and method. The research carried out corresponds to a documentary study of ex post facto retrospective, historiographic and bibliometric design. A bibliographic review search was carried out in the libraries of the Colombian Institute of Anthropology and History (ICANH) and the National University of Colombia for books and articles on the archeology of the region. In addition, a search was carried out in databases and the Internet for books and articles on dental anthropology, archeology and dentistry on the relationship between dental pathologies and diet in prehistoric and current populations from different parts of the world. Conclusions. The complex societies (500 BC - 300 AD) of the equatorial Pacific coast used an agricultural system of intensive monoculture of corn (Zea mays). This form of subsistence was reflected in an intensification of dental pathologies such as dental caries, dental abscesses generated by cavities, and enamel hypoplasia associated with a lower frequency of wear. The Upper Formative period (800 A.D. -16th century A.D.) is characterized by the development of polyculture, slash-and-burn agriculture, as an adaptive agricultural strategy to the ecological damage generated by the intensive economic activity of complex societies. This process leads to a more varied diet, which generates better dental health.

Keywords: dental pathologies, nutritional diet, equatorial pacific coast, dental anthropology

Procedia PDF Downloads 30
1748 The Attitudes towards English Relative to Other Languages in Indonesia: Discrepancies between Policy and Usage

Authors: Rani Silvia

Abstract:

English has surpassed other languages to become the most widely taught and studied foreign language in Indonesia. This reflects the tendency of the Indonesian public to participate in global mainstream culture, which is longstanding but has been greatly facilitated by the widespread availability of television, the traditional media, and more recently the Internet and social media. However, despite increasing exposure and a history of teaching and study, mastery of English remains low, even as interest and perceived importance continue to increase. This along with Indonesia’s extremely complex linguistic environment has increased the status and value associated with the use of English and is changing the dynamic of language use nationwide. This study investigates the use of English in public settings in Indonesia as well as the attitudes of Indonesian speakers towards English. A case study was developed to explicate this phenomenon in a major Indonesian city. Fifty individuals, including both professionals and lay people, were interviewed about their language preferences as well as their perceptions about English as compared to other languages, such as the local language, Indonesian as the national language, and other foreign languages. Observations on the use of language in the public environment in advertising, signs, and other forms of public expression were analyzed to identify language preferences at this level and their relationship to current language policy. This study has three major findings. First, Indonesian speakers have more positive attitudes towards English than other languages; second, English has encroached on domains in which Indonesian should be used; and third, perceived awareness of the importance of Indonesian as an introduced national language seems to be declining to suggest a failure of policy. The study includes several recommendations for the future development of language planning in determining and directing language use in a public context in Indonesia.

Keywords: English, Indonesia, language attitudes, language policy

Procedia PDF Downloads 96
1747 A Retrospective Study of the Effects of Xenophobia on South Africa-Nigeria Relations

Authors: O. Fayomi, F. Chidozie, C. Ayo

Abstract:

The underlying causes of xenophobia are complex and varied. Xenophobia has to do with being contemptuous of that which is foreign, especially of strangers or of people from different countries or cultures. Unemployment and mounting poverty among South Africans at the bottom of the economic ladder have provoked fears of the competition that better educated and experienced migrants can represent. South Africa’s long track-record of violence as a means of protest and the targeting of foreigners in particular, and, the documented tensions over migration policy and the scale of repatriation serve a very good explanation for its xenophobia. It was clear that while most of the attacks were directed against foreign, primarily African, migrants, this was not the rule. Attacks were also noted against Chinese-speakers, Pakistani migrants as well as against South Africans from minority language groups (in the conflict areas). Settlements that have recently experienced the expression of ‘xenophobic’ violence have also been the site of violent and other forms of protest around other issues, most notably service delivery. The failure of government in service delivery was vexed on this form of xenophobia. Due to the increase in migration, this conflict is certainly not temporary in nature. Xenophobia manifests in different regions and communities with devastating effects on the affected nationals. Nigerians living in South Africa have been objects of severe attacks and assault as a result of this xenophobic attitude. It is against this background that this study seeks to investigate the xenophobic attacks against Nigerians in South Africa. The methodology is basically qualitative with the use of secondary sources such as books, journals, newspapers and internet sources.

Keywords: xenophobia, unemployment, poverty, Nigeria, South Africa

Procedia PDF Downloads 458
1746 The Influence of Remuneration Committees, Directors' Shareholding and Institutional Ownership on the Remuneration of Directors in the Large Listed Companies in South Africa

Authors: Henriette Scholtz

Abstract:

Excessive executive directors’ remuneration remains a major concern for many stakeholders and are some of the factors to blame for the recent global financial crisis. The objective of this study was to examine whether certain firm characteristics are an effective way of protecting shareholders’ interests with respect to executive directors’ remuneration. To achieve this, an ordinary least squares model was used to test the relationship between the remuneration of executive directors and a number of firm and corporate governance characteristics to determine whether these characteristics have an influence on executive directors’ remuneration of large listed companies in South Africa. It was found that corporate governance reforms relating to institutional ownership, shareholder voting on the remuneration policy and the number of remuneration committee meetings acts as an effective governance tool to protect shareholder’s interests with regard to executive remuneration. There is no evidence that the number of non-executive directors on the remuneration committee has an influence on the executive directors’ remuneration.

Keywords: executive directors’ remuneration, agency theory, corporate governance, remuneration committee, directors’ shareholding, institutional ownership

Procedia PDF Downloads 187
1745 Diversification and Risk Management in Non-Profit Organisations: A Case Study

Authors: Manzurul Alam, John Griffiths, David Holloway, Megan Paull, Anne Clear

Abstract:

Background: This paper investigates the nature of risk management practices in non-profit organizations. It is argued here that the risk exposure of these organizations has increased as a result of their entrepreneurial activities. This study explores how a particular non-profit organization formulates its risk strategies in the face funding restrictions. Design/Method/Approach: The study adopts a case study approach to report the results on how a non-profit organization diversifies its activities, tackles risks arising from such activities and improves performance. Results: The findings show that the organization made structural adjustments and leadership changes which helped to adjust their risk strategies. It also reports the organizational processes to deal with risks arising from both related and unrelated diversification strategies. Implications: Any generalization from this case example needs to be taken with caution as there are significant differences between non-profit organizations operating in different sectors. Originality: The paper makes a significant contribution to the non-profit literature by highlighting the diversification strategies along with risk performance.

Keywords: risk management, performance management, non-profit organizations, financial management

Procedia PDF Downloads 501
1744 The Role of Organizational Culture in Facilitating Employee Job Satisfaction in Emerald Group

Authors: Mohamed Haffar, Muhammad Abdul Aziz, Ahmad Ghoneim

Abstract:

The importance of having a good organizational culture that supports employee job satisfaction has fascinated both the business and academic world because of a tantalizing promise: culture can be fundamental to the enhancement of financial performance. This promise has led to growing interest for both researchers and practitioners in attempting to understand the influence of organizational culture on employees’ satisfaction and organizational performance. Even though the relationship between organizational culture and employee job satisfaction have gained attention in the literature, the majority of studies have been conducted within manufacturing organizations and tend to oversee the impact of culture on employee job satisfaction in a service-based environment. Thus, the main driving force of this study was to explore the role of organizational culture types in facilitating employee job satisfaction at Emerald Publishing Group. Interviews qualitative data analysis indicated that Emerald’s culture dominated by adhocracy and clan culture values. In addition, the findings provided evidence, which demonstrated that group and adhocracy organizational culture types play key roles in facilitating employee job satisfaction in a service-based environment.

Keywords: employee satisfaction, organizational culture, performance, service based environment

Procedia PDF Downloads 421
1743 Looking At Labor Trafficking In Poland

Authors: Ashlyn Smith, Chloe Zampelli, Vincent Manna, Vernon Murray

Abstract:

According to Polaris (a UN affiliate), there are currently 44 million human trafficking victims globally. Using a sample of 137 labor trafficking victims in Poland, we found that all were Ukrainian citizens. We categorized victims according to the “Victim Intervention Marketing” (Murray) social marketing framework. The largest victim type consisted of “Willing Assimilators” (57%). This means they entered their particular trafficking situations without coercion and were left at will. Such victims are typically driven by financial desperation. Twenty percent (20%) of Willing Assimilators were men, and 80% were women. Victims who were not Willing Assimilators were forced as either “Enlightened Apostates” (37%) or “Tricked and Trapped” (7%). All of the forced victims were women. Crosstabs with Chi-square test (Pearson Chi-Square test significance = .002) results indicated that the male victims were all between 30 and 38 years old, while female victim ages ranged from 24 to 47. Accordingly, labor trafficking victim interventions in Poland should be age-sensitive and focus on three areas: 1) economic development for the Willing Assimilators, 2) training to identify fraudulent job postings, etc. for the Tricked and Trapped segment, and 3) training to equip potential victims to distrust certain close “loved ones” for the Enlightened Apostates.

Keywords: Poland, labor trafficking, social marketing, victim intervention marketing

Procedia PDF Downloads 168
1742 The Mental Workload of Intensive Care Unit Nurses in Performing Human-Machine Tasks: A Cross-Sectional Survey

Authors: Yan Yan, Erhong Sun, Lin Peng, Xuchun Ye

Abstract:

Aims: The present study aimed to explore Intensive Care Unit (ICU) nurses’ mental workload (MWL) and associated factors with it in performing human-machine tasks. Background: A wide range of emerging technologies have penetrated widely in the field of health care, and ICU nurses are facing a dramatic increase in nursing human-machine tasks. However, there is still a paucity of literature reporting on the general MWL of ICU nurses performing human-machine tasks and the associated influencing factors. Methods: A cross-sectional survey was employed. The data was collected from January to February 2021 from 9 tertiary hospitals in 6 provinces (Shanghai, Gansu, Guangdong, Liaoning, Shandong, and Hubei). Two-stage sampling was used to recruit eligible ICU nurses (n=427). The data were collected with an electronic questionnaire comprising sociodemographic characteristics and the measures of MWL, self-efficacy, system usability, and task difficulty. The univariate analysis, two-way analysis of variance (ANOVA), and a linear mixed model were used for data analysis. Results: Overall, the mental workload of ICU nurses in performing human-machine tasks was medium (score 52.04 on a 0-100 scale). Among the typical nursing human-machine tasks selected, the MWL of ICU nurses in completing first aid and life support tasks (‘Using a defibrillator to defibrillate’ and ‘Use of ventilator’) was significantly higher than others (p < .001). And ICU nurses’ MWL in performing human-machine tasks was also associated with age (p = .001), professional title (p = .002), years of working in ICU (p < .001), willingness to study emerging technology actively (p = .006), task difficulty (p < .001), and system usability (p < .001). Conclusion: The MWL of ICU nurses is at a moderate level in the context of a rapid increase in nursing human-machine tasks. However, there are significant differences in MWL when performing different types of human-machine tasks, and MWL can be influenced by a combination of factors. Nursing managers need to develop intervention strategies in multiple ways. Implications for practice: Multidimensional approaches are required to perform human-machine tasks better, including enhancing nurses' willingness to learn emerging technologies actively, developing training strategies that vary with tasks, and identifying obstacles in the process of human-machine system interaction.

Keywords: mental workload, nurse, ICU, human-machine, tasks, cross-sectional study, linear mixed model, China

Procedia PDF Downloads 54
1741 A Phishing Email Detection Approach Using Machine Learning Techniques

Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani

Abstract:

Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.

Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning

Procedia PDF Downloads 321
1740 The Strategic Entering Time of a Commerce Platform

Authors: Chia-li Wang

Abstract:

The surge of service and commerce platforms, such as e-commerce and internet-of-things, have rapidly changed our lives. How to avoid the congestion and get the job done in the platform is now a common problem that many people encounter every day. This requires platform users to make decisions about when to enter the platform. To that end, we investigate the strategic entering time of a simple platform containing random numbers of buyers and sellers of some item. Upon a trade, the buyer and the seller gain respective profits, yet they pay the cost of waiting in the platform. To maximize their expected payoffs from trading, both buyers and sellers can choose their entering times. This creates an interesting and practical framework of a game that is played among buyers, among sellers, and between them. That is, a strategy employed by a player is not only against players of its type but also a response to those of the other type, and, thus, a strategy profile is composed of strategies of buyers and sellers. The players' best response, the Nash equilibrium (NE) strategy profile, is derived by a pair of differential equations, which, in turn, are used to establish its existence and uniqueness. More importantly, its structure sheds valuable insights of how the entering strategy of one side (buyers or sellers) is affected by the entering behavior of the other side. These results provide a base for the study of dynamic pricing for stochastic demand-supply imbalances. Finally, comparisons between the social welfares (the sum of the payoffs incurred by individual participants) obtained by the optimal strategy and by the NE strategy are conducted for showing the efficiency loss relative to the socially optimal solution. That should help to manage the platform better.

Keywords: double-sided queue, non-cooperative game, nash equilibrium, price of anarchy

Procedia PDF Downloads 72
1739 To Cloudify or Not to Cloudify

Authors: Laila Yasir Al-Harthy, Ali H. Al-Badi

Abstract:

As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors. The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter. This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services. Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change. The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.

Keywords: cloud computing, cloud deployment models, cloud service models, deciding factors

Procedia PDF Downloads 277
1738 A Historical Overview of the General Implementation of the European Union Market Abuse Directive in the United Kingdom before the Brexit and Its Future Implications

Authors: Howard Chitimira

Abstract:

The European Union (EU) was probably the first body to establish multinational anti-market abuse laws aimed at enhancing the detection and curbing of cross-border market abuse activities in its member states. Put differently, the EU Insider Dealing Directive was adopted in 1989 and was the first law that harmonised the insider trading ban among the EU member states. Thereafter, the European Union Directive on Insider Dealing and Market Manipulation (EU Market Abuse Directive) was adopted in a bid to improve and effectively discourage all the forms of market abuse in the EU’s securities and financial markets. However, the EU Market Abuse Directive had its own gaps and flaws. In light of this, the Market Abuse Regulation and the Criminal Sanctions for Market Abuse Directive were enacted to repeal and replace the EU Market Abuse Directive in 2016. The article examines the adequacy of the EU Market Abuse Directive and its implementation in the United Kingdom (UK) prior to the British exit (Brexit). This is done to investigate the possible implications of the Brexit referendum outcome of 23 June 2016 on the future regulation of market abuse in the UK.

Keywords: market abuse, insider trading, market manipulation, European Union, United Kingdom

Procedia PDF Downloads 233
1737 Management of Therapeutic Anticancer at Oran Teaching Hospital, Algeria

Authors: S. Boulenouar, M. Sefir, M. Benahmed

Abstract:

All facilities need medication and other pharmaceuticals for their operation. Management and supply is therefore to provide the different services of the facility goods and services in required quantity and quality. The permanent availability of drugs in the facilities is very difficult because most face many difficulties at the inventory management and drug supplies. Therefore, it is necessary for each health facility to know the causes for the malfunction of its management system to cope with them. It is in this context that we have undertaken to conduct this study to know the causes which should be taken into consideration by the concerned authorities to carry out their mission, which is to provide quality health care for the population. In terms of financial resources, the budget for medicines represents a significant part of the budget of the pharmacy. Our study shows that the share of the hospital budget reserved for the drugs procurement represent on average 70% of the budget of the pharmacy. The results show a state of lack of anticancer drugs at Oran teaching hospital. The analysis of the management process allowed us to know the level that the problem of stock-outs of anti-cancer drugs is at. Suggestions were made to that effect to improve the availability for these products and to respond better to the needs of patients.

Keywords: anticancer drugs, health care facility, budget, hospital pharmacist, hospital service

Procedia PDF Downloads 425
1736 Challenges for Adopting Circular Economy Toward Business Innovation and Supply Chain

Authors: Kapil Khanna, Swee Kuik, Joowon Ban

Abstract:

The current linear economic system is unsustainable due to its dependence on the uncontrolled exploitation of diminishing natural resources. The integration of business innovation and supply chain management has brought about the redesign of business processes through the implementation of a closed-loop approach. The circular economy (CE) offers a sustainable solution to improve business opportunities in the near future by following the principles of rejuvenation and reuse inspired by nature. Those business owners start to rethink and consider using waste as raw material to make new products for consumers. The implementation of CE helps organisations to incorporate new strategic plans for decreasing the use of virgin materials and nature resources. Supply chain partners that are geographically dispersed rely heavily on innovative approaches to support supply chain management. Presently, numerous studies have attempted to establish the concept of supply chain management (SCM) by integrating CE principles, which are commonly denoted as circular SCM. While many scholars have recognised the challenges of transitioning to CE, there is still a lack of consensus on business best practices that can facilitate companies in embracing CE across the supply chain. Hence, this paper strives to scrutinize the SCM practices utilised for CE, identify the obstacles, and recommend best practices that can enhance a company's ability to incorporate CE principles toward business innovation and supply chain performance. Further, the paper proposes future research in the field of using specific technologies such as artificial intelligence, Internet of Things, and blockchain as business innovation tools for supply chain management and CE adoption.

Keywords: business innovation, challenges, circular supply chain, supply chain management, technology

Procedia PDF Downloads 77
1735 A Study on the Current Challenges Hindering Urban Park Development in Ulaanbaatar City, Mongolia

Authors: Bayarmaa Enkhbold, Kenichi Matsui

Abstract:

Urban parks are important assets to every community in terms of providing space for health, cultural and leisure activities. However, Ulaanbaatar, the capital of Mongolia, faces a shortage of green spaces, particularly urban parks, due to overpopulation and haphazard growth. Therefore, in order to increase green space per person, the city government has planned to increase green space per person up to 20m² by 2020 and 30m² by 2030 by establishing more urban parks throughout the city. But this plan was estimated that it is highly unlikely to reach those goals according to the analysis of the present status of plan implementation because the current amount of green space per person is still 4m². In the past studies globally, city planners and scientists agree that it is highly improbable to develop urban parks and keep maintenance sustainably without reflecting community perceptions and their involvement in the park establishment. Therefore, this research aims to find the challenges which stymie urban park development in Ulaanbaatar city and recommend dealing with the problems. In order to reach the goal, communities’ perceptions about the current challenges and their necessity for urban parks were identified and determined whether they differentiated depending on two different types of residential areas (urban and suburban areas). It also attempted to investigate international good practices on how they deal with similar problems. The research methodology was based on a questionnaire survey among city residents, a document review regarding the involvement of stakeholders, and a literature review of relevant past studies. According to the residents’ perceptions, the biggest challenge was a lack of land availability and followed by a lack of proper policy, planning, management, and maintenance out of seven key challenges identified. The biggest community demand from the urban park was a playground for children and followed by recreation and relaxation out of six types of needs. Based on research findings, the study proposed several recommendations for enhancements as institutional and legal framework, park plan and management, supportive environment and monitoring, evaluation, and reporting.

Keywords: challenges of urban park planning and maintenance, community-based urban park establishment, community perceptions and participation, urban parks in Ulaanbaatar, Mongolia

Procedia PDF Downloads 105
1734 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 169
1733 Statistical Analysis of the Main Causes of Delay Factors of Infrastructure Projects

Authors: Seyed Ali Mohammadiborna, Mehdi Ravanshadnia

Abstract:

Project delays usually detrimentally affect perceptions of project success and can in some instances, result in increased costs and other time-related damages to project stakeholders. One of the realities in the national infrastructure projects is that since the primary stakeholders are state-affiliated, the delay factors of the projects have not been seriously taken into account despite the importance of on-time completion of projects. Project postponement has different economic and social consequences and leads to the technical and economic infeasibility of the infrastructure projects in the form of reduced productivity and exploitation capacity. The present study aimed at investigating delay factors of Iranian national infrastructure projects according to regulatory reports of the Plan and Budget Organization (BPO) of Iran. The present study scrutinized the influence of each of the factors that caused delays in national Iranian infrastructure projects according to the supervision reports of the planning and budget organization in 8 years. For this purpose, the study analyzed the information regarding the impact of 12 key delay factors causing delays in average 4867 projects per year in all provinces. The said factors were classified into the three groups of executive, credit, and financial and environmental-procurement factors.

Keywords: delays, infrastructure, projects, regulatory

Procedia PDF Downloads 125
1732 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 279
1731 Nursing Students' Experience of Using Electronic Health Record System in Clinical Placements

Authors: Nurten Tasdemir, Busra Baloglu, Zeynep Cingoz, Can Demirel, Zeki Gezer, Barıs Efe

Abstract:

Student nurses are increasingly exposed to technology in the workplace after graduation with the growing numbers of electric health records (EHRs), handheld computers, barcode scanner medication dispensing systems, and automatic capture of patient data such as vital signs. Internationally, electronic health records (EHRs) systems are being implemented and evaluated. Students will inevitably encounter EHRs in the clinical learning environment and their professional practice. Nursing students must develop competency in the use of EHR. Aim: The study aimed to examine nursing students’ experiences of learning to use electronic health records (EHR) in clinical placements. Method: This study adopted a descriptive approach. The study population consisted of second and third-year nursing students at the Zonguldak School of Health in the West Black Sea Region of Turkey; the study was conducted during the 2015–2016 academic year. The sample consisted of 315 (74.1% of 425 students) nursing students who volunteered to participate. The students, who were involved in clinical practice, were invited to participate in the study Data were collected by a questionnaire designed by the researchers based on the relevant literature. Data were analyzed descriptively using the Statistical Package for Social Sciences (SPSS) for Windows version 16.0. The data are presented as means, standard deviations, and percentages. Approval for the study was obtained from the Ethical Committee of the University (Reg. Number: 29/03/2016/112) and the director of Nursing Department. Findings: A total of 315 students enrolled in this study, for a response rate of 74.1%. The mean age of the sample was 22.24 ± 1.37 (min: 19, max: 32) years, and most participants (79.7%) were female. Most of the nursing students (82.3%) stated that they use information technologies in clinical practice. Nearly half of the students (42.5%) reported that they have not accessed to EHR system. In addition, 61.6% of the students reported that insufficient computers available in clinical placement. Of the students, 84.7% reported that they prefer to have patient information from EHR system, and 63.8% of them found more effective to preparation for the clinical reporting. Conclusion: This survey indicated that nursing students experience to learn about EHR systems in clinical placements. For more effective learning environment nursing education should prepare nursing students for EHR systems in their educational life.

Keywords: electronic health record, clinical placement, nursing student, nursing education

Procedia PDF Downloads 275
1730 Big Data in Telecom Industry: Effective Predictive Techniques on Call Detail Records

Authors: Sara ElElimy, Samir Moustafa

Abstract:

Mobile network operators start to face many challenges in the digital era, especially with high demands from customers. Since mobile network operators are considered a source of big data, traditional techniques are not effective with new era of big data, Internet of things (IoT) and 5G; as a result, handling effectively different big datasets becomes a vital task for operators with the continuous growth of data and moving from long term evolution (LTE) to 5G. So, there is an urgent need for effective Big data analytics to predict future demands, traffic, and network performance to full fill the requirements of the fifth generation of mobile network technology. In this paper, we introduce data science techniques using machine learning and deep learning algorithms: the autoregressive integrated moving average (ARIMA), Bayesian-based curve fitting, and recurrent neural network (RNN) are employed for a data-driven application to mobile network operators. The main framework included in models are identification parameters of each model, estimation, prediction, and final data-driven application of this prediction from business and network performance applications. These models are applied to Telecom Italia Big Data challenge call detail records (CDRs) datasets. The performance of these models is found out using a specific well-known evaluation criteria shows that ARIMA (machine learning-based model) is more accurate as a predictive model in such a dataset than the RNN (deep learning model).

Keywords: big data analytics, machine learning, CDRs, 5G

Procedia PDF Downloads 124
1729 Nature of HR Practices in the Micro Informal Enterprises: Case Study of Pakistan

Authors: Aamar Ilyas

Abstract:

Value of firm does not only depend upon its financial and material resources rather human resource is also a significant contributor in success of organizations by achieving competitive advantage. Human resource is an important asset so it is the main responsibility of employers to get the best use of this resource. Hence, this paper will explore the human resource practices used by entrepreneurs in the informal economy in Lahore, the provincial capital of Punjab, Pakistan. In this study three major sectors are randomly selected. Snowball sampling technique was applied to collect data. Survey was conducted through interviews of 45 respondents working in the informal sector. The results show that informal sector in Pakistan is not using any formal human resource practices as done by formal enterprises. Findings suggest that there should be the implementation of the human resource practices that help the firm to increase its productivity and ensure the betterment of the employees. The main limitation of the study was short time period to cater all sectors of informal economy of Pakistan which limits the extent of its generalizability. The rationale behind this study is to uncover the facts regarding management practices of human capital in the informal sector.

Keywords: HR practices, informal economy, working condition, recruitment, training, employee motivation, welfare

Procedia PDF Downloads 358
1728 Recognising Patients’ Perspective on Health Behaviour Problems Through Laughter: Implications for Patient-Centered Care Practice in Behaviour Change Consultations in General Practice

Authors: Binh Thanh Ta, Elizabeth Sturgiss

Abstract:

Central to patient-centered care is the idea of treating a patient as a person and understanding their perspectives regarding their health conditions and care preferences. Surprisingly, little is known about how GPs can understand their patients’ perspectives. This paper addresses the challenge of understanding patient perspectives in behavior change consultations by adopting Conversation Analysis (CA), which is an empirical research approach that allows both researchers and the audience to examine patients’ perspectives as displayed in GP-patient interaction. To understand people’s perspectives, CA researchers do not rely on what they say but instead on how they demonstrate their endogenous orientations to social norms when they interact with each other. Underlying CA is the notion that social interaction is orderly by all means. (It is important to note that social orders should not be treated as exogenous sets of rules that predetermine human behaviors. Rather social orders are constructed and oriented by social members through their interactional practices. Also, note that these interactional practices are the resources shared by all social members). As CA offers tools to uncover the orderliness of interactional practices, it not only allows us to understand the perspective of a particular patient in a particular medical encounter but, more importantly, enables us to recognise the shared interactional practice for signifying a particular perspective. Drawing on the 10 video-recorded consultations on behavior change in primary care, we have discovered the orderliness of patient laughter when reporting health behaviors, which signifies their orientation to the problematic nature of the reported behaviors. Among 24 cases where patients reported their health behaviors, we found 19 cases in which they laughed while speaking. In the five cases where patients did not laugh, we found that they explicitly framed their behavior as unproblematic. This finding echoes the CA body research on laughter, which suggests that laughter produced by first speakers (as opposed to laughing in response to what has been said earlier) normally indicates some sort of problems oriented to the self (e.g. self-tease, self-depreciation, etc.). This finding points to the significance of understanding when and why patients laugh; such understanding would assist GPs to recognise whether patients treat their behavior as problematic or not, thereby producing responses sensitive to patient perspectives.

Keywords: patient centered care, laughter, conversation analysis, primary care, behaviour change consultations

Procedia PDF Downloads 88
1727 Energy Box Programme in the Netherlands

Authors: B. E. Weber, N. Vrielink, M. G. Rietbergen

Abstract:

This paper explores the long-term effects of the Energy Box trajectory on households in the private rental sector, specifically households experiencing energy poverty. The concept of energy poverty has been getting increasing attention among policymakers over the past few years. In the Netherlands, as far as we know, there are no national policies on alleviating energy poverty, which negatively impacts energy-poor households. The Energy Box can help households experiencing energy poverty by stimulating them to improve the energy efficiency of their home by changing their energy-saving behavior. Important long-term effects are that respondents indicate that they live in a more environmentally friendly way and that they save money on their energy bills. Households feel engaged with the concept of energy-saving and can see the benefits of changing their energy-saving behavior. Respondents perceived the Energy Box as a means to live more environmentally friendly, instead of it solely being a means to save money on energy bills. The findings show that most respondents signed up for the Energy Box are interested in energy-saving as a lifestyle choice instead of a financial choice, which would likely be the case for households experiencing energy poverty.

Keywords: energy-saving behavior, energy poverty, poverty, private rental sector

Procedia PDF Downloads 91
1726 Understanding Personal Well-Being among Entrepreneurial Breadwinners: Bibliographic and Empirical Analyses of Relative Resource Theory

Authors: E. Fredrick Rice

Abstract:

Over the past three decades, a substantial body of academic literature has asserted that the pressure to maintain household income can negatively affect the personal well-being of breadwinners. Given that scholars have failed to thoroughly explore this phenomenon with breadwinners who are also business owners, theory has been underdeveloped in the entrepreneurial context. To identify the most appropriate theories to apply to entrepreneurs, the current paper utilized two approaches. First, a comprehensive bibliographic analysis was conducted focusing on works at the intersection of breadwinner status and well-being. Co-authorship and journal citation patterns highlighted relative resource theory as a boundary spanning approach with promising applications in the entrepreneurial space. To build upon this theory, regression analysis was performed using data from the Panel Study of Entrepreneurial Dynamics (PSED). Empirical results showed evidence for the effects of breadwinner status and household income on entrepreneurial well-being. Further, the findings suggest that it is not merely income or job status that predicts well-being, but one’s relative financial contribution compared to that of one’s non-breadwinning organizationally employed partner. This paper offers insight into how breadwinner status can be studied in relation to the entrepreneurial personality.

Keywords: breadwinner, entrepreneurship, household income, well-being.

Procedia PDF Downloads 152
1725 Modelling Operational Risk Using Extreme Value Theory and Skew t-Copulas via Bayesian Inference

Authors: Betty Johanna Garzon Rozo, Jonathan Crook, Fernando Moreira

Abstract:

Operational risk losses are heavy tailed and are likely to be asymmetric and extremely dependent among business lines/event types. We propose a new methodology to assess, in a multivariate way, the asymmetry and extreme dependence between severity distributions, and to calculate the capital for Operational Risk. This methodology simultaneously uses (i) several parametric distributions and an alternative mix distribution (the Lognormal for the body of losses and the Generalized Pareto Distribution for the tail) via extreme value theory using SAS®, (ii) the multivariate skew t-copula applied for the first time for operational losses and (iii) Bayesian theory to estimate new n-dimensional skew t-copula models via Markov chain Monte Carlo (MCMC) simulation. This paper analyses a newly operational loss data set, SAS Global Operational Risk Data [SAS OpRisk], to model operational risk at international financial institutions. All the severity models are constructed in SAS® 9.2. We implement the procedure PROC SEVERITY and PROC NLMIXED. This paper focuses in describing this implementation.

Keywords: operational risk, loss distribution approach, extreme value theory, copulas

Procedia PDF Downloads 580
1724 Effects of E-Learning Mode of Instruction and Conventional Mode of Instruction on Student’s Achievement in English Language in Senior Secondary Schools, Ibadan Municipal, Nigeria

Authors: Ibode Osa Felix

Abstract:

The use of e-Learning is presently intensified in the academic world following the outbreak of the Covid-19 pandemic in early 2020. Hitherto, e-learning had made its debut in teaching and learning many years ago when it emerged as an aspect of Computer Based Teaching, but never before has its patronage become so important and popular as currently obtains. Previous studies revealed that there is an ongoing debate among researchers on the efficacy of the E-learning mode of instruction over the traditional teaching method. Therefore, the study examined the effect of E-learning and Conventional Mode of Instruction on Students Achievement in the English Language. The study is a quasi-experimental study in which 230 students, from three public secondary schools, were selected through a simple random sampling technique. Three instruments were developed, namely, E-learning Instructional Guide (ELIG), Conventional Method of Instructional Guide (CMIG), and English Language Achievement Test (ELAT). The result revealed that students taught through the conventional method had better results than students taught online. The result also shows that girls taught with the conventional method of teaching performed better than boys in the English Language. The study, therefore, recommended that effort should be made by the educational authorities in Nigeria to provide internet facilities to enhance practices among learners and provide electricity to power e-learning equipment in the secondary schools. This will boost e-learning practices among teachers and students and consequently overtake conventional method of teaching in due course.

Keywords: e-learning, conventional method of teaching, achievement in english, electricity

Procedia PDF Downloads 154
1723 Social Assistive Robots, Reframing the Human Robotics Interaction Benchmark of Social Success

Authors: Antonio Espingardeiro

Abstract:

It is likely that robots will cross the boundaries of industry into households over the next decades. With demographic challenges worldwide, the future ageing populations will require the introduction of assistive technologies capable of providing, care, human dignity and quality of life through the aging process. Robotics technology has a high potential for being used in the areas of social and healthcare by promoting a wide range of activities such as entertainment, companionship, supervision or cognitive and physical assistance. However, such close Human Robotics Interactions (HRIs) encompass a rich set of ethical scenarios that need to be addressed before Socially Assistive Robots (SARs) reach the global markets. Such interactions with robots may seem a worthy goal for many technical/financial reasons but inevitably require close attention to the ethical dimensions of such interactions. This article investigates the current HRI benchmark of social success. It revises it according to the ethical principles of beneficence, non-maleficence and justice aligned with social care ethos. An extension of such benchmark is proposed based on an empirical study of HRIs with elderly groups.

Keywords: HRI, SARs, social success, benchmark, elderly care

Procedia PDF Downloads 499