Search results for: critical information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15285

Search results for: critical information

14985 A Taxonomy of the Informational Content of Virtual Heritage Serious Games

Authors: Laurence C. Hanes, Robert J. Stone

Abstract:

Video games have reached a point of huge commercial success as well as wide familiarity with audiences both young and old. Much attention and research have also been directed towards serious games and their potential learning affordances. It is little surprise that the field of virtual heritage has taken a keen interest in using serious games to present cultural heritage information to users, with applications ranging from museums and cultural heritage institutions, to academia and research, to schools and education. Many researchers have already documented their efforts to develop and distribute virtual heritage serious games. Although attempts have been made to create classifications of the different types of virtual heritage games (somewhat akin to the idea of game genres), no formal taxonomy has yet been produced to define the different types of cultural heritage and historical information that can be presented through these games at a content level, and how the information can be manifested within the game. This study proposes such a taxonomy. First the informational content is categorized as heritage or historical, then further divided into tangible, intangible, natural, and analytical. Next, the characteristics of the manifestation within the game are covered. The means of manifestation, level of demonstration, tone, and focus are all defined and explained. Finally, the potential learning outcomes of the content are discussed. A demonstration of the taxonomy is then given by describing the informational content and corresponding manifestations within several examples of virtual heritage serious games as well as commercial games. It is anticipated that this taxonomy will help designers of virtual heritage serious games to think about and clearly define the information they are presenting through their games, and how they are presenting it. Another result of the taxonomy is that it will enable us to frame cultural heritage and historical information presented in commercial games with a critical lens, especially where there may not be explicit learning objectives. Finally, the results will also enable us to identify shared informational content and learning objectives between any virtual heritage serious and/or commercial games.

Keywords: informational content, serious games, taxonomy, virtual heritage

Procedia PDF Downloads 367
14984 Understanding the Impact of Ephemerality and Mobility on Social Media News: A Content Analysis of News on Snapchat

Authors: Chelsea Peterson-Salahuddin

Abstract:

Over the past decade, news outlets have increasingly used social media as a means to create and distribute news content to audiences. Ephemerality, the transitory nature of media, and mobility, media viewing on mobile technologies, are two increasingly salient attributes of social media content; yet little is known about how these features influence news selection practices of news outlets when distributing news via social media. To account for this gap, this study examines the influences of ephemerality and mobility on social media news content on the social media application Snapchat, in order to understand how these qualities of digital media influence and shape news content. Findings from this study suggest that understandings of ephemerality and mobility play a key role in influencing social media news. This paper suggests that as these factors become increasingly salient in our dominant news viewing environments, being able to understand how they manifest themselves in online news reporting practices is critical for both scholars and practitioners of news as they aim to understand what 'newsworthiness' means in the current, digital age. Findings from this study also enhance our current understandings of how the technological affordances of online and digital media platforms play a key role in shaping the kinds being produced and what information is being prioritized and highlighted in our contemporary news media environment. This is especially important in our current era where new mediums and technologies for news dissemination are continuously arising, and reorienting our understandings of what is considered ‘news'. As a key site of mass communication, discourse, and stories highlighted in the news do critical work in defining culture and ideology. Thus, better understanding the contours of news in our contemporary moment is critical in understanding cultural norms and meaning-making.

Keywords: content analysis, ephemerality, mobile communication, social media news

Procedia PDF Downloads 136
14983 Evaluation of Critical Rate in Mature Oil Field with Dynamic Oil Rim Fluid Contacts in the Niger Delta

Authors: Stanley Ibuchukwu Onwukwe

Abstract:

Most reservoir in mature oil fields are vulnerable to challenges of water and/or gas coning as the size of their oil column reduces due to long period of oil production. These often result to low oil production and excessive water and/or gas production. Since over 50 years of oil production in the Niger delta, it is apparent that most of the oil fields in the region have reached their mature stages, thereby susceptible to coning tendencies. As a result of these, a good number of wells have been shut-in and abandoned, with significant amount of oil left unproduced. Analysis of the movement of fluid contacts in the reservoir is a significant aspect of reservoir studies and can assist in the management of coning tendencies and production performance of reservoirs in a mature field. This study, therefore, seeks to evaluate the occurrence of coning through the movement of fluid contacts (GOC and OWC) and determine the critical rate for controlling coning tendencies in mature oil field. This study applies the principle of Nodal analysis to calibrate the thin oil column of a reservoir of a mature field, and was graphically evaluated using the Joshi’s equation of critical rate for gas-oil system and oil-water system respectively. A representative Proxy equation was developed and sensitivity analysis carried out to determine the trend of critical rate as the oil column is been depleted. The result shows the trend in the movement of the GOC and OWC, and the critical rate, beyond which will result in excessive water and gas production, resulting to decreasing oil production from the reservoir. This result of this study can be used as a first pass assessment in the development of mature oil field reservoirs anticipated to experience water and/or gas coning during production.

Keywords: coning, fluid contact movement, mature oil field, oil production

Procedia PDF Downloads 242
14982 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 29
14981 Critical Evaluation of Groundwater Monitoring Networks for Machine Learning Applications

Authors: Pedro Martinez-Santos, Víctor Gómez-Escalonilla, Silvia Díaz-Alcaide, Esperanza Montero, Miguel Martín-Loeches

Abstract:

Groundwater monitoring networks are critical in evaluating the vulnerability of groundwater resources to depletion and contamination, both in space and time. Groundwater monitoring networks typically grow over decades, often in organic fashion, with relatively little overall planning. The groundwater monitoring networks in the Madrid area, Spain, were reviewed for the purpose of identifying gaps and opportunities for improvement. Spatial analysis reveals the presence of various monitoring networks belonging to different institutions, with several hundred observation wells in an area of approximately 4000 km2. This represents several thousand individual data entries, some going back to the early 1970s. Major issues included overlap between the networks, unknown screen depth/vertical distribution for many observation boreholes, uneven time series, uneven monitored species, and potentially suboptimal locations. Results also reveal there is sufficient information to carry out a spatial and temporal analysis of groundwater vulnerability based on machine learning applications. These can contribute to improve the overall planning of monitoring networks’ expansion into the future.

Keywords: groundwater monitoring, observation networks, machine learning, madrid

Procedia PDF Downloads 78
14980 Elevating Environmental Impact Assessment through Remote Sensing in Engineering

Authors: Spoorthi Srupad

Abstract:

Environmental Impact Assessment (EIA) stands as a critical engineering application facilitated by Earth Resources and Environmental Remote Sensing. Employing advanced technologies, this process enables a systematic evaluation of potential environmental impacts arising from engineering projects. Remote sensing techniques, including satellite imagery and geographic information systems (GIS), play a pivotal role in providing comprehensive data for assessing changes in land cover, vegetation, water bodies, and air quality. This abstract delves into the significance of EIA in engineering, emphasizing its role in ensuring sustainable and environmentally responsible practices. The integration of remote sensing technologies enhances the accuracy and efficiency of impact assessments, contributing to informed decision-making and the mitigation of adverse environmental consequences associated with engineering endeavors.

Keywords: environmental impact assessment, engineering applications, sustainability, environmental monitoring, remote sensing, geographic information systems, environmental management

Procedia PDF Downloads 92
14979 Centering Critical Sociology for Social Justice and Inclusive Education

Authors: Al Karim Datoo

Abstract:

Abstract— The presentation argues for an urgent case to center and integrate critical sociology in enriching potency of educational thought and practice to counteract inequalities and social injustices. COVID phenomenon has starkly exposed burgeoning of social-economic inequalities and widening marginalities which have been historically and politically constructed through deep-seated social and power imbalances and injustices in the world. What potent role could education possibly play to combat these issues? A point of departure for this paper highlights increasing reductionist and exclusionary ‘mind-set’ of education that has been developed through trends in education such as: the commodification of knowledge, standardisation, homogenization, and reification which are products of the positivist ideology of knowledge coopted to serve capitalist interests. To redress these issues of de-contextualization and de-humanization of education, it is emphasized that there is an urgent need to center the role of interpretive and critical epistemologies and pedagogies of social sciences. In this regard, notions of problem-posing versus problem-solving, generative themes, instrumental versus emancipatory reasoning will be discussed. The presentation will conclude by illustrating the pedagogic utility of these critically oriented notions to counteract the social reproduction of exclusionary and inequality in and through education.

Keywords: Critical pedagogy, social justice, inclusion , education

Procedia PDF Downloads 113
14978 A Critical Exploration of Dominant Perspectives Regarding Inclusion and Disability: Shifts Toward Meaningful Approaches

Authors: Luigi Iannacci

Abstract:

This study critically explores how disability and disability are presently and problematically configured within education. As such, pedagogies, discourses, and practices that shape this configuration are examined to forward a reconceptualization of disability as it relates to education and the inclusion of students with special needs in mainstream classroom contexts. The study examines how the dominant medical/deficit model of disability positions students with special needs and advocates for a shift towards a social/critical model of disability as applied to education and classrooms. This is demonstrated through a critical look at how language, processes, and ‘interventions’ name and address deficits people who have a disability are presumed to have and, as such, conceptualize these deficits as inherent flaws that are in need of ‘fixing.’ The study will demonstrate the necessary shifts in thinking, language and practice required to forward a critical/social model of disability. The ultimate aim of this research is to offer a much-needed reconceptualization of inclusion that recognizes disability as epistemology, identity, and diversity through a critical exploration of dominant discourses that impact language, policy, instruction and ultimately, the experiences students with disabilities have within mainstream classrooms. The presentation seeks to explore disability as neurodiversity and therefore elucidate how people with disabilities can demonstrate these ways of knowing within inclusive education that avoids superficial approaches that are not responsive to their needs. This research is, therefore, of interest and use to educators teaching at the elementary, secondary, and in-service levels as well as graduate students and scholars working in the areas of inclusion, special education, and literacy. Ultimately the presentation attempts to foster a social justice and human rights-focused approach to inclusion that is responsive to students with disabilities and, as such ensures a reconceptualization of present language, understandings and practices that continue to configure disability in problematic ways.

Keywords: inclusion, disability, critical approach, social justice

Procedia PDF Downloads 75
14977 The Role of Online Videos in Undergraduate Casual-Leisure Information Behaviors

Authors: Nei-Ching Yeh

Abstract:

This study describes undergraduate casual-leisure information behaviors relevant to online videos. Diaries and in-depth interviews were used to collect data. Twenty-four undergraduates participated in this study (9 men, 15 women; all were aged 18–22 years). This study presents a model of casual-leisure information behaviors and contributes new insights into user experience in casual-leisure settings, such as online video programs, with implications for other information domains.

Keywords: casual-leisure information behaviors, information behavior, online videos, role

Procedia PDF Downloads 309
14976 Tsunami Vulnerability of Critical Infrastructure: Development and Application of Functions for Infrastructure Impact Assessment

Authors: James Hilton Williams

Abstract:

Recent tsunami events, including the 2011 Tohoku Tsunami, Japan, and the 2015 Illapel Tsunami, Chile, have highlighted the potential for tsunami impacts on the built environment. International research in the tsunami impacts domain has been largely focused toward impacts on buildings and casualty estimations, while only limited attention has been placed on the impacts on infrastructure which is critical for the recovery of impacted communities. New Zealand, with 75% of the population within 10 km of the coast, has a large amount of coastal infrastructure exposed to local, regional and distant tsunami sources. To effectively manage tsunami risk for New Zealand critical infrastructure, including energy, transportation, and communications, the vulnerability of infrastructure networks and components must first be determined. This research develops infrastructure asset vulnerability, functionality and repair- cost functions based on international post-event tsunami impact assessment data from technologically similar countries, including Japan and Chile, and adapts these to New Zealand. These functions are then utilized within a New Zealand based impact framework, allowing for cost benefit analyses, effective tsunami risk management strategies and mitigation options for exposed critical infrastructure to be determined, which can also be applied internationally.

Keywords: impact assessment, infrastructure, tsunami impacts, vulnerability functions

Procedia PDF Downloads 161
14975 Interoperable Design Coordination Method for Sharing Communication Information Using Building Information Model Collaboration Format

Authors: Jin Gang Lee, Hyun-Soo Lee, Moonseo Park

Abstract:

The utilization of BIM and IFC allows project participants to collaborate across different areas by consistently sharing interoperable product information represented in a model. Comments or markups generated during the coordination process can be categorized as communication information, which can be shared in less standardized manner. It can be difficult to manage and reuse such information compared to the product information in a model. The present study proposes an interoperable coordination method using BCF (the BIM Collaboration Format) for managing and sharing the communication information during BIM based coordination process. A management function for coordination in the BIM collaboration system is developed to assess its ability to share the communication information in BIM collaboration projects. This approach systematically links communication information during the coordination process to the building model and serves as a type of storage system for retrieving knowledge created during BIM collaboration projects.

Keywords: design coordination, building information model, BIM collaboration format, industry foundation classes

Procedia PDF Downloads 433
14974 Critical Terrain Slope Calculation for Locating Small Hydropower Plants

Authors: C. Vrekos, C. Evagelides, N. Samarinas, G. Arampatzis

Abstract:

As known, the water energy is a renewable and clean source of energy. Energy production from hydropower has been the first, and still is today a renewable source used to generate electricity. The optimal location and sizing of a small hydropower plant is a very important issue in engineering design which encourages investigation. The aim of this paper is to present a formula that can be utilized for locating the position of a small hydropower plant although there is a high dependence on economic, environmental, and social parameters. In this paper, the economic and technical side of the problem is considered. More specifically, there is a critical terrain slope that determines if the plant should be located at the end of the slope or not. Of course, this formula can be used for a first estimate and does not include detailed economic analysis. At the end, a case study is presented for the location of a small hydropower plant in order to demonstrate the validity of the proposed formula.

Keywords: critical terrain slope, economic analysis, hydropower plant locating, renewable energy

Procedia PDF Downloads 207
14973 On the Design of Electronic Control Unitsfor the Safety-Critical Vehicle Applications

Authors: Kyung-Jung Lee, Hyun-Sik Ahn

Abstract:

This paper suggests a design methodology for the hardware and software of the Electronic Control Unit (ECU) of safety-critical vehicle applications such as braking and steering. The architecture of the hardware is a high integrity system such that it incorporates a high performance 32-bit CPU and a separate Peripheral Control-Processor (PCP) together with an external watchdog CPU. Communication between the main CPU and the PCP is executed via a common area of RAM and events on either processor which are invoked by interrupts. Safety-related software is also implemented to provide a reliable, self-testing computing environment for safety critical and high integrity applications. The validity of the design approach is shown by using the Hardware-in-the-Loop Simulation (HILS) for Electric Power Steering (EPS) systems which consists of the EPS mechanism, the designed ECU, and monitoring tools.

Keywords: electronic control unit, electric power steering, functional safety, hardware-in-the-loop simulation

Procedia PDF Downloads 295
14972 Smartphones: Tools for Enhancing Teaching in Nigeria’s Higher Institutions

Authors: Ma'amun Muhammed

Abstract:

The ability of smartphones in enhancing communication, providing access to business and serving as a pool for information retrieval has a far reaching and potentially beneficial impacts on enhancing teaching in higher institutions in the developing countries like Nigeria. Nigeria as one of the fast growing economies in Africa, whose citizens patronize smartphones can utilize this opportunity by inculcating the culture of using smartphones not only for communication, business transaction, banking etc. but also for enhancing teaching in the higher institutions. Smartphones have become part and parcel of our lives, particularly among young people. The primary objective of this paper is to ascertain the use of smartphones in enhancing teaching in Nigeria’s higher institutions, to achieve this, content analysis was used thoroughly. This paper examines the opportunities offered by smartphones to the students of higher institutions of learning, the challenges being faced by lecturers of these institutions in classrooms. Lastly, it offers solution on how some of these critical challenges will be overcame, so as to utilize the technology of these devices.

Keywords: communication, information retrieval, mobile phone, smartphones teaching

Procedia PDF Downloads 423
14971 Critical Reflection in Teaching and Learning Mathematics towards Perspective Transformation: Practices in Public and Private Schools

Authors: Arturo Tobias Calizon Jr.

Abstract:

The study investigated the practices in critical reflection being employed in teaching and learning mathematics in public and private schools for students to achieve perspective transformation in psychological, convictional and behavioral dimensions. There were 1,969 senior high school and college student-respondents selected at random from 33 schools. Process reflection is most commonly practiced in both public and private schools. Convictional dimension of perspective transformation is most frequently achieved. There is no significant difference in practices of process reflection between senior high school and college students. However, there is a significant difference in perspective transformation in behavioral dimension achieved by students from public and private schools. Also, there are significant differences in psychological, convictional and behavioral dimensions of perspective transformation achieved by senior high school and college students. There is a high and significant relationship between critical reflection practices and perspective transformation of students. The researcher concludes that there are teaching strategies that facilitate critical thinking, and there are learning activities that alter perspective of students about mathematics as an abstract field. The researcher further concludes that consistent use of appropriate teaching and learning activities could bring about perspective transformation in students with success.

Keywords: critical reflection, perspective transformation, process reflection, convictional dimension, teaching and learning mathematics

Procedia PDF Downloads 154
14970 Teaching Accounting through Critical Accounting Research: The Origin and Its Relevance to the South African Curriculum

Authors: Rosy Makeresemese Qhosola

Abstract:

South Africa has maintained the effort to uphold its guiding principles in terms of its constitution. The constitution upholds principles such as equity, social justice, peace, freedom and hope, to mention but a few. So, such principles are made to form the basis for any legislation and policies that are in place to guide all fields/departments of government. Education is one of those departments or fields and is expected to abide by such principles as outlined in their policies. Therefore, as expected education policies and legislation outline their intentions to ensure the development of students’ clear critical thinking capacity as well as their creative capacities by creating learning contexts and opportunities that accommodate the effective teaching and learning strategies, that are learner centered and are compatible with the prescripts of a democratic constitution of the country. The paper aims at exploring and analyzing the progress of conventional accounting in terms of its adherence to the effective use of principles of good teaching, as per policy expectations in South Africa. The progress is traced by comparing conventional accounting to Critical Accounting Research (CAR), where the history of accounting as intended in the curriculum of SA and CAR are highlighted. Critical Accounting Research framework is used as a lens and mode of teaching in this paper, since it can create a space for the learning of accounting that is optimal marked by the use of more learner-centred methods of teaching. The Curriculum of South Africa also emphasises the use of more learner-centred methods of teaching that encourage an active and critical approach to learning, rather than rote and uncritical learning of given truths. The study seeks to maintain that conventional accounting is in contrast with principles of good teaching as per South African policy expectations. The paper further maintains that, the possible move beyond it and the adherence to the effective use of good teaching, could be when CAR forms the basis of teaching. Data is generated through Participatory Action Research where the meetings, dialogues and discussions with the focused groups are conducted, which consists of lecturers, students, subject heads, coordinators and NGO’s as well as departmental officials. The results are analysed through Critical Discourse Analysis since it allows for the use of text by participants. The study concludes that any teacher who aspires to achieve in the teaching and learning of accounting should first meet the minimum requirements as stated in the NQF level 4, which forms the basic principles of good teaching and are in line with Critical Accounting Research.

Keywords: critical accounting research, critical discourse analysis, participatory action research, principles of good teaching

Procedia PDF Downloads 309
14969 The Effect of Information Technologies on Business Performance: An Application on Small Hotels

Authors: Abdullah Karaman, Kursad Sayin

Abstract:

In this research, which information technologies are used in small hotel businesses, and the information technologies-performance perception of the managers are pointed out. During the research, the questionnaire was prepared and the small scale hotel managers were interviewed face to face and they filled out the questionnaire and the answers acquired were evaluated. As the result of the research, it was obtained that the managers do not care much about the information technologies usage in practice even though they accepted that the information technologies are important in terms of performance.

Keywords: information technologies, managers, performance, small hotels

Procedia PDF Downloads 489
14968 Interpersonal Emotion Regulation in Adolescence: An Enhanced Critical Incident Study

Authors: Setareh Shayanfar

Abstract:

Given the increasing importance of peer relationships during adolescence, the present study aimed to examine peer interactions that facilitate or hinder adolescents’ regulation of negative emotions. Using the Enhanced Critical Incident Technique, 1-hour semi-structured interviews were conducted with 16 junior high school adolescents. Participants were asked to recall situations when they experienced strong negative emotions during the past school year, indicate the peer interactions that helped or hindered their emotion regulation, and identify prospective interactions with the potential to help regulate their emotions. Data analysis extracted 182 critical incidents, including 109 helping incidents, 45 hindering incidents, and 28 wish list items, which generated 10 categories nested within four overarching themes: Positive Personal Support included (a) supportive presence, (b) expressing concern, (c) empathizing, and (d) encouraging and cheering up; while Strategy Transmission included (e) sharing perspective, and (f) giving advice; Activated Support included (g) taking action, and (h) distracting; while Negative Personal Interactions included (i) withdrawing and (j) punishing. Implications for mental health and service providers, as well as recommendations for future research, are presented.

Keywords: adolescence, emotion regulation, enhanced critical incident technique, peers

Procedia PDF Downloads 144
14967 Seismic Fragility of Base-Isolated Multi-Story Piping System in Critical Facilities

Authors: Bu Seog Ju, Ho Young Son, Yong Hee Ryu

Abstract:

This study is focused on the evaluation of seismic fragility of multi-story piping system installed in critical structures, isolated with triple friction pendulum bearing. The concept of this study is to isolate the critical building structure as well as nonstructural component, especially piping system in order to mitigate the earthquake damage and achieve the reliable seismic design. Then, the building system and multi-story piping system was modeled in OpenSees. In particular, the triple friction pendulum isolator was accounted for the vertical and horizontal coupling behavior in the building system subjected to seismic ground motions. Consequently, in order to generate the seismic fragility of base-isolated multi-story piping system, 21 selected seismic ground motions were carried out, by using Monte Carlo Simulation accounted for the uncertainties in demand. Finally, the system-level fragility curves corresponding to the limit state of the piping system was conducted at each T-joint system, which was commonly failure points in piping systems during and after an earthquake. Additionally, the system-level fragilities were performed to the first floor and second floor level in critical structures.

Keywords: fragility, friction pendulum bearing, nonstructural component, seismic

Procedia PDF Downloads 150
14966 Qualitative Study of Organizational Variables Affecting Nurses’ Resilience in Pandemic Condition

Authors: Zahra Soltani Shal

Abstract:

Introduction: The COVID-19 pandemic marks an extraordinary global public health crisis unseen in the last century, with its rapid spread worldwide and associated mortality burden. Healthcare resilience during a pandemic is crucial not only for continuous and safe patients care but also for control of any outbreak. Aim: The present study was conducted to discover the organizational variables effective in increasing resilience and continuing the work of nurses in critical and stressful pandemic conditions. Method: The study population is nurses working in hospitals for patients with coronavirus. Sampling was done purposefully and information was collected from 15 nurses through In-depth semi-structured interviews. The interview was conducted to analyze the data using the framework analysis method consisting of five steps and is classified in the table. Results: According to the findings through semi-structural interviews, among organizational variables, organizational commitment (Affective commitment, continuous commitment, normative commitment) has played a prominent role in nurses' resilience. Discussion: despite the non-withdrawal of nurses and their resilience, due to the negative quality of their working life, the mentioned variable has affected their level of performance and ability and leads to fatigue and physical and mental exhaustion. Implications for practice: By equipping hospitals and improving the facilities of nurses, their organizational commitment can be increased and lead to their resilience in critical situations. Supervisors and senior officials at the hospitals should be responsible for nurses' health and safety. A clear and codified program in critical situations and comprehensive management is effective in improving the quality of the work-life of nurses. Creating an empathetic and interactive environment can help promote nurses' mental health.

Keywords: organizational commitment, quality of work life, nurses resilience, pandemic, coronavirus

Procedia PDF Downloads 162
14965 Connecting Critical Macro-Finance to Theories of Capitalism

Authors: Vithul Kalki

Abstract:

The mainstream political economy failed to explain the nature and causes of systemic failures and thus to compare and comprehend how contemporary capitalist systems work. An alternative research framework of Critical Macro-Finance (CMF) is an attempt to collaborate political theory with post-Keynesian economics with an objective to find answers to unresolved questions that emerged since the international financial crisis and repeated failures of capital systems. This unorthodox approach brings out four main propositions, namely : (a) that the adoption of American financial practices has anchored financial globalization in market-based finance; (b) that global finance is a set of interconnected, hierarchical balance sheets, increasingly subject to time-critical liquidity; (c) that credit creation in market-based finance involves new forms of money; and (d) that market-based finance structurally requires a de-risking state capable both of protecting systemic liabilities and creating new investment opportunities. The ongoing discussion of CMF literature is yet to be tested or even fully framed. This qualitative paper will critically examine the CMF framework and will engage in discussions aiming to connect the CMF with theories of capitalism in a wider context to bring a holistic approach for analyzing contemporary financial capitalism.

Keywords: critical macro-finance, capitalism, financial system, comparative political economy

Procedia PDF Downloads 186
14964 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 361
14963 Exploiting JPEG2000 into Reversible Information

Authors: Te-Jen Chang, I-Hui Pan, Kuang-Hsiung Tan, Shan-Jen Cheng, Chien-Wu Lan, Chih-Chan Hu

Abstract:

With the event of multimedia age in order to protect data not to be tampered, damaged, and faked, information hiding technologies are proposed. Information hiding means important secret information is hidden into cover multimedia and then camouflaged media is produced. This camouflaged media has the characteristic of natural protection. Under the undoubted situation, important secret information is transmitted out.Reversible information hiding technologies for high capacity is proposed in this paper. The gray images are as cover media in this technology. We compress gray images and compare with the original image to produce the estimated differences. By using the estimated differences, expression information hiding is used, and higher information capacity can be achieved. According to experimental results, the proposed technology can be approved. For these experiments, the whole capacity of information payload and image quality can be satisfied.

Keywords: cover media, camouflaged media, reversible information hiding, gray image

Procedia PDF Downloads 327
14962 Effect of Internal Control Weaknesses and Audit Opinion to the Findings of State Losses

Authors: Wiji Wijaya

Abstract:

The aim of this research is to examine the effect of internal control weaknesses and audit opinion on the state’s loss findings of audit compliance to the regulation in public sector. The samples of this research consisted of 175 local government financial statements in the area of Central Java Province at 2009 until 2013. Area sampling design was used to select the financial statements. This study using quantitative descriptive statistical analysis and regression was run for data analysis and hypothesis examination. Result of this study indicated that internal control weaknesses and audit opinion contributes a positive influence which is significant to the state’s loss findings of audit compliance to the regulation. The internal control weaknesses that affect the state's loss finding are weakness control system of accounting and reporting with the value of the critical ratio 0.010 p 2.613 ; weakness budget execution control system with critical ratio value of 3.421 p 0.001 and weaknesses internal control structure with critical ratio value of 2.246 p 0.026 . While the audit opinion with a critical ratio value of 4.401 p 0.000. The implications of this research so that policy makers at the local government should give more attention to the implementation and improvement of internal control system.

Keywords: audit compliance findings, state’s loss, audit opinion, internal control, local government

Procedia PDF Downloads 379
14961 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 548
14960 The Quality of Accounting Information of Private Companies in the Czech Republic

Authors: Kateřina Struhařová

Abstract:

The paper gives the evidence of quality of accounting information of Czech private companies. In general the private companies in the Czech Republic do not see the benefits of providing accounting information of high quality. Based on the research of financial statements of entrepreneurs and companies in Zlin region it was confirmed that the quality of accounting information differs among the private entities and that the major impact on the accounting information quality has the fact if the financial statements are audited as well as the size of the entity. Also the foreign shareholders and lenders have some impact on the accounting information quality.

Keywords: accounting information quality, financial statements, Czech Republic, private companies

Procedia PDF Downloads 304
14959 The Impact of Using Building Information Modeling Technology in Construction Projects Management

Authors: Mohammad Ashraf

Abstract:

This research links the use of Building Information Modeling technology in constructions and infrastructure projects, starting from the moment when considering the establishment of a project to demolishing or renovating it, going through the design work, planning, procurement and implementation. BIM Software's which used are Revit, Navisworks and Asta Project in the case study for the Atletico Madrid Stadium project (Wanda Stadium). Also, the project improves through various phases of construction (planning - implementation - management). Besides, the level of the details managed within this project advances gradually. In addition, the construction process problems become about 30 % less than before, resulting from high coordination between designing, implementation and follow through that is done by the project management office (PMO). The current disposition in the industry is to tightly manage the detail contained within the planning and coordination phases of construction, but we miss the opportunity to manage that data as it matures and grows into the execution and commissioning phases.

Keywords: construction management, BIM technology, planning, design, procurements, critical path method

Procedia PDF Downloads 280
14958 Critical Review of Web Content Mining Extraction Mechanisms

Authors: Rabia Bashir, Sajjad Akbar

Abstract:

There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.

Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval

Procedia PDF Downloads 548
14957 Effect of Fluidized Granular Activated Carbon for the Mitigation of Membrane Fouling in Wastewater Treatment

Authors: Jingwei Wang, Anthony G. Fane, Jia Wei Chew

Abstract:

The use of fluidized Granular Activated Carbon (GAC) as a means of mitigation membrane fouling in membrane bioreactors (MBRs) has received much attention in recent years, especially in anaerobic fluidized bed membrane bioreactors (AFMBRs). It has been affirmed that the unsteady-state tangential shear conferred by GAC fluidization on membrane surface suppressed the extent of membrane fouling with energy consumption much lower than that of bubbling (i.e., air sparging). In a previous work, the hydrodynamics of the fluidized GAC particles were correlated with membrane fouling mitigation effectiveness. Results verified that the momentum transfer from particle to membrane held a key in fouling mitigation. The goal of the current work is to understand the effect of fluidized GAC on membrane critical flux. Membrane critical flux values were measured by a vertical Direct Observation Through the Membrane (DOTM) setup. The polystyrene particles (known as latex particles) with the particle size of 5 µm were used as model foulant thus to give the number of the foulant on the membrane surface. Our results shed light on the positive effect of fluidized GAC enhancing the critical membrane flux by an order-of-magnitude as compared to that of liquid shear alone. Membrane fouling mitigation was benefitted by the increasing of power input.

Keywords: membrane fouling mitigation, liquid-solid fluidization, critical flux, energy input

Procedia PDF Downloads 407
14956 A Quick Method for Seismic Vulnerability Evaluation of Offshore Structures by Static and Dynamic Nonlinear Analyses

Authors: Somayyeh Karimiyan

Abstract:

To evaluate the seismic vulnerability of vital offshore structures with the highest possible precision, Nonlinear Time History Analyses (NLTHA), is the most reliable method. However, since it is very time-consuming, a quick procedure is greatly desired. This paper presents a quick method by combining the Push Over Analysis (POA) and the NLTHA. The POA is preformed first to recognize the more critical members, and then the NLTHA is performed to evaluate more precisely the critical members’ vulnerability. The proposed method has been applied to jacket type structure. Results show that combining POA and NLTHA is a reliable seismic evaluation method, and also that none of the earthquake characteristics alone, can be a dominant factor in vulnerability evaluation.

Keywords: jacket structure, seismic evaluation, push-over and nonlinear time history analyses, critical members

Procedia PDF Downloads 280