Search results for: impersonal trust
469 The Effectiveness of the Repositioning Campaign of PKO BP Brand on the Basis of Questionnaire Research
Authors: Danuta Szwajca
Abstract:
Image is a very important intangible asset of a contemporary enterprise, especially, in case of a bank as a public trust institution. A positive, demanded image may effectively distinguish the bank among the competition and build the customer confidence and loyalty. PKO BP is the biggest and largest bank functioning on the Polish financial market. Within the years not a very nice image of the bank has been embedded in the customers’ minds as an old-fashioned, stagnant, resistant to changes institution, what result in the customer loss, and ageing. For this reason, in 2010, the bank launched a campaign of radical image change along with a strategy of branches modernization and improvement of the product offer. The objective of the article is to make an attempt of effectiveness assessment of the brand repositioning campaign that lasted three years. The foundations of the assessment are the results of the questionnaire research concerning the way of bank’s perception before and after the campaign.Keywords: advertising campaign, brand repositioning, image of the bank, repositioning
Procedia PDF Downloads 423468 From Patient Satisfaction to Dental Service Reutilization: Innovative Solutions for Improving Dental Care Services
Authors: Seyed Kian Haji Seyed Javadi, Aisan Nouri
Abstract:
Patient satisfaction in dental care is shaped by experiences throughout the treatment journey. Challenges such as fear, lack of trust and poor communication can impact patient contentment and willingness to seek dental care. This narrative review explores these issues and presents innovative solutions to address them by searching PubMed and Scopus data sources. It examines factors affecting patient satisfaction and adherence across three phases—before, during and after treatment—emphasizing the roles of effective communication, payment and follow-up systems, appointment scheduling, welcoming reception and the treatment environment. The factors discussed in this study motivate patients to return for routine check-ups and preventive care, even if their initial visit was for an emergency.Keywords: patient satisfaction, dentistry, dental access, dental care services
Procedia PDF Downloads 19467 Team Members' Perception of Team Leader's Effectiveness in Biotechnology Industry in India
Authors: Keerthana Gonella, Kamesh Apparaju
Abstract:
Teams are all pervasive and team leadership is a much discussed topic in managing projects that characterize the modern work environment. Biotechnology industry in India is an area of research interest for scholars on leadership, especially, team leadership. The present paper examines the perception of team members on the effectiveness of their team leaders in the biotechnology industry in India. This is an empirical study in which the data was collected by administering the closed-ended questionnaire to the respondents from across India. The effectiveness of the team leader is dependent upon his goal orientation that creates a collaborative climate. Leaders with technical know-how inspire teamwork with trust. They build confidence, mitigate the differences and expand team capabilities through teamwork. Effective leaders also create team identity making the most of the differences with a vision.Keywords: collaboration, perception, team, team capabilities, team leadership
Procedia PDF Downloads 308466 Employer Branding and Its Influence in Employee Retention in the Non Governmental Organizations in Jordan
Authors: Wasfi Alrawabdeh
Abstract:
Abstract The prime purpose of this study was to investigate whether employers use branding in their organizations, and how employer branding influence the attraction and retention of employees in the Non Governmental Organizations (NGOs) in Jordan. The descriptive survey design was adopted for the study. 500 random NGOs employees', including junior and senior staff were conveniently sampled for the study. Data was analyzed using both descriptive and inferential statistics. The results of the study suggest that organizations use employer-branding processes in their business to attract employees and customers. It was also found that brand names of organizations might significantly influence the decision of employees to join and stay in the organizations. It was therefore suggested that employers need to create conducive work environment with conditions to enable employees feel comfortable and remain in the organization.Keywords: Employer branding, Employee attraction , and retention , Trust , Satisfaction.
Procedia PDF Downloads 161465 Pregnancy through the Lens of Iranian Women with HIV: A Qualitative
Authors: Zahra BehboodiI-Moghadam, Zohre Khalajinia, Ali Reza Nikbakht Nasrabadi, Minoo Mohraz
Abstract:
The purpose of our study was to explore and describe the experiences of pregnant women with HIV in Iran. A qualitative exploratory study with conventional content analysis was used. Twelve pregnant women with HIV who referred to perinatal care at the Imam Khomeini Hospital Behavioral Diseases Consultation: Center in Tehran were recruited to participate in in-depth interviews. The average age of the participants was 32.5 years. Four main themes were extracted from the data: “fear and hope, “stigma and discrimination, “marital life stability” and “trust”. The findings reveal the pregnant women living with HIV are vulnerable and need professional support. Improving the knowledge of healthcare professionals especially midwifes on pregnancy complications for women with HIV is crucial in order to provide high-quality care to pregnant women with HIV-positive.Keywords: HIV, pregnancy, content analysis, experiences, Iran, qualitative research
Procedia PDF Downloads 472464 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 323463 Demand for Index Based Micro-Insurance (IBMI) in Ethiopia
Authors: Ashenafi Sileshi Etefa, Bezawit Worku Yenealem
Abstract:
Micro-insurance is a relatively new concept that is just being introduced in Ethiopia. For an agrarian economy dominated by small holder farming and vulnerable to natural disasters, mainly drought, the need for an Index-Based Micro Insurance (IBMI) is crucial. Since IBMI solves moral hazard, adverse selection, and access issues to poor clients, it is preferable over traditional insurance products. IBMI is being piloted in drought prone areas of Ethiopia with the aim of learning and expanding the service across the country. This article analyses the demand of IBMI and the barriers to demand and finds that the demand for IBMI has so far been constrained by lack of awareness, trust issues, costliness, and the level of basis risk; and recommends reducing the basis risk and increasing the role of government and farmer cooperatives.Keywords: agriculture, index based micro-insurance (IBMI), drought, micro-finance institution (MFI)
Procedia PDF Downloads 290462 Using Focus Group Method to Identify Citizen Requirements to Saudi Mobile Government Services
Authors: S. Alotaibi, D. Roussinov
Abstract:
Mobile government services implementation faces several challenges in developing countries. This paper studies some of those challenges in the context of Saudi Arabia. The study aims to investigate factors affecting m-government acceptance in Saudi Arabia, including ease of use, usefulness, service quality, trust, intention to use and users’ satisfaction. Our investigation will help in integrating the m-government services in citizens’ everyday life. We collected and analyzed our data from focus groups. These focus groups are from King Saud University and Imam Muhammed Bin Saud University, so the samples size are five and seven participants, respectively. We found that there are some factors to identifying citizen requirements to Saudi mobile government services. These services should be easy to use and not require too much effort. Also, these services must be fully trusted.Keywords: e-government, m-government, focus group, Saudi mobile government services
Procedia PDF Downloads 297461 A Cloud-Based Federated Identity Management in Europe
Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas
Abstract:
Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).Keywords: cybersecurity, identity federation, trust, user authentication
Procedia PDF Downloads 166460 Electronic Government Services Adoption from Multi-Nationalities Perspectives
Authors: Isaac Kofi Mensah, Jianing Mi, Cheng Feng
Abstract:
Electronic government is the application of Information and Communication Technologies (ICTs) by the government to improve public service delivery to citizens and businesses. The purpose of this study is to investigate factors influencing the adoption and use of e-government services from different nationalities perspectives. The Technology Acceptance Model (TAM) will be used as the theoretical framework for the study. A questionnaire would be developed and administered to 500 potential respondents who are students from different nationalities in China. Predictors such as perceived usefulness, perceived ease of use, computer self-efficacy, trust in both the internet and government, social influence and perceived service quality would be examined with regard to their impact on the intention to use e-government services. This research is currently at the design and implementation stage. The completion of this study will provide useful insights into understanding factors impacting the decision to use e-government services from a cross and multi nationalities perspectives.Keywords: different nationalities, e-government, e-government services, technology acceptance model (TAM)
Procedia PDF Downloads 429459 Science and Monitoring Underpinning River Restoration: A Case Study
Authors: Geoffrey Gilfillan, Peter Barham, Lisa Smallwood, David Harper
Abstract:
The ‘Welland for People and Wildlife’ project aimed to improve the River Welland’s ecology and water quality, and to make it more accessible to the community of Market Harborough. A joint monitoring project by the Welland Rivers Trust & University of Leicester was incorporated into the design. The techniques that have been used to measure its success are hydrological, geomorphological, and water quality monitoring, species and habitat surveys, and community engagement. Early results show improvements to flow and habitat diversity, water quality and biodiversity of the river environment. Barrier removal has increased stickleback mating activity, and decreased parasitically infected fish in sample catches. The habitats provided by the berms now boast over 25 native plant species, and the river is clearer, cleaner and with better-oxygenated water.Keywords: community engagement, ecological monitoring, river restoration, water quality
Procedia PDF Downloads 232458 Framework for Government ICT Projects
Authors: Manal Rayes
Abstract:
In its efforts to utilize the information and communication technology to enhance the quality of public service delivery, national and local governments around the world are competing to introduce more ICT applications as tools to automate processes related to law enforcement or policy execution, increase citizen orientation, trust, and satisfaction, and create one-stop-shops for public services. In its implementation, e-Government ICTs need to maintain transparency, participation, and collaboration. Due to this diverse of mixed goals and requirements, e-Government systems need to be designed based on special design considerations in order to eliminate the risks of failure to compliance to government regulations, citizen dissatisfaction, or market repulsion. In this article we suggest a framework with guidelines for designing government information systems that takes into consideration the special requirements of the public sector. Then we introduce two case studies and show how applying those guidelines would result in a more solid system design.Keywords: e-government, framework, guidelines, system design
Procedia PDF Downloads 366457 Examining the Drivers of Engagement in Social Media Brand Communities
Authors: Rania S. Hussein
Abstract:
This research mainly focuses on examining engagement in social media brand communities. Engagement in social media has become a main focus in literature affirming that the role of social media in our daily lives is growing. (Akman and Mishra, 2017;Prado-Gascó et al., 2017). Social media has also become a key medium for brand communication and brand building relationships(Frimpong and McLean,2018;Dimitriu and Guesalaga, 2017). Engagement on social media has become a main focus of many researchers who tried to understand this concept further and draw a link between engagement and various social media activities (Cvijikj and Michahelles;2013), Andre,2015; Wang et al., 2015). According to Felix et al. (2017), the internet and social media have provided better digital resources to improve brand loyalty and customer interactions, thus leading to social media engagement within brand communities. The aim of this research is to highlight the importance of social media and why it is important to maintain engagement within social media. While the term ‘engagement’ is widely used in scholarly literature, there isn’t a common consensus about what the term exactly entails, according to Kidd, (2011). On one hand, it was seen as something that includes factors such as participation, activation, empowerment, devotion, trust, and productivity (Zhang et al, andBenyoucef, M. (2016), ). Other scholars held different viewpoints. For example, Lim et al. (2015) has chosen to break down engagement into three types: operational engagement, emotional engagement, and relational engagement. Chandler and Lusch (2015) further studied engagement as a means to measure commitment to a brand. Fernandes&Remelhe (2016) had a more technical view, measuring engagement through comments, following, subscribing, sharing, enjoying, writing, etc., in the social media context. ustomer engagement has become a research focus for understanding how consumer relationships are developed, retained, and improved within a digital context. Based on previous literature, it is evident that many customer engagement related studies are limited to the interaction between firms and consumers on social media. There is a clear gap in the literature regarding consumer-to-consumer interaction and user-generated content and its significance. While some researchers, such as Alversia et al. (2016), touched upon the importance of customer-based engagement, a gap still remains: there is no consistent and well-tested method for defining the factors that affect consumer interaction. Moreover, few scholarly research papers such as (Case, 2019; Riley, 2020;Habibi, 2014) provided to assist businesses understand their customers' interaction habits as well as the best ways to develop customer loyalty. Additionally, the majority of research on brand pages concentrated on the drivers of Consumer engagement, with just a few studies example, Lamberton, Cc(2016), Poorrezaei, (2016). (Jayasingh, 2019), looking into the implications. This study focuses on understanding the concept of engagement and its importance, specifically engagement within social media brand communities. It examines drivers as well as consequences of engagement, including brand knowledge, brand trust, entertainment, and brand page interactivity. Brand engagement is also expected to affect brand loyalty and word of the mouth.Keywords: engagement, social media, brand communities, drivers
Procedia PDF Downloads 160456 Providing Support On-Time: Need to Establish De-Radicalization Hotlines
Authors: Ashir Ahmed
Abstract:
Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.Keywords: de-radicalization, framework, hotlines, peacekeeping
Procedia PDF Downloads 214455 Re-Development and Lost Industrial History: Darling Harbour of Sydney
Authors: Ece Kaya
Abstract:
Urban waterfront re-development is a well-established phenomenon internationally since 1960s. In cities throughout the world, old industrial waterfront land is being redeveloped into luxury housing, offices, tourist attractions, cultural amenities and shopping centres. These developments are intended to attract high-income residents, tourists and investors to the city. As urban waterfronts are iconic places for the cities and catalyst for further development. They are often referred as flagship project. In Sydney, the re-development of industrial waterfront has been exposed since 1980s with Darling Harbour Project. Darling Harbour waterfront used to be the main arrival and landing place for commercial and industrial shipping until 1970s. Its urban development has continued since the establishment of the city. It was developed as a major industrial and goods-handling precinct in 1812. This use was continued by the mid-1970s. After becoming a redundant industrial waterfront, the area was ripe for re-development in 1984. Darling Harbour is now one of the world’s fascinating waterfront leisure and entertainment destinations and its transformation has been considered as a success story. It is a contradictory statement for this paper. Data collection was carried out using an extensive archival document analysis. The data was obtained from Australian Institute of Architects, City of Sydney Council Archive, Parramatta Heritage Office, Historic Houses Trust, National Trust, and University of Sydney libraries, State Archive, State Library and Sydney Harbour Foreshore Authority Archives. Public documents, primarily newspaper articles and design plans, were analysed to identify possible differences in motives and to determine the process of implementation of the waterfront redevelopments. It was also important to obtain historical photographs and descriptions to understand how the waterfront had been altered. Sites maps in different time periods have been identified to understand what kind of changes happened on the urban landscape and how the developments affected areas. Newspaper articles and editorials have been examined in order to discover what aspects of the projects reflected the history and heritage. The thematic analysis of the archival data helped determine Darling Harbour is a historically important place as it had represented a focal point for Sydney's industrial growth and the cradle of industrial development in European Australia. It has been found that the development area was designated in order to be transformed to a place for tourist, education, recreational, entertainment, cultural and commercial activities and as a result little evidence remained of its industrial past. This paper aims to discuss the industrial significance of Darling Harbour and to explain the changes on its industrial landscape. What is absent now is the layer of its history that creates the layers of meaning to the place so its historic industrial identity is effectively lost.Keywords: historical significance, industrial heritage, industrial waterfront, re-development
Procedia PDF Downloads 301454 Enhanced Automated Teller Machine Using Short Message Service Authentication Verification
Authors: Rasheed Gbenga Jimoh, Akinbowale Nathaniel Babatunde
Abstract:
The use of Automated Teller Machine (ATM) has become an important tool among commercial banks, customers of banks have come to depend on and trust the ATM conveniently meet their banking needs. Although the overwhelming advantages of ATM cannot be over-emphasized, its alarming fraud rate has become a bottleneck in it’s full adoption in Nigeria. This study examined the menace of ATM in the society another cost of running ATM services by banks in the country. The researcher developed a prototype of an enhanced Automated Teller Machine Authentication using Short Message Service (SMS) Verification. The developed prototype was tested by Ten (10) respondents who are users of ATM cards in the country and the data collected was analyzed using Statistical Package for Social Science (SPSS). Based on the results of the analysis, it is being envisaged that the developed prototype will go a long way in reducing the alarming rate of ATM fraud in Nigeria.Keywords: ATM, ATM fraud, e-banking, prototyping
Procedia PDF Downloads 322453 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification
Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune
Abstract:
This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP
Procedia PDF Downloads 72452 Evaluating Electronic Service Quality in Banking Iran
Authors: Vahid Bairami Rad
Abstract:
With the rapid growth of the Internet and the globalization of the market, most enterprises are trying to attract and win customers in the highly competitive electronic market. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Iranian Banking Iran. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and speed of delivery had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Iranian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.Keywords: electronic banking, Dimensions, customer service quality, electronic, communication
Procedia PDF Downloads 499451 Understanding Non-Utilization of AI Tools for Research and Academic Writing among Academic Staff in Nigerian Universities: A Paradigm Shift
Authors: Abubakar Abdulkareem, Nasir Haruna Soba
Abstract:
This study investigates the non-utilization of AI tools for research and academic writing among academic staff in Nigerian universities using the perceived attribute of innovation theory by Rogers as a theoretical framework to guide the investigation. This study was framed in an interpretative research paradigm. A qualitative methodology and case study research design was adopted. Interviews were conducted with 20 academic staff. The study used a thematic analysis process to identify 115 narratives. The narratives are organized into five major categories and further collapsed into five theoretical constructs explaining the non-use of AI tools for research and academic writing. Findings from this study revealed some of the reasons for the non-utilization of AI tools for research and academic writing as lack of Awareness, perceived Complexity, trust and Reliability Concerns, cost and accessibility, ethical and Privacy concerns and, cultural and institutional factors, etc.Keywords: non-utilization, AI tools, research and academic writing, academic staff
Procedia PDF Downloads 47450 Tool for Metadata Extraction and Content Packaging as Endorsed in OAIS Framework
Authors: Payal Abichandani, Rishi Prakash, Paras Nath Barwal, B. K. Murthy
Abstract:
Information generated from various computerization processes is a potential rich source of knowledge for its designated community. To pass this information from generation to generation without modifying the meaning is a challenging activity. To preserve and archive the data for future generations it’s very essential to prove the authenticity of the data. It can be achieved by extracting the metadata from the data which can prove the authenticity and create trust on the archived data. Subsequent challenge is the technology obsolescence. Metadata extraction and standardization can be effectively used to resolve and tackle this problem. Metadata can be categorized at two levels i.e. Technical and Domain level broadly. Technical metadata will provide the information that can be used to understand and interpret the data record, but only this level of metadata isn’t sufficient to create trustworthiness. We have developed a tool which will extract and standardize the technical as well as domain level metadata. This paper is about the different features of the tool and how we have developed this.Keywords: digital preservation, metadata, OAIS, PDI, XML
Procedia PDF Downloads 393449 The End Is Just the Beginning: The Importance of Project Post-Implementation Reviews
Authors: Catalin-Teodor Dogaru, Ana-Maria Dogaru
Abstract:
Success means different things to different people. For us, project managers, it becomes even harder to find a definition. Many factors have to be included in the evaluation. Moreover, literature is not very helpful, lacking consensus and neutrality. Post-implementation reviews (PIR) can be an efficient tool in evaluating how things worked on a certain project. Despite the visible progress, PIR is not a very detailed subject yet and there is not a common understanding in this matter. This may be the reason that some organizations include it in the projects’ lifecycle and some do not. Through this paper, we point out the reasons why all project managers should pay proper attention to this important step and to the elements, which can be assessed, beside the already famous triple constraints: cost, budget, and time. It is essential to take notice that PIR is not a checklist. It brings the edge in eliminating subjectivity and judging projects based on actual proof. Based on our experience, our success indicator model, presented in this paper, contributes to the success of the project! In the same time, it increases trust among customers who will perceive success more objectively.Keywords: project, post implementation, review, success, indicators
Procedia PDF Downloads 371448 Comparison of the Effectiveness of Communication between the Traditional Lecture and IELS
Authors: Ahmed R. Althobaiti, Malcolm Munro
Abstract:
Communication and effective information exchange within technology has become a crucial part of delivering knowledge to students during the learning process. It enables better understanding, builds trust, respect and increase the knowledge between students. This paper examines the communication between undergraduate students and their lecturers during the Traditional lecture and in using the Interactive Electronic Lecture System (IELS). The IELS is an application that offers a set of components, which support the effective communication between students, themselves and their lecturers. Moreover, this paper highlights the communication skills such as sender, receiver, channel and feedback. It will show how the IELS creates a rich communication environment between its users and how they communicate effectively. To examine and check the effectiveness of communication an experiment has been conducted for groups of users; students and lecturers. The first group communicated during the Traditional lecture while the second group communicated by the IELS application. The result showed that there was an effective communication between the second group more than the first group.Keywords: communication, effective information exchange, lecture, student
Procedia PDF Downloads 404447 Citizens’ Satisfaction Causal Factors in E-Government Services
Authors: Abdullah Alshehab
Abstract:
Governments worldwide are intensely focused on digitizing public transactions to establish reliable e-government services. The advent of new digital technologies and ongoing advancements in ICT have profoundly transformed business operations. Citizen engagement and participation in e-government services are crucial for the system's success. However, it is essential to measure and enhance citizen satisfaction levels to effectively evaluate and improve these systems. Citizen satisfaction is a key criterion that allows government institutions to assess the quality of their services. There is a strong connection between information quality, service quality, and system quality, all of which directly impact user satisfaction. Additionally, both system quality and information quality have indirect effects on citizen satisfaction. A causal map, which is a network diagram representing causes and effects, can illustrate these relationships. According to the literature, the main factors influencing citizen satisfaction are trust, reliability, citizen support, convenience, and transparency. This paper investigates the causal relationships among these factors and identifies any interrelatedness between them.Keywords: e-government services, e-satisfaction, citizen satisfaction, causal map.
Procedia PDF Downloads 24446 Leadership Values in Succession Processes
Authors: Peter Heimerl, Alexander Plaikner, Mike Peters
Abstract:
Background and Significance of the Study: Family-run businesses are a decisive economic factor in the Alpine tourism and leisure industry. Within the next years, it is expected that a large number of family-run small and medium-sized businesses will transfer ownership due to demographic developments. Four stages of succession processes can be identified by several empirical studies: (1) the preparation phase, (2) the succession planning phase, (3) the development of the succession concept, (4) and the implementation of the business transfer. Family business research underlines the importance of individual's and family’s values: Especially leadership values address mainly the first phase, which strongly determines the following stages. Aim of the Study: The study aims at answering the following research question: Which leadership values are dominating during succession processes in family-run businesses in Austrian Alpine tourism industry? Methodology: Twenty-two problem-centred individual interviews with 11 transferors and their 11 transferees were conducted. Data analysis was carried out using the software program MAXQDA following an inductive approach to data coding. Major Findings: Data analysis shows that nine values particularly influence succession processes, especially during the vulnerable preparation phase. Participation is the most-dominant value (162 references). It covers a style of cooperation, communication, and controlling. Discipline (142) is especially prevailing from the transferor's perspective. It addresses entrepreneurial honesty and customer orientation. Development (138) is seen as an important value, but it can be distinguished between transferors and transferees. These are mainly focused on strategic positioning and new technologies. Trust (105) is interpreted as a basic prerequisite to run the family firm smoothly. Interviewees underline the importance to be able to take a break from family-business management; however, this is only possible when openness and honesty constitute trust within the family firm. Loyalty (102): Almost all interviewees perceive that they can influence the loyalty of the employees through their own role models. A good work-life balance (90) is very important to most of the transferors, especially for their employees. Despite the communicated importance of a good work-life-balance, but however, mostly the commitment to the company is prioritised. Considerations of regionality (82) and regional responsibility are also frequently raised. Appreciation (75) is of great importance to both the handover and the takeover generation -as appreciation towards the employees in the company and especially in connection with the family. Familiarity (66) and the blurring of the boundaries between private and professional life are very common, especially in family businesses. Familial contact and open communication with employees which is mentioned in almost all handing over. Conclusions: In the preparation phase of succession, successors and incumbents have to consider and discuss their leadership and family values of family-business management. Quite often, assistance is needed to commonly and openly discuss these values in the early stages of succession processes. A large majority of handovers fail because of these values. Implications can be drawn to support family businesses, e.g., consulting initiatives at chambers of commerce and business consultancies must address this problem.Keywords: leadership values, family business, succession processes, succession phases
Procedia PDF Downloads 98445 The Role of Brand Authenticity in Egyptian Destination Marketing
Authors: Hala Hilaly, Nermin Morsy, Jala Morsy Ibrahim
Abstract:
Brand authenticity has a significant impact on brand trust and can help grow within the markets. Consumers have become more concerned with the 'authenticity' due to the doubt of credibility of the value of mass production. This is why people prefer authentic products, which making authenticity a cornerstone of contemporary marketing and a major factor for brand success. Therefore, it is important to embrace a culture that encourages and promotes authentic values. Hence, the purpose of the research is to investigate the impact of using local products as an authentic brand on promoting Egyptian tourist destination and explore the effect of Globalized authenticity on the local product in Egypt. Results confirmed that local products provide an excellent opportunity to worldwide advertising with positive impact on promoting Egypt as tourist destination. However, number of problems are facing local products in Egypt such as imported 'Made in China' products as well as other obstacles.Keywords: authentic brand, contemporary marketing, destination marketing, local products
Procedia PDF Downloads 283444 The Factors Predicting Credibility of News in Social Media in Thailand
Authors: Ekapon Thienthaworn
Abstract:
This research aims to study the reliability of the forecasting factor in social media by using survey research methods with questionnaires. The sampling is the group of undergraduate students in Bangkok. A multiple-step random number of 400 persons, data analysis are descriptive statistics with multivariate regression analysis. The research found the average of the overall trust at the intermediate level for reading the news in social media and the results of the multivariate regression analysis to find out the factors that forecast credibility of the media found the only content that has the power to forecast reliability of undergraduate students in Bangkok to reading the news on social media at the significance level.at 0.05.These can be factors with forecasts reliability of news in social media by a variable that has the highest influence factor of the media content and the speed is also important for reliability of the news.Keywords: credibility of news, behaviors and attitudes, social media, web board
Procedia PDF Downloads 468443 The Role of Information and Communication Technology in Curbing Electoral Malpractices in Nigeria
Authors: Fred Fudah Moveh, Muhammad Abba Jallo
Abstract:
Electoral fraud remains a persistent threat to democracy in Nigeria, undermining public trust and stalling political development. This study explores the role of Information and Communication Technology (ICT) in curbing electoral fraud, focusing on its application in recent Nigerian elections. The paper identifies the main forms of electoral fraud, evaluates the effectiveness of ICT-based interventions like the Permanent Voter Card (PVC) and the Bi-modal Voter Accreditation System (BVAS), and discusses challenges such as poor infrastructure, voter intimidation, and legal inadequacies. Data was collected through structured questionnaires and interviews and analyzed using SPSS software. Results reveal that while ICT has mitigated some forms of fraud, systemic issues continue to hinder its full potential. The study concludes with recommendations for enhancing the application of ICT in Nigeria’s electoral process.Keywords: ICT, electoral fraud, election process, Nigeria, political instability
Procedia PDF Downloads 25442 Examining the Level of Compliance of Patients’ Rights in Physiotherapy Clinic
Authors: Hokuma Isgandarova, Khalil Aryanfar
Abstract:
The patient's rights include all care items that the patient has the right to receive. Considering the growing importance of this important issue and its effect on improving treatment results and customer satisfaction, the present study was conducted with the aim of investigating the level of respect for patient rights in the physiotherapy clinic of the Faculty of Medicine University of Medical Sciences in 2023. In this study, the patients or companions who were referred to the clinic answered questions about the performance status of the clinic with respect to various aspects of the patient's rights. The aspects that were studied: choosing the service provider, having authority, respect, safety, prevention and access were found to have inappropriate performance scores. However, communication and interaction, continuity of service, quality of basic facilities and facilities, timely and immediate attention and trust had appropriate performance. Also, the results of the data analysis showed that there is no significant relationship between the total performance score and any of the demographic variables.Keywords: compliance, patients' rights, physiotherapy clinic, performance level
Procedia PDF Downloads 58441 Translating Empathy in a Senior Community
Authors: Denver E. Severt, Cynthia Mejia
Abstract:
With a grey wave sweeping across the world and people living longer than ever, more individuals will reside in retirement communities in unprecedented numbers. Enhancing the resident stay within these communities is imperative to reduce past stigmas associated with senior communities. This exploratory quantitative investigation examined interview contents of employees and residents to see if empathy was observed. The results showed the employees across all ranges had a much better grasp of affective empathy, yet with greater experience and age, it was clear that cognitive empathy had to be used with affective empathy in order to gain better trust across the community of residents. Outcomes from the study suggest that future training programs for employees are operationalized to include both affective and cognitive empathy practices. This study is unique in that two scales of empathy were transformed into qualitative questions, and in-depth employee and resident interviews were conducted. The study answers many calls of research to provide more specific studies in senior living communities.Keywords: senior living community, transformational service research, qualitative research
Procedia PDF Downloads 143440 Understanding the Nature of Conflicts in Africa: Analytical and Theoretical Explanations
Authors: Kingfahd Adewale Adedapo, Adekunle Ajisebiyawo
Abstract:
The focus of this paper is to explore the different theoretical perspectives that underline academic attempts at understanding and explaining the nature of conflicts in Africa. The African environment is riddled with the past history of conflicts among groups either for an economic outlet or imperial space, and most often, such past negative interactions have made it difficult even now for some of these groups to live harmoniously together within the present state system and to trust each other. The paper observed that no one theory or explanatory schema could offer a holistic explanation of conflict in Africa. At best, each of the possible theories can only offer a partial explanation of the causes and nature of conflict in a particular African society or state. This paper, therefore, attempted to synthesize the many sources of theories of conflicts and provided the intellectual background from which these different theories emanated. Therefore, if this paper has done anything at all, it is to offer the basis for assessing different theoretical strands aimed at offering cogent and reliable explanations for most of the conflicts in Africa and especially in the West African sub-region.Keywords: conflict, functionalism, humanitarianism, structuralism, theory
Procedia PDF Downloads 105