Search results for: personal finance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2728

Search results for: personal finance

2428 Rethinking Riba in an Agency Theoretic Framework: Islamic Banking and Finance beyond Sophistry

Authors: Muhammad Arsalan

Abstract:

The efficiency of a financial intermediation system is assessed by its ability to achieve allocative efficiency, asset transformation, and the subsequent economic development. Islamic Banking and Finance (IBF) was conceived to serve as an alternate financial intermediation system adherent to the injunctions of Islam. A critical appraisal of the state of contemporary IBF reveals that it neither fulfills the aspirations of Islamic rhetoric nor is efficient in terms of asset transformation and economic development. This paper is an intuitive pursuit to explore the economic rationale of established principles of IBF, and the reasons of the persistent divergence of IBF being accused of ruses and sophistry. Disentangling the varying viewpoints, the underdevelopment of IBF has been attributed to misinterpretation of Riba, which has been explicated through a narrow fiqhi and legally deterministic approach. It presents a critical account of how incorrect conceptualization of the key injunction on Riba, steered flawed institutionalization of an Islamic Financial intermediation system. It also emphasizes on the wrong interpretation of the ontological and epistemological sources of Islamic Law (primarily Riba), that explains the perennial economic underdevelopment of the Muslim world. Deeming ‘a collaborative and dynamic Ijtihad’ as the elixir, this paper insists on the exigency of redefining Riba, i.e., a definition that incorporates the modern modes of economic cooperation and the contemporary financial intermediation ecosystem. Finally, Riba has been articulated in an agency theoretic framework to eschew expropriation of wealth, and assure protection of property rights, aimed at realizing the twin goals of a) Shari’ah adherence in true spirit, b) financial and economic development of the Muslim world.

Keywords: agency theory, financial intermediation, Islamic banking and finance, ijtihad, economic development, Riba, information asymmetry

Procedia PDF Downloads 120
2427 Towards a Comprehensive Framework on Civic Competence Development of Teachers: A Systematic Review of Literature

Authors: Emilie Vandevelde, Ellen Claes

Abstract:

This study aims to develop a comprehensive model for the civic socialization process of teachers. Citizenship has become one of the main objectives for the European education systems. It is expected that teachers are well prepared and equipped with the necessary knowledge, skills, and attitudes to also engage students in democratic citizenship. While a lot is known about young peoples’ civic competence development and how schools and teachers (don’t) support this process, less is known about how teachers themselves engage with (the teaching of) civics. Other than the civic socialization process of young adolescents that focuses on personal competence development, the civic socialization process of teachers includes the development of professional, civic competences. These professional competences make that they are able to prepare pupils to carry out their civic responsibilities in thoughtful ways. Existing models for the civic socialization process of young adolescents do not take this dual purpose into account. Based on these observations, this paper will investigate (1)What personal and professional civic competences teachers need to effectively teach civic education and (2) how teachers acquire these personal and professional civic competences. To answer the first research question, a systematic review of literature of existing civic education frameworks was carried out and linked to literature on teacher training. The second research question was addressed by adapting the Octagon model, developed by the International Association for the Evaluation of Educational Achievement (IEA), to the context of teachers. This was done by carrying out a systematic review of the recent literature linking three theoretical topics involved in teachers’ civic competence development: theories about the civic socialization process of young adolescents, Schulmans (1987) theoretical assumptions on pedagogical content knowledge (PCK), and Nogueira & Moreira’s (2012) framework for civic education teachers’ knowledge and literature on teachers’ professional development. This resulted in a comprehensive conceptual framework describing the personal and professional civic competences of civic education teachers. In addition, this framework is linked to the OctagonT model: a model that describes the processes through which teachers acquire these personal and professional civic competences. This model recognizes that teachers’ civic socialization process is influenced by interconnected variables located at different levels in a multi-level structure (the individual teacher (e.g., civic beliefs), everyday contacts (e.g., teacher educators, the intended, informal and hidden curriculum of the teacher training program, internship contacts, participation opportunities in teacher training, etc.) and the influence of the national educational context (e.g., vision on civic education)). Furthermore, implications for teacher education programs are described.

Keywords: civic education, civic competences, civic socialization, octagon model, teacher training

Procedia PDF Downloads 256
2426 Use of Telephone Counselling in Employee Assistance Program

Authors: Andy S.K. Cheng, Samuel Leung, Cindy Kwok, Hector Tsang

Abstract:

Background: Telephone counselling is one of the essential interventions that can be found in most of the Employee Assistance Programs (EAP). The purposes of this study were to (1) explore the trend of the telephone counselling from 2003-2016 in Hong Kong; (2) explore which EAP issue requires more follow-up; and 3) examine the relationship between the EAP issues and demographic data such as gender and job ranking. Method: Date of EAP services usage was collected from EAP providers in Hong Kong during 2003-2016. EAP issues were categorized into two domains, namely workplace issues and personal issues. Each domain has 12 sub-categories. Two hypotheses were formulated in this study (1) there was a gender difference in EAP issues and the follow-up hours; and (2) there was a significant difference between job ranking, EAP issues and follow-up hours. Results: A total of eight hundred and ninety-three valid cases were identified for analysis. Of them, three hundred and forty-three cases sought for follow-up. The duration of follow-up by hours was calculated for each of the follow-up cases. The results of the study shows that the top three workplace issues that required the longest duration of follow-up were (1) workload, (2) supervisor-subordinate relationship; and (3) team member’s relationship. On the other hand, the top three personal issues that required the longest duration of follow-up were (1) parenting/parent-child relationship, (2) family care, and (3) marital relationship. Two-way ANOVA was performed to compare the total follow-up hours (excluding first intake) between gender and EAP issues. There was no statistical significance for gender (p =.891), but a statistically significant main effect for EAP issues (p <.001) was found. Post-hoc analysis (Tukey’s test) showed that total follow-up hour in personal issues was statistically significant higher than that in handling workplace issues (p <.001). However, there was no statistically significant interaction effect between gender and EAP issues (p=.879) and between job ranking and EAP issues (p=.843). Conclusion: Telephone counselling is a very common intervention in addressing EAP issues arising from workplace and personal level in Hong Kong. It was frequently used to handle interpersonal relationships and the service usage was independent of gender and job ranking.

Keywords: employee assistance program, follow-up time, interpersonal relationships, telephone counselling

Procedia PDF Downloads 202
2425 The Role of Islamic Finance and Socioeconomic Factors in Financial Inclusion: A Cross Country Comparison

Authors: Allya Koesoema, Arni Ariani

Abstract:

While religion is only a very minor factor contributing to financial exclusion in most countries, the World Bank 2014 Global Financial Development Report highlighted it as a significant barrier for having a financial account in some Muslim majority countries. This is in part due to the perceived incompatibility between traditional financial institutions practices and Islamic finance principles. In these cases, the development of financial institutions and products that are compatible with the principles of Islamic finance may act as an important lever to increasing formal account ownership. However, there is significant diversity in the relationship between a country’s proportion of Muslim population and its level of financial inclusion. This paper combines data taken from the Global Findex Database, World Development Indicators, and the Pew Research Center to quantitatively explore the relationship between individual and country level religious and socioeconomic factor to financial inclusion. Results from regression analyses show a complex relationship between financial inclusion and religion-related factors in the population both on the individual and country level. Consistent with prior literature, on average the percentage of Islamic population positively correlates with the proportion of unbanked populations who cites religious reasons as a barrier to getting an account. However, its impact varies across several variables. First, a deeper look into countries’ religious composition reveals that the average negative impact of a large Muslim population is not as strong in more religiously diverse countries and less religious countries. Second, on the individual level, among the unbanked, the poorest quintile, least educated, older and the female populations are comparatively more likely to not have an account because of religious reason. Results also show indications that in this case, informal mechanisms partially substitute formal financial inclusion, as indicated by the propensity to borrow from family and friends. The individual level findings are important because the demographic groups that are more likely to cite religious reasons as barriers to formal financial inclusion are also generally perceived to be more vulnerable socially and economically and may need targeted attention. Finally, the number of Islamic financial institutions in a particular country is negatively correlated to the propensity of religious reasons as a barrier to financial inclusion. Importantly, the number of financial institutions in a country also mitigates the negative impact of the proportion of Muslim population, low education and individual age to formal financial inclusion. These results point to the potential importance of Islamic Finance Institutions in increasing global financial inclusion, and highlight the potential importance of looking beyond the proportion of Muslim population to other underlying institutional and socioeconomic factor in maximizing its impact.

Keywords: cross country comparison, financial inclusion, Islamic banking and finance, quantitative methods, socioeconomic factors

Procedia PDF Downloads 180
2424 An Exploration of Nursing Assistants' Continuing Professional Development (CPD) Engagement in a Acute Healthcare Setting: A Qualitative Case Study Pilot in England

Authors: Ana Fouto

Abstract:

Background: Continuing Personal Development (CPD) enables professionals to keep up to date with the professional requirements, broadening their knowledge and expertise. However, much of the research explores the registered professionals’ experiences and the factors that influence their choice of engaging, despite the unregistered staff providing the majority of the direct patient care. Aim: To explore the Nursing/Midwifery Assistants’ (NAs) perception of the concept of CPD, as well as explore the factors that influence the NAs to engage (or not) with CPD experiences. Methodology: This pilot study used a qualitative approach through a case study, where a semi-structured interview was applied to three NAs to explore the factors that influence the decision-making of process of CPD engagement. Thematic analysis was used to analyse their answers and interpret patterns and associations. Findings: All the participants agreed that CPD is important and relevant to their practice and personal lives. Five main categories were identified: NAs’ scope of practice, the impact of CPD; decision-making process; challenges; changes required. Although similar findings to the registered nurses were identified, the lack of CPD regulation for NAs and the rapid evolution of their role make the CPD engagement more problematic. Conclusion: Engagement with CPD is influenced by a wide range of professional (organisational and national) and personal factors. NAs perceive lack of management support at different stages of the CPD activities as a main influence. Organisations should be more flexible in the recruitment, offer of CPD choices, content, delivery, and contractual arrangements of NAs, which may increase engagement.

Keywords: nursing assistants, engagement, factors, pilot, continuing professional development (CPD)

Procedia PDF Downloads 139
2423 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 11
2422 Challenges and Prospects of Small and Medium Scale Enterprises in Somolu Local Government Area

Authors: A. A. Akharayi, B. E. Anjola

Abstract:

The economic development of a country depends greatly on internally built revenue. Small and Medium-scale Enterprise (SMEs) contributes to the economic buoyancy as it provides employment for the teeming population, encourages job creation by youths who believes in themselves and also by others who have gathered finance enough to invest in growable investment. SMEs is faced with several challenges. The study investigates the role and challenges of SMEs Somolu Local Government Area. Simple random sampling techniques were used to select entrepreneurs (SMEs owners and managers). One hundred and fifty (150) registered SMEs were selected across the LGA data collection with the use of well-structured questionnaire. The data collected were analysed using Statistical Package for Social Science (SPSS) version 21. The result of the analysis indicated that marketing, finance, social facilities and indiscriminate taxes among other high level of fund available significantly (p <0 .05) increase firm capacity while marketing showed a significant (p < 0.05) relationship with profit level.

Keywords: challenge, development, economic, small and medium scale enterprise

Procedia PDF Downloads 224
2421 A Study on the Korean Connected Industrial Parks Smart Logistics It Financial Enterprise Architecture

Authors: Ilgoun Kim, Jongpil Jeong

Abstract:

Recently, a connected industrial parks (CIPs) architecture using new technologies such as RFID, cloud computing, CPS, Big Data, 5G 5G, IIOT, VR-AR, and ventral AI algorithms based on IoT has been proposed. This researcher noted the vehicle junction problem (VJP) as a more specific detail of the CIPs architectural models. The VJP noted by this researcher includes 'efficient AI physical connection challenges for vehicles' through ventilation, 'financial and financial issues with complex vehicle physical connections,' and 'welfare and working conditions of the performing personnel involved in complex vehicle physical connections.' In this paper, we propose a public solution architecture for the 'electronic financial problem of complex vehicle physical connections' as a detailed task during the vehicle junction problem (VJP). The researcher sought solutions to businesses, consumers, and Korean social problems through technological advancement. We studied how the beneficiaries of technological development can benefit from technological development with many consumers in Korean society and many small and small Korean company managers, not some specific companies. In order to more specifically implement the connected industrial parks (CIPs) architecture using the new technology, we noted the vehicle junction problem (VJP) within the smart factory industrial complex and noted the process of achieving the vehicle junction problem performance among several electronic processes. This researcher proposes a more detailed, integrated public finance enterprise architecture among the overall CIPs architectures. The main details of the public integrated financial enterprise architecture were largely organized into four main categories: 'business', 'data', 'technique', and 'finance'.

Keywords: enterprise architecture, IT Finance, smart logistics, CIPs

Procedia PDF Downloads 150
2420 Assessing a Potential Conceive Design Implement Operate Curricular Change in an Engineering Degree

Authors: L. Miranda

Abstract:

The requirements of the engineering education are nowadays very broad and demand a set of skills which demands not only technical knowledge but also the ability to lead and innovate and personal and interpersonal skills. A framework for the assessment of a potential curricular change is necessary to guide the analysis of the program with respect to the stakeholders and the legislation of the country, in order to develop appropriate learning outcomes. A Conceive-Design-Implement-Operate (CDIO) approach was chosen for an evaluation conducted in a mechanical engineering degree in Brazil. The work consisted in the application of a survey with students and professors and a literature review of the legislation and studies that raised the required competences and skills for the modern engineer. The results show a great potential for a CDIO set of skills in engineering degrees in Brazil and reveal the frequent demands of stakeholders before a curricular change.

Keywords: curriculum change, conceive design implement operate, accreditation, personal and interpersonal skills

Procedia PDF Downloads 349
2419 Intuitional Insight in Islamic Mysticism

Authors: Maryam Bakhtyar, Pegah Akrami

Abstract:

Intuitional insight or mystical cognition is a different insight from common, concrete and intellectual insights. This kind of insight is not achieved by visionary contemplation but by the recitation of God, self-purification, and mystical life. In this insight, there is no distance or medium between the subject of cognition and its object, and they have a sort of unification, unison, and incorporation. As a result, knowledgeable consider this insight as direct, immediate, and personal. The goal of this insight is God, cosmos’ creatures, and the general inner and hidden aspect of the world that is nothing except God’s manifestations in the view of mystics. AS our common cognitions have diversity and stages, intuitional insight also has diversity and levels. As our senses are divided into concrete and rational, mystical discovery is divided into superficial discovery and spiritual one. Based on Islamic mystics, the preferable way to know God and believe in him is intuitional insight. There are two important criteria for evaluating mystical intuition, especially for beginner mystics of intellect and revelation. Indeed, the conclusion and a brief evaluation of Islamic mystics’ viewpoint is the main subject of this paper.

Keywords: intuition, discovery, mystical insight, personal knowledge, superficial discovery, spiritual discovery

Procedia PDF Downloads 79
2418 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 135
2417 Interface between Personal Values and Social Entrepreneurship in Social Projects That Develop Sports Practice

Authors: Leticia Lengler, Jefferson Oliveira, Vania Estivalete, Jordana Marques Kneipp

Abstract:

The context of social, economic and environmental transformations has driven innumerable changes in the organizational environment, influencing the social interactions that occur in this scenario. In this sense, social entrepreneurship emerges as a unique opportunity to challenge, question, rethink certain concepts and traditional theories widely discussed in relation to entrepreneurship. Therefore, the interest in studying personal values has been based on the idea that they might be predictors of the behavior of individuals. As an attempt to relate personal values with the characteristics of social entrepreneurs, this study aims to investigate the salient values and the social entrepreneurship perceptions that occur in two social projects responsible for developing sports skills among the students. For purposes of analysis, it is intended to consider: (i) a description of both Social Projects and their respective institutions, considering their history and relevance in the context; (ii) analysis of the personal values of the idealizers and teachers responsible for the projects, (iii) identification of the characteristics of social entrepreneurship manifested in the two projects, and (iv) discussion of similarities and disparities of the categories identified among the participants of the projects. Therefore, this study will carry a qualitative analysis from the interviews with 10 participants of each social project (named Projeto Remar/ASENA and Projeto Mãos Dadas/JUDÔ SANTA MARIA): 2 projects coordinators, 2 students, 2 parents of students, 2 physical education internships and 2 businessmen who stablished a partnership with each project. The data collection will be done through semi-structured interviews that are going to last around 30 minutes each, being recorded, transcribed and later analyzed, through the categorical analysis. The option for categorical analysis is supported by the fact that it is the best alternative when one wants to study values, opinions, attitudes and beliefs, through qualitative ones. In the present research, the pre-analysis phase consisted of an organization of the material collected during the research with Remar and Mãos Dadas Project, and a dynamic reading of this material, seeking to identify the characteristics of social entrepreneurship and values addressed in the study. In the analytical description phase, a more in-depth analysis of the material collected in the research will be carried out. The third phase, referred to as referential interpretation or treatment of results obtained will allow to verify the homogeneity and the heterogeneity among the participants' perceptions of the projects. Some preliminary results coming from the first interviews revealed the projects are guided by values such as cooperation, respect, well-being and nature preservation. These values are linked to the social entrepreneurship perception of the projects managers, who established their activities in behalf of the local community.

Keywords: personal values, social entrepreneurship, social projects, sports participants

Procedia PDF Downloads 350
2416 Actual and Perceived Financial Sophistication and Wealth Accumulation: The Role of Education and Gender

Authors: Christina E. Bannier, Milena Neubert

Abstract:

This study examines the role of actual and perceived financial sophistication (i.e., financial literacy and confidence) for individuals’ wealth accumulation. Using survey data from the German SAVE initiative, we find strong gender- and education-related differences in the distribution of the two variables: Whereas financial literacy rises in formal education, confidence increases in education for men but decreases for women. As a consequence, highly-educated women become strongly underconfident, while men remain overconfident. We show that these differences influence wealth accumulation: The positive effect of financial literacy is stronger for women than for men and is increasing in women’s education but decreasing in men’s. For highly-educated men, however, overconfidence closes this gap by increasing wealth via stronger financial engagement. Interestingly, female underconfidence does not reduce current wealth levels though it weakens future-oriented financial engagement and may thus impair future wealth accumulation.

Keywords: financial literacy, financial sophistication, confidence, wealth, household finance, behavioral finance, gender, formal education

Procedia PDF Downloads 254
2415 Analysis of Expert Possibilities While Identifying Human Teeth

Authors: Saule Mussabekova

Abstract:

Forensic investigation of human teeth plays an important role in detection of crime, particularly in cases of personal identification of dead bodies changed by putrefactive processes or skeletonized bodies as well as when finding bodies of unknown persons. 152 teeth have been investigated; 85 of them belonged to men and 67 belonged to women taken from alive people of different age. Teeth have been investigated after extraction. Two types of teeth have been investigated: teeth without integrity violation of dental crown and teeth with different degrees of its violation. Additionally, 517 teeth have been investigated that were collected from dead bodies, 252 of which belonged to women and 265 belonged to men, whatever the cause of death with death limitation from 1 month to 20 years. Isohemagglutinating serums and Coliclons of different series have been used for the research of tooth-group specificity by serological methods according to the AB0 system. Standard protocols of different techniques have been used for DNA purification from teeth (by reagent Chelex 100 produced by Bio-Rad using reagent kit 'DNA IQTM System' produced by Promega company (USA) and using columns 'QIAamp DNA Investigator Kit' produced by Qiagen company). Results of comparative forensic investigation of human teeth using serological and molecular genetic methods have shown that use of serological methods for forensic identification is sensible only in cases of preselection prior to the next molecular genetic investigation as well as in cases of impossibility of corresponding genetic investigation for different objective reasons. A number of advantages of methods of molecular genetics in the dental investigation have been marked, particularly in putrefactive changes, in personal identification. Key moments of modern condition of personal identification have been reflected according to dental state. Prospective directions of advance preparation of material have been emphasized for identification of teeth in forensic practice.

Keywords: dental state, forensic identification, molecular genetic analysis, teeth

Procedia PDF Downloads 129
2414 A Pervasive System Architecture for Smart Environments in Internet of Things Context

Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço

Abstract:

Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.

Keywords: internet of things, cloud, intelligent personal assistant, architecture

Procedia PDF Downloads 496
2413 Competencies of a Commercial Grain Farmer: A Classic Grounded Theory Approach

Authors: Thapelo Jacob Moloi

Abstract:

This paper purports to present the findings in relation to the competencies of commercial grain farmers using a classic grounded theory method. A total of about eighteen semi-structured interviews with farmers, former farmers, farm workers, and agriculture experts were conducted. Findings explored competencies in the form of skills, knowledge and personal attributes that commercial grain farmers possess. Skills range from production skills, financial management skill, time management skill, human resource management skill, planning skill to mechanical skill. Knowledge ranges from soil preparation, locality, and technology to weather knowledge. The personal attributes that contribute to shaping a commercial grain farmer are so many, but for this study, seven stood out as a passion, work dedication, self-efficacy, humbleness, intelligence, emotional stability, and patience.

Keywords: grain farming, farming competencies, classic grounded theory, competency model

Procedia PDF Downloads 62
2412 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 305
2411 A Study on Occupational Injuries among Building Construction Workers in Bhubaneswar City Odisha

Authors: Rahul Pal

Abstract:

In India, construction industry plays a vital role in the development of infrastructures. It is one of the most hazardous industries. Construction workers are a group that is particularly vulnerable to health risks because they have few legal protection. India has the world’s highest accident rate among construction workers. This study aimed to investigate the prevalence of occupation injury among construction workers and to find out the factors responsible for such injuries. Methodology: A cross-sectional study using a semi-structured questionnaire among 305 construction workers in Bhubaneswar city. In this study, it was found that the overall prevalence of injury was 43.28% in the previous one year period. Majority of the construction workers were less experience in the construction work. Factors responsible for injuries are fall of the object followed by striking, and majority of the workers reported their injuries to have occurred in the summer season. And most of the construction workers are not using personal protective equipment (PPE). Conclusion: Given the occupational injuries, the majority of the construction workers are injured in this study; there is a need to address this issue to ensure necessary step for the safety and well-being of construction workers.

Keywords: construction, construction workers, occupational injuries, personal protective equipment

Procedia PDF Downloads 184
2410 Islamic Banking in Ghana: Prospects and Challenges

Authors: Shaibu Ali, Sherif Heiman Shaban, Musah Ismaila, Imoro Alhassan, Yusif Ali

Abstract:

Purpose: Islamic banking and finance is one of the most rapidly growing segments of the global finance industry. Starting with the Dubai Islamic Bank in 1975, the number of Islamic financial institutions worldwide has shot up astronomically, to over three hundred, with operations in seventy-five countries and assets in excess of US$400 billion. The purpose of this study is to explore the prospects and challenges of Islamic banking introduction in a non-Islamic country like Ghana. Design/Methodology: Data for the study was collected via an expert opinion of three Islamic scholars on Islamic banking from Ghana. Findings: Findings from this study indicates some of the benefits of Islamic banking includes connecting financial markets and economic activity, promoting the principle of financial justice, greater stability, avoiding economic bubbles (and bursts) and reducing the impact of harmful products and practices. The study also identified lack of experts in various fields of Islamic banking, product innovation, moral hazard, and need for experienced staff in Islamic banking as some of the challenges to Islamic banking system’s introduction. Contribution: The study contributes to literature on Islamic banking from a non-Islamic country like Ghana.

Keywords: Islamic banking, Shari’ah, Riba, conventional banking

Procedia PDF Downloads 160
2409 A Multi-Agent Smart E-Market Design at Work for Shariah Compliant Islamic Banking

Authors: Wafa Ghonaim

Abstract:

Though quite fast on growth, Islamic financing at large, and its diverse instruments, is a controversial matter among scholars. This is evident from the ongoing debates on its Shariah compliance. Arguments, however, are inciting doubts and concerns among clients about its credibility, which is harming this lucrative sector. The work here investigates, particularly, some issues related to the Tawarruq instrument. The work examines the issues of linking Murabaha and Wakala contracts, the reselling of commodities to same traders, and the transfer of ownerships. The work affirms that a multi-agent smart electronic market design would facilitate Shariah compliance. The smart market exploits the rational decision-making capabilities of autonomous proxy agents that enable the clients, traders, brokers, and the bank buy and sell commodities, and manage transactions and cash flow. The smart electronic market design delivers desirable qualities that terminate the need for Wakala contracts and the reselling of commodities to the same traders. It also resolves the ownership transfer issues by allowing stakeholders to trade independently. The bank administers the smart electronic market and assures reliability of trades, transactions and cash flow. A multi-agent simulation is presented to validate the concept and processes. We anticipate that the multi-agent smart electronic market design would deliver Shariah compliance of personal financing to the aspiration of scholars, banks, traders and potential clients.

Keywords: Islamic finance, share'ah compliance, smart electronic markets design, multiagent systems

Procedia PDF Downloads 303
2408 Mitigating the Negative Health Effects from Stress - A Social Network Analysis

Authors: Jennifer A. Kowalkowski

Abstract:

Production agriculture (farming) is a physically, emotionally, and cognitively stressful occupation, where workers have little control over the stressors that impact both their work and their lives. In an occupation already rife with hazards, these occupational-related stressors have been shown to increase farm workers’ risks for illness, injury, disability, and death associated with their work. Despite efforts to mitigate the negative health effects from occupational-related stress (ORS) and to promote health and well-being (HWB) among farmers in the US, marked improvements have not been attained. Social support accessed through social networks has been shown to buffer against the negative health effects from stress, yet no studies have directly examined these relationships among farmers. The purpose of this study was to use social network analysis to explore the social networks of farm owner-operators and the social supports available to them for mitigating the negative health effects of ORS. A convenience sample of 71 farm owner-operators from a Midwestern County in the US completed and returned a mailed survey (55.5% response rate) that solicited information about their social networks related to ORS. Farmers reported an average of 2.4 individuals in their personal networks and higher levels of comfort discussing ORS with female network members. Farmers also identified few connections (3.4% density) and indicated low comfort with members of affiliation networks specific to ORS. Findings from this study highlighted that farmers accessed different social networks and resources for their personal HWB than for issues related to occupational(farm-related) health and safety. In addition, farmers’ social networks for personal HWB were smaller, with different relational characteristics than reported in studies of farmers’ social networks related to occupational health and safety. Collectively, these findings suggest that farmers conceptualize personal HWB differently than farm health and safety. Therefore, the same research approaches and targets that guide occupational health and safety research may not be appropriate for personal HWB for farmers. Interventions and programming targeting ORS and HWB have largely been offered through the same platforms or mechanisms as occupational health and safety programs. This may be attributed to the significant overlap between the farm as a family business and place of residence, or that ORS stems from farm-related issues. However, these assumptions translated to health research of farmers and farm families from the occupational health and safety literature have not been directly studied or challenged. Thismay explain why past interventions have not been effective at improving health outcomes for farmers and farm families. A close examination of findings from this study raises important questions for researchers who study agricultural health. Findings from this study have significant implications for future research agendas focused on addressing ORS, HWB, and health disparities for farmersand farm families.

Keywords: agricultural health, occupational-related stress, social networks, well-being

Procedia PDF Downloads 94
2407 Transforming Personal Healthcare through Patient Engagement: An In-Depth Analysis of Tools and Methods for the Digital Age

Authors: Emily Hickmann, Peggy Richter, Maren Kaehlig, Hannes Schlieter

Abstract:

Patient engagement is a cornerstone of high-quality care and essential for patients with chronic diseases to achieve improved health outcomes. Through digital transformation, possibilities to engage patients in their personal healthcare have multiplied. However, the exploitation of this potential is still lagging. To support the transmission of patient engagement theory into practice, this paper’s objective is to give a state-of-the-art overview of patient engagement tools and methods. A systematic literature review was conducted. Overall, 56 tools and methods were extracted and synthesized according to the four attributes of patient engagement, i.e., personalization, access, commitment, and therapeutic alliance. The results are discussed in terms of their potential to be implemented in digital health solutions under consideration of the “computers are social actors” (CASA) paradigm. It is concluded that digital health can catalyze patient engagement in practice, and a broad future research agenda is formulated.

Keywords: chronic diseases, digitalization, patient-centeredness, patient empowerment, patient engagement

Procedia PDF Downloads 91
2406 Intellectual Women: The Continuing Struggle between Marriage and Personal Dreams in Margaret Drabble's a Summer Bird-Cage and The Millstone

Authors: Ashwag Abdul-Hakeem Al-Thubaiti

Abstract:

This study aims at analysing women's hesitant attitudes towards marriage in Margaret Drabble's novels, A Summer-Bird-Cage (1964) and The Millstone (1965), to prove that these ambivalent feelings are due to their search for autonomy. The heroines' radical outlook on independence is only meant to hide their conflict regarding sex-experience and fear of intimacy, a fear that has been enhanced by their rejection of the expression of faith that considers marriage a sacred bond and instead focus on their own identity and dissolve any bond that may affect their independence. To achieve their autonomy, they have to depend on themselves financially and focus on their aspirational goals. This sharp division between the two worlds, the family life and the personal success attributes negatively to their lives and leads to a self-identity crisis. Drabble tends to solve this struggle by awakening their maternal instinct. Once they respect their physical needs and appreciate their role as it is assigned to them by nature and society, they reach a balanced identity.

Keywords: autonomy, marriage, maternity, women

Procedia PDF Downloads 551
2405 A Double Differential Chaos Shift Keying Scheme for Ultra-Wideband Chaotic Communication Technology Applied in Low-Rate Wireless Personal Area Network

Authors: Ghobad Gorji, Hasan Golabi

Abstract:

The goal of this paper is to describe the design of an ultra-wideband (UWB) system that is optimized for the low-rate wireless personal area network application. To this aim, we propose a system based on direct chaotic communication (DCC) technology. Based on this system, a 2-GHz wide chaotic signal is directly generated into the lower band of the UWB spectrum, i.e., 3.1–5.1 GHz. For this system, two simple modulation schemes, namely chaotic on-off keying (COOK) and differential chaos shift keying (DCSK), were studied before, and their performance was evaluated. We propose a modulation scheme, namely Double DCSK, to improve the performance of UWB DCC. Different characteristics of these systems, with Monte Carlo simulations based on the Additive White Gaussian Noise (AWGN) and the IEEE 802.15.4a standard channel models, are compared.

Keywords: UWB, DCC, IEEE 802.15.4a, COOK, DCSK

Procedia PDF Downloads 61
2404 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 365
2403 Encounters with the Other Sisters of the Past: the Role of Colonial History and Memory in the Adjustment of the Postcolonial Female Identity

Authors: Fatiha Kaïd Berrahal, Nassima Kaïd, Djihad Affaf Selt

Abstract:

The present paper is a comparative analysis of the Algerian writer Assia Djebar’s women of Algiers in Their Apartment (1982) and the Anglo-Egyptian Ahdaf Soueif’s The Map of Love (1999) foregrounded on the female protagonists’ painfully common colonial and patriarchal experiences, though in different geographical regions of North Africa. This study raises questions pertaining, first, to the emerging contemporary genre “Historiographic meta-fiction” in which the novels examined could be inscribed, then, the interplay of colonial history and personal memory that impinges on the development of the identity of the post-colonial female subject. As the novels alternate between the historical and the autobiographical, we currently seek to understand how it is pertinent and pressing for women to excavate the lost and occluded stories of the past for the adjustment of their present personal identities, which are undoubtedly an important part of the identity of a nation.

Keywords: postcolonial feminism, islamic feminism, memory, histoirographic metafiction

Procedia PDF Downloads 631
2402 Psychological Aspects of Quality of Life in Patients with Primary and Metastatic Bone Tumors

Authors: O. Yu Shchelkova, E. B. Usmanova

Abstract:

Introduction: Last decades scientific research of quality of life (QoL) is developing fast worldwide. QoL concept pays attention to emotional experience of disease in patients, particularly to personal sense of possibility to satisfy actual needs and possibility of full social functioning in spite of disease limitations. QoL in oncological patients is studied intensively. Nevertheless, the issue of QoL in patients with bone tumors focused on psychological factors of QoL and relation to disease impact on QoL is not discussed. The aim of the study was to reveal the basic aspects and personality factors of QoL in patients with bone tumor. Results: Study participants were 139 patients with bone tumors. The diagnoses were osteosarcoma (n=42), giant cell tumor (n=32), chondrosarcoma (n=32), Ewing sarcoma (n=10) and bone metastases (n=23). The study revealed that patients with bone metastases assess their health significantly worse than other patients. Besides patients with osteosarcoma evaluate their general health higher than patients with giant cell tumors. Social functioning in patients with chondrosarcoma is higher than in patients with bone metastases and patients with giant cell tumor. Patients with chondrosarcoma have higher physical functioning and less restricted in daily activities than patients with bone metastases. Patients with bone metastases characterize their pain as more widespread than patients with primary bone tumors and have more functional restrictions due to bone incision. Moreover, the study revealed personality significant influence on QoL related to bone tumors. Such characteristics in structure of personality as high degree of self-consciousness, personal resources, cooperation and disposition to positive reappraisal in difficult situation correspond to higher QoL. Otherwise low personal resources and slight problem solving behaviour, low degree of self-consciousness and high social dependence correspond to decrease of QoL in patients with bone tumors. Conclusion: Patients with bone metastasis have lower QoL compared to patients with primary bone tumors. Patients with giant cell tumor have the worth quality of life among patients with primary bone tumors. Furthermore, the results revealed differences in QoL parameters associated with personality characteristics in patients with bone tumors. Such psychological factors as future goals, interest in life and emotional saturation, besides high degree of personal resources and cooperation influence on increasing QoL in patients with bone tumors.

Keywords: quality of life, psychological factors, bone tumor, personality

Procedia PDF Downloads 128
2401 Elitism: Navigating Professional Diversity Barriers

Authors: Rachel Nir, Tina Mckee

Abstract:

In the UK, reliance has been placed on the professions to ‘heal themselves’ in improving equality and diversity. This approach has faltered, in part due to the global economic climate, and stimulus is needed to make faster equality progress. Recent empirical evidence has identified specific diversity barriers, namely: the cost of training; the use of high school grades as a primary selection criteria; the significance of prior work experience in recruitment decisions; and recruitment from elite universities. Students from majority groups and affluent backgrounds are advantaged over their counterparts. We as educators are passionate about resisting this. We believe that education can be a key agent of change. As part of this belief, the presenters have recently designed learning and teaching materials for the 2015/16 academic year. These are aimed at undergraduate law students for the purpose of 1) educating them on career barriers; 2) helping them to develop personal strategies to overcome them; and 3) encouraging them to address their own biases, both conscious and implicit, so that they, themselves, may be fairer employers and managers in the future.

Keywords: career barriers, challenging professional bias, education, elitism, personal student strategies

Procedia PDF Downloads 223
2400 Analyzing Data Protection in the Era of Big Data under the Framework of Virtual Property Layer Theory

Authors: Xiaochen Mu

Abstract:

Data rights confirmation, as a key legal issue in the development of the digital economy, is undergoing a transition from a traditional rights paradigm to a more complex private-economic paradigm. In this process, data rights confirmation has evolved from a simple claim of rights to a complex structure encompassing multiple dimensions of personality rights and property rights. Current data rights confirmation practices are primarily reflected in two models: holistic rights confirmation and process rights confirmation. The holistic rights confirmation model continues the traditional "one object, one right" theory, while the process rights confirmation model, through contractual relationships in the data processing process, recognizes rights that are more adaptable to the needs of data circulation and value release. In the design of the data property rights system, there is a hierarchical characteristic aimed at decoupling from raw data to data applications through horizontal stratification and vertical staging. This design not only respects the ownership rights of data originators but also, based on the usufructuary rights of enterprises, constructs a corresponding rights system for different stages of data processing activities. The subjects of data property rights include both data originators, such as users, and data producers, such as enterprises, who enjoy different rights at different stages of data processing. The intellectual property rights system, with the mission of incentivizing innovation and promoting the advancement of science, culture, and the arts, provides a complete set of mechanisms for protecting innovative results. However, unlike traditional private property rights, the granting of intellectual property rights is not an end in itself; the purpose of the intellectual property system is to balance the exclusive rights of the rights holders with the prosperity and long-term development of society's public learning and the entire field of science, culture, and the arts. Therefore, the intellectual property granting mechanism provides both protection and limitations for the rights holder. This perfectly aligns with the dual attributes of data. In terms of achieving the protection of data property rights, the granting of intellectual property rights is an important institutional choice that can enhance the effectiveness of the data property exchange mechanism. Although this is not the only path, the granting of data property rights within the framework of the intellectual property rights system helps to establish fundamental legal relationships and rights confirmation mechanisms and is more compatible with the classification and grading system of data. The modernity of the intellectual property rights system allows it to adapt to the needs of big data technology development through special clauses or industry guidelines, thus promoting the comprehensive advancement of data intellectual property rights legislation. This paper analyzes data protection under the virtual property layer theory and two-fold virtual property rights system. Based on the “bundle of right” theory, this paper establishes specific three-level data rights. This paper analyzes the cases: Google v. Vidal-Hall, Halliday v Creation Consumer Finance, Douglas v Hello Limited, Campbell v MGN and Imerman v Tchenquiz. This paper concluded that recognizing property rights over personal data and protecting data under the framework of intellectual property will be beneficial to establish the tort of misuse of personal information.

Keywords: data protection, property rights, intellectual property, Big data

Procedia PDF Downloads 10
2399 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 244