Search results for: trust law
459 Electronic Government Services Adoption from Multi-Nationalities Perspectives
Authors: Isaac Kofi Mensah, Jianing Mi, Cheng Feng
Abstract:
Electronic government is the application of Information and Communication Technologies (ICTs) by the government to improve public service delivery to citizens and businesses. The purpose of this study is to investigate factors influencing the adoption and use of e-government services from different nationalities perspectives. The Technology Acceptance Model (TAM) will be used as the theoretical framework for the study. A questionnaire would be developed and administered to 500 potential respondents who are students from different nationalities in China. Predictors such as perceived usefulness, perceived ease of use, computer self-efficacy, trust in both the internet and government, social influence and perceived service quality would be examined with regard to their impact on the intention to use e-government services. This research is currently at the design and implementation stage. The completion of this study will provide useful insights into understanding factors impacting the decision to use e-government services from a cross and multi nationalities perspectives.Keywords: different nationalities, e-government, e-government services, technology acceptance model (TAM)
Procedia PDF Downloads 429458 Science and Monitoring Underpinning River Restoration: A Case Study
Authors: Geoffrey Gilfillan, Peter Barham, Lisa Smallwood, David Harper
Abstract:
The ‘Welland for People and Wildlife’ project aimed to improve the River Welland’s ecology and water quality, and to make it more accessible to the community of Market Harborough. A joint monitoring project by the Welland Rivers Trust & University of Leicester was incorporated into the design. The techniques that have been used to measure its success are hydrological, geomorphological, and water quality monitoring, species and habitat surveys, and community engagement. Early results show improvements to flow and habitat diversity, water quality and biodiversity of the river environment. Barrier removal has increased stickleback mating activity, and decreased parasitically infected fish in sample catches. The habitats provided by the berms now boast over 25 native plant species, and the river is clearer, cleaner and with better-oxygenated water.Keywords: community engagement, ecological monitoring, river restoration, water quality
Procedia PDF Downloads 231457 Framework for Government ICT Projects
Authors: Manal Rayes
Abstract:
In its efforts to utilize the information and communication technology to enhance the quality of public service delivery, national and local governments around the world are competing to introduce more ICT applications as tools to automate processes related to law enforcement or policy execution, increase citizen orientation, trust, and satisfaction, and create one-stop-shops for public services. In its implementation, e-Government ICTs need to maintain transparency, participation, and collaboration. Due to this diverse of mixed goals and requirements, e-Government systems need to be designed based on special design considerations in order to eliminate the risks of failure to compliance to government regulations, citizen dissatisfaction, or market repulsion. In this article we suggest a framework with guidelines for designing government information systems that takes into consideration the special requirements of the public sector. Then we introduce two case studies and show how applying those guidelines would result in a more solid system design.Keywords: e-government, framework, guidelines, system design
Procedia PDF Downloads 366456 Examining the Drivers of Engagement in Social Media Brand Communities
Authors: Rania S. Hussein
Abstract:
This research mainly focuses on examining engagement in social media brand communities. Engagement in social media has become a main focus in literature affirming that the role of social media in our daily lives is growing. (Akman and Mishra, 2017;Prado-Gascó et al., 2017). Social media has also become a key medium for brand communication and brand building relationships(Frimpong and McLean,2018;Dimitriu and Guesalaga, 2017). Engagement on social media has become a main focus of many researchers who tried to understand this concept further and draw a link between engagement and various social media activities (Cvijikj and Michahelles;2013), Andre,2015; Wang et al., 2015). According to Felix et al. (2017), the internet and social media have provided better digital resources to improve brand loyalty and customer interactions, thus leading to social media engagement within brand communities. The aim of this research is to highlight the importance of social media and why it is important to maintain engagement within social media. While the term ‘engagement’ is widely used in scholarly literature, there isn’t a common consensus about what the term exactly entails, according to Kidd, (2011). On one hand, it was seen as something that includes factors such as participation, activation, empowerment, devotion, trust, and productivity (Zhang et al, andBenyoucef, M. (2016), ). Other scholars held different viewpoints. For example, Lim et al. (2015) has chosen to break down engagement into three types: operational engagement, emotional engagement, and relational engagement. Chandler and Lusch (2015) further studied engagement as a means to measure commitment to a brand. Fernandes&Remelhe (2016) had a more technical view, measuring engagement through comments, following, subscribing, sharing, enjoying, writing, etc., in the social media context. ustomer engagement has become a research focus for understanding how consumer relationships are developed, retained, and improved within a digital context. Based on previous literature, it is evident that many customer engagement related studies are limited to the interaction between firms and consumers on social media. There is a clear gap in the literature regarding consumer-to-consumer interaction and user-generated content and its significance. While some researchers, such as Alversia et al. (2016), touched upon the importance of customer-based engagement, a gap still remains: there is no consistent and well-tested method for defining the factors that affect consumer interaction. Moreover, few scholarly research papers such as (Case, 2019; Riley, 2020;Habibi, 2014) provided to assist businesses understand their customers' interaction habits as well as the best ways to develop customer loyalty. Additionally, the majority of research on brand pages concentrated on the drivers of Consumer engagement, with just a few studies example, Lamberton, Cc(2016), Poorrezaei, (2016). (Jayasingh, 2019), looking into the implications. This study focuses on understanding the concept of engagement and its importance, specifically engagement within social media brand communities. It examines drivers as well as consequences of engagement, including brand knowledge, brand trust, entertainment, and brand page interactivity. Brand engagement is also expected to affect brand loyalty and word of the mouth.Keywords: engagement, social media, brand communities, drivers
Procedia PDF Downloads 160455 Providing Support On-Time: Need to Establish De-Radicalization Hotlines
Authors: Ashir Ahmed
Abstract:
Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.Keywords: de-radicalization, framework, hotlines, peacekeeping
Procedia PDF Downloads 214454 Re-Development and Lost Industrial History: Darling Harbour of Sydney
Authors: Ece Kaya
Abstract:
Urban waterfront re-development is a well-established phenomenon internationally since 1960s. In cities throughout the world, old industrial waterfront land is being redeveloped into luxury housing, offices, tourist attractions, cultural amenities and shopping centres. These developments are intended to attract high-income residents, tourists and investors to the city. As urban waterfronts are iconic places for the cities and catalyst for further development. They are often referred as flagship project. In Sydney, the re-development of industrial waterfront has been exposed since 1980s with Darling Harbour Project. Darling Harbour waterfront used to be the main arrival and landing place for commercial and industrial shipping until 1970s. Its urban development has continued since the establishment of the city. It was developed as a major industrial and goods-handling precinct in 1812. This use was continued by the mid-1970s. After becoming a redundant industrial waterfront, the area was ripe for re-development in 1984. Darling Harbour is now one of the world’s fascinating waterfront leisure and entertainment destinations and its transformation has been considered as a success story. It is a contradictory statement for this paper. Data collection was carried out using an extensive archival document analysis. The data was obtained from Australian Institute of Architects, City of Sydney Council Archive, Parramatta Heritage Office, Historic Houses Trust, National Trust, and University of Sydney libraries, State Archive, State Library and Sydney Harbour Foreshore Authority Archives. Public documents, primarily newspaper articles and design plans, were analysed to identify possible differences in motives and to determine the process of implementation of the waterfront redevelopments. It was also important to obtain historical photographs and descriptions to understand how the waterfront had been altered. Sites maps in different time periods have been identified to understand what kind of changes happened on the urban landscape and how the developments affected areas. Newspaper articles and editorials have been examined in order to discover what aspects of the projects reflected the history and heritage. The thematic analysis of the archival data helped determine Darling Harbour is a historically important place as it had represented a focal point for Sydney's industrial growth and the cradle of industrial development in European Australia. It has been found that the development area was designated in order to be transformed to a place for tourist, education, recreational, entertainment, cultural and commercial activities and as a result little evidence remained of its industrial past. This paper aims to discuss the industrial significance of Darling Harbour and to explain the changes on its industrial landscape. What is absent now is the layer of its history that creates the layers of meaning to the place so its historic industrial identity is effectively lost.Keywords: historical significance, industrial heritage, industrial waterfront, re-development
Procedia PDF Downloads 301453 Enhanced Automated Teller Machine Using Short Message Service Authentication Verification
Authors: Rasheed Gbenga Jimoh, Akinbowale Nathaniel Babatunde
Abstract:
The use of Automated Teller Machine (ATM) has become an important tool among commercial banks, customers of banks have come to depend on and trust the ATM conveniently meet their banking needs. Although the overwhelming advantages of ATM cannot be over-emphasized, its alarming fraud rate has become a bottleneck in it’s full adoption in Nigeria. This study examined the menace of ATM in the society another cost of running ATM services by banks in the country. The researcher developed a prototype of an enhanced Automated Teller Machine Authentication using Short Message Service (SMS) Verification. The developed prototype was tested by Ten (10) respondents who are users of ATM cards in the country and the data collected was analyzed using Statistical Package for Social Science (SPSS). Based on the results of the analysis, it is being envisaged that the developed prototype will go a long way in reducing the alarming rate of ATM fraud in Nigeria.Keywords: ATM, ATM fraud, e-banking, prototyping
Procedia PDF Downloads 321452 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification
Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune
Abstract:
This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP
Procedia PDF Downloads 72451 Evaluating Electronic Service Quality in Banking Iran
Authors: Vahid Bairami Rad
Abstract:
With the rapid growth of the Internet and the globalization of the market, most enterprises are trying to attract and win customers in the highly competitive electronic market. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Iranian Banking Iran. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and speed of delivery had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Iranian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.Keywords: electronic banking, Dimensions, customer service quality, electronic, communication
Procedia PDF Downloads 499450 Understanding Non-Utilization of AI Tools for Research and Academic Writing among Academic Staff in Nigerian Universities: A Paradigm Shift
Authors: Abubakar Abdulkareem, Nasir Haruna Soba
Abstract:
This study investigates the non-utilization of AI tools for research and academic writing among academic staff in Nigerian universities using the perceived attribute of innovation theory by Rogers as a theoretical framework to guide the investigation. This study was framed in an interpretative research paradigm. A qualitative methodology and case study research design was adopted. Interviews were conducted with 20 academic staff. The study used a thematic analysis process to identify 115 narratives. The narratives are organized into five major categories and further collapsed into five theoretical constructs explaining the non-use of AI tools for research and academic writing. Findings from this study revealed some of the reasons for the non-utilization of AI tools for research and academic writing as lack of Awareness, perceived Complexity, trust and Reliability Concerns, cost and accessibility, ethical and Privacy concerns and, cultural and institutional factors, etc.Keywords: non-utilization, AI tools, research and academic writing, academic staff
Procedia PDF Downloads 47449 Tool for Metadata Extraction and Content Packaging as Endorsed in OAIS Framework
Authors: Payal Abichandani, Rishi Prakash, Paras Nath Barwal, B. K. Murthy
Abstract:
Information generated from various computerization processes is a potential rich source of knowledge for its designated community. To pass this information from generation to generation without modifying the meaning is a challenging activity. To preserve and archive the data for future generations it’s very essential to prove the authenticity of the data. It can be achieved by extracting the metadata from the data which can prove the authenticity and create trust on the archived data. Subsequent challenge is the technology obsolescence. Metadata extraction and standardization can be effectively used to resolve and tackle this problem. Metadata can be categorized at two levels i.e. Technical and Domain level broadly. Technical metadata will provide the information that can be used to understand and interpret the data record, but only this level of metadata isn’t sufficient to create trustworthiness. We have developed a tool which will extract and standardize the technical as well as domain level metadata. This paper is about the different features of the tool and how we have developed this.Keywords: digital preservation, metadata, OAIS, PDI, XML
Procedia PDF Downloads 393448 The End Is Just the Beginning: The Importance of Project Post-Implementation Reviews
Authors: Catalin-Teodor Dogaru, Ana-Maria Dogaru
Abstract:
Success means different things to different people. For us, project managers, it becomes even harder to find a definition. Many factors have to be included in the evaluation. Moreover, literature is not very helpful, lacking consensus and neutrality. Post-implementation reviews (PIR) can be an efficient tool in evaluating how things worked on a certain project. Despite the visible progress, PIR is not a very detailed subject yet and there is not a common understanding in this matter. This may be the reason that some organizations include it in the projects’ lifecycle and some do not. Through this paper, we point out the reasons why all project managers should pay proper attention to this important step and to the elements, which can be assessed, beside the already famous triple constraints: cost, budget, and time. It is essential to take notice that PIR is not a checklist. It brings the edge in eliminating subjectivity and judging projects based on actual proof. Based on our experience, our success indicator model, presented in this paper, contributes to the success of the project! In the same time, it increases trust among customers who will perceive success more objectively.Keywords: project, post implementation, review, success, indicators
Procedia PDF Downloads 371447 Comparison of the Effectiveness of Communication between the Traditional Lecture and IELS
Authors: Ahmed R. Althobaiti, Malcolm Munro
Abstract:
Communication and effective information exchange within technology has become a crucial part of delivering knowledge to students during the learning process. It enables better understanding, builds trust, respect and increase the knowledge between students. This paper examines the communication between undergraduate students and their lecturers during the Traditional lecture and in using the Interactive Electronic Lecture System (IELS). The IELS is an application that offers a set of components, which support the effective communication between students, themselves and their lecturers. Moreover, this paper highlights the communication skills such as sender, receiver, channel and feedback. It will show how the IELS creates a rich communication environment between its users and how they communicate effectively. To examine and check the effectiveness of communication an experiment has been conducted for groups of users; students and lecturers. The first group communicated during the Traditional lecture while the second group communicated by the IELS application. The result showed that there was an effective communication between the second group more than the first group.Keywords: communication, effective information exchange, lecture, student
Procedia PDF Downloads 403446 Citizens’ Satisfaction Causal Factors in E-Government Services
Authors: Abdullah Alshehab
Abstract:
Governments worldwide are intensely focused on digitizing public transactions to establish reliable e-government services. The advent of new digital technologies and ongoing advancements in ICT have profoundly transformed business operations. Citizen engagement and participation in e-government services are crucial for the system's success. However, it is essential to measure and enhance citizen satisfaction levels to effectively evaluate and improve these systems. Citizen satisfaction is a key criterion that allows government institutions to assess the quality of their services. There is a strong connection between information quality, service quality, and system quality, all of which directly impact user satisfaction. Additionally, both system quality and information quality have indirect effects on citizen satisfaction. A causal map, which is a network diagram representing causes and effects, can illustrate these relationships. According to the literature, the main factors influencing citizen satisfaction are trust, reliability, citizen support, convenience, and transparency. This paper investigates the causal relationships among these factors and identifies any interrelatedness between them.Keywords: e-government services, e-satisfaction, citizen satisfaction, causal map.
Procedia PDF Downloads 24445 Leadership Values in Succession Processes
Authors: Peter Heimerl, Alexander Plaikner, Mike Peters
Abstract:
Background and Significance of the Study: Family-run businesses are a decisive economic factor in the Alpine tourism and leisure industry. Within the next years, it is expected that a large number of family-run small and medium-sized businesses will transfer ownership due to demographic developments. Four stages of succession processes can be identified by several empirical studies: (1) the preparation phase, (2) the succession planning phase, (3) the development of the succession concept, (4) and the implementation of the business transfer. Family business research underlines the importance of individual's and family’s values: Especially leadership values address mainly the first phase, which strongly determines the following stages. Aim of the Study: The study aims at answering the following research question: Which leadership values are dominating during succession processes in family-run businesses in Austrian Alpine tourism industry? Methodology: Twenty-two problem-centred individual interviews with 11 transferors and their 11 transferees were conducted. Data analysis was carried out using the software program MAXQDA following an inductive approach to data coding. Major Findings: Data analysis shows that nine values particularly influence succession processes, especially during the vulnerable preparation phase. Participation is the most-dominant value (162 references). It covers a style of cooperation, communication, and controlling. Discipline (142) is especially prevailing from the transferor's perspective. It addresses entrepreneurial honesty and customer orientation. Development (138) is seen as an important value, but it can be distinguished between transferors and transferees. These are mainly focused on strategic positioning and new technologies. Trust (105) is interpreted as a basic prerequisite to run the family firm smoothly. Interviewees underline the importance to be able to take a break from family-business management; however, this is only possible when openness and honesty constitute trust within the family firm. Loyalty (102): Almost all interviewees perceive that they can influence the loyalty of the employees through their own role models. A good work-life balance (90) is very important to most of the transferors, especially for their employees. Despite the communicated importance of a good work-life-balance, but however, mostly the commitment to the company is prioritised. Considerations of regionality (82) and regional responsibility are also frequently raised. Appreciation (75) is of great importance to both the handover and the takeover generation -as appreciation towards the employees in the company and especially in connection with the family. Familiarity (66) and the blurring of the boundaries between private and professional life are very common, especially in family businesses. Familial contact and open communication with employees which is mentioned in almost all handing over. Conclusions: In the preparation phase of succession, successors and incumbents have to consider and discuss their leadership and family values of family-business management. Quite often, assistance is needed to commonly and openly discuss these values in the early stages of succession processes. A large majority of handovers fail because of these values. Implications can be drawn to support family businesses, e.g., consulting initiatives at chambers of commerce and business consultancies must address this problem.Keywords: leadership values, family business, succession processes, succession phases
Procedia PDF Downloads 98444 The Role of Brand Authenticity in Egyptian Destination Marketing
Authors: Hala Hilaly, Nermin Morsy, Jala Morsy Ibrahim
Abstract:
Brand authenticity has a significant impact on brand trust and can help grow within the markets. Consumers have become more concerned with the 'authenticity' due to the doubt of credibility of the value of mass production. This is why people prefer authentic products, which making authenticity a cornerstone of contemporary marketing and a major factor for brand success. Therefore, it is important to embrace a culture that encourages and promotes authentic values. Hence, the purpose of the research is to investigate the impact of using local products as an authentic brand on promoting Egyptian tourist destination and explore the effect of Globalized authenticity on the local product in Egypt. Results confirmed that local products provide an excellent opportunity to worldwide advertising with positive impact on promoting Egypt as tourist destination. However, number of problems are facing local products in Egypt such as imported 'Made in China' products as well as other obstacles.Keywords: authentic brand, contemporary marketing, destination marketing, local products
Procedia PDF Downloads 283443 The Factors Predicting Credibility of News in Social Media in Thailand
Authors: Ekapon Thienthaworn
Abstract:
This research aims to study the reliability of the forecasting factor in social media by using survey research methods with questionnaires. The sampling is the group of undergraduate students in Bangkok. A multiple-step random number of 400 persons, data analysis are descriptive statistics with multivariate regression analysis. The research found the average of the overall trust at the intermediate level for reading the news in social media and the results of the multivariate regression analysis to find out the factors that forecast credibility of the media found the only content that has the power to forecast reliability of undergraduate students in Bangkok to reading the news on social media at the significance level.at 0.05.These can be factors with forecasts reliability of news in social media by a variable that has the highest influence factor of the media content and the speed is also important for reliability of the news.Keywords: credibility of news, behaviors and attitudes, social media, web board
Procedia PDF Downloads 468442 The Role of Information and Communication Technology in Curbing Electoral Malpractices in Nigeria
Authors: Fred Fudah Moveh, Muhammad Abba Jallo
Abstract:
Electoral fraud remains a persistent threat to democracy in Nigeria, undermining public trust and stalling political development. This study explores the role of Information and Communication Technology (ICT) in curbing electoral fraud, focusing on its application in recent Nigerian elections. The paper identifies the main forms of electoral fraud, evaluates the effectiveness of ICT-based interventions like the Permanent Voter Card (PVC) and the Bi-modal Voter Accreditation System (BVAS), and discusses challenges such as poor infrastructure, voter intimidation, and legal inadequacies. Data was collected through structured questionnaires and interviews and analyzed using SPSS software. Results reveal that while ICT has mitigated some forms of fraud, systemic issues continue to hinder its full potential. The study concludes with recommendations for enhancing the application of ICT in Nigeria’s electoral process.Keywords: ICT, electoral fraud, election process, Nigeria, political instability
Procedia PDF Downloads 23441 Examining the Level of Compliance of Patients’ Rights in Physiotherapy Clinic
Authors: Hokuma Isgandarova, Khalil Aryanfar
Abstract:
The patient's rights include all care items that the patient has the right to receive. Considering the growing importance of this important issue and its effect on improving treatment results and customer satisfaction, the present study was conducted with the aim of investigating the level of respect for patient rights in the physiotherapy clinic of the Faculty of Medicine University of Medical Sciences in 2023. In this study, the patients or companions who were referred to the clinic answered questions about the performance status of the clinic with respect to various aspects of the patient's rights. The aspects that were studied: choosing the service provider, having authority, respect, safety, prevention and access were found to have inappropriate performance scores. However, communication and interaction, continuity of service, quality of basic facilities and facilities, timely and immediate attention and trust had appropriate performance. Also, the results of the data analysis showed that there is no significant relationship between the total performance score and any of the demographic variables.Keywords: compliance, patients' rights, physiotherapy clinic, performance level
Procedia PDF Downloads 58440 Translating Empathy in a Senior Community
Authors: Denver E. Severt, Cynthia Mejia
Abstract:
With a grey wave sweeping across the world and people living longer than ever, more individuals will reside in retirement communities in unprecedented numbers. Enhancing the resident stay within these communities is imperative to reduce past stigmas associated with senior communities. This exploratory quantitative investigation examined interview contents of employees and residents to see if empathy was observed. The results showed the employees across all ranges had a much better grasp of affective empathy, yet with greater experience and age, it was clear that cognitive empathy had to be used with affective empathy in order to gain better trust across the community of residents. Outcomes from the study suggest that future training programs for employees are operationalized to include both affective and cognitive empathy practices. This study is unique in that two scales of empathy were transformed into qualitative questions, and in-depth employee and resident interviews were conducted. The study answers many calls of research to provide more specific studies in senior living communities.Keywords: senior living community, transformational service research, qualitative research
Procedia PDF Downloads 143439 Understanding the Nature of Conflicts in Africa: Analytical and Theoretical Explanations
Authors: Kingfahd Adewale Adedapo, Adekunle Ajisebiyawo
Abstract:
The focus of this paper is to explore the different theoretical perspectives that underline academic attempts at understanding and explaining the nature of conflicts in Africa. The African environment is riddled with the past history of conflicts among groups either for an economic outlet or imperial space, and most often, such past negative interactions have made it difficult even now for some of these groups to live harmoniously together within the present state system and to trust each other. The paper observed that no one theory or explanatory schema could offer a holistic explanation of conflict in Africa. At best, each of the possible theories can only offer a partial explanation of the causes and nature of conflict in a particular African society or state. This paper, therefore, attempted to synthesize the many sources of theories of conflicts and provided the intellectual background from which these different theories emanated. Therefore, if this paper has done anything at all, it is to offer the basis for assessing different theoretical strands aimed at offering cogent and reliable explanations for most of the conflicts in Africa and especially in the West African sub-region.Keywords: conflict, functionalism, humanitarianism, structuralism, theory
Procedia PDF Downloads 104438 The Relationship between Religiosity, Childhood Attachment, and Childhood Trauma in Adulthood
Authors: Ashley Sainvil
Abstract:
The present study explores the relationship and possible effects of religiosity on both adverse childhood experiences and childhood attachment. Furthermore, to explore the idea that adult religiousness may play as a protective role, specifically protecting adults with a past of adverse childhood experiences and an insecure childhood attachment from reporting depression. Analyses are based on 57 participants (N= 57, 32.1% of ages 18-22; 70.2% female, 28.1% male, 1.8% other). In the form of an online Qualtrics survey through questionnaires, childhood attachment, adverse childhood experiences, sense of religiosity, and depression were measured. While not significant at conventional levels, there was no direct relationship between adverse childhood experiences, insecure childhood attachment, and sense of religiosity, and when assessing age for the relationship in later adulthood, there was no significance. Positive childhood experiences of feeling protected, love, and special had a direct relationship with a positive image and sense of closeness to God. Results highlight the importance of positive childhood experiences, secure childhood attachment quality relationship, such as trust, communication for positive health outcomes, such as less depression.Keywords: religiosity, childhood trauma, childhood attachment, depression
Procedia PDF Downloads 83437 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces
Authors: Emmanuel Mugiraneza
Abstract:
Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping
Procedia PDF Downloads 123436 How Information Sharing Can Improve Organizational Performance?
Authors: Syed Abdul Rehman Khan
Abstract:
In today’s world, information sharing plays a vital role in successful operations of supply chain; and boost to the profitability of the organizations (end-to-end supply chains). Many researches have been completed over the role of information sharing in supply chain. In this research article, we will investigate the ‘how information sharing can boost profitability & productivity of the organization; for this purpose, we have developed one conceptual model and check to that model through collected data from companies. We sent questionnaire to 369 companies; and will filled form received from 172 firms and the response rate was almost 47%. For the data analysis, we have used Regression in (SPSS software) In the research findings, our all hypothesis has been accepted significantly and due to the information sharing between suppliers and manufacturers ‘quality of material and timely delivery’ increase and also ‘collaboration & trust’ will become more stronger and these all factors will lead to the company’s profitability directly and in-directly. But unfortunately, companies could not avail the all fruitful benefits of information sharing due to the fear of ‘compromise confidentiality or leakage of information’.Keywords: collaboration, information sharing, risk factor, timely delivery
Procedia PDF Downloads 417435 The Nature and Impact of Trojan Horses in Cybersecurity
Authors: Mehrab Faraghti
Abstract:
Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.Keywords: Trojan horses, cybersecurity, malware, data breach
Procedia PDF Downloads 9434 Blockchain’s Feasibility in Military Data Networks
Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam
Abstract:
Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing
Procedia PDF Downloads 138433 The Exploration of Psychosocial Risk and the Handling of Unsafe Acts and Misconduct
Authors: Jacquelene Swanepoel, J. C. Visagie, H. M. Linde
Abstract:
Purpose: The aim of this article is to investigate the psychosocial risk environment influencing employee behaviour, and subsequently the trust relationship between employer and employee. Design/methodology/approach: The unique nature and commonness of negative acts, such as unsafe behaviour, human errors, poor performance and negligence, also referred to as unsafe practice, are explored. A literature review is formulated to investigate the nature of negative acts or unsafe behaviour. The findings of this study are used to draw comparisons between unsafe behaviour/misconduct and accidents in the workplace and finally conclude how it should be addressed from a labour relations point of view. Findings: The results indicate comparisons between unsafe practice/misconduct and occupational injuries and accidents, as a result of system flaws, human error or psychosocial risk.Keywords: occupational risks, unsafe practice, misconduct, organisational safety culture, ergonomics, management commitment and leadership, labour relations
Procedia PDF Downloads 357432 Corruption and the Entrenchment of the Rule of Law in Nigeria
Authors: Grace Titilayo, Kolawole-Amao
Abstract:
Influence and authority of law within society should be respected by all and sundry regardless of individual status. Rule of law implies that every citizen is subject to the law. In a society governed by the rule of law, government and its officials and agents are also held subject to and accountable under the law. Law should not be employed to suit individual tenets. Where the rule of law operates, the government is the government of law and not of men. Corruption is a factor that kills the growth of the rule of law. Where corruption flourishes, the rule of law fails, simply put, corruption is a threat to the rule of law. It bastardized and undermines the rule of law and good governance principles - where men rule at their discretion rather than the use of the rule of law which makes governance processes ineffective. Corruption is prevalent all over the world, and has extremely far reaching effects. Many of the world’s greatest challenges have been amplified by corruption, for example poverty, unequal distribution of wealth and resources, and world hunger and it weakens the application and the entrenchment of the rule of law. It saps citizens' trust in their governments and undercuts government credibility. This paper will discuss the rule of law in the present democratic system in Nigeria, the impact of corruption on the rule of law in Nigeria and how corruption undermines and subverts the entrenchment of the rule of law in the present day Nigeria.Keywords: rule of law, corruption, Nigeria, influence, authority
Procedia PDF Downloads 557431 Use of WhatsApp Messenger for Optimal Healthcare Operational Communication during the COVID-19 Pandemic
Authors: Josiah O. Carter, Charlotte Hayden, Elizabeth Arthurs
Abstract:
Background: During the COVID-19 pandemic, hospital management policies have changed frequently and rapidly. This has created novel challenges in keeping the workforce abreast of these changes to enable them to deliver safe and effective care. Traditional communication methods, e.g. email, do not keep pace with the rapidly changing environment in the hospital, resulting in inaccurate, irrelevant, or outdated information being communicated, resulting in inefficiencies in patient care. Methods: The creation of a WhatsApp messaging group within the medical division at the Bristol Royal Infirmary has enabled senior clinicians and the hospital management team to update the medical workforce in real-time. It has two primary functions: (1) To enable dissemination of a concise, important operational summary. This comprises information on bed status and infection control procedural changes. It is fed directly from a daily critical incident briefing (2) To facilitate a monthly scheduled question and answer (Q&A) session for junior doctors to clarify issues with clinical directors, rota, and management staff. Additional ad-hoc updates are sent out for time-critical information; otherwise, it mainly functions as a broadcast-only group to prevent important information from being lost amongst other communication. All junior doctors within the medical division were invited to join the group. At present, the group comprises 131 participants, of which 10 are administrative staff (rota coordinators, management staff & clinical directors); the remaining 121 are junior clinicians working within the medical division. An electronic survey via Microsoft forms was sent out to junior doctors via the WhatsApp group and via email to assess its utilisation and effectiveness with the aim of quality improvements. Results: Of the 121 group participants, 19 completed the questionnaire (response rate 15.7%). Of these, 16/19 (84.2%) used it regularly, and 12/19 (63.2%) rated it as the most useful source for reliable updates relating to the hospital response to the COVID-19 pandemic, whereas only 2/19 (10.5%) found the trust intranet and the trust COVID-19 operational email update most useful. Respondents rated the WhatsApp group more useful as an information source (mean score 7.7/10) than as a means of providing feedback to management staff (mean score 6.3/10). Qualitative feedback suggested information around ward closures and changes to COVID cohorting, along with updates on staffing issues, were most useful. Respondents also noted the Q&A sessions were an efficient way of relaying feedback about management decisions but that it would be preferable if these sessions could be delivered more frequently. Discussion: During the current global COVID-19 pandemic, there is an increased need for rapid dissemination of critical information within NHS trusts; this includes communication between junior doctors, managers, and senior clinicians. The versatility of WhatsApp permits a variety of functions allowing for regular updates, the dissemination of time-critical information, and enables conversing and feedback. The project has demonstrated that reserved and well-managed use of a WhatsApp group is a welcome, efficient and practical means of communication between the senior management team and the junior medical workforce.Keywords: communication, COVID-19, hospital management, WhatsApp
Procedia PDF Downloads 112430 Combating Fake News: A Qualitative Evidence Synthesis of Organizational Stakeholder Trust in Social Media Communication during Crisis
Authors: Todd R. Walton
Abstract:
Social media would seem to be an ideal mechanism for crisis communication, yet it has been met with varied results. Natural disasters, such as hurricanes, provide a slow moving view of how social media can be leveraged to guide stakeholders and the public through a crisis. Crisis communication managers have struggled to reach target audiences with credible messaging. This Qualitative Evidence Synthesis (QES) analyzed the findings of eight studies published in the last year to determine how organizations effectively utilize social media for crisis communication. Additionally, the evidence was analyzed to note strategies for establishing credibility in a medium fraught with misinformation. Studies indicated wide agreement on the use of multiple social media channels in addition to frequent accurate messaging in order to establish credibility. Studies indicated mixed agreement on the use of text based emergency notification systems. The findings in this QES will help crisis communication professionals plan for social media use for crisis communication.Keywords: crisis communication, crisis management, emergency response, social media
Procedia PDF Downloads 206