Search results for: intellectual assets
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1170

Search results for: intellectual assets

780 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 71
779 Community-Based Palliative Care for Patients with Cerebral Palsy and Developmental Disabilities

Authors: Elizabeth Grier, Meg Gemmill, Mary Martin, Leora Reiter, Herman Tang, Alexandra Donaldson, Isis Lunsky, Mia Wu

Abstract:

Background: Individuals with Cerebral Palsy (CP) and/or IDD face numerous physical and mental health challenges, including difficulty accessing effective palliative care. The aim of this study is to assess the knowledge and comfort of healthcare providers in providing community-based palliative care for patients with Cerebral Palsy (CP) and severe to profound Intellectual and Developmental Disabilities (IDD). Methods: This study includes a mixed methods approach obtaining both quantitative and qualitative data. Quantitative data from palliative care practitioners was obtained through an online survey assessing comfort in symptom management, grief assessment, and goals of care discussion. This survey was distributed to physicians and allied health practitioners across Canada through the College of Family Physicians of Canada Member Interest Groups for Palliative Care and for IDD. Survey results guided the development of a semi-structured interview template, which was used to conduct a focus group on the same topic. Participants were four palliative care providers (3 physicians and one spiritual care practitioner). The focus group transcript is currently undergoing thematic analysis using NVivo 12 software. Results: 57 palliative care practitioners completed the survey. 87% of participants indicated they have provided palliative care services for persons with CP and/or IDD. Findings suggest practitioners are somewhat confident in identifying specific physical symptoms (dyspnea, pressure ulcers) but less confident in identifying physical/emotional pain, addressing grief, and prognosticating life expectancy in this population. 54% of responses indicated they had little/no training on palliating those with CP or IDD, and 45% somewhat or strongly disagree members of their profession can manage symptoms for this population. Focus group analysis is underway, and results will be available at the time of the poster presentation. Conclusion: Persons with CP and IDD are more likely to experience severe health inequities when accessing palliative care. Results of this study suggest further education is needed for palliative care professionals to address the barriers and challenges in providing palliative care to this patient population.

Keywords: palliative care, symptom management, health equity, community healthcare, intellectual and developmental disabilities

Procedia PDF Downloads 121
778 Big Data Strategy for Telco: Network Transformation

Authors: F. Amin, S. Feizi

Abstract:

Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating churn and declining revenue per user. Big Data presents new method to reverse the way and improve profitability. The benefits of Big Data and next-generation network, however, are more exorbitant than improved customer relationship management. Next generation of networks are in a prime position to monetize rich supplies of customer information—while being mindful of legal and privacy issues. As data assets are transformed into new revenue streams will become integral to high performance.

Keywords: big data, next generation networks, network transformation, strategy

Procedia PDF Downloads 346
777 Impacts of Exchange Rate and Inflation Rate on Foreign Direct Investment in Pakistan

Authors: Saad Bin Nasir

Abstract:

The study identifies the impact of inflation and foreign exchange rate on foreign direct investment in Pakistan. Inflation and exchange rates are used as independent variables and foreign direct investment is taken as dependent variable. Discreet time series data has been used from the period of 1999 to 2009. The results of regression analysis reveal that high inflation has negative impact on foreign direct investment and higher exchange rates has positive impact on foreign direct investment in Pakistan. The inflation and foreign exchange rates both are insignificant in the analysis.

Keywords: inflation rate, foreign exchange rate, foreign direct investment, foreign assets

Procedia PDF Downloads 402
776 Health Monitoring of Concrete Assets in Refinery

Authors: Girish M. Bhatia

Abstract:

Most of the important structures in refinery complex are RCC Structures for which in-depth structural monitoring and inspection is required for incessant service. Reinforced concrete structures can be under threat from a combination of insidious challenges due to environmental conditions, including temperature and humidity that lead to accelerated deterioration mechanisms like carbonation, as well as marine exposure, above and below ground structures can experience ingress from aggressive ground waters carrying chlorides and sulphates leading to unexpected deterioration that threaten the integrity of a vital structural asset. By application of health monitoring techniques like corrosion monitoring with help of sensor probes, visual inspection of high rise structures with help of drones, it is possible to establish an early warning at the onset of these destructive processes.

Keywords: concrete structures, corrosion sensors, drones, health monitoring

Procedia PDF Downloads 388
775 Western Culture Differences and the Contradictions in the Islamic World

Authors: Shabnam Dadparvar, Laijin Shen, Farzad Ravanbod

Abstract:

Regarding the issues that are currently happening in the world, more than any other time the differences between West and Islam is under discussion. The cultural relations between Islam and the West took a drastically new turn when Europe arose as the dominant and unchallenged force of the modern era. The author, by using descriptive- analytical method, tries to analyse one of the most controversial questions facing analysts of relations between the Islamic world and the West: What are the roots of the conflict? This paper addresses the history of the intellectual tradition of the West and the attitude of Muslim world regarding the rise of western modernity. Also, the differences between two groups on philosophical foundations such as religion, power, science and humanism will be explained. The author believes that the real difference between the West and Islam is epistemological.

Keywords: civilization, culture, Islam, West

Procedia PDF Downloads 301
774 Even When the Passive Resistance Is Obligatory: Civil Intellectuals’ Solidarity Activism in Tea Workers Movement

Authors: Moshreka Aditi Huq

Abstract:

This study shows how a progressive portion of civil intellectuals in Bangladesh contributed as the solidarity activist entities in a movement of tea workers that became the symbol of their unique moral struggle. Their passive yet sharp way of resistance, with the integration of mass tea workers of a tea estate, got demonstrated against certain private companies and government officials who approached to establish a special economic zone inside the tea garden without offering any compensation and rehabilitation for poor tea workers. Due to massive protests and rebellion, the authorized entrepreneurs had to step back and called off the project immediately. The extraordinary features of this movement generated itself from the deep core social need of indigenous tea workers who are still imprisoned in the colonial cage. Following an anthropological and ethnographic perspective, this study adopted the main three techniques of intensive interview, focus group discussion, and laborious observation, to extract empirical data. The intensive interviews were undertaken informally using a mostly conversational approach. Focus group discussions were piloted among various representative groups where observations prevailed as part of the regular documentation process. These were conducted among civil intellectual entities, tea workers, tea estate authorities, civil service authorities, and business officials to obtain a holistic view of the situation. The fieldwork was executed in capital Dhaka city, along with northern areas like Chandpur-Begumkhan Tea Estate of Chunarughat Upazilla and Habiganj city of Habiganj District of Bangladesh. Correspondingly, secondary data were accessed through books, scholarly papers, archives, newspapers, reports, leaflets, posters, writing blog, and electronic pages of social media. The study results find that: (1) civil intellectuals opposed state-sponsored business impositions by producing counter-discourse and struggled against state hegemony through the phases of the movement; (2) instead of having the active physical resistance, civil intellectuals’ strength was preferably in passive form which was portrayed through their intellectual labor; (3) the combined movement of tea workers and civil intellectuals reflected on social security of ethnic worker communities that contrasts state’s pseudo-development motives which ultimately supports offensive and oppressive neoliberal growths of economy; (4) civil intellectuals are revealed as having certain functional limitations in the process of movement organization as well as resource mobilization; (5) in specific contexts, the genuine need of protest by indigenous subaltern can overshadow intellectual elitism and helps to raise the voices of ‘subjugated knowledge’. This study is quite likely to represent two sets of apparent protagonist entities in the discussion of social injustice and oppressive development intervention. On the one, hand it may help us to find the basic functional characteristics of civil intellectuals in Bangladesh when they are in a passive mode of resistance in social movement issues. On the other hand, it represents the community ownership and inherent protest tendencies of indigenous workers when they feel threatened and insecure. The study seems to have the potential to understand the conditions of ‘subjugated knowledge’ of subalterns. Furthermore, being the memory and narratives, these ‘activism mechanisms’ of social entities broadens the path to understand ‘power’ and ‘resistance’ in more fascinating ways.

Keywords: civil intellectuals, resistance, subjugated knowledge, indigenous

Procedia PDF Downloads 114
773 Basket Option Pricing under Jump Diffusion Models

Authors: Ali Safdari-Vaighani

Abstract:

Pricing financial contracts on several underlying assets received more and more interest as a demand for complex derivatives. The option pricing under asset price involving jump diffusion processes leads to the partial integral differential equation (PIDEs), which is an extension of the Black-Scholes PDE with a new integral term. The aim of this paper is to show how basket option prices in the jump diffusion models, mainly on the Merton model, can be computed using RBF based approximation methods. For a test problem, the RBF-PU method is applied for numerical solution of partial integral differential equation arising from the two-asset European vanilla put options. The numerical result shows the accuracy and efficiency of the presented method.

Keywords: basket option, jump diffusion, ‎radial basis function, RBF-PUM

Procedia PDF Downloads 342
772 The Determinants and Effects of R&D Outsourcing in Korean Manufacturing Firm

Authors: Sangyun Han, Minki Kim

Abstract:

R&D outsourcing is a strategy for acquiring the competitiveness of firms as an open innovation strategy. As increasing total R&D investment of firms, the ratio of amount of R&D outsourcing in it is also increased in Korea. In this paper, we investigate the determinants and effects of R&D outsourcing of firms. Through analyzing the determinants of R&D outsourcing and effect on firm’s performance, we can find some academic and politic issues. Firstly, in the point of academic view, distinguishing the determinants of R&D outsourcing is linked why the firms do open innovation. It can be answered resource based view, core competence theory, and etc. Secondly, we can get some S&T politic implication for transferring the public intellectual properties to private area. Especially, for supporting the more SMEs or ventures, government can get the basement and the reason why and how to make the policies.

Keywords: determinants, effects, R&D, outsourcing

Procedia PDF Downloads 495
771 Challenges, Practices, and Opportunities of Knowledge Management in Industrial Research Institutes: Lessons Learned from Flanders Make

Authors: Zhenmin Tao, Jasper De Smet, Koen Laurijssen, Jeroen Stuyts, Sonja Sioncke

Abstract:

Today, the quality of knowledge management (KM)become one of the underpinning factors in the success of an organization, as it determines the effectiveness of capitalizing the organization’s knowledge. Overall, KMin an organization consists of five aspects: (knowledge) creation, validation, presentation, distribution, and application. Among others, KM in research institutes is considered as the cornerstone as their activities cover all five aspects. Furthermore, KM in a research institute facilitates the steering committee to envision the future roadmap, identify knowledge gaps, and make decisions on future research directions. Likewise, KMis even more challenging in industrial research institutes. From a technical perspective, technology advancement in the past decades calls for combinations of breadth and depth in expertise that poses challenges in talent acquisition and, therefore, knowledge creation. From a regulatory perspective, the strict intellectual property protection from industry collaborators and/or the contractual agreements made by possible funding authoritiesform extra barriers to knowledge validation, presentation, and distribution. From a management perspective, seamless KM activities are only guaranteed by inter-disciplinary talents that combine technical background knowledge, management skills, and leadership, let alone international vision. From a financial perspective, the long feedback period of new knowledge, together with the massive upfront investment costs and low reusability of the fixed assets, lead to low RORC (return on research capital) that jeopardize KM practice. In this study, we aim to address the challenges, practices, and opportunitiesof KM in Flanders Make – a leading European research institute specialized in the manufacturing industry. In particular, the analyses encompass an internal KM project which involves functionalities ranging from management to technical domain experts. This wide range of functionalities provides comprehensive empirical evidence on the challenges and practices w.r.t.the abovementioned KMaspects. Then, we ground our analysis onto the critical dimensions ofKM–individuals, socio‐organizational processes, and technology. The analyses have three steps: First, we lay the foundation and define the environment of this study by briefing the KM roles played by different functionalities in Flanders Make. Second, we zoom in to the CoreLab MotionS where the KM project is located. In this step, given the technical domains covered by MotionS products, the challenges in KM will be addressed w.r.t. the five KM aspects and three critical dimensions. Third, by detailing the objectives, practices, results, and limitations of the MotionSKMproject, we justify the practices and opportunities derived in the execution ofKMw.r.t. the challenges addressed in the second step. The results of this study are twofold: First, a KM framework that consolidates past knowledge is developed. A library based on this framework can, therefore1) overlook past research output, 2) accelerate ongoing research activities, and 3) envision future research projects. Second, the challenges inKM on both individual (actions) level and socio-organizational level (e.g., interactions between individuals)are identified. By doing so, suggestions and guidelines will be provided in KM in the context of industrial research institute. To this end, the results in this study are reflected towards the findings in existing literature.

Keywords: technical knowledge management framework, industrial research institutes, individual knowledge management, socio-organizational knowledge management.

Procedia PDF Downloads 100
770 Functional and Stimuli Implementation and Verification of Programmable Peripheral Interface (PPI) Protocol

Authors: N. N. Joshi, G. K. Singh

Abstract:

We present the stimuli implementation and verification of a Programmable Peripheral Interface (PPI) 8255. It involves a designing and verification of configurable intellectual property (IP) module of PPI protocol using Verilog HDL for implementation part and System Verilog for verification. The overview of the PPI-8255 presented then the design specification implemented for the work following the functional description and pin configuration of PPI-8255. The coverage report of design shows that our design and verification environment covered 100% functionality in accordance with the design specification generated by the Questa Sim 10.0b.

Keywords: Programmable Peripheral Interface (PPI), verilog HDL, system verilog, questa sim

Procedia PDF Downloads 512
769 A Systematic Analysis of Knowledge Development Trends in Industrial Maintenance Projects

Authors: Lilian Ogechi Iheukwumere-Esotu, Akilu Yunusa-Kaltungo, Paul Chan

Abstract:

Industrial assets are prone to degradation and eventual failures due to repetitive loads and harsh environments in which they operate. These failures often lead to costly downtimes, which may involve loss of critical assets and/or human lives. The rising pressures from stakeholders for optimized systems’ outputs have further placed strains on business organizations. Traditional means of combating such failures are by adopting strategies capable of predicting, controlling, and/or reducing the likelihood of systems’ failures. Turnarounds, shutdowns, and outages (TSOs) projects are popular maintenance management activities conducted over a certain period of time. However, despite the critical and significant cost implications of TSOs, the management of the interface of knowledge between academia and industry to our best knowledge has not been fully explored in comparison to other aspects of industrial operations. This is perhaps one of the reasons for the limited knowledge transfer between academia and industry, which has affected the outcomes of most TSOs. Prior to now, the study of knowledge development trends as a failure analysis tool in the management of TSOs projects have not gained the required level of attention. Hence, this review provides useful references and their implications for future studies in this field. This study aims to harmonize the existing research trends of TSOs through a systematic review of more than 3,000 research articles published over 7 decades (1940- till date) which were extracted using very specific research criteria and later streamlined using nominated inclusion and exclusion parameters. The information obtained from the analysis were then synthesized and coded into 8 parameters, thereby allowing for a transformation into actionable outputs. The study revealed a variety of information, but the most critical findings can be classified into 4 folds: (1) Empirical validation of available conceptual frameworks and models is still a far cry in practice, (2) traditional project management views for managing uncertainties are still dominant, (3) Inconsistent approaches towards the adoption and promotion of knowledge management systems which supports creation, transfer and application of knowledge within and outside the project organization and, (4) exploration of social practices in industrial maintenance project environments are under-represented within the existing body of knowledge. Thus, the intention of this study is to depict the usefulness of a framework which incorporates fact findings emanating from careful analysis and illustrations of evidence based results as a suitable approach which can tackle reoccurring failures in industrial maintenance projects.

Keywords: industrial maintenance, knowledge management, maintenance projects, systematic review, TSOs

Procedia PDF Downloads 107
768 Optimal Diversification and Bank Value Maximization

Authors: Chien-Chih Lin

Abstract:

This study argues that the optimal diversifications for the maximization of bank value are asymmetrical; they depend on the business cycle. During times of expansion, systematic risks are relatively low, and hence there is only a slight effect from raising them with a diversified portfolio. Consequently, the benefit of reducing individual risks dominates any loss from raising systematic risks, leading to a higher value for a bank by holding a diversified portfolio of assets. On the contrary, in times of recession, systematic risks are relatively high. It is more likely that the loss from raising systematic risks surpasses the benefit of reducing individual risks from portfolio diversification. Consequently, more diversification leads to lower bank values. Finally, some empirical evidence from the banks in Taiwan is provided.

Keywords: diversification, default probability, systemic risk, banking, business cycle

Procedia PDF Downloads 424
767 Some Aspects of Improving Service Sphere Management in Georgia

Authors: Gechbaia Badri

Abstract:

In the article, it is studied and realized the perfection issues of service sphere management in Georgia’s reality. As stated above, to transfer the country's economy onto marketing relationships, to form competitive dynamic market is dictated by the time and represents objective necessity. In the last period, the abruptly increasing of changes on science and education caused servicing sphere and producing skills, consumptions based on fields of places and changing role in a structure of the national economy. The main recourse in the new system of the economy became the intellectual capital. The economical progress is significantly determined by developing informational technologies. In the article, it is investigated the service problems of different fields of national economy and are given sentences to settle these problems.

Keywords: service management, service, paradigm, business and management engineering

Procedia PDF Downloads 407
766 Corporate Performance and Balance Sheet Indicators: Evidence from Indian Manufacturing Companies

Authors: Hussain Bohra, Pradyuman Sharma

Abstract:

This study highlights the significance of Balance Sheet Indicators on the corporate performance in the case of Indian manufacturing companies. Balance sheet indicators show the actual financial health of the company and it helps to the external investors to choose the right company for their investment and it also help to external financing agency to give easy finance to the manufacturing companies. The period of study is 2000 to 2014 for 813 manufacturing companies for which the continuous data is available throughout the study period. The data is collected from PROWESS data base maintained by Centre for Monitoring Indian Economy Pvt. Ltd. Panel data methods like fixed effect and random effect methods are used for the analysis. The Likelihood Ratio test, Lagrange Multiplier test and Hausman test results proof the suitability of the fixed effect model for the estimation. Return on assets (ROA) is used as the proxy to measure corporate performance. ROA is the best proxy to measure corporate performance as it already used by the most of the authors who worked on the corporate performance. ROA shows return on long term investment projects of firms. Different ratios like Current Ratio, Debt-equity ratio, Receivable turnover ratio, solvency ratio have been used as the proxies for the Balance Sheet Indicators. Other firm specific variable like firm size, and sales as the control variables in the model. From the empirical analysis, it was found that all selected financial ratios have significant and positive impact on the corporate performance. Firm sales and firm size also found significant and positive impact on the corporate performance. To check the robustness of results, the sample was divided on the basis of different ratio like firm having high debt equity ratio and low debt equity ratio, firms having high current ratio and low current ratio, firms having high receivable turnover and low receivable ratio and solvency ratio in the form of firms having high solving ratio and low solvency ratio. We find that the results are robust to all types of companies having different form of selected balance sheet indicators ratio. The results for other variables are also in the same line as for the whole sample. These findings confirm that Balance sheet indicators play as significant role on the corporate performance in India. The findings of this study have the implications for the corporate managers to focus different ratio to maintain the minimum expected level of performance. Apart from that, they should also maintain adequate sales and total assets to improve corporate performance.

Keywords: balance sheet, corporate performance, current ratio, panel data method

Procedia PDF Downloads 252
765 Simulation of Forest Fire Using Wireless Sensor Network

Authors: Mohammad F. Fauzi, Nurul H. Shahba M. Shahrun, Nurul W. Hamzah, Mohd Noah A. Rahman, Afzaal H. Seyal

Abstract:

In this paper, we proposed a simulation system using Wireless Sensor Network (WSN) that will be distributed around the forest for early forest fire detection and to locate the areas affected. In Brunei Darussalam, approximately 78% of the nation is covered by forest. Since the forest is Brunei’s most precious natural assets, it is very important to protect and conserve our forest. The hot climate in Brunei Darussalam can lead to forest fires which can be a fatal threat to the preservation of our forest. The process consists of getting data from the sensors, analyzing the data and producing an alert. The key factors that we are going to analyze are the surrounding temperature, wind speed and wind direction, humidity of the air and soil.

Keywords: forest fire monitor, humidity, wind direction, wireless sensor network

Procedia PDF Downloads 441
764 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 520
763 Risk, Capital Buffers, and Bank Lending: The Adjustment of Euro Area Banks

Authors: Laurent Maurin, Mervi Toivanen

Abstract:

This paper estimates euro area banks’ internal target capital ratios and investigates whether banks’ adjustment to the targets have an impact on credit supply and holding of securities during the financial crisis in 2005-2011. Using data on listed banks and country-specific macro-variables a partial adjustment model is estimated in a panel context. The results indicate, firstly, that an increase in the riskiness of banks’ balance sheets influences positively on the target capital ratios. Secondly, the adjustment towards higher equilibrium capital ratios has a significant impact on banks’ assets. The impact is found to be more size-able on security holdings than on loans, thereby suggesting a pecking order.

Keywords: Euro area, capital ratios, credit supply, partial adjustment model

Procedia PDF Downloads 438
762 Conceptual Design of Unmanned Aerial Targets

Authors: M. Adamski, J. Cwiklak

Abstract:

The contemporary battlefield creates a demand for more costly and highly advanced munitions. Training personnel responsible for operations, as well as an immediate execution of combat tasks, which engage real assets, is unrealistic and economically not feasible. Owing to a wide array of exploited simulators and various types of imitators, it is possible to reduce the costs. One of the effective elements of training, which can be applied in the training of all service branches, are imitators of aerial targets. This research serves as an introduction to the commencement of design analysis over a real aerial target imitator. Within the project, the basic aerodynamic calculations were made, which enabled to determine its geometry, design layout, performance, as well as the mass balance of individual components. The conducted calculations of the parameters of flight characteristics come closer to the real performance of such unmanned aerial vehicles.

Keywords: aerial target, aerodynamics, imitator, performance

Procedia PDF Downloads 377
761 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 77
760 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 333
759 Developing and Managing an Institutional Repository in a Nigerian University Library: The Futa Experience

Authors: Belau Olatunde Gbadamosi, Oluchi Okere

Abstract:

Spurred by the ease of access to and the cost-effectiveness of open-source software such as DSpace, EPrints, and Greenstone Digital Libraries for hosting digital content, many libraries have added institutional repositories (IRs) to their repertoire of digital assets. This paper adopts a qualitative approach based on focus group discussions and the system development life cycle model (SDLC) to describe the experience of Albert Ilemobade Library (the Federal University of Technology Akure, Nigeria (FUTA) in the development of their IR - FUTASpace. Peculiar challenges experienced in the course of the development and solutions adopted are also reported. This study will serve as a reference point to other institutions, particularly those operating in developing countries, which may be poorly funded.

Keywords: institutional repository, digital libraries, university libraries, DSpace

Procedia PDF Downloads 163
758 Management Workspaces to Create Value

Authors: Nevruz Zogu, Shpetim Rezniqi

Abstract:

It is very important that a new environment where work shall be constructed in such a strong record to be creative and eligible for workers, can not have success in the workplace. But, is it possible to design the inner-inspire to create and collaborate? By watching and analyzing examples of creativity in business, construction managers can learn ways on how to encourage their imagination inside buildings. We struggle to find and retain talented employees and skilled labor environment is becoming more and always an important tool for recruiting and retaining employees. Managers who recognize the importance are gaining an edge over their competitors. The physical work environment is as important as its quality is often used as a recruiting tool and even to companies with The relationship between the company and the employees between strategy and behavior, between the product and the customer can reincorporated under the light of symbolic mediation of space, as instrument and interpreter of the core values and identity of the organization.

Keywords: strategy, business, quality, productivity, space, offices, assets

Procedia PDF Downloads 376
757 Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier

Abstract:

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.

Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection

Procedia PDF Downloads 482
756 A Content Analysis of the Introduction to the Philosophy of Religion Literature Published in the West between 1950-2010 in Terms of Definition, Method and Subjects

Authors: Fatih Topaloğlu

Abstract:

Although philosophy is inherently a theoretical and intellectual activity, it should not be denied that environmental conditions influence the formation and shaping of philosophical thought. In this context, it should be noted that the Philosophy of Religion has been influential in the debates in the West, especially since the beginning of the 20th century, and that this influence has dimensions that cannot be limited to academic or intellectual fields. The issues and problems that fall within the field of interest of Philosophy of Religion are followed with interest by a significant proportion of society through popular publications. Philosophy of Religion has its share in many social, economic, cultural, scientific, political and ethical developments. Philosophy of Religion, in the most general sense, can be defined as a philosophical approach to religion or a philosophical way of thinking and discussing religion. Philosophy of Religion tries to explain the epistemological foundations of concepts such as belief and faith that shape religious life by revealing their meaning for the individual. Thus, Philosophy of Religion tries to evaluate the effect of beliefs on the individual's values, judgments and behaviours with a comprehensive and critical eye. The Philosophy of Religion, which tries to create new solutions and perspectives by applying the methods of philosophy to religious problems, tries to solve these problems not by referring to the holy book or religious teachings but by logical proofs obtained through the possibilities of reason and evidence filtered through the filter of criticism. Although there is no standard method for doing Philosophy of Religion, it can be said that an approach that can be expressed as thinking about religion in a rational, objective, and consistent way is generally accepted. The evaluations made within the scope of Philosophy of Religion have two stages. The first is the definition stage, and the second is the evaluation stage. In the first stage, the data of different scientific disciplines, especially other religious sciences, are utilized to define the issues objectively. In the second stage, philosophical evaluations are made based on this foundation. During these evaluations, the issue of how the relationship between religion and philosophy should be established is extremely sensitive. The main thesis of this paper is that the Philosophy of Religion, as a branch of philosophy, has been affected by the conditions caused by the historical experience through which it has passed and has differentiated its subjects and the methods it uses to realize its philosophical acts over time under the influence of these conditions. This study will attempt to evaluate the validity of this study based on the "Introduction to Philosophy of Religion" literature, which we assume reflects this differentiation. As a result of this examination will aim to reach some factual conclusions about the nature of both philosophical and religious thought, to determine the phases that the Philosophy of Religion as a discipline has gone through since the day it emerged, and to investigate the possibilities of a holistic view of the field.

Keywords: content analysis, culture, history, philosophy of religion, method

Procedia PDF Downloads 45
755 Profitability and Productivity Performance of the Selected Public Sector Banks in India

Authors: Sudipto Jana

Abstract:

Background and significance of the study: Banking industry performs as a catalyst for industrial growth and agricultural growth, however, as well involves the existence and welfare of the citizens. The banking system in India was described by unmatched growth and the recreation of bunch making in the pre-liberalization era. At the time of financial sector reforms Reserve Bank of India issued a regulatory norm concerning capital adequacy, income recognition, asset classification and provisioning that have increasingly precede meeting by means of the international paramount performs. Bank management ceaselessly manages the triumph, effectiveness, productivity and performance of the bank as good performance, high productivity and efficiency authorizes the triumph of the bank management targets as well as aims of bank. In a comparable move toward performance of any economy depends upon the expediency and effectiveness of its financial system of nation establishes its economic growth indicators. Profitability and productivity are the most important relevant parameters of any banking group. Keeping in view of this, this study examines the profitability and productivity performance of the selected public sector banks in India. Methodology: This study is based on secondary data obtained from Reserve Bank of India database for the periods between 2006 and 2015. This study purposively selects four types of commercial banks, namely, State Bank of India, United Bank of India, Punjab National Bank and Allahabad Bank. In order to analyze the performance with relation to profitability and productivity, productivity performance indicators in terms of capital adequacy ratio, burden ratio, business per employee, spread per employee and advances per employee and profitability performance indicators in terms of return on assets, return on equity, return on advances and return on branch have been considered. In the course of analysis, descriptive statistics, correlation statistics and multiple regression have been used. Major findings: Descriptive statistics indicate that productivity performance of State Bank of India is very satisfactory than other public sector banks in India. But management of productivity is unsatisfactory in case of all the public sector banks under study. Correlation statistics point out that profitability of the public sector banks are strongly positively related with productivity performance in case of all the public sector banks under study. Multiple regression test results show that when profitability increases profit per employee increases and net non-performing assets decreases. Concluding statements: Productivity and profitability performance of United Bank of India, Allahabad Bank and Punjab National Bank are unsatisfactory due to poor management of asset quality as well as management efficiency. It needs government’s interference so that profitability and productivity performance are increased in the near future.

Keywords: India, productivity, profitability, public sector banks

Procedia PDF Downloads 412
754 Protection of Television Programme Formats in Comparative Law

Authors: Mustafa Arikan, Ibrahim Ercan

Abstract:

In this paper, protection of program formats was investigated in terms of program formats. Protection of program formats was studied in the French Law in the sense of competition law and CPI. Since the English Judicial system exhibits differences from the legal system of Continental Europe, its investigation bears a special significance. The subject was also handled in German Law at length. Indeed, German Law was investigated in detail within the overall framework of the study. Here, the court decisions in the German Law and the views in the doctrine were expressed in general. There are many court decisions in the American legal system concerning the subject. These decisions also present alternatives in terms of a solution to the problem.

Keywords: comparative law, protection of television programme formats, intellectual property, american legal system

Procedia PDF Downloads 320
753 On the Impact of Oil Price Fluctuations on Stock Markets: A Multivariate Long-Memory GARCH Framework

Authors: Manel Youssef, Lotfi Belkacem

Abstract:

This paper employs multivariate long memory GARCH models to simultaneously estimate mean and conditional variance spillover effects between oil prices and different financial markets. Since different financial assets are traded based on these market sector returns, it’s important for financial market participants to understand the volatility transmission mechanism over time and across these series in order to make optimal portfolio allocation decisions. We examine weekly returns from January 1, 2003 to November 30, 2012 and find evidence of significant transmission of shocks and volatilities between oil prices and some of the examined financial markets. The findings support the idea of cross-market hedging and sharing of common information by investors.

Keywords: oil prices, stock indices returns, oil volatility, contagion, DCC-multivariate (FI) GARCH

Procedia PDF Downloads 518
752 Environmental Impact of Gas Field Decommissioning

Authors: Muhammad Ahsan

Abstract:

The effective decommissioning of oil and gas fields and related assets is one of the most important challenges facing the oil and gas industry today and in the future. Decommissioning decisions can no longer be avoided by the operators and the industry as a whole. Decommissioning yields no return on investment and carries significant regulatory liabilities. The main objective of this paper is to provide an approach and mechanism for the estimation of emissions associated with decommissioning of Oil and Gas fields. The model uses gate to gate approach and considers field life from development phase up to asset end life. The model incorporates decommissioning processes which includes; well plugging, plant dismantling, wellhead, and pipeline dismantling, cutting and temporary fabrication, new manufacturing from raw material and recycling of metals. The results of the GHG emissions during decommissioning phase are 2.31x10-2 Kg CO2 Eq. per Mcf of the produced natural gas. Well plug and abandonment evolved to be the most GHG emitting activity with 84.7% of total field decommissioning operational emissions.

Keywords: LCA (life cycle analysis), gas field, decommissioning, emissions

Procedia PDF Downloads 177
751 Option Pricing Theory Applied to the Service Sector

Authors: Luke Miller

Abstract:

This paper develops an options pricing methodology to value strategic pricing strategies in the services sector. More specifically, this study provides a unifying taxonomy of current service sector pricing practices, frames these pricing decisions as strategic real options, demonstrates accepted option valuation techniques to assess service sector pricing decisions, and suggests future research areas where pricing decisions and real options overlap. Enhancing revenue in the service sector requires proactive decision making in a world of uncertainty. In an effort to strategically price service products, revenue enhancement necessitates a careful study of the service costs, customer base, competition, legalities, and shared economies with the market. Pricing decisions involve the quality of inputs, manpower, and best practices to maintain superior service. These decisions further hinge on identifying relevant pricing strategies and understanding how these strategies impact a firm’s value. A relatively new area of research applies option pricing theory to investments in real assets and is commonly known as real options. The real options approach is based on the premise that many corporate decisions to invest or divest in assets are simply an option wherein the firm has the right to make an investment without any obligation to act. The decision maker, therefore, has more flexibility and the value of this operating flexibility should be taken into consideration. The real options framework has already been applied to numerous areas including manufacturing, inventory, natural resources, research and development, strategic decisions, technology, and stock valuation. Additionally, numerous surveys have identified a growing need for the real options decision framework within all areas of corporate decision-making. Despite the wide applicability of real options, no study has been carried out linking service sector pricing decisions and real options. This is surprising given the service sector comprises 80% of the US employment and Gross Domestic Product (GDP). Identifying real options as a practical tool to value different service sector pricing strategies is believed to have a significant impact on firm decisions. This paper identifies and discusses four distinct pricing strategies available to the service sector from an options’ perspective: (1) Cost-based profit margin, (2) Increased customer base, (3) Platform pricing, and (4) Buffet pricing. Within each strategy lie several pricing tactics available to the service firm. These tactics can be viewed as options the decision maker has to best manage a strategic position in the market. To demonstrate the effectiveness of including flexibility in the pricing decision, a series of pricing strategies were developed and valued using a real options binomial lattice structure. The options pricing approach discussed in this study allows service firms to directly incorporate market-driven perspectives into the decision process and thus synchronizing service operations with organizational economic goals.

Keywords: option pricing theory, real options, service sector, valuation

Procedia PDF Downloads 343