Search results for: key information documents
11042 Higher Education Internationalisation: The Case of Indonesia
Authors: Agustinus Bandur, Dyah Budiastuti
Abstract:
With the rapid development of information and communication technology (ICT) in globalisation era, higher education (HE) internationalisation has become a worldwide phenomenon. However, even though various studies have been widely published in existing literature, the settings of these studies were taken places in developed countries. Accordingly, the major purpose of this article is to explore the current trends of higher education internationalisation programs with particular reference to identify the benefits and challenges confronted by participating staff and students. For these purposes, ethnographic qualitative study with the usage of NVivo 11 software was applied in coding, analyzing, and visualization of non-numeric data gathered from interviews, videos, web contents, social media, and relevant documents. Purposive sampling technique was applied in this study with a total of ten high-ranked accredited government and private universities in Indonesia. On the basis of thematic and cross-case analyses, this study indicates that while Australia has led other countries in dual-degree programs, partner universities from Japan and Korea have the most frequent collaboration on student exchange programs. Meanwhile, most visiting scholars who have collaborated with the universities in this study came from the US, the UK, Japan, Australia, Netherlands, and China. Other European countries such as Germany, French, and Norway have also conducted joint research with Indonesian universities involved in this study. This study suggests that further supports of government policy and grants are required to overcome the challenges as well as strategic leadership and management roles to achieve high impacts of such programs on higher education quality.Keywords: higher education, internationalisation, challenges, Indonesia
Procedia PDF Downloads 27011041 Historical Geography of Lykaonia Region
Authors: Asuman Baldiran, Erdener Pehlivan
Abstract:
In this study, the root of the name Lykaonia and the geographical area defined as Lykaonia Region are mentioned. In this context, information concerning the settlements of Paleolithic Age, Neolithic Age and Chalcolithic Age are given place. Particularly the settlements belonging to Classical Age are localized and brief information about the history of these settlements is provided. In the light of this information, roads of Antique period in the region are evaluated.Keywords: ancient cities, central anatolia, historical geography, Lykaonia region
Procedia PDF Downloads 37911040 Investigating Dynamic Transition Process of Issues Using Unstructured Text Analysis
Authors: Myungsu Lim, William Xiu Shun Wong, Yoonjin Hyun, Chen Liu, Seongi Choi, Dasom Kim, Namgyu Kim
Abstract:
The amount of real-time data generated through various mass media has been increasing rapidly. In this study, we had performed topic analysis by using the unstructured text data that is distributed through news article. As one of the most prevalent applications of topic analysis, the issue tracking technique investigates the changes of the social issues that identified through topic analysis. Currently, traditional issue tracking is conducted by identifying the main topics of documents that cover an entire period at the same time and analyzing the occurrence of each topic by the period of occurrence. However, this traditional issue tracking approach has limitation that it cannot discover dynamic mutation process of complex social issues. The purpose of this study is to overcome the limitations of the existing issue tracking method. We first derived core issues of each period, and then discover the dynamic mutation process of various issues. In this study, we further analyze the mutation process from the perspective of the issues categories, in order to figure out the pattern of issue flow, including the frequency and reliability of the pattern. In other words, this study allows us to understand the components of the complex issues by tracking the dynamic history of issues. This methodology can facilitate a clearer understanding of complex social phenomena by providing mutation history and related category information of the phenomena.Keywords: Data Mining, Issue Tracking, Text Mining, topic Analysis, topic Detection, Trend Detection
Procedia PDF Downloads 40811039 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis
Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim
Abstract:
As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.Keywords: private information, value, users, perceived risk, online information privacy, attributes
Procedia PDF Downloads 23911038 Secret Agents in the Azores during the Second World War and the Impact of Espionage on Portuguese-British Relations
Authors: Marisa Galiza Filipe
Abstract:
In 1942, at the height of the Second World War, Roosevelt and Churchill planned to occupy the Azores to establish air and naval bases. The islands' privileged position in the middle of the Atlantic made them a strategic location for both the Axis and the Allies. For the Germans, the occupation of the island was also a strategic place to launch an attack on the United States of America, and for the British and Americans, the islands were the perfect spot to counterattack the German sinking of British boats and submarines. Salazar avoided the concession of the islands until 1943, claiming, on the one hand, the policy of neutrality, a decision made in agreement with England, and on the other hand, the reaffirmation of Portuguese sovereignty over the territory. Aware of the constant changes and supported by a network of informers on the islands, the German and British spies played a crucial role in the negotiations between Portugal and the Allies and the ceding of the bases by Salazar, which prevented their forced occupation. The espionage caused several diplomatic tensions, and the large number of German spies denounced by the British, operating on the islands under the watchful eye of the PVDE and Salazar, weakened the Portuguese-British alliance. Using primary source documents in the Ministério dos Negócios Estrangeiros (MNE) archives, this paper introduces the spies that operated on the islands, their missions and motives, organizations, and modus operandi. As a chess game, any move was careful thinking and the spies were valuable assets to control and use information that could lead to the occupation of the islands and, ultimately, change the tide of the war.Keywords: espionage, Azores, WWI, neutrality
Procedia PDF Downloads 6611037 A Survey on Countermeasures of Cache-Timing Attack on AES Systems
Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush
Abstract:
Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure
Procedia PDF Downloads 30011036 The Potential Benefits of Multimedia Information Representation in Enhancing Students’ Critical Thinking and History Reasoning
Authors: Ang Ling Weay, Mona Masood
Abstract:
This paper discusses the potential benefits of an interactive multimedia information representation in enhancing students’ critical thinking aligned with history reasoning in learning history between Secondary School students in Malaysia. Two modes of multimedia information representation implemented which are chronological and thematic information representation. A qualitative study of an unstructured interview was conducted among two history teachers, one history education lecturer, two i-think expert and program trainers and five form 4 secondary school students. The interview was to elicit their opinions on the implementation of thinking maps and interactive multimedia information representation in history learning. The key elements of interactive multimedia (e.g. multiple media, user control, interactivity, and use of timelines and concept maps) were then considered to improve the learning process. Findings of the preliminary investigation reveal that the interactive multimedia information representations have the potential benefits to be implemented as instructional resource in enhancing students’ higher order thinking skills (HOTs). This paper concludes by giving suggestions for future work.Keywords: multimedia information representation, critical thinking, history reasoning, chronological and thematic information representation
Procedia PDF Downloads 35011035 Information Retrieval from Internet Using Hand Gestures
Authors: Aniket S. Joshi, Aditya R. Mane, Arjun Tukaram
Abstract:
In the 21st century, in the era of e-world, people are continuously getting updated by daily information such as weather conditions, news, stock exchange market updates, new projects, cricket updates, sports and other such applications. In the busy situation, they want this information on the little use of keyboard, time. Today in order to get such information user have to repeat same mouse and keyboard actions which includes time and inconvenience. In India due to rural background many people are not much familiar about the use of computer and internet also. Also in small clinics, small offices, and hotels and in the airport there should be a system which retrieves daily information with the minimum use of keyboard and mouse actions. We plan to design application based project that can easily retrieve information with minimum use of keyboard and mouse actions and make our task more convenient and easier. This can be possible with an image processing application which takes real time hand gestures which will get matched by system and retrieve information. Once selected the functions with hand gestures, the system will report action information to user. In this project we use real time hand gesture movements to select required option which is stored on the screen in the form of RSS Feeds. Gesture will select the required option and the information will be popped and we got the information. A real time hand gesture makes the application handier and easier to use.Keywords: hand detection, hand tracking, hand gesture recognition, HSV color model, Blob detection
Procedia PDF Downloads 29211034 Information on Financial Statements for Loan Decision-Making of Commercial Banks in Vietnam
Authors: Mai Hoang Minh
Abstract:
Financial statements (FS) are tools which provide information to users for making business decisions. This article is going to present the survey which clarifies the role of financial statement to Commercial Banks’ loan decisions in Vietnam. Moreover, this also discusses about financial statement’s quality currently, thereby making suggestions for enterprises to enhance the usefulness of accounting information in borrowing activities.Keywords: usefulness of financial statement, accounting information quality, loan decisions
Procedia PDF Downloads 27911033 Predictive Analysis of Personnel Relationship in Graph Database
Authors: Kay Thi Yar, Khin Mar Lar Tun
Abstract:
Nowadays, social networks are so popular and widely used in all over the world. In addition, searching personal information of each person and searching connection between them (peoples’ relation in real world) becomes interesting issue in our society. In this paper, we propose a framework with three portions for exploring peoples’ relations from their connected information. The first portion focuses on the Graph database structure to store the connected data of peoples’ information. The second one proposes the graph database searching algorithm, the Modified-SoS-ACO (Sense of Smell-Ant Colony Optimization). The last portion proposes the Deductive Reasoning Algorithm to define two persons’ relationship. This study reveals the proper storage structure for connected information, graph searching algorithm and deductive reasoning algorithm to predict and analyze the personnel relationship from peoples’ relation in their connected information.Keywords: personnel information, graph storage structure, graph searching algorithm, deductive reasoning algorithm
Procedia PDF Downloads 45211032 An Approach for Pattern Recognition and Prediction of Information Diffusion Model on Twitter
Authors: Amartya Hatua, Trung Nguyen, Andrew Sung
Abstract:
In this paper, we study the information diffusion process on Twitter as a multivariate time series problem. Our model concerns three measures (volume, network influence, and sentiment of tweets) based on 10 features, and we collected 27 million tweets to build our information diffusion time series dataset for analysis. Then, different time series clustering techniques with Dynamic Time Warping (DTW) distance were used to identify different patterns of information diffusion. Finally, we built the information diffusion prediction models for new hashtags which comprise two phrases: The first phrase is recognizing the pattern using k-NN with DTW distance; the second phrase is building the forecasting model using the traditional Autoregressive Integrated Moving Average (ARIMA) model and the non-linear recurrent neural network of Long Short-Term Memory (LSTM). Preliminary results of performance evaluation between different forecasting models show that LSTM with clustering information notably outperforms other models. Therefore, our approach can be applied in real-world applications to analyze and predict the information diffusion characteristics of selected topics or memes (hashtags) in Twitter.Keywords: ARIMA, DTW, information diffusion, LSTM, RNN, time series clustering, time series forecasting, Twitter
Procedia PDF Downloads 39211031 The Relevance of Corporate Governance Disclosure in Spanish Public Universities
Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez
Abstract:
There is currently a growing interest in the improvement of university governance and the disclosure of information on corporate governance processes as an essential part of the transparency and accountability of universities. This paper aims to know the importance given by Spanish university stakeholders to the disclosure of information about structure and mechanism of corporate governance. So as to meet this objective we propose a model for disclosing information on the main aspects of university governance in Spanish universities. This model will be validated using a questionnaire sent to members of the Social Councils of public universities in Spain. Our results show that Spanish university stakeholders attach great importance to the disclosure of specific information on aspects of corporate governance, which would result in improved transparency and accountability. According to the results of this study it may be concluded that the university stakeholders feel that it is relevant to publish information on corporate governance in the university accounting information model.Keywords: corporate governance, transparency, accountability, universities, Spain
Procedia PDF Downloads 31311030 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher
Authors: Okike Benjami, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 29011029 Predicting Success and Failure in Drug Development Using Text Analysis
Authors: Zhi Hao Chow, Cian Mulligan, Jack Walsh, Antonio Garzon Vico, Dimitar Krastev
Abstract:
Drug development is resource-intensive, time-consuming, and increasingly expensive with each developmental stage. The success rates of drug development are also relatively low, and the resources committed are wasted with each failed candidate. As such, a reliable method of predicting the success of drug development is in demand. The hypothesis was that some examples of failed drug candidates are pushed through developmental pipelines based on false confidence and may possess common linguistic features identifiable through sentiment analysis. Here, the concept of using text analysis to discover such features in research publications and investor reports as predictors of success was explored. R studios were used to perform text mining and lexicon-based sentiment analysis to identify affective phrases and determine their frequency in each document, then using SPSS to determine the relationship between our defined variables and the accuracy of predicting outcomes. A total of 161 publications were collected and categorised into 4 groups: (i) Cancer treatment, (ii) Neurodegenerative disease treatment, (iii) Vaccines, and (iv) Others (containing all other drugs that do not fit into the 3 categories). Text analysis was then performed on each document using 2 separate datasets (BING and AFINN) in R within the category of drugs to determine the frequency of positive or negative phrases in each document. A relative positivity and negativity value were then calculated by dividing the frequency of phrases with the word count of each document. Regression analysis was then performed with SPSS statistical software on each dataset (values from using BING or AFINN dataset during text analysis) using a random selection of 61 documents to construct a model. The remaining documents were then used to determine the predictive power of the models. Model constructed from BING predicts the outcome of drug performance in clinical trials with an overall percentage of 65.3%. AFINN model had a lower accuracy at predicting outcomes compared to the BING model at 62.5% but was not effective at predicting the failure of drugs in clinical trials. Overall, the study did not show significant efficacy of the model at predicting outcomes of drugs in development. Many improvements may need to be made to later iterations of the model to sufficiently increase the accuracy.Keywords: data analysis, drug development, sentiment analysis, text-mining
Procedia PDF Downloads 16011028 Evalution of the Impact on Improvement of Bank Manager Decision Making
Authors: Farzane Sadatnia, Bahram Fathi
Abstract:
Today, all public and private organizations have found that the management of the world for key information related to the activities of a staff and its main essence and philosophy, though they constitute the management information systems are very helpful in this respect the right to apply systems can save a lot in terms of economic organizations including reducing the time decision - making, improve the quality of decision making, and cost savings to bring information systems is a backup system that can never be instead of logic and human reasoning, which can be used in the series is spreading, providing resources, and provide the necessary facilities, provide better services for users, balanced budget allocation, determine strengths and weaknesses and previous plans to review the current decisions and especially the decision . Hence; in this study attempts to the effect of an information system on a review of the organization.Keywords: information system, planning, organization, coordination, control
Procedia PDF Downloads 47611027 Spanish University Governance Reporting
Authors: Agustin Baidez, Yolanda Ramirez
Abstract:
There is currently a growing interest in the improvement of university governance and the disclosure of information on governance processes as an essential part of the transparency and accountability of universities. This paper aims to examine the extent and quality of voluntary corporate governance disclosure by public Spanish universities on their websites in relation to information need of stakeholders. The results of this study show that Spanish university stakeholders attach great importance to the disclosure of specific information on aspects of corporate governance. However, the quality of disclosed information on university governance in public Spanish universities websites is in the middle level. In order to satisfy the information needs of university stakeholders, Spanish universities can be recommended to focus on reporting higher quality information on university autonomy in financing, autonomy in management, autonomy regarding student selection and assessment, degree of consanguinity of executive directors, report on assigned public funding based on results, and management reports.Keywords: university, governance, transparency, stakeholders
Procedia PDF Downloads 5811026 Big Data’s Mechanistic View of Human Behavior May Displace Traditional Library Missions That Empower Users
Authors: Gabriel Gomez
Abstract:
The very concept of information seeking behavior, and the means by which librarians teach users to gain information, that is information literacy, are at the heart of how libraries deliver information, but big data will forever change human interaction with information and the way such behavior is both studied and taught. Just as importantly, big data will orient the study of behavior towards commercial ends because of a tendency towards instrumentalist views of human behavior, something one might also call a trend towards behaviorism. This oral presentation seeks to explore how the impact of big data on understandings of human behavior might impact a library information science (LIS) view of human behavior and information literacy, and what this might mean for social justice aims and concomitant community action normally at the center of librarianship. The methodology employed here is a non-empirical examination of current understandings of LIS in regards to social justice alongside an examination of the benefits and dangers foreseen with the growth of big data analysis. The rise of big data within the ever-changing information environment encapsulates a shift to a more mechanistic view of human behavior, one that can easily encompass information seeking behavior and information use. As commercial aims displace the important political and ethical aims that are often central to the missions espoused by libraries and the social sciences, the very altruism and power relations found in LIS are at risk. In this oral presentation, an examination of the social justice impulses of librarians regarding power and information demonstrates how such impulses can be challenged by big data, particularly as librarians understand user behavior and promote information literacy. The creeping behaviorist impulse inherent in the emphasis big data places on specific solutions, that is answers to question that ask how, as opposed to larger questions that hint at an understanding of why people learn or use information threaten library information science ideals. Together with the commercial nature of most big data, this existential threat can harm the social justice nature of librarianship.Keywords: big data, library information science, behaviorism, librarianship
Procedia PDF Downloads 38311025 Electronic Libraries and the Emergence of New Technology Paradigms
Authors: A. Basheer Ahamadhu, Kiran Kaur, Zainab Ajab Mohideen, Sukmawati Muhammad, Noor Azlinda Wan Jan
Abstract:
Library management facing favorable conditions and unexpected challenges in the century of information technology. They were having been under pressure to meet their duties to meet the information needs of customers. An information technology has brought big changes to the traditional methods of library work. Libraries need to evaluate, measuring effect information technology to them. This would equip them with the knowledge to make effective information technology to enhance their services. Recognizing the importance of development an electronic library, this research investigated their willingness to change from the traditional library based on the level of automation for the digital library initiatives, review both of the problems associated with digital library and public and terms to be considered for future growth. The main components have been inspected, such as grip library, demographic automations and digitization projects, digital library related to budgetary problems, the thought leader in the electronic library practices library, and the situation viewed for future growth. Libraries have run several digitization projects, at the level of institutions and countries but still needs more efforts in order to bring it to higher levels.Keywords: academic library, electronic library, information technology, information commons, web pages library
Procedia PDF Downloads 47811024 Bangladesh’s July Revolution: Analyzing the 2024 Movement for Free Speech and Democracy
Authors: Abu Bakar Siddik
Abstract:
The July Movement in Bangladesh marked a pivotal moment in the nation’s struggle for democratic freedom and the right to free speech. This movement, driven by citizens, intellectuals, and activists, opposed authoritarian governance and the violation of civil liberties. By encouraging support for democratic reforms, it significantly changed the political landscape and highlighted the importance of grassroots activism for human rights. This essay examines the sociopolitical dynamics of the July Movement and its roots in popular resistance to authoritarian rule. It explores the movement's beginnings, emphasizing how citizens, scholars, and activists united to challenge the regime that restricted freedom of speech. In order to show how the movement gathered support for democratic reforms and ultimately helped bring about the overthrow of the regime, the article examines significant demonstrations, speeches, and government acts. This book offers a thorough examination of how the July Movement changed Bangladesh's political landscape by acting as a revolution for free speech and a trigger for the overthrow of autocratic authority, using historical documents, media coverage, and firsthand recollections. This study provides insightful information about how grassroots activism advances human rights.Keywords: July movement, Bangladesh, free speech, democracy, authoritarianism, civil liberties, political change, human rights, social movements, protests, political landscape, regime change, activism, socio-political dynamics
Procedia PDF Downloads 2611023 Enhancing Quality Management Systems through Automated Controls and Neural Networks
Authors: Shara Toibayeva, Irbulat Utepbergenov, Lyazzat Issabekova, Aidana Bodesova
Abstract:
The article discusses the importance of quality assessment as a strategic tool in business and emphasizes the significance of the effectiveness of quality management systems (QMS) for enterprises. The evaluation of these systems takes into account the specificity of quality indicators, the multilevel nature of the system, and the need for optimal selection of the number of indicators and evaluation of the system state, which is critical for making rational management decisions. Methods and models of automated enterprise quality management are proposed, including an intelligent automated quality management system integrated with the Management Information and Control System. These systems make it possible to automate the implementation and support of QMS, increasing the validity, efficiency, and effectiveness of management decisions by automating the functions performed by decision makers and personnel. The paper also emphasizes the use of recurrent neural networks to improve automated quality management. Recurrent neural networks (RNNs) are used to analyze and process sequences of data, which is particularly useful in the context of document quality assessment and non-conformance detection in quality management systems. These networks are able to account for temporal dependencies and complex relationships between different data elements, which improves the accuracy and efficiency of automated decisions. The project was supported by a grant from the Ministry of Education and Science of the Republic of Kazakhstan under the Zhas Galym project No. AR 13268939, dedicated to research and development of digital technologies to ensure consistency of QMS regulatory documents.Keywords: automated control system, quality management, document structure, formal language
Procedia PDF Downloads 4111022 A Case Study of Al-Shifa: A Healthcare Information System in Oman
Authors: Khamis Al-Gharbi, Said M. Gattoufi, Ali H. Al-Badi, Ali Al-Hashmi
Abstract:
The case study presents the progression of a project management of Al-Shifa, a healthcare information system in Oman. The case study describes the evolution of the implementation of a healthcare information system tailored to meet the needs of the healthcare units under the supervision of the Ministry of Health (MOH) in Oman. A focus group methodology was used for collecting the relevant information from the main project's stakeholders. In addition reports about the project made available for the researchers. The case analysis is made based on the Project Management approach developed by the Project Management Institute (PMI). The main finding that there was no formal project management approach adopted by the MOH for the development and implementation of the herewith mentioned healthcare information system project. Furthermore, the project had suffered a scope creep in terms of features, cost and time-schedule. The recommendations of the authors, for the rescue of the project from its current dilemma, consist of technological, administrative and human resources development actions.Keywords: project management, information system, healthcare, Al-Shifa, Oman
Procedia PDF Downloads 39011021 Public Financial Management in Ghana: A Move beyond Reforms to Consolidation and Sustainability
Authors: Mohammed Sani Abdulai
Abstract:
Ghana’s Public Financial Management reforms have been going on for some two decades now (1997/98 to 2017/18). Given this long period of reforms, Ghana in 2019 is putting together both a Public Financial Management (PFM) strategy and a Ghana Integrated Financial Management Information System (GIFMIS) strategy for the next 5-years (2020-2024). The primary aim of these dual strategies is assisting the country in moving beyond reforms to consolidation and sustainability. In this paper we, first, examined the evolution of Ghana’s PFM reforms. We, secondly, reviewed the legal and institutional reforms undertaken to strengthen the country’s key PFM institutions. Thirdly, we summarized the strengths and weaknesses identified by the 2018 Public Expenditure and Financial Accountability (PEFA) assessment of Ghana’s PFM system relating to its macro-fiscal framework, budget preparation and approval, budget execution, accounting and fiscal reporting as well as external scrutiny and audit. We, finally, considered what the country should be doing to achieve its intended goal of PFM consolidation and sustainability. Using a qualitative method of review and analysis of existing documents, we, through this paper, brought to the fore the lessons that could be learnt by other developing countries from Ghana’s PFM reforms experiences. These lessons included the need to: (a) undergird any PFM reform with a comprehensive PFM reform strategy; (b) undertake a legal and institutional reforms of the key PFM institutions; (c) assess the strengths and weaknesses of those reforms using PFM performance evaluation tools such as PEFA framework; and (d) move beyond reforms to consolidation and sustainability.Keywords: public financial management, public expenditure and financial accountability, reforms, consolidation, sustainability
Procedia PDF Downloads 23411020 A Controlled Natural Language Assisted Approach for the Design and Automated Processing of Service Level Agreements
Authors: Christopher Schwarz, Katrin Riegler, Erwin Zinser
Abstract:
The management of outsourcing relationships between IT service providers and their customers proofs to be a critical issue that has to be stipulated by means of Service Level Agreements (SLAs). Since service requirements differ from customer to customer, SLA content and language structures vary largely, standardized SLA templates may not be used and an automated processing of SLA content is not possible. Hence, SLA management is usually a time-consuming and inefficient manual process. For overcoming these challenges, this paper presents an innovative and ITIL V3-conform approach for automated SLA design and management using controlled natural language in enterprise collaboration portals. The proposed novel concept is based on a self-developed controlled natural language that follows a subject-predicate-object approach to specify well-defined SLA content structures that act as templates for customized contracts and support automated SLA processing. The derived results eventually enable IT service providers to automate several SLA request, approval and negotiation processes by means of workflows and business rules within an enterprise collaboration portal. The illustrated prototypical realization gives evidence of the practical relevance in service-oriented scenarios as well as the high flexibility and adaptability of the presented model. Thus, the prototype enables the automated creation of well defined, customized SLA documents, providing a knowledge representation that is both human understandable and machine processable.Keywords: automated processing, controlled natural language, knowledge representation, information technology outsourcing, service level management
Procedia PDF Downloads 43311019 Developing an Information Model of Manufacturing Process for Sustainability
Authors: Jae Hyun Lee
Abstract:
Manufacturing companies use life-cycle inventory databases to analyze sustainability of their manufacturing processes. Life cycle inventory data provides reference data which may not be accurate for a specific company. Collecting accurate data of manufacturing processes for a specific company requires enormous time and efforts. An information model of typical manufacturing processes can reduce time and efforts to get appropriate reference data for a specific company. This paper shows an attempt to build an abstract information model which can be used to develop information models for specific manufacturing processes.Keywords: process information model, sustainability, OWL, manufacturing
Procedia PDF Downloads 43011018 A Multi-Science Study of Modern Synergetic War and Its Information Security Component
Authors: Alexander G. Yushchenko
Abstract:
From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism
Procedia PDF Downloads 13611017 The Structural Analysis of Out-of-Sequence Thrust: Insights from Chaura Thrust of Higher Himalaya in Himachal Pradesh, India
Authors: Rajkumar Ghosh
Abstract:
This paper focuses on the structural analysis of Chaura Thrust in Himachal Pradesh, India. It investigates mylonitised zones under microscopic observation, characterizes the box fold and its signature in the regional geology of Himachal Himalaya, and documents the Higher Himalayan Out-of-Sequence Thrust (OOST) in the region. The study aims to provide field evidence and documentation for Chaura Thrust (CT), which was previously considered a blind thrust. The research methodology involves geological field observation, microscopic studies, and strain analysis of oriented samples collected along the Jhakri-Chaura transect. The study presents findings such as the activation ages of MCT and STDS, the identification of mylonitised zones and various types of crenulated schistosity, and the manifestation of box folds and OOST. The presence of meso- and micro-scale box folds around Chaura suggests structural upliftment, while kink folds and shear sense indicators were identified. The research highlights the importance of microscopic studies and contributes to the understanding of the structural analysis of CT and its implications in the regional geology of the Himachal Himalaya. Mylonitised zones with S-C fabric were observed under the microscope, along with dynamic and bulging recrystallization and sub-grain formation. Various types of crenulated schistosity were documented, including a rare case of crenulation cleavage and sigmoid Muscovite occurring together. The conclusions emphasize the non-blind nature of Chaura Thrust, the characterization of box folds, the activation timing of different thrusts, and the significance of microscopic observations. Jhakri/Chaura/Sarahan thrusts are the zone of tectonic imbrication that transport Higher Himalayan gneissic rock on Rampur Quartzite. The evidence of frequent earthquakes and landslides in the Jhakri region confirm the study of morphometric conclusion that there is considerable neo-tectonic activity along an active fault in the Sutlej river basin. The study also documents the presence of OOST in Himachal Pradesh and its potential impact on strain accumulation.Keywords: Main Central Thrust, Jhakri Thrust, Chaura Thrust, Higher Himalaya, Out-of-Sequence Thrust, Sarahan Thrust
Procedia PDF Downloads 8911016 The Effects of Information Technology in Urban Health
Authors: Safdari Reza, Zahmatkeshan Maryam, Goli Arji
Abstract:
Background and Aim: Urban health is one of the challenges of the 21st century. Rapid growth and expanding urbanization have implications for health. In this regard, information technology can remove a large number of modern cities’ problems. Therefore, the present article aims to study modern information technologies in the development of urban health. Materials and Methods:. This is a review article based on library research and Internet searches on valid websites such as Science Direct, Magiran, Springer and advanced searches in Google. Some 164 domestic and foreign texts were studied on such topics as the application of ICT tools including cell phones and wireless tools, GIS, and RFID in the field of urban health in 2011. Finally, 30 sources were used. Conclusion: Information and communication technologies play an important role in improving people's health and enhancing the quality of their lives. Effective utilization of information and communication technologies requires the identification of opportunities and constraints, and the formulation of appropriate planning principles with regard to social and economic factors together with preparing the technological, communication and telecommunications, legal and administrative infrastructures.Keywords: Urban Health, Information Technology, Information & Communication, Technology
Procedia PDF Downloads 46611015 A research of Dhuta Characteristic Poems Associated with Traditional Serpent Medicine (From Galkalla and Ratmalavetia Vedaparampara)
Authors: M. S. M. Anjalee Umesha Bandara
Abstract:
Hela Veda Shastra is a science that is an endowment from generation to generation. There is also an individualistic science and indigenous practice of traditional herbs. There are many effective cures for snakes, fractures, head cancer, cuts, lunatics, reflexology, etc. Hela physicians who rescued them from infections caused by snakes have recognized poems to remember the medicines they used to cure the patients. Due to the harmony of the Hela Osu and Hela Knowledge poetry collection, it has become easy for the juniors of the Hela Veda generation to gain medical knowledge. It is a research problem whether it is possible to arrive at a correct conclusion about the patient form of the snake information thread through the existing Dhuta characteristics of Hela Serpa Vedakam. This research was done with the assumption that snake venom can be successfully treated according to its characteristics. In this research, two generations related to the Ratmalavatiya Vedaparamparava and the Vannihatpattu of the Kalla Veda generation have been identified as Veda Paramparas who treat and created Dutha Kavya, including the form of the Serpent Dasthana. They have collected ancient books, documents and interviews related to qualitative research on snake disease treatment. In addition, collecting data by referring to books related to Hela medicine. The ancient indigenous lineage methods that are superior to modern Western science's snake therapy should save the Hela's amazing wealth of wisdom for the future, leaving aside the selfishness of keeping the teaching to themselves.Keywords: snake venom medicine, vedic genealogy, Dhuta characteristic, snake
Procedia PDF Downloads 6211014 How Markets React to Corporate Disclosure: An Analysis Using a SEM Model
Authors: Helena Susana Afonso Alves, Natália Maria Rafael Canadas, Ana Maria Rodrigues
Abstract:
We examined the impact of governance rules on information asymmetry, using the turnover ratio and the bid-ask spread as proxies for the information asymmetry. We used a SEM model and analyzed the indirect relations through the voluntary disclosure of information and the organizational performance. We built a voluntary disclosure index based on the information firms provided in their annual reports and divided the governance characteristics in two constructs: directors’ and supervisors’ structures and ownership structure. We concluded that the ownership structure exerts a direct influence on share price and share liquidity, Otherwise, the directors’ and supervisors’ structures exert an indirect influence, through the organizational performance and the voluntary disclosure of information. The results also show that for firms with high levels of disclosure the bid-ask spread is lower. However, in firms with a high ownership concentration investors tend to increase the bid-ask spreads and trade less, which, in this case, reduces the liquidity of the stock. The failure to find the relationship between voluntary disclosure of information and the turnover ratio shows us that the liquidity of shares is more related to the greater or lesser concentration of shareholders, with the performance of their companies than with the access to information. Moreover, it is clear that the role that information disclosure plays is mainly at the level of price formation.Keywords: corporate governance, information asymmetry, voluntary disclosure, structural equation modelling, SEM
Procedia PDF Downloads 51811013 Information Extraction Based on Search Engine Results
Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk
Abstract:
The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.Keywords: search engines, information extraction, agent system
Procedia PDF Downloads 430