Search results for: private information
11765 Impact of Endogenous Risk Factors on Risk Cost in KSA PPP Projects
Authors: Saleh Alzahrani, Halim Boussabaine
Abstract:
The Public Private Partnership (PPP) contracts are produced taking into account the reason that the configuration, development, operation, and financing of an open undertaking is to be recompensed to a private gathering inside a solitary contractual structure. PPP venture dangers are ordinarily connected with the improvement and development of another resource and in addition its operation for a considerable length of time. Without a doubt, the most genuine outcomes of dangers amid the development period are value and time overwhelms. These occasions are amongst the most extensively utilized situations as a part of worth for cash investigation dangers. The wellsprings of danger change over the life cycle of a PPP venture. In customary acquirement, the general population segment ordinarily needs to cover all value trouble from these dangers. At any rate there is bounty confirmation to recommend that cost pain is a standard in a percentage of the tasks that are conveyed under customary obtainment. This paper means to research the effect of endogenous dangers on expense overwhelm in KSA PPP ventures. The paper displays a brief writing survey on PPP danger evaluating systems, and after that presents an affiliation model between danger occasions and expense invade in KSA. The paper finishes up with considerations for future examination.Keywords: PPP, risk pricing, impact of risk, Endogenous risks
Procedia PDF Downloads 45111764 We Cannot Cross Our Limits: Sexuality and Desire in Urban Pakistani Youth's Gendered Performance
Authors: Shirin Zubair
Abstract:
Keeping in view the segregation of space(s) experienced by young women and men at puberty in Pakistan and the socially constructed and performative aspect of gender identity by Western theorists of gender and self, this paper will explore Pakistani youth’s differential, gendered performances. Specifically focused on Pakistani youth’s perceptions and experiences of sexuality, extramarital and same-sex relationships in constructing and performing gendered identities as manifested through their talk, the research will also draw upon recent theories of space in cultural studies and postcolonial discourses. The data cited has been culled from two different studies conducted at universities in the city of Multan. Informal, unstructured group discussions of women and men aged between twenty and twenty nine years of age were recorded separately among groups of friends and cohorts studying at two different universities. The findings clearly show both young women and men doing the boundary work in identity construction in private and public spaces: talking of sexuality, sexual desire and sexual relationships, women tend to safely couch their articulations in euphemisms: distance themselves from the Western concepts of sexual liberation ; while young men’s exhibitionism in boasting of their sexual prowess and sexual encounters as well as the use of sexually explicit and tabooed words frequently in their intimate conversations shows a clear departure from and a contestation of the normative public discourses. Further the findings illustrate that young men conform to the patriarchal ideologies by constructing heterosexual identities whereas young women initiate discourse on same-sex relationships. The data also reveals that the private identities of these young Pakistanis are different from their public identities, as it is in their intimate conversations and private (or safe) spaces that they talk about their pre-marital sexual activities and love affairs. These intimate and safe spaces thus emerge as subversion and contestation of their public identity, as sex and sexuality are tabooed subjects in public discourses.Keywords: sexuality, gender, identity, performance
Procedia PDF Downloads 33711763 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 38111762 Effect of Financing Sources on Firm Performance: A Study of Indian Private Limited Small and Medium Enterprises
Authors: Denila Jinny Arulraj, Thillai Rajan Annamalai
Abstract:
This paper aims to study the relationship between funding sources and firm performance of Indian private limited SMEs using cross-sectional data obtained from a nation-wide census. A unique feature of the study is that it analyses firms that use only one form of external funding. Employing Propensity Score Matching, we find that obtaining any form of external finance has a negative influence on equivalents of profit margin and return on assets and a negative influence on asset turnover of small firms. But, the impact of institutional sources of funding on small enterprises is found to be lesser than that of non-institutional sources of funding. External/institutional sources of funding have a less negative impact on the profit margin for medium enterprises and have no significant influence on other measures of performance. The contribution of this research is the discovery of institutional sources wielding a lesser influence on performance measures considered. It is also found that institutional sources can benefit small enterprises more than medium enterprises.Keywords: external finance, institutional finance, non-institutional finance, performance, India, SME
Procedia PDF Downloads 27611761 Promoting Public Participation in the Digital Memory Project: Experience from My Peking Memory Project(MPMP)
Authors: Xiaoshuang Jia, Huiling Feng, Li Niu, Wei Hai
Abstract:
Led by Humanistic Beijing Studies Center in Renmin University of China, My Peking Memory Project(MPMP) is a long-time digital memory project under guarantee of public participation to enable the cultural and intellectual memory of Beijing to be collected, organized, preserved and promoted for discovery and research. Taking digital memory as a new way, MPMP is an important part of Peking Memory Project(PMP) which is aimed at using digital technologies to protect and (re)present the cultural heritage in Beijing. The key outcome of MPMP is the co-building of a total digital collection of knowledge assets about Beijing. Institutional memories are central to Beijing’s collection and consist of the official published documentary content of Beijing. These have already fall under the archival collection purview. The advances in information and communication technology and the knowledge form social memory theory have allowed us to collect more comprehensively beyond institutional collections. It is now possible to engage citizens on a large scale to collect private memories through crowdsourcing in digital formats. Private memories go beyond official published content to include personal narratives, some of which are just in people’s minds until they are captured by MPMP. One aim of MPMP is to engage individuals, communities, groups or institutions who have formed memories and content about Beijing, and would like to contribute them. The project hopes to build a culture of remembering and it believes ‘Every Memory Matters’. Digital memory contribution was achieved through the development of the MPMP. In reducing barriers to digital contribution and promoting high public Participation, MPMP has taken explored the harvesting of transcribe service for digital ingestion, mobile platform and some off-line activities like holding social forum. MPMP has also cooperated with the ‘Implementation Plan of Support Plan for Growth of Talents in Renmin University of China’ to get manpower and intellectual support. After six months of operation, now MPMP have more than 2000 memories added and 7 Special Memory Collections now online. The work of MPMP has ultimately helped to highlight the important role in safeguarding the documentary heritage and intellectual memory of Beijing.Keywords: digital memory, public participation, MPMP, cultural heritage, collection
Procedia PDF Downloads 16911760 Skills Development: The Active Learning Model of a French Computer Science Institute
Authors: N. Paparisteidi, D. Rodamitou
Abstract:
This article focuses on the skills development and path planning of students studying computer science in EPITECH: french private institute of Higher Education. The researchers examine students’ points of view and experience in a blended learning model based on a skills development curriculum. The study is based on the collection of four main categories of data: semi-participant observation, distribution of questionnaires, interviews, and analysis of internal school databases. The findings seem to indicate that a skills-based program on active learning enables students to develop their learning strategies as well as their personal skills and to actively engage in the creation of their career path and contribute to providing additional information to curricula planners and decision-makers about learning design in higher education.Keywords: active learning, blended learning, higher education, skills development
Procedia PDF Downloads 10411759 From Cultural Policy to Social Practice: Literary Festivals as a Platform for Social Inclusion in Pakistan
Authors: S. Jabeen
Abstract:
Though Pakistan has a rich cultural history and a diverse population; its global image is tarnished with labels of Muslim ‘fundamentalism’ and ‘extremism.’ Cultural policy is a tool that can be used by the government of Pakistan to ameliorate this image, but instead, this fundamentalist reputation is reinforced in the 2005 draft of Pakistan’s cultural policy. With its stern focus on a homogenized cultural identity, this 2005 draft bases itself largely on forced participation from the largely Muslim public and leaves little or no benefits to them or cultural minorities in Pakistan. The effects of this homogenized ‘Muslim’ identity linger ten years later where the study and celebration of the cultural heritage of Pakistan in schools and educational festivals focus entirely on creating and maintaining a singular ‘Islamic’ cultural identity. The current lack of inclusion has many adverse effects that include the breeding of extremist mindsets through the usurpation of minority rights and lack of safe cultural public spaces. This paper argues that Pakistan can improve social inclusivity and boost its global image through cultural policy. The paper sets the grounds for research by surveying the effectiveness of different cultural policies across nations with differing socioeconomic status. Then, by sampling two public literary festivals in Pakistan as case studies, the National Youth Peace Festival hosted with a nationalistic agenda using public funds and the Lahore Literary Festival (LLF) that aims to boost the cultural literacy scene of Lahore using both private and public efforts, this paper looks at the success of the private, more inclusive LLF. A revision of cultural policy is suggested that combines public and private efforts to host cultural festivals for the sake of cultural celebration and human development, without a set nationalistic agenda. Consequently, this comparison which is grounded in the human capabilities approach, recommends revising the 2005 draft of the Cultural Policy to improve human capabilities in order to support cultural diversity and ultimately contribute to economic growth in Pakistan.Keywords: cultural policy, festivals, human capabilities, Pakistan
Procedia PDF Downloads 13811758 Factors Affecting Corruption in Ethiopia from Higher Education Instructors' Perceptions: Evidence from Business and Economics College, Bahir Dar University
Authors: Asmamaw Yigzaw Chirkos
Abstract:
Corruption increasingly has become one of the greatest challenges of the contemporary world. It undermines good government and rule of law and in turn leads to the misallocation of public resources, harms both the private and public sector and particularly hurts the poor. Corruption is found everywhere, but it is deep-rooted in the poor countries of Sub-Saharan Africa countries. Corruption in developing countries continues to be one of the greatest factors of poverty and underdevelopment. As it is the case in other developing countries, in Ethiopia, the culture of corruption has grown roots in the society at large and become endemic. Institutions, which were designed for the regulation of the relationships between citizens and the State, are being used instead for the personal enrichment of public officials and other corrupt private agents. This paper, therefore, assesses the major factors affecting Corruption in Ethiopia from higher education instructors’ Perceptions with special reference to Business and Economics College of Bahir Dar University. The findings of the study support several previously conducted studies in that each factor examined had a moderate to high positive correlation with corruption, where r ranged between .35 and .54. In addition, the 13 variables together explain about 37 percent change in perceived corruption in Ethiopia (R²= .37).Keywords: Bahir Dar university, corruption, Ethiopia, factors, instructors perceptions
Procedia PDF Downloads 24411757 Factors Influencing Disclosure and CSR Spending in Indian Companies: An Econometric Analysis
Authors: Shekar Babu, Amalendu Jyothishi
Abstract:
The New Companies Bill-2013 in India has mandated all the companies with a certain profit to spend on Corporate Social Responsibility (CSR). Despite the Corporate Governance (CG) compliances at the strategic level the firms have to engage in social good. For both the Central Public Sector Enterprises (CPSE) and the private companies in India the need for strategic CSR focus through operational efficiency measures are mandated. In this paper the focus is to find out if the Indian companies understand their responsibility towards the society despite government making CSR mandatory. Analyzing both the CPSEs and Private companies the researchers find out which set of companies behave responsibly towards the society. Does any particular industry group(s) impact the society by disclosing their CSR spending activities. The key financial and non-financial parameters that influence CSR spending were identified and through econometric analysis methodologies (logistic regression and OLS models) the results were analyzed. The innovative methods were developed to identify if the firms operate efficiently and at the same time complying with the new CSR laws. An innovative matrix was developed to explain how companies could operate efficiently and be compliant in parallel how some of the companies can strategically realign their spending by operating efficiently.Keywords: corporate social responsibility(CSR), corporate governance(CG), India, logit function, ordinary least squares (OLS)
Procedia PDF Downloads 35511756 The Adoption of Process Management for Accounting Information Systems in Thailand
Authors: Manirath Wongsim
Abstract:
Information Quality (IQ) has become a critical, strategic issue in Accounting Information Systems (AIS) adoption. In order to implement AIS adoption successfully, it is important to consider the quality of information use throughout the adoption process, which seriously impacts the effectiveness of AIS adoption practice and the optimization of AIS adoption decisions. There is a growing need for research to provide insights into issues and solutions related to IQ in AIS adoption. The need for an integrated approach to improve IQ in AIS adoption, as well as the unique characteristics of accounting data, demands an AIS adoption specific IQ framework. This research aims to explore ways of managing information quality and AIS adoption to investigate the relationship between the IQ issues and AIS adoption process. This study has led to the development of a framework for understanding IQ management in AIS adoption. This research was done on 44 respondents as ten organisations from manufacturing firms in Thailand. The findings of the research’s empirical evidence suggest that IQ dimensions in AIS adoption to provide assistance in all process of decision making. This research provides empirical evidence that information quality of AIS adoption affect decision making and suggests that these variables should be considered in adopting AIS in order to improve the effectiveness of AIS.Keywords: information quality, information quality dimensions, accounting information systems, accounting information system adoption
Procedia PDF Downloads 46711755 District 10 in Tehran: Urban Transformation and the Survey Evidence of Loss in Place Attachment in High Rises
Authors: Roya Morad, W. Eirik Heintz
Abstract:
The identity of a neighborhood is inevitably shaped by the architecture and the people of that place. Conventionally the streets within each neighborhood served as a semi-public-private extension of the private living spaces. The street as a design element formed a hybrid condition that was neither totally public nor private, and it encouraged social interactions. Thus through creating a sense of community, one of the most basic human needs of belonging was achieved. Similar to major global cities, Tehran has undergone serious urbanization. Developing into a capital city of high rises has resulted in an increase in urban density. Although allocating more residential units in each neighborhood was a critical response to the population boom and the limited land area of the city, it also created a crisis in terms of social communication and place attachment. District 10 in Tehran is a neighborhood that has undergone the most urban transformation among the other 22 districts in the capital and currently has the highest population density. This paper will explore how the active streets in district 10 have changed into their current condition of high rises with a lack of meaningful social interactions amongst its inhabitants. A residential building can be thought of as a large group of people. One would think that as the number of people increases, the opportunities for social communications would increase as well. However, according to the survey, there is an indirect relationship between the two. As the number of people of a residential building increases, the quality of each acquaintance reduces, and the depth of relationships between people tends to decrease. This comes from the anonymity of being part of a crowd and the lack of social spaces characterized by most high-rise apartment buildings. Without a sense of community, the attachment to a neighborhood is decreased. This paper further explores how the neighborhood participates to fulfill ones need for social interaction and focuses on the qualitative aspects of alternative spaces that can redevelop the sense of place attachment within the community.Keywords: high density, place attachment, social communication, street life, urban transformation
Procedia PDF Downloads 12711754 Overview of E-government Adoption and Implementation in Ghana
Authors: Isaac Kofi Mensah
Abstract:
E-government has been adopted and used by many governments/countries around the world including Ghana to provide citizens and businesses with more accurate, real-time, and high quality services and information. The objective of this paper is to present an overview of the Government of Ghana’s (GoG) adoption and implement of e-government and its usage by the Ministries, Departments and its agencies (MDAs) as well as other public sector institutions to deliver efficient public service to the general public i.e. citizens, business etc. Government implementation of e-government focused on facilitating effective delivery of government service to the public and ultimately to provide efficient government-wide electronic means of sharing information and knowledge through a network infrastructure developed to connect all major towns and cities, Ministries, Departments and Agencies and other public sector organizations in Ghana. One aim for the Government of Ghana use of ICT in public administration is to improve productivity in government administration and service by facilitating the exchange of information to enable better interaction and coordination of work among MDAs, citizens and private businesses. The study was prepared using secondary sources of data from government policy documents, national and international published reports, journal articles, and web sources. This study indicates that through the e-government initiative, currently citizens and businesses can access and pay for services such as renewal of driving license, business registration, payment of taxes, acquisition of marriage and birth certificates as well as application for passport through the GoG electronic service (eservice) and electronic payment (epay) portal. Further, this study shows that there is an enormous commitment from GoG to adopt and implement e-government as a tool not only to transform the business of government but also to bring efficiency in public services delivered by the MDAs. To ascertain this, a further study need to be carried out to determine if the use of e-government has brought about the anticipated improvements and efficiency in service delivery of MDAs and other state institutions in Ghana.Keywords: electronic government, electronic services, electronic pay, MDAs
Procedia PDF Downloads 51211753 Environmental Variables as Determinants of Students Achievement in Biology Secondary Schools in South West Nigeria
Authors: Ayeni Margaret Foluso, K. A. Omotayo
Abstract:
This study investigated the impact of selected environmental variables as determinants of students’ achievements in biology in secondary schools. The selected environmental variables are class size and laboratory adequacy. The purpose was to find out whether these environmental variables can bring about improvement in the learning of biology by Senior Secondary School Students. The study design used was descriptive research of the survey type. Two instruments were used that is, Biology Achievement Test and School Environment Questionnaire .The population of the study consisted of all Biology students in both public and private Senior Secondary Schools class III (SSIII) in all the three selected states in South West Nigeria. A sample of 900 Biology students and 45 Biology Teachers from both public and private Senior Secondary Schools Class III were used. Two research hypotheses were generated for the study. The data collected were subjected to both descriptive statistics of mean and standard deviation; and the inferential statistics of regression Analyses was employed to test the hypotheses formulated. From the results, it was revealed that the selected environmental variables had influence on the students’ achievement in biology.Keywords: environmental variables, determinants, students’ achievement, school science
Procedia PDF Downloads 48811752 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU
Authors: Nicole Christiansen, Hanne Marie Motzfeldt
Abstract:
In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.Keywords: AI, cyber vetting, data protection, job recruitment, online privacy
Procedia PDF Downloads 8611751 An Exploratory Study of Preschool English Education in China
Authors: Xuan Li
Abstract:
The English language occupies a crucial position in the Chinese educational system and is officially introduced in the school curriculum from the third year of primary school onward. However, it is worth noting that along with the movement to remove primary-oriented education from preschools, the teaching of English is banned in preschools. Considering the worldwide trend of learning English at a young age, whether this ban can be implemented successfully is doubtful. With an initial focus on the interaction of language-in-education planning and policy (LEPP) at the macro level and actual practice at the micro level, this research selected three private preschools and two public preschools to explore what is taking place in terms of English education. All data collected is qualitative and is gained from documentary analysis, school observation, interviews, and focus groups. The findings show that: (1) although the English ban in preschool education aims to regulate all types of preschools and all adult Chinese participants are aware of this ban, there are very different scenarios according to type of preschool, such that no English classes are found in public schools while private preschools commonly provide some kind of English education; (2) even public schools do not have an English-free environment and parents’ demand for English education is high; (3) there is an obvious top-down hierarchy in both public and private schools, in which administrators make the decisions while others have little power to influence the school curriculum; (4) there is a clear gap in the perception of English teaching between children and adults, in which adults prefer foreign English teachers and think English teaching is just playing, while children do not have a clear preference regarding teachers and do not think English class is just for fun; (5) without macro support, there are many challenges involved in preschool English education, including the shortage of qualified teachers and teaching resources, ineffective personnel management and few opportunities for speaking English in daily life. Hopefully, this research will not only highlight the interaction of LEPP at different levels and the importance of individual agency but also raise the awareness of how to provide qualified and equal education for all children.Keywords: individual agency, language-in-education planning and policy, micro context, preschool English education
Procedia PDF Downloads 15111750 Key Issues in Transfer Stage of BOT Project: Experience from China
Authors: Wang Liguang, Zhang Xueqing
Abstract:
The build-operate-transfer (BOT) project delivery system has provided effective routes to mobilize private sector funds, innovative technologies, management skills and operational efficiencies for public infrastructure development and have been widely used in China during the last 20 years. Many BOT projects in China will be smoothly transferred to the government soon and the transfer stage, which is considered as the last stage, must be studied carefully and handled well to achieve the overall success of BOT projects. There will be many issues faced by both the public sector and private sector in the transfer stage of BOT projects, including project post-assessment, technology and documents transfer, personal training and staff transition, etc. and sometimes additional legislation is needed for future operation and management of facilities. However, most previous studies focused on the bidding, financing, and building and operation stages instead of transfer stage. This research identifies nine key issues in the transfer stage of BOT projects through a comprehensive study on three cases in China, and the expert interview and expert discussion meetings are held to validate the key issues and give detail analysis. A proposed framework of transfer management is prepared based on the experiences derived and lessons drawn from the case studies and expert interview and discussions, which is expected to improve the transfer management of BOT projects in practice.Keywords: BOT project, key issues, transfer management, transfer stage
Procedia PDF Downloads 25611749 Economic Perspectives for Agriculture and Forestry Owners in Bulgaria
Authors: Todor Nickolov Stoyanov
Abstract:
These factors appear as a reason for difficulties in financing from programs for rural development of the European Union. Credit conditions for commercial banks are difficult to implement, and its interest rate is too high. One of the possibilities for short-term loans at preferential conditions for the small and medium-sized agricultural and forest owners is credit cooperative. After the changes, occurred in the country after 1990, the need to restore credit cooperatives raised. The purpose for the creation of credit cooperatives is to assist private agricultural and forest owners to take care for them, to assist in the expansion and strengthening of their farms, to increase the quality of life and to improve the local economy. It was found that: in Bulgaria there is a legal obstacle for credit cooperatives to expand their business in the deposit and lending sphere; private forest and agricultural owners need small loans to solve a small problem for a certain season; providing such loans is not attractive for banks, but it is extremely necessary for owners of small forests and lands; if a special law on credit cooperatives is adopted, as required by the Cooperatives Act, it will allow more local people to be members of such credit structures and receive the necessary loans. In conclusion, proposals to create conditions for the development of credit cooperatives in the country are made and positive results expected from the creation of credit cooperatives, are summarized.Keywords: cooperatives, credit cooperatives, forestry, forest owners
Procedia PDF Downloads 22511748 Online Information Seeking: A Review of the Literature in the Health Domain
Authors: Sharifah Sumayyah Engku Alwi, Masrah Azrifah Azmi Murad
Abstract:
The development of the information technology and Internet has been transforming the healthcare industry. The internet is continuously accessed to seek for health information and there are variety of sources, including search engines, health websites, and social networking sites. Providing more and better information on health may empower individuals, however, ensuring a high quality and trusted health information could pose a challenge. Moreover, there is an ever-increasing amount of information available, but they are not necessarily accurate and up to date. Thus, this paper aims to provide an insight of the models and frameworks related to online health information seeking of consumers. It begins by exploring the definition of information behavior and information seeking to provide a better understanding of the concept of information seeking. In this study, critical factors such as performance expectancy, effort expectancy, and social influence will be studied in relation to the value of seeking health information. It also aims to analyze the effect of age, gender, and health status as the moderator on the factors that influence online health information seeking, i.e. trust and information quality. A preliminary survey will be carried out among the health professionals to clarify the research problems which exist in the real world, at the same time producing a conceptual framework. A final survey will be distributed to five states of Malaysia, to solicit the feedback on the framework. Data will be analyzed using SPSS and SmartPLS 3.0 analysis tools. It is hoped that at the end of this study, a novel framework that can improve online health information seeking is developed. Finally, this paper concludes with some suggestions on the models and frameworks that could improve online health information seeking.Keywords: information behavior, information seeking, online health information, technology acceptance model, the theory of planned behavior, UTAUT
Procedia PDF Downloads 27411747 Political Discourse Used in the TV Talk Shows of Pakistani Media
Authors: Hafiz Sajjad Hussain, Asad Razzaq
Abstract:
The study aims to explore the relationship between application of speech and discourse used by the political workers and their leaders for maintaining authoritative approach and dialog power. The representation of these relationships between ideology and language in the analysis of discourse and spoken text following Van Dijk Socio-Cognitive model. Media and political leaders are two pillars of a state and their role is so important for development and effects on the society. Media has become an industry in the recent years in the globe, and especially, the private sector developed a lot in the last decade in Pakistan. Media is the easiest way of communication with the large community in a short time and used discourse independently. The prime time of the news channels in Pakistan presents the political programs on most favorite story or incident of the day. The current program broadcasted by a private channel ARY News July 6, 2014 covered the most top story of the day. The son of Ex. CJ Arslan Iftikhar moves an application to Election Commission of Pakistan about the daughter of the most popular political leader and chairman PTI Imran Khan. This movement turns the whole scenario of the political parties and media got a hot issue form discussion. This study also shows that the ideology and meanings which are presented by the TV channels not always obvious for readers.Keywords: electronic media, political discourse, ideology of media, power, authoritative approach
Procedia PDF Downloads 52911746 Formulating Rough Approximations in Information Tables with Possibilistic Information
Authors: Michinori Nakata, Hiroshi Sakai
Abstract:
A rough set, which consists of lower and upper approximations, is formulated in information tables containing possibilistic information. First, lower and upper approximations on the basis of possible world semantics in the same way as Lipski did in the field of incomplete databases are shown in order to clarify fundamentals of rough sets under possibilistic information. Possibility and necessity measures are used, as is done in possibilistic databases. As a result, each object has certain and possible membership degrees to lower and upper approximations, which degrees are the lower and upper bounds. Therefore, the degree that the object belongs to lower and upper approximations is expressed by an interval value. And the complementary property linked with the lower and upper approximations holds, as is valid under complete information. Second, the approach based on indiscernibility relations, which is proposed by Dubois and Prade, are extended in three cases. The first case is that objects used to approximate a set of objects are characterized by possibilistic information. The second case is that objects used to approximate a set of objects with possibilistic information are characterized by complete information. The third case is that objects that are characterized by possibilistic information approximate a set of objects with possibilistic information. The extended approach create the same results as the approach based on possible world semantics. This justifies our extension.Keywords: rough sets, possibilistic information, possible world semantics, indiscernibility relations, lower approximations, upper approximations
Procedia PDF Downloads 32111745 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 14811744 Stress and Personality as Predictors of Aggressive Behaviour among Nurses of Private Hospitals in Imo State, Nigeria
Authors: Ngozi N. Sydney-Agbor, Chioma N. Ihegboro
Abstract:
Stress and personality as factors influencing nurses’ aggressive behaviour were investigated. The participants comprised of one hundred and fifty nurses selected through convenience sampling technique from four (4) private hospitals in Imo State, Nigeria; namely: Eastern Summit Specialist Clinics and Maternity, St. David Hospital, New Cross Hospital, and Christian Teaching Hospital. The nurses were all females with ages between 20–35 and a mean age of 25.10 years and a standard deviation of 4.15. The participants were administered with Job Related Tension Scale, Type A Behaviour Scale and Buss- Perry Aggressive Behaviour Scale. Two hypotheses were postulated and tested. Cross- sectional survey and Regression Analysis were adopted as design and statistics respectively. Results showed that as stress increased, nurses aggression also increased. Personality also predicted nurses aggressive behaviour with Type As’ exhibiting higher aggression than Type Bs’.The study recommended that hospital management board should improve the welfare of the nurses and their morale should be boosted by involving them in policy-making concerning their welfare and care of their patients, this will help minimise situations capable of increasing aggressive behaviour. There should also be sensitization on the negative impact of aggressive behaviour to patients especially amongst the personality Type A’s who are more susceptible to aggression.Keywords: aggressive behaviour, nurses, personality, stress
Procedia PDF Downloads 34111743 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong
Authors: Jojo Y. C. Mo
Abstract:
Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.Keywords: privacy, right to be forgotten, data protection, Hong Kong
Procedia PDF Downloads 18911742 Public-Private Partnership for Better Protection of Trafficked Victims in Thailand: Case Study on Public Protection and Welfare Center in Cooperation with Jim Thompson Foundation in Occupational Development on Silk Sewing and Tailoring
Authors: Aungkana Kmonpetch
Abstract:
Protection of trafficked victims and partnership among stakeholders are established as core principles in 5P’ strategies in international and national anti-human trafficking policies. In this article, it is of interest to discuss how the role of public-private partnerships in promoting the occupation development for employment in wage will enhance the better protection for victims of trafficking who affirmatively decide they want a criminal justice intervention, using Thailand as a case. Most of the victims who have accepted to be witness in the criminal justice system have lost income during their absence from work. The analysis of Thailand case is based on two methodological approaches: 1) interview with victims of trafficking, protection authorities, service providers, trainers and teachers, social workers, NGOs, police, prosecutors, business owners and enterprises, ILO, UNDP etc.; 2) create collaborative effort through workshops/consultation meetings in participation of all stakeholders – governmental agencies, private organizations, UN and international agencies. The linking of protection and partnership is anchored in international conventions and human trafficking directives. While this is actually framed as a responsive advantage for 5P strategies of anti-human trafficking – prevention, protection, persecution, punishment, and partnership, in reality, there might have more practical requirements of care and support. The article addresses how the partnership between governmental agencies and private organizations provide opportunities for trafficked victims to engage in high-skilled occupational development such as Silk-Sewing and Tailoring. The discussion is also focused how this approach of capacity building of the trainer for trainee, be enable the trafficked victims to cultivate the practices of high-skilled training to engage them into the business of social enterprise with employment in wage. The partnership coordination draws specifically to two aspects: firstly, to formulate appropriate assistance for promotion and protection of human rights of the trafficked victims in response to the 5P’ strategies of anti-human trafficking policy; secondly, to empower them to settle some economic stability for livelihood opportunity in the country of origin on their return and reintegration. Therefore, they can define how they want to move forward to prevent them at risk of vulnerable situations where they might being trafficked again or going on to work in exploitative conditions. It strengthens proper access to protection and assistance, depending on how the incentive of protection for cooperation is perceived to be and how useful the capacity building in occupation development for employment in wage will be implemented practically both in the host country and in the country of origin. This also brings into question how the victim of trafficking are able to access to the trade of market and are supported the employment opportunity according to the concept of decent work as they are constituted as witnesses. We discuss these issues in the area of a broader literature on social protection, economic security, gender, law, and victimhood.Keywords: employment opportunity, occupation development, protection for victim of trafficking, public-private partnership
Procedia PDF Downloads 22811741 Smart Grid Simulator
Authors: Ursachi Andrei
Abstract:
The Smart Grid Simulator is a computer software based on advanced algorithms which has as the main purpose to lower the energy bill in the most optimized price efficient way as possible for private households, companies or energy providers. It combines the energy provided by a number of solar modules and wind turbines with the consumption of one household or a cluster of nearby households and information regarding weather conditions and energy prices in order to predict the amount of energy that can be produced by renewable energy sources and the amount of energy that will be bought from the distributor for the following day. The user of the system will not only be able to minimize his expenditures on energy fractures, but also he will be informed about his hourly consumption, electricity prices fluctuation and money spent for energy bought as well as how much money he saved each day and since he installed the system. The paper outlines the algorithm that supports the Smart Grid Simulator idea and presents preliminary test results that support the discussion and implementation of the system.Keywords: smart grid, sustainable energy, applied science, renewable energy sources
Procedia PDF Downloads 34711740 Causes and Implications of Obesity in Urban School Going Children
Authors: Mohammad Amjad, Muhammad Iqbal Zafar, Ashfaq Ahmed Maan, Muhammad Tayyab Kashif
Abstract:
Obesity is an abnormal physical condition where an increased and undesirable fat accumulates in the human body. Obesity is an international phenomenon. In the present study, 12 schools were randomly selected from each district considering the areas i.e. Elite Private Schools in the private sector, Government schools in urban areas and Government schools in rural areas. Interviews were conducted with male students studying in grade 5 to grade 9 in each school. The sample size was 600 students; 300 from Faisalabad district and 300 from Rawalpindi district in Pakistan. A well-structured and pre-tested questionnaire was used for data collection. The calibrated scales were used to attain the heights and weights of the respondents. Obesity of school-going children depends on family types, family size, family history, junk food consumption, mother’s education, weekly time spent in walking, and sports facility at school levels. Academic performance, physical health and psychological health of school going children are affected with obesity. Concrete steps and policies could minimize the incidence of obesity in children in Pakistan.Keywords: body mass index, cardiovascular disease, fast food, morbidity, overweight
Procedia PDF Downloads 18311739 The Impact of the Information Technologies on the Accounting Department of the Romanian Companies
Authors: Dumitru Valentin Florentin
Abstract:
The need to use high volumes of data and the high competition are only two reasons which make necessary the use of information technologies. The objective of our research is to establish the impact of information technologies on the accounting department of the Romanian companies. In order to achieve it, starting from the literature review we made an empirical research based on a questionnaire. We investigated the types of technologies used, the reasons which led to the implementation of certain technologies, the benefits brought by the use of the information technologies, the difficulties brought by the implementation and the future effects of the applications. The conclusions show that there is an evolution in the degree of implementation of the information technologies in the Romanian companies, compared with the results of other studies conducted a few years before.Keywords: information technologies, impact, company, Romania, empirical study
Procedia PDF Downloads 42411738 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 8811737 Visual Analytics of Higher Order Information for Trajectory Datasets
Authors: Ye Wang, Ickjai Lee
Abstract:
Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data
Procedia PDF Downloads 40211736 A Preliminary Literature Review of Digital Transformation Case Studies
Authors: Vesna Bosilj Vukšić, Lucija Ivančić, Dalia Suša Vugec
Abstract:
While struggling to succeed in today’s complex market environment and provide better customer experience and services, enterprises encompass digital transformation as a means for reaching competitiveness and foster value creation. A digital transformation process consists of information technology implementation projects, as well as organizational factors such as top management support, digital transformation strategy, and organizational changes. However, to the best of our knowledge, there is little evidence about digital transformation endeavors in organizations and how they perceive it – is it only about digital technologies adoption or a true organizational shift is needed? In order to address this issue and as the first step in our research project, a literature review is conducted. The analysis included case study papers from Scopus and Web of Science databases. The following attributes are considered for classification and analysis of papers: time component; country of case origin; case industry and; digital transformation concept comprehension, i.e. focus. Research showed that organizations – public, as well as private ones, are aware of change necessity and employ digital transformation projects. Also, the changes concerning digital transformation affect both manufacturing and service-based industries. Furthermore, we discovered that organizations understand that besides technologies implementation, organizational changes must also be adopted. However, with only 29 relevant papers identified, research positioned digital transformation as an unexplored and emerging phenomenon in information systems research. The scarcity of evidence-based papers calls for further examination of this topic on cases from practice.Keywords: digital strategy, digital technologies, digital transformation, literature review
Procedia PDF Downloads 217