Search results for: language in international business
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9895

Search results for: language in international business

5065 Nuclear Materials and Nuclear Security in India: A Brief Overview

Authors: Debalina Ghoshal

Abstract:

Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this.

Keywords: India, nuclear security, nuclear materials, non proliferation

Procedia PDF Downloads 352
5064 Integrating Data Mining within a Strategic Knowledge Management Framework: A Platform for Sustainable Competitive Advantage within the Australian Minerals and Metals Mining Sector

Authors: Sanaz Moayer, Fang Huang, Scott Gardner

Abstract:

In the highly leveraged business world of today, an organisation’s success depends on how it can manage and organize its traditional and intangible assets. In the knowledge-based economy, knowledge as a valuable asset gives enduring capability to firms competing in rapidly shifting global markets. It can be argued that ability to create unique knowledge assets by configuring ICT and human capabilities, will be a defining factor for international competitive advantage in the mid-21st century. The concept of KM is recognized in the strategy literature, and increasingly by senior decision-makers (particularly in large firms which can achieve scalable benefits), as an important vehicle for stimulating innovation and organisational performance in the knowledge economy. This thinking has been evident in professional services and other knowledge intensive industries for over a decade. It highlights the importance of social capital and the value of the intellectual capital embedded in social and professional networks, complementing the traditional focus on creation of intellectual property assets. Despite the growing interest in KM within professional services there has been limited discussion in relation to multinational resource based industries such as mining and petroleum where the focus has been principally on global portfolio optimization with economies of scale, process efficiencies and cost reduction. The Australian minerals and metals mining industry, although traditionally viewed as capital intensive, employs a significant number of knowledge workers notably- engineers, geologists, highly skilled technicians, legal, finance, accounting, ICT and contracts specialists working in projects or functions, representing potential knowledge silos within the organisation. This silo effect arguably inhibits knowledge sharing and retention by disaggregating corporate memory, with increased operational and project continuity risk. It also may limit the potential for process, product, and service innovation. In this paper the strategic application of knowledge management incorporating contemporary ICT platforms and data mining practices is explored as an important enabler for knowledge discovery, reduction of risk, and retention of corporate knowledge in resource based industries. With reference to the relevant strategy, management, and information systems literature, this paper highlights possible connections (currently undergoing empirical testing), between an Strategic Knowledge Management (SKM) framework incorporating supportive Data Mining (DM) practices and competitive advantage for multinational firms operating within the Australian resource sector. We also propose based on a review of the relevant literature that more effective management of soft and hard systems knowledge is crucial for major Australian firms in all sectors seeking to improve organisational performance through the human and technological capability captured in organisational networks.

Keywords: competitive advantage, data mining, mining organisation, strategic knowledge management

Procedia PDF Downloads 415
5063 The Management of Company Directors Conflicts of Interest in Large Corporations and the Issue of Public Interest

Authors: Opemiposi Adegbulu

Abstract:

The research investigates the existence of a public interest consideration or rationale for the management of directors’ conflicts of interest within large public corporations. This is conducted through extensive literature review and theories on the definition of conflicts of interest, the firm and purposes of the fiduciary duty of loyalty under which the management of these conflicts of interest find their foundation. Conflicts of interest is an elusive, diverse and engaging subject, a cross-cutting problem of governance which involves all levels of governance, ranging from local to global, public to corporate or financial sectors. It is a common issue that affects corporate governance and corporate culture, having a negative impact on the reputation of corporations and their trustworthiness. It is clear that addressing this issue is imperative for good governance of corporations as they are increasingly becoming and are powerful global economies with significant power and influence in the society. Similarly, the bargaining power of these powerful corporations has been recognised by international organisations such as the UN and the OECD. This is made evident by the increasing calls and push for greater responsibility of these corporations for environmental and social disasters caused by their corporate activities and their impact in various parts of the world. Equally, in the US, the Sarbanes-Oxley Act like other legislation and regulatory efforts made to manage conflicts of interest linked to corporate governance, in many countries indicates that there is a (global) public interest in the maintenance of the orderly functioning of commerce. Consequently, the governance of these corporations is tremendously pivotal to the society as it touches upon a key aspect of the good functioning of society. This is because corporations, particularly large international corporations can be said to be the plumbing of the global economy. This study will employ theoretical, doctrinal and comparative methods. The research will make use largely of theory-guided methodology and theoretical framework – theories of the firm, public interest, regulation, conflicts of interest in general, directors’ conflicts of interest and corporate governance. Although, the research is intended to be narrowed down to the topic of conflicts of interest in corporate governance, the subject of company directors’ duty of loyalty and the management of conflicts of interest, an examination of the history, origin and typology of conflicts of interest in general will be carried out in order to identify some specific challenges to understanding and identifying these conflicts of interest; origin, diverging theories, psychological barrier to definition, similarities with public sector conflicts of interest due to the notions of corrosion of trust, the effect on decision-making and judgment, “being in a particular kind of situation”, etc. The result of this research will be useful and relevant in the identification of the rationale for the management of directors’ conflicts of interest, contributing to the understanding of conflicts of interest in the private sector and the significance of public interest in corporate governance of large corporations.

Keywords: conflicts of interest, corporate governance, corporate law, directors duty of loyalty, public interest

Procedia PDF Downloads 368
5062 Wheel Diameter and Width Influence in Variability of Brake Data Measurement at Ministry of Transport Facilities

Authors: Carolina Senabre, Sergio Valero, Emilio Velasco

Abstract:

The brake systems of vehicles are tested periodically by a “brake tester” at Ministry of Transport (MOT) stations. This tester measures the effectiveness of vehicle. This parameter is established by the International Committee of Vehicle Inspection (CITA). In this paper, we present an investigation of the influence of the tire size on the measurements of brake force on three MOT brake testers. We performed an analysis of the vehicle braking capacity test at MOT stations. The influence of varying wheel diameter and width on the measurement of braking at MOT stations has been analyzed. Thereby, the MOT brake tester as a verification system for a vehicle has been evaluated.

Keywords: brake tester, ministry of transport facilities, wheel diameter, efficiency

Procedia PDF Downloads 375
5061 Strengthening Strategy across Languages: A Cognitive and Grammatical Universal Phenomenon

Authors: Behnam Jay

Abstract:

In this study, the phenomenon called “Strengthening” in human language refers to the strategic use of multiple linguistic elements to intensify specific grammatical or semantic functions. This study explores cross-linguistic evidence demonstrating how strengthening appears in various grammatical structures. In French and Spanish, double negatives are used not to cancel each other out but to intensify the negation, challenging the conventional understanding that double negatives result in an affirmation. For example, in French, il ne sait pas (He dosn't know.) uses both “ne” and “pas” to strengthen the negation. Similarly, in Spanish, No vio a nadie. (He didn't see anyone.) uses “no” and “nadie” to achieve a stronger negative meaning. In Japanese, double honorifics, often perceived as erroneous, are reinterpreted as intentional efforts to amplify politeness, as seen in forms like ossharareru (to say, (honorific)). Typically, an honorific morpheme appears only once in a predicate, but native speakers often use double forms to reinforce politeness. In Turkish, the word eğer (indicating a condition) is sometimes used together with the conditional suffix -se(sa) within the same sentence to strengthen the conditional meaning, as in Eğer yağmur yağarsa, o gelmez. (If it rains, he won't come). Furthermore, the combination of question words with rising intonation in various languages serves to enhance interrogative force. These instances suggest that strengthening is a cross-linguistic strategy that may reflect a broader cognitive mechanism in language processing. This paper investigates these cases in detail, providing insights into why languages may adopt such strategies. No corpus was used for collecting examples from different languages. Instead, the examples were gathered from languages the author encountered during their research, focusing on specific grammatical and morphological phenomena relevant to the concept of strengthening. Due to the complexity of employing a comparative method across multiple languages, this approach was chosen to illustrate common patterns of strengthening based on available data. It is acknowledged that different languages may have different strengthening strategies in various linguistic domains. While the primary focus is on grammar and morphology, it is recognized that the strengthening phenomenon may also appear in phonology. Future research should aim to include a broader range of languages and utilize more comprehensive comparative methods where feasible to enhance methodological rigor and explore this phenomenon more thoroughly.

Keywords: strengthening, cross-linguistic analysis, syntax, semantics, cognitive mechanism

Procedia PDF Downloads 24
5060 Concepts of Creation and Destruction as Cognitive Instruments in World View Study

Authors: Perizat Balkhimbekova

Abstract:

Evolutionary changes in cognitive world view taking place in the last decades are followed by changes in perception of the key concepts which are related to the certain lingua-cultural sphere. Also, such concepts reflect the person’s attitude to essential processes in the sphere of concepts, e.g. the opposite operations like creation and destruction. These changes in people’s life and thinking are displayed in a language world view. In order to open the maintenance of mental structures and concepts we should use language means as observable results of people’s cognitive activity. Semantics of words, free phrases and idioms should be considered as an authoritative source of information concerning concepts. The regularized set of concepts in people consciousness forms the sphere of concepts. Cognitive linguistics widely discusses the sphere of concepts as its crucial category defining it as the field of knowledge which is made of concepts. It is considered that a sphere of concepts comprises the various types of association and forms conceptual fields. As a material for the given research, the data from Russian National Corpus and British National Corpus were used. In is necessary to point out that data provided by computational studies, are intrinsic and verifiable; so that we have used them in order to get the reliable results. The procedure of study was based on such techniques as extracting of the context containing concepts of creation|destruction from the Russian National Corpus (RNC), and British National Corpus (BNC); analyzing and interpreting of those context on the basis of cognitive approach; finding of correspondence between the given concepts in the Russian and English world view. The key problem of our study is to find the correspondence between the elements of world view represented by opposite concepts such as creation and destruction. Findings: The concept of "destruction" indicates a process which leads to full or partial destruction of an object. In other words, it is a loss of the object primary essence: structures, properties, distinctive signs and its initial integrity. The concept of "creation", on the contrary, comprises positive characteristics, represents the activity aimed at improvement of the certain object, at the creation of ideal models of the world. On the other hand, destruction is represented much more widely in RNC than creation (1254 cases of the first concept by comparison to 192 cases for the second one). Our hypothesis consists in the antinomy represented by the aforementioned concepts. Being opposite both in respect of semantics and pragmatics, and from the point of view of axiology, they are at the same time complementary and interrelated concepts.

Keywords: creation, destruction, concept, world view

Procedia PDF Downloads 346
5059 Effect of Base Coarse Layer on Load-Settlement Characteristics of Sandy Subgrade Using Plate Load Test

Authors: A. Nazeri, R. Ziaie Moayed, H. Ghiasinejad

Abstract:

The present research has been performed to investigate the effect of base course application on load-settlement characteristics of sandy subgrade using plate load test. The main parameter investigated in this study was the subgrade reaction coefficient. The model tests were conducted in a 1.35 m long, 1 m wide, and 1 m deep steel test box of Imam Khomeini International University (IKIU Calibration Chamber). The base courses used in this research were in three different thicknesses of 15 cm, 20 cm, and 30 cm. The test results indicated that in the case of using base course over loose sandy subgrade, the values of subgrade reaction coefficient can be increased from 7  to 132 , 224 , and 396  in presence of 15 cm, 20 cm, and 30 cm base course, respectively.

Keywords: modulus of subgrade reaction, plate load test, base course, sandy subgrade

Procedia PDF Downloads 247
5058 Sacred Spaces, Scarred Bodies: Understanding Forms of and Meanings Associated with Female Circumcision amongst Somali Women in Johannesburg

Authors: Z. Jinnah

Abstract:

International migration is associated with a disruption of social environments and social control. At the same time, the reproduction of cultural and social norms in the Diaspora provides a space for the (re)negotiation of gender roles, rights, and practices. This paper explores the relationship between mobility and the practice of female circumcision amongst Somalis in Johannesburg. Based on 4 years of ethnographic fieldwork, this paper explores the social determinants of cultural norms and practices, the linkages between class and tradition, and argues that the new social environment in South Africa conditions the ways in which Somali women relate to their bodies, and therefore understand the meanings associated with and practices of female circumcision.

Keywords: migration, gender, Somali women, female circumcision, Johannesburg

Procedia PDF Downloads 370
5057 Governance Disclosure Quality and Cooperative Performance in Malaysia

Authors: Intan Waheedah Othman, Maslinawati Mohamad, Azizah Abdullah

Abstract:

Few discussions were made on cooperative governance reforms despite the fact that cooperative movements operate and compete in an identical business environment as the private as well as the public corporations. Due to the scarcity of research examining the issue of governance among cooperatives, this paper is motivated to examine the extent of governance compliance and disclosure among cooperatives, hence the relationship between cooperative governance and its firm performance. Results from the study provide empirical evidence that disclosure on ownership structure and exercise of control rights was found to have significant negative relationship with cooperative firm performance.

Keywords: cooperative, governance, firm performance, Malaysia

Procedia PDF Downloads 541
5056 Impact of Cultural Intelligence on Decision Making Styles of Managers: A Turkish Case

Authors: Fusun Akdag

Abstract:

Today, as business becomes increasingly global, managers/leaders of multinational companies or local companies work with employees or customers from a variety of cultural backgrounds. To do this effectively, they need to develop cultural competence. Therefore, cultural intelligence (CQ) becomes a vitally important aptitude and skill, especially for leaders. The organizational success or failure depends upon the way, the kind of leadership which has been provided to its members. The culture we are born into deeply effects our values, beliefs, and behavior. Cultural intelligence (CQ) focuses on how well individuals can relate and work across cultures. CQ helps minimize conflict and maximize performance of a diverse workforce. The term 'decision,' refers to a commitment to a course of action that is intended to serve the interests and values of particular people. One dimension of culture that has received attention is individualism-collectivism or, independence-interdependence. These dimensions are associated with different conceptualizations of the 'self.' Individualistic cultures tend to value personal goal pursuit as opposed to pursuit of others’ goals. Collectivistic cultures, by contrast, view the 'self' as part of a whole. Each person is expected to work with his or her in-group toward goals, generally pursue group harmony. These differences underlie cross-cultural variation in decision-making, such as the decision modes people use, their preferences, negotiation styles, creativity, and more. The aim of this study is determining the effect of CQ on decision making styles of male and female managers in Turkey, an emergent economy framework. The survey is distributed to gather data from managers at various companies. The questionnaire consists of three parts: demographics, The Cultural Intelligence Scale (CQS) to measure the four dimensions of cultural intelligence and General Decision Making Style (GMDS) Inventory to measure the five subscales of decision making. The results will indicate the Turkish managers’ score at metacognitive, cognitive, motivational and behavioral aspects of cultural intelligence and to what extent these scores affect their rational, avoidant, dependent, intuitive and spontaneous decision making styles since business leaders make dozens of decisions every day that influence the success of the company and also having an impact on employees, customers, shareholders and the market.

Keywords: cultural intelligence, decision making, gender differences, management styles,

Procedia PDF Downloads 370
5055 Impact of Primary Care on Sexual and Reproductive Health for Migrant Women in Medellín Colombia

Authors: Alexis Piedrahita, Ludi Valencia, Aura Gutierrez

Abstract:

The migration crisis that is currently being experienced in the world is a continuous phenomenon that has had solutions in form but not in substance, violating the international humanitarian law of people who are in transit through countries foreign to their roots, especially women of age reproductive, this has caused different governments and organizations worldwide to meet around this problem to define concise actions to protect the rights of migrant women in the world. This research compiles the stories of migrant women who arrive in Colombia seeking better opportunities, such as accessibility to comprehensive and quality health services, including primary health care. This is the gateway to the offer of health promotion and disease prevention services.

Keywords: accessibility, primary health care, sexual and reproductive health, sustainable development goals, women migrant

Procedia PDF Downloads 77
5054 Strategies for Incorporating Intercultural Intelligence into Higher Education

Authors: Hyoshin Kim

Abstract:

Most post-secondary educational institutions have offered a wide variety of professional development programs and resources in order to advance the quality of education. Such programs are designed to support faculty members by focusing on topics such as course design, behavioral learning objectives, class discussion, and evaluation methods. These are based on good intentions and might help both new and experienced educators. However, the fundamental flaw is that these ‘effective methods’ are assumed to work regardless of what we teach and whom we teach. This paper is focused on intercultural intelligence and its application to education. It presents a comprehensive literature review on context and cultural diversity in terms of beliefs, values and worldviews. What has worked well with a group of homogeneous local students may not work well with more diverse and international students. It is because students hold different notions of what is means to learn or know something. It is necessary for educators to move away from certain sets of generic teaching skills, which are based on a limited, particular view of teaching and learning. The main objective of the research is to expand our teaching strategies by incorporating what students bring to the course. There have been a growing number of resources and texts on teaching international students. Unfortunately, they tend to be based on the deficiency model, which treats diversity not as strengths, but as problems to be solved. This view is evidenced by the heavy emphasis on assimilationist approaches. For example, cultural difference is negatively evaluated, either implicitly or explicitly. Therefore the pressure is on culturally diverse students. The following questions reflect the underlying assumption of deficiencies: - How can we make them learn better? - How can we bring them into the mainstream academic culture?; and - How can they adapt to Western educational systems? Even though these questions may be well-intended, there seems to be something fundamentally wrong as the assumption of cultural superiority is embedded in this kind of thinking. This paper examines how educators can incorporate intercultural intelligence into the course design by utilizing a variety of tools such as pre-course activities, peer learning and reflective learning journals. The main goal is to explore ways to engage diverse learners in all aspects of learning. This can be achieved by activities designed to understand their prior knowledge, life experiences, and relevant cultural identities. It is crucial to link course material to students’ diverse interests thereby enhancing the relevance of course content and making learning more inclusive. Internationalization of higher education can be successful only when cultural differences are respected and celebrated as essential and positive aspects of teaching and learning.

Keywords: intercultural competence, intercultural intelligence, teaching and learning, post-secondary education

Procedia PDF Downloads 211
5053 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 262
5052 Preservation and Promotion of Lao Traditional Food as Luangprabang Province Unique Culture and Tradition in Accordance With One District One Product Policy

Authors: Lamphong Volady

Abstract:

The primary purpose of this study was to explore the traditional cuisine (local food) of Luangprabang Province in line with the Lao PDR’s One District One Product Policy. Another purpose of the study was to examine channels used to present local food, reasons to preserve and promote local food, as well as local food preservation and promotion strategies. It also aimed at testing correlation hypotheses whether there is a statistically significant relationship between enjoyment of having local food and willingness to promote local cuisines becoming international cuisines, attractiveness to consume local food, preservation and promotion of local food problems, and local people’s occupations. The Convergent Parallel Mixed Methods were employed in this study. The results of the study showed that several local cuisines were found to be local food of Luangprabang Province, namely Jeow Bon (Chilli dipping suace), Or Lam or aw lahm (stew buffalo skin, herbs, Mai sakaan), Kai Pan (River Weed Dry), Tam Mak Houng Luangprabang (Papaya Salad), Nang (Yam Buffalo Skin Dry), Sai Oor (Sausage), Laap Sin Koay Sai Mar-Keua Pao (Beef Salad with Roasted Eggplants), Orm Born (Taro leaves Stew), Oor Nor Mai (Bamboo Shoot Sausage), Jeow Nam Poo (Pickled Crab Chillies), Mok Dok Kae (steaming or roasting a Dok Kae Wrapp), Nor Sa Wan, Kao Noom Kee Noo, Kao Noom Ba Bin. It also depicted that YouTube, Facebook, and TikTok were multiple social channels or platforms which were found to be used to introduce traditional food as well as television, smartphone, word of mouth, Lao food fairs and other provincial events. The study also found that local food should be preserved and promoted since traditional food is not only ancestral, ancient, traditional, and local cuisines, but it is also wisdom, unique, and national cuisine. The study also found that people feel attracted to consuming local food because local food is delicious, unique, clean, nutritious, non-contaminated and natural. The study showed that lack of funds to produce local food, inadequate draw materials, lack material to store products, insufficient place to produce and lack of related organizations engagement were found to be problems for preserving and promoting traditional food. Finally, the result of the study revealed that there is a statistically significant weak relationship between enjoyment of having local food and willingness to promote local cuisines becoming international cuisines (R²= 4.5%), (p-value <0.001). There is a statistically significant moderate relationship between enjoyment of having local food and attractiveness to consume local food (R²= 7.8%), (p-value <0.001). However, there is a statistically insignificant relationship between enjoyment of having local food and preservation and promotion of local food problems (R²= 1.8%), (p-value = 0.086). It was found that there is a statistically insignificant relationship between enjoyment of having local food and local people’s occupations (R²= 0.0%), (p-value = 0.929).

Keywords: local food, preservation, promotion, traditional food, cuisines

Procedia PDF Downloads 78
5051 Cybersecurity Awareness Among Applied Sciences Student Population

Authors: Sanja Bracun, Nikolina Kasunic

Abstract:

After graduation, the student population of applied sciences will become the population of employees on IT experts’ positions or "just" business users of certain IT technologies for which the level of awareness of existing cybersecurity risks is extremely important. This research results define the current cybersecurity awareness level of students at Zagreb University of Applied Sciences (TVZ), what can be useful not only for teaching staff to form a curriculum related to cybersecurity more accurately but also to employers to know what to expect from their future employees regarding cybersecurity awareness level.

Keywords: student population cybersecurity awareness, cybersecurity awareness, cybersecurity, applied sciences students

Procedia PDF Downloads 253
5050 Inverse Polynomial Numerical Scheme for the Solution of Initial Value Problems in Ordinary Differential Equations

Authors: Ogunrinde Roseline Bosede

Abstract:

This paper presents the development, analysis and implementation of an inverse polynomial numerical method which is well suitable for solving initial value problems in first order ordinary differential equations with applications to sample problems. We also present some basic concepts and fundamental theories which are vital to the analysis of the scheme. We analyzed the consistency, convergence, and stability properties of the scheme. Numerical experiments were carried out and the results compared with the theoretical or exact solution and the algorithm was later coded using MATLAB programming language.

Keywords: differential equations, numerical, polynomial, initial value problem, differential equation

Procedia PDF Downloads 447
5049 Epidemiology of Bone Hydatidosis in Eastern Libya from 1995 to 2013

Authors: Sadek A. Makhlouf, Hassan M. Nouh

Abstract:

Bone hydatidosis is an infection in worldwide distribution. Although there is no evidence in literature on Bone Hydatid disease in Libya, we tried to present the first epidemiological study of this disease in Eastern Libya through retrospective study from 1995 to 2013. Our data were collected from 3 hospitals in Eastern Libya particularly the sheep-raising areas with total number of musculoskeletal infection cases of two thousand one hundred ninety-four (2,194). There were five (5) five cases of bone infection, four (4) of it have been diagnosed after more than three (3) months. Our study is comparable to other international study but this type of bone infection need further studies for effective control strategies for all dogs to avoid serious complications that might happened from the delay in diagnosing this type of disease.

Keywords: bone infection, hydatidosis, Eastern Libya, sheep-raising areas

Procedia PDF Downloads 414
5048 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 364
5047 Using Dynamic Bayesian Networks to Characterize and Predict Job Placement

Authors: Xupin Zhang, Maria Caterina Bramati, Enrest Fokoue

Abstract:

Understanding the career placement of graduates from the university is crucial for both the qualities of education and ultimate satisfaction of students. In this research, we adapt the capabilities of dynamic Bayesian networks to characterize and predict students’ job placement using data from various universities. We also provide elements of the estimation of the indicator (score) of the strength of the network. The research focuses on overall findings as well as specific student groups including international and STEM students and their insight on the career path and what changes need to be made. The derived Bayesian network has the potential to be used as a tool for simulating the career path for students and ultimately helps universities in both academic advising and career counseling.

Keywords: dynamic bayesian networks, indicator estimation, job placement, social networks

Procedia PDF Downloads 379
5046 Convention Refugees in New Zealand: Being Trapped in Immigration Limbo without the Right to Obtain a Visa

Authors: Saska Alexandria Hayes

Abstract:

Multiple Convention Refugees in New Zealand are stuck in a state of immigration limbo due to a lack of defined immigration policies. The Refugee Convention of 1951 does not give the right to be issued a permanent right to live and work in the country of asylum. A gap in New Zealand's immigration law and policy has left Convention Refugees without the right to obtain a resident or temporary entry visa. The significant lack of literature on this topic suggests that the lack of visa options for Convention Refugees in New Zealand is a widely unknown or unacknowledged issue. Refugees in New Zealand enjoy the right of non-refoulement contained in Article 33 of the Refugee Convention 1951, whether lawful or unlawful. However, a number of rights contained in the Refugee Convention 1951, such as the right to gainful employment and social security, are limited to refugees who maintain lawful immigration status. If a Convention Refugee is denied a resident visa, the only temporary entry visa a Convention Refugee can apply for in New Zealand is discretionary. The appeal cases heard at the Immigration Protection Tribunal establish that Immigration New Zealand has declined resident and discretionary temporary entry visa applications by Convention Refugees for failing to meet the health or character immigration instructions. The inability of a Convention Refugee to gain residency in New Zealand creates a dependence on the issue of discretionary temporary entry visas to maintain lawful status. The appeal cases record that this reliance has led to Convention Refugees' lawful immigration status being in question, temporarily depriving them of the rights contained in the Refugee Convention 1951 of lawful refugees. In one case, the process of applying for a discretionary temporary entry visa led to a lawful Convention Refugee being temporarily deprived of the right to social security, breaching Article 24 of the Refugee Convention 1951. The judiciary has stated a constant reliance on the issue of discretionary temporary entry visas for Convention Refugees can lead to a breach of New Zealand's international obligations under Article 7 of the International Covenant on Civil and Political Rights. The appeal cases suggest that, despite successful judicial proceedings, at least three persons have been made to rely on the issue of discretionary temporary entry visas potentially indefinitely. The appeal cases establish that a Convention Refugee can be denied a discretionary temporary entry visa and become unlawful. Unlawful status could ultimately breach New Zealand's obligations under Article 33 of the Refugee Convention 1951 as it would procedurally deny Convention Refugees asylum. It would force them to choose between the right of non-refoulement or leaving New Zealand to seek the ability to access all the human rights contained in the Universal Declaration of Human Rights elsewhere. This paper discusses how the current system has given rise to these breaches and emphasizes a need to create a designated temporary entry visa category for Convention Refugees.

Keywords: domestic policy, immigration, migration, New Zealand

Procedia PDF Downloads 102
5045 Filling the Gap of Extraction of Digital Evidence from Emerging Platforms Without Forensics Tools

Authors: Yi Anson Lam, Siu Ming Yiu, Kam Pui Chow

Abstract:

Digital evidence has been tendering to courts at an exponential rate in recent years. As an industrial practice, most digital evidence is extracted and preserved using specialized and well-accepted forensics tools. On the other hand, the advancement in technologies enables the creation of quite a few emerging platforms such as Telegram, Signal etc. Existing (well-accepted) forensics tools were not designed to extract evidence from these emerging platforms. While new forensics tools require a significant amount of time and effort to be developed and verified, this paper tries to address how to fill this gap using quick-fix alternative methods for digital evidence collection (e.g., based on APIs provided by Apps) and discuss issues related to the admissibility of this evidence to courts with support from international courts’ stance and the circumstances of accepting digital evidence using these proposed alternatives.

Keywords: extraction, digital evidence, laws, investigation

Procedia PDF Downloads 68
5044 Modeling Atmospheric Correction for Global Navigation Satellite System Signal to Improve Urban Cadastre 3D Positional Accuracy Case of: TANA and ADIS IGS Stations

Authors: Asmamaw Yehun

Abstract:

The name “TANA” is one of International Geodetic Service (IGS) Global Positioning System (GPS) station which is found in Bahir Dar University in Institute of Land Administration. The station name taken from one of big Lakes in Africa ,Lake Tana. The Institute of Land Administration (ILA) is part of Bahir Dar University, located in the capital of the Amhara National Regional State, Bahir Dar. The institute is the first of its kind in East Africa. The station is installed by cooperation of ILA and Sweden International Development Agency (SIDA) fund support. The Continues Operating Reference Station (CORS) is a network of stations that provide global satellite system navigation data to help three dimensional positioning, meteorology, space, weather, and geophysical applications throughout the globe. TANA station was as CORS since 2013 and sites are independently owned and operated by governments, research and education facilities and others. The data collected by the reference station is downloadable through Internet for post processing purpose by interested parties who carry out GNSS measurements and want to achieve a higher accuracy. We made a first observation on TANA, monitor stations on May 29th 2013. We used Leica 1200 receivers and AX1202GG antennas and made observations from 11:30 until 15:20 for about 3h 50minutes. Processing of data was done in an automatic post processing service CSRS-PPP by Natural Resources Canada (NRCan) . Post processing was done June 27th 2013 so precise ephemeris was used 30 days after observation. We found Latitude (ITRF08): 11 34 08.6573 (dms) / 0.008 (m), Longitude (ITRF08): 37 19 44.7811 (dms) / 0.018 (m) and Ellipsoidal Height (ITRF08): 1850.958 (m) / 0.037 (m). We were compared this result with GAMIT/GLOBK processed data and it was very closed and accurate. TANA station is one of the second IGS station for Ethiopia since 2015 up to now. It provides data for any civilian users, researchers, governmental and nongovernmental users. TANA station is installed with very advanced choke ring antenna and GR25 Leica receiver and also the site is very good for satellite accessibility. In order to test hydrostatic and wet zenith delay for positional data quality, we used GAMIT/GLOBK and we found that TANA station is the most accurate IGS station in East Africa. Due to lower tropospheric zenith and ionospheric delay, TANA and ADIS IGS stations has 2 and 1.9 meters 3D positional accuracy respectively.

Keywords: atmosphere, GNSS, neutral atmosphere, precipitable water vapour

Procedia PDF Downloads 70
5043 A Review on Trends in Measurement of Port Performance

Authors: J. Racedo, J. Torres

Abstract:

Globalization has led to a worldwide competition for participation in markets of goods and productive factors, with significant effects on transports requirements. The port industry has not been an exception to this event, in fact, it has received increasing attention in recent years due to its crucial role on international trade. Because of this, the measurement of port performance has become an important issue in transport policy. Port performance and port efficiency has been widely studied in the last decades, resulting in noteworthy contributions to improving the industry competitiveness. In this paper, we aim to present a review of the literature on port performance and the relation between this concept and transport policies. This study has the objective to describe the approaches that have been developed in recent years, and especially those that include the modeling of public policies. Finally, we highlight existing gaps in this field, as well as possible directions for future research.

Keywords: port performance, port efficiency, transport, policy

Procedia PDF Downloads 329
5042 Cloud Design for Storing Large Amount of Data

Authors: M. Strémy, P. Závacký, P. Cuninka, M. Juhás

Abstract:

Main goal of this paper is to introduce our design of private cloud for storing large amount of data, especially pictures, and to provide good technological backend for data analysis based on parallel processing and business intelligence. We have tested hypervisors, cloud management tools, storage for storing all data and Hadoop to provide data analysis on unstructured data. Providing high availability, virtual network management, logical separation of projects and also rapid deployment of physical servers to our environment was also needed.

Keywords: cloud, glusterfs, hadoop, juju, kvm, maas, openstack, virtualization

Procedia PDF Downloads 353
5041 Trafficking of Women in Assam: The Untold Violation of Women's Human Rights

Authors: Mridula Devi

Abstract:

Trafficking of women is a slur on human dignity and a shameful act to human civilization and development. Trafficking of women is one of worst brazen abuses which violate the women’s human rights. In India, more particularly in Assam, human trafficking and infringement of human rights of individual includes mainly the women and girl child of the State. Trafficking in North East region of India, more particularly in Assam occurs in two different ways – one is the internal trafficking of women and girl child from conflict affected rural areas of Assam for domestic work and prostitution. Secondly, there is trafficking of women to other south-East Asiatic countries like Bangladesh, Bhutan, Bangkok, Myanmar (Burma) for various purposes such as drug trafficking, labor, bar girl and prostitution.Historically, trafficking in human beings is associated with slavery and bonded or forced labor. Since the period of Roman Civilization, there was the practice of traffic in persons in the form of slave trade among the nations. With the rise of new imperialism, slavery had become an integral part of the colonial system of European Countries. With time, it almost became synonymous with prostitution or commercial sexual exploitation. Finally, the United Nation adopted the Convention for the Suppression of the Traffic in Persons and of the Prostitution of others, 1949 by the G.A.Res.No.-317(iv). The Convention totally denounces the traffic in persons for the purpose of prostitution. However, it is important to note that, now a days trafficking is not confined to commercial sexual exploitation of women and children alone. It has myriad forms and the number of victims has been steadily on the rise over the past few decades. In Assam, it takes place through and for marriage, sexual exploitation, begging, organ trading, militancy conflicts, drug padding and smuggling, labour, adoption, entertainment, and sports. In this paper, empirical methodology has been used. The study is based on primary and secondary sources. Data’s are collected from different books, publications, newspaper, journals etc. For empirical analysis, some random samples are collected and systematized for better result. India suffers from the ignominy of being one of the biggest hubs of women trafficking in the world. Over the years, Assam: the north east part of India has been bearing the brunt of the rapidly rising evil of trafficking of women which threaten the life, dignity and human rights of women. Though different laws are adopted at international and national level to restore trafficking, still the menace of trafficking of women in Assam is not decreased, rather it increased. This causes a serious violation of women’s human right in Assam. Human trafficking or women’s trafficking is a serious crime against society. To curb this in Assam it is required to take some effective and dedicated measure at state level as well as national and international level.

Keywords: Assam, human trafficking, sexual exploitation, India

Procedia PDF Downloads 516
5040 An Integrative Review on the Experiences of Integration of Quality Assurance Systems in Universities

Authors: Laura Mion

Abstract:

Concepts of quality assurance and management are now part of the organizational culture of the Universities. Quality Assurance (QA) systems are, in large part, provided for by national regulatory dictates or supranational indications (such as, for example, at European level are, the ESG Guidelines "European Standard Guidelines"), but their specific definition, in terms of guiding principles, requirements and methodologies, are often delegated to the national evaluation agencies or to the autonomy of individual universities. For this reason, the experiences of implementation of QA systems in different countries and in different universities is an interesting source of information to understand how quality in universities is understood, pursued and verified. The literature often deals with the treatment of the experiences of implementation of QA systems in the individual areas in which the University's activity is carried out - teaching, research, third mission - but only rarely considers quality systems with a systemic and integrated approach, which allows to correlate subjects, actions, and performance in a virtuous circuit of continuous improvement. In particular, it is interesting to understand how to relate the results and uses of the QA in the triple distinction of university activities, identifying how one can cause the performance of the other as a function of an integrated whole and not as an exploit of specific activities or processes conceived in an abstractly atomistic way. The aim of the research is, therefore, to investigate which experiences of "integrated" QA systems are present on the international scene: starting from the experience of European countries that have long shared the Bologna Process for the creation of a European space for Higher Education (EHEA), but also considering experiences from emerging countries that use QA processes to develop their higher education systems to keep them up to date with international levels. The concept of "integration", in this research, is understood in a double meaning: i) between the different areas of activity, in particular between the didactic and research areas, and possibly with the so-called "third mission" "ii) the functional integration between those involved in quality assessment and management and the governance of the University. The paper will present the results of a systematic review conducted according with a method of an integrative review aimed at identifying best practices of quality assurance systems, in individual countries or individual universities, with a high level of integration. The analysis of the material thus obtained has made it possible to grasp common and transversal elements of QA system integration practices or particularly interesting elements and strengths of these experiences that can, therefore, be considered as winning aspects in a QA practice. The paper will present the method of analysis carried out, and the characteristics of the experiences identified, of which the structural elements will be highlighted (level of integration, areas considered, organizational levels included, etc.) and the elements for which these experiences can be considered as best practices.

Keywords: quality assurance, university, integration, country

Procedia PDF Downloads 87
5039 Factors Influencing the Usage of ERP in Enterprise Systems

Authors: Mohammad Reza Babaei, Sanaz Kamrani

Abstract:

The main problems That arise In adopting most Enterprise resources planning (ERP) strategies come from organizational, complex information systems like the ERP integrate the data of all business areas within the organization. The implementation of ERP is a difficult process as it involves different types of end users. Based on literature, we proposed a conceptual framework and examined it to find the effect of some of the individual, organizational, and technological factors on the usage of ERP and its impact on the end user. The results of the analysis suggest that computer self-efficacy, organizational support, training, and compatibility have a positive influence on ERP usage which in turn has significant influence on panoptic empowerment and individual performance.

Keywords: factor, influencing, enterprise, system

Procedia PDF Downloads 367
5038 Battle on Historical Water: An Analysis Roots of conflict between India and Sri Lanka and Victimization of Arrested Indian Fishermen

Authors: Xavier Louis, Madhava Soma Sundaram

Abstract:

The Palk Bay, a narrow strip of water, separates the state of Tamil Nadu in India from north Sri Lanka. The bay, which is 137 km in length and varies from 64 to 137 kilometers in width and is home to more than 580 fish species and chunks of shrimp’s resources, is divided by the International Maritime Boundary Line (IMBL). The bay, bordering it are five Tamil Nadu districts of India and three Sri Lankan districts and assumes importance as it is one of the areas presenting permanent and serious challenges to both India and Sri Lanka with respect to the fishing rights in the Bay. Fishermen from both sides were enjoying fishing with hormones for centuries. Katchchadeevu is a tiny Island located in the Bay, which was a part of India. After the Katchchadeevu agreement 1974 it became a part of Sri Lanka and a fishing conflict arose between the two countries' fishermen. Fuelling the dispute over Katchatheevu is the overfishing of Indian mechanized trawlers in Palk Bay and the damaging environmental and economic effects of trawling. Since 2008, more than 300 Indian fishermen have been killed by firing by Sri Lankan Navy, nearly 100 fishermen have gone missing and more than 3000 fishermen were arrested and later released after the trials for trespassing into Sri Lankan waters. Currently, more than 120 fishing boats and 29 fishermen are in Sri Lankan custody. This paper attempts to find out the causes of fishing conflict and who has the fishing rights in the mentioned waters, how the international treaties are complied with at the time of arrest and trials, how the arrested fishermen are treated by them and how they suffer from fishermen families without a breadwinner. A Semi-structured interview schedule tool was prepared by the researcher, which is suitable for measuring quantitative and qualitative aspects of the above-mentioned theme. One hundred arrested fishermen were interviewed and recorded their prison experiences in Sri Lanka. The research found that the majority of the fishermen believe that they have the right to fish in the historical water and that the Sri Lankan Naval personnel have brutally attacked the Indian fishermen at the time of the arrest. The majority of the fishermen accepted that they had limited fishing grounds. As a result, they entered Sri Lankan waters for their livelihood. The majority of the fishermen expected that they would also get their belongings back at the time of release, primarily the boats. Most of the arrested fishermen's families face financial crises in the absence of their breadwinners and this situation has created conditions for child labor among the affected families and some fishers migrate to different places for different occupations. The majority of the fishers have trauma about their victimization and face uncertainty in the future of their occupation. We can discuss more the causes and nature of the fishing conflict and the financial and psychological victimization of Indian fishermen in relation to the conflict.

Keywords: palk bay, historical water, fishing conflict, arrested fishermen, victimization

Procedia PDF Downloads 80
5037 Human Rights Abuse in the Garment Factory in Bekasi Indonesia

Authors: Manotar Tampubolon

Abstract:

Although the Indonesian human rights protection has increased in recent years, but human rights violations still occur in the industrial sector. Crimes against human rights continue to occur and go unnoticed in spite of the government's legislation on human rights, employment law in addition to an international treaty that has been ratified by Indonesia. The increasing number of garment companies in Bekasi, also give rise to increased human rights violations since the government does not have a commitment to protect it. The Indonesian government and industry owners should pay attention to and protect the human rights of workers and treat them accordingly. This paper will review the human rights violations experienced by workers at garment factories in the context of the law, as well as ideas to improve the protection of workers' rights.

Keywords: human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 461
5036 Support of Knowledge Sharing in Manufacturing Companies: A Case Study

Authors: Zuzana Crhová, Karel Kolman, Drahomíra Pavelková

Abstract:

Knowledge is considered as an important asset which can help organizations to create competitive advantage. The necessity of taking care of these assets is more important in these days – in days of turbulent changes in business environment. Knowledge could facilitate adaption to constant changes. The aim of this paper is to describe how the knowledge sharing can be supported in the manufacturing companies. The methods of case studies and grounded theory were used to present information gained by carrying out semi-structured interviews. Results show that knowledge sharing is supported in very similar ways in respondent companies.

Keywords: case study, human resource management, knowledge, knowledge sharing

Procedia PDF Downloads 449