Search results for: trust
250 Drama Education: Towards Building Multicultural Adolescent Peer Relationships
Authors: Tahnee West
Abstract:
Drama education is increasingly understood as a useful tool in promoting positive social change and cultural awareness. The effects of both positive and negative peer relationships are also a researched facet of education systems. Despite this, very little research has been conducted in the intersection of these two areas, even given current, significant public interest surrounding multicultural relationships. This research addresses a problem faced by educators and students: facilitating meaningful multicultural relationships. The research explores the following question in an Australian context: in what ways does Drama education affect peer relationships between culturally diverse students? In doing so, the study explores the various challenges and experiences of a multicultural group of adolescents, in terms of forming and maintaining effective intercultural friendships, while participating in a series of drama workshops. The project presents a starting point for providing educators with strategies for inclusivity and relationship development amongst diverse student populations. Findings show that Drama education can positively affect culturally diverse young people’s peer relationships; interactions between participants and data collected in focus groups throughout the eight-week Drama program show a steady improvement in sense of trust, support, tolerance, empathy, familiarity with other participants, and enjoyment. Data also points to a positive correlation between the Drama activities and improved conflict resolution and communication skills, as well as an improved understanding of the other participants’ cultures. Diversities and commonalities within the group were explored, with similarities encouraging social cohesion, and decreasing cultural ‘cliques’.Keywords: cultural diversity, drama education, friendship, multicultural, peer relationships
Procedia PDF Downloads 143249 Online Information Seeking: A Review of the Literature in the Health Domain
Authors: Sharifah Sumayyah Engku Alwi, Masrah Azrifah Azmi Murad
Abstract:
The development of the information technology and Internet has been transforming the healthcare industry. The internet is continuously accessed to seek for health information and there are variety of sources, including search engines, health websites, and social networking sites. Providing more and better information on health may empower individuals, however, ensuring a high quality and trusted health information could pose a challenge. Moreover, there is an ever-increasing amount of information available, but they are not necessarily accurate and up to date. Thus, this paper aims to provide an insight of the models and frameworks related to online health information seeking of consumers. It begins by exploring the definition of information behavior and information seeking to provide a better understanding of the concept of information seeking. In this study, critical factors such as performance expectancy, effort expectancy, and social influence will be studied in relation to the value of seeking health information. It also aims to analyze the effect of age, gender, and health status as the moderator on the factors that influence online health information seeking, i.e. trust and information quality. A preliminary survey will be carried out among the health professionals to clarify the research problems which exist in the real world, at the same time producing a conceptual framework. A final survey will be distributed to five states of Malaysia, to solicit the feedback on the framework. Data will be analyzed using SPSS and SmartPLS 3.0 analysis tools. It is hoped that at the end of this study, a novel framework that can improve online health information seeking is developed. Finally, this paper concludes with some suggestions on the models and frameworks that could improve online health information seeking.Keywords: information behavior, information seeking, online health information, technology acceptance model, the theory of planned behavior, UTAUT
Procedia PDF Downloads 275248 An Exploration of Why Insider Fraud Is the Biggest Threat to Your Business
Authors: Claire Norman-Maillet
Abstract:
Insider fraud, otherwise known as occupational, employee, or internal fraud, is a financial crime threat. Perpetrated by defrauding (or attempting to defraud) one’s current, prospective, or past employer, an ‘employee’ covers anyone employed by the company, including board members and contractors. The Coronavirus pandemic has forced insider fraud into the spotlight, and it isn’t dimming. As the focus of most academics and practitioners has historically been on that of ‘external fraud’, insider fraud is often overlooked or not considered to be a real threat. However, since COVID-19 changed the working world, pushing most of us into remote or hybrid working, employers cannot easily keep an eye on what their staff are doing, which has led to reliance on trust and transparency. This, therefore, brings about an increased risk of insider fraud perpetration. The objective of this paper is to explore why insider fraud is, therefore, now the biggest threat to a business. To achieve the research objective, participating individuals within the financial crime sector (either as a practitioner or consultants) attended semi-structured interviews with the researcher. The principal recruitment strategy for these individuals was via the researcher’s LinkedIn network. The main findings in the research suggest that insider fraud has been ignored and rejected as a threat to a business, owing to a reluctance to admit that a colleague may perpetrate. A positive of the Coronavirus pandemic is that it has forced insider fraud into a more prominent position and giving it more importance on a business’ agenda and risk register. Despite insider fraud always having been a possibility (and therefore a risk) within any business, it is very rare that a business has given it the attention it requires until now, if at all. The research concludes that insider fraud needs to prioritised by all businesses, and even ahead of external fraud. The research also provides advice on how a business can add new or enhance existing controls to mitigate the risk.Keywords: insider fraud, occupational fraud, COVID-19, COVID, coronavirus, pandemic, internal fraud, financial crime, economic crime
Procedia PDF Downloads 65247 Digital Customer Relationship Management on Service Delivery Performance
Authors: Reuben Kinyuru Njuguna, Martin Mabuya Njuguna
Abstract:
Digital platforms, such as The Internet, and the advent of digital marketing strategies, have led to many changes in the marketing of goods and services. These have resulted in improved service quality, enhanced customer relations, productivity gains, marketing transaction cost reductions, improved customer service and flexibility in fulfilling customers’ changing needs and lifestyles. Consequently, the purpose of this study was to determine the effect of digital marketing practices on the financial performance of mobile network operators in the telecommunications industry in Kenya. The objectives of the study were to establish how digital customer relationship management strategies on performance of mobile network operators in Kenya. The study used an explanatory cross-sectional survey research design, while the target population was made up of from the 4 major mobile network operators in Kenya, namely Safaricom Limited, Airtel Networks Kenya Limited, Finserve Africa Limited and Telkom Kenya Limited. Sampling strategy was stratified sampling with a sample size of 97 respondents. Digital customer relationship strategies were seen to influence firm performance, through enhancing convenience, building trust, encouraging growth in market share through creating sustainable relationships, building commitment with customers, enhancing customer retention and customer satisfaction. Digital customer relationship management were seen to maximize gross profits by increasing customer satisfaction, loyalty and retention. The study recommended upscaling the use of digital customer relationship management strategies to further enhance firm performance, given their great potential in this regard.Keywords: customer relationship management, customer service delivery, performance, customer satisfaction
Procedia PDF Downloads 238246 The Implementation of Educational Partnerships for Undergraduate Students at Yogyakarta State University
Authors: Broto Seno
Abstract:
This study aims to describe and examine more in the implementation of educational partnerships for undergraduate students at Yogyakarta State University (YSU), which is more focused on educational partnerships abroad. This study used descriptive qualitative approach. The study subjects consisted of a vice-rector, two staff education partnerships, four vice-dean, nine undergraduate students and three foreign students. Techniques of data collection using interviews and document review. Validity test of the data source using triangulation. Data analysis using flow models Miles and Huberman, namely data reduction, data display, and conclusion. Results of this study showed that the implementation of educational partnerships abroad for undergraduate students at YSU meets six of the nine indicators of the success of strategic partnerships. Six indicators are long-term, strategic, mutual trust, sustainable competitive advantages, mutual benefit for all the partners, and the separate and positive impact. The indicator has not been achieved is cooperative development, successful, and world class / best practice. These results were obtained based on the discussion of the four formulation of the problem, namely: 1) Implementation and development of educational partnerships abroad has been running good enough, but not maximized. 2) Benefits of the implementation of educational partnerships abroad is providing learning experiences for students, institutions of experience in comparison to each faculty, and improving the network of educational partnerships for YSU toward World Class University. 3) The sustainability of educational partnerships abroad is pursuing a strategy of development through improved management of the partnership. 4) Supporting factors of educational partnerships abroad is the support of YSU, YSU’s partner and society. Inhibiting factors of educational partnerships abroad is not running optimally management.Keywords: partnership, education, YSU, institutions and faculties
Procedia PDF Downloads 334245 Perspectives of charitable organisations on the impact of the COVID-19 pandemic on family carers of people with profound and multiple intellectual disabilities.
Authors: Mark Linden, Trisha Forbes, Michael Brown, Lynne Marsh, Maria Truesdale, Stuart Todd, Nathan Hughes
Abstract:
Background The COVID-19 pandemic resulted in a reduction of health care services for many family carers of people with profound and multiple intellectual disabilities (PMID). Due to lack of services, family carers turned to charities for support during the pandemic. We explored the views of charity workers across the UK and Ireland who supported family carers during the COVID-19 pandemic and explored their views on effective online support programmes for family carers. Methods This was a qualitative study using online focus groups with participants (n = 24) from five charities across the UK and Ireland. Questions focused on challenges, supports, coping and resources which helped during lockdown restrictions. Focus groups were audio recorded, transcribed verbatim, and analysed through thematic analysis. Findings Four themes were identified (i) ‘mental and emotional health’, (ii) ‘they who shout the loudest’ (fighting for services), (iii) ‘lack of trust in statutory services’ and (iv) ‘creating an online support programme’. Mental and emotional health emerged as the most prominent theme and included three subthemes named as ‘isolation’, ‘fear of COVID-19’ and ‘the exhaustion of caring’. Conclusions The withdrawal of many services during the COVID-19 pandemic further isolated and placed strain on family carers. Even after the end of the pandemic family cares continue to report on the struggle to receive adequate support. There is a critical need to design services, including online support programmes, in partnership with family carers which adequately address their needs.Keywords: intellectual disability, family carers, COVID-19, charities
Procedia PDF Downloads 74244 The Effect of the Organization of Mental Health Care on General Practitioners’ Prescription Behavior of Psychotropics for Adolescents in Belgium
Authors: Ellen Lagast, Melissa Ceuterick, Mark Leys
Abstract:
Although adolescence is a stressful period with an increased risk for mental illnesses such as anxiety and depression, little in-depth knowledge is available on the determinants of the use of psychotropic drugs (BZD/SSRIs) and the effects. A qualitative research with adolescents in Flanders was performed. Based on indepth interviews, the interviewees indicate feelings of ambiguity towards their medication use because on the one hand the medication helps to manage their mental vulnerability and disrupted lives, but on the other hand they experience a loss of control of their self and their environment. Undesired side-effects and stigma led to a negative pharmaceutical self. The interviewed youngsters also express dissatisfaction about the prescription behavior with regard to psychotropic drugs of their general practitioner (GP). They wished to have received more information about alternative non-pharmaceutical treatment options. Notwithstanding these comments, the majority of the interviewees maintained trust in their GP to act in their best interest. This paper will relate the prescription behavior in primary care to the organization of mental health care to better understand the “phamaceuticalization” and medicalization of mental health problems in Belgium. Belgium implemented fundamental mental health care reforms to collaborate, to integrate care and to optimize continuity of care. Children and adolescents still are confronted with long waiting lists to access (non-medicalized) mental health services. This access to mental health care partly explains general practitioners’ prescription behavior of psychotropics. Moreover, multidisciplinary practices have not pervaded primary health care yet. Medicalization and pharmaceuticalization of mental health vulnerabilities of youth are both a structural and cultural problem.Keywords: adolescents, antidepressants, benzodiazepines, mental health system, psychotropic drugs
Procedia PDF Downloads 100243 The Quality of Business Relationships in the Tourism System: An Imaginary Organisation Approach
Authors: Armando Luis Vieira, Carlos Costa, Arthur Araújo
Abstract:
The tourism system is viewable as a network of relationships amongst business partners where the success of each actor will ultimately be determined by the success of the whole network. Especially since the publication of Gümmesson’s (1996) ‘theory of imaginary organisations’, which suggests that organisational effectiveness largely depends on managing relationships and sharing resources and activities, relationship quality (RQ) has been increasingly recognised as a main source of value creation and competitive advantage. However, there is still ambiguity around this topic, and managers and researchers have been recurrently reporting the need to better understand and capitalise on the quality of interactions with business partners. This research aims at testing an RQ model from a relational, imaginary organisation’s approach. Two mail surveys provide the perceptions of 725 hotel representatives about their business relationships with tour operators, and 1,224 corporate client representatives about their business relationships with hotels (21.9 % and 38.8 % response rate, respectively). The analysis contributes to enhance our understanding on the linkages between RQ and its determinants, and identifies the role of their dimensions. Structural equation modelling results highlight trust as the dominant dimension, the crucial role of commitment and satisfaction, and suggest customer orientation as complementary building block. Findings also emphasise problem solving behaviour and selling orientation as the most relevant dimensions of customer orientation. The comparison of the two ‘dyads’ deepens the discussion and enriches the suggested theoretical and managerial guidelines concerning the contribution of quality relationships to business performance.Keywords: corporate clients, destination competitiveness, hotels, relationship quality, structural equations modelling, tour operators
Procedia PDF Downloads 393242 A Study on Employer Branding and Its Impact on Employee
Authors: Kvnkc Sharma
Abstract:
Globalization, coupled with increase in competition is compelling organizations to adopt innovative strategies and identify core competencies in order to distinguish themselves from the competition. The capability of an organization is no longer determined by their products or services alone. The intellectual assets and quality of the human resource are fast emerging as key differentiators. Corporations are now positioning themselves as ‘brands’ not solely to market their products and services, but also to lure and to retain the best talent in the business. This paper identifies leadership as the ‘key element’ in developing an organization’s brand, which has a significant influence on the employee’s eventual perception of this external brand as portrayed by the organization. External branding incorporates innovation, consumer concern, trust, quality and sustainability. The paper contends that employees are indeed an organization’s ‘brand ambassadors. Internal branding involves taking care of these ambassadors of corporate brand i.e. human resource. If employees of an organization are not exposed to the organization’s branding (an ongoing process that functionally aligns, motivates and empower employees at all levels to consistently provide a satisfying customer experience), the external brand could be jeopardized. Internal branding, on the other hand, refers to employee’s perception of the organization’s brand. The current business environment can at best, be termed as volatile. Employees with the right technical and behavioral skills remain a scarce resource and the employers need to be ready to capture the attention, interest and commitment of the best and brightest candidates. This paper attempts to review and understand the relationship between employer branding and employee retention. The paper also seeks to identify potential impact of employer branding across all the factors affecting employees.Keywords: external branding, human resource, internal branding, leadership
Procedia PDF Downloads 249241 Final Account Closing in Construction Project: The Use of Supply Chain Management to Reduce the Delays
Authors: Zarabizan Zakaria, Syuhaida Ismail, Aminah Md. Yusof
Abstract:
Project management process starts from the planning stage up to the stage of completion (handover of buildings, preparation of the final accounts and the closing balance). This process is not easy to implement efficiently and effectively. The issue of delays in construction is a major problem for construction projects. These delays have been blamed mainly on inefficient traditional construction practices that continue to dominate the current industry. This is due to several factors, such as environments of construction technology, sophisticated design and customer demands that are constantly changing and influencing, either directly or indirectly, the practice of management. Among the identified influences are physical environment, social environment, information environment, political and moral atmosphere. Therefore, this paper is emerged to determine the problem and issues in the final account closing in construction projects, and it establishes the need to embrace Supply Chain Management (SCM) and then elucidates the need and strategies for the development of a delay reduction framework. At the same time, this paper provides effective measures to avoid or at least reduce the delay to the optimum level. Allowing problems in the closure declaration to occur without proper monitoring and control can leave negative impact on the cost and time of delivery to the end user. Besides, it can also affect the reputation or image of the agency/department that manages the implementation of a contract and consequently may reduce customer's trust towards the agencies/departments. It is anticipated that the findings reported in this paper could address root delay contributors and apply SCM tools for their mitigation for the better development of construction project.Keywords: final account closing, construction project, construction delay, supply chain management
Procedia PDF Downloads 369240 A Study on Employer Branding and Its Impacts on Employee’s
Authors: KVNKC Sharma, Soujanya Pasumarthi
Abstract:
Globalization, coupled with increase in competition is compelling organizations to adopt innovative strategies and identify core competencies in order to distinguish themselves from the competition. The capability of an organization is no longer determined by their products or services alone. The intellectual assets and quality of the human resource are fast emerging as key differentiators. Corporations are now positioning themselves as ‘brands’ not solely to market their products and services, but also to lure and to retain the best talent in the business. This paper identifies leadership as the ‘key element’ in developing an organization’s brand, which has a significant influence on the employee’s eventual perception of this external brand as portrayed by the organization. External branding incorporates innovation, consumer concern, trust, quality and sustainability. The paper contends that employees are indeed an organization’s ‘brand ambassadors. Internal branding involves taking care of these ambassadors of corporate brand i.e. human resource. If employees of an organization are not exposed to the organization’s branding (an ongoing process that functionally aligns, motivates and empower employees at all levels to consistently provide a satisfying customer experience), the external brand could be jeopardized. Internal branding, on the other hand, refers to employee’s perception of the organization’s brand. The current business environment can at best, be termed as volatile. Employees with the right technical and behavioral skills remain a scarce resource and the employers need to be ready to capture the attention, interest and commitment of the best and brightest candidates. This paper attempts to review and understand the relationship between employer branding and employee retention. The paper also seeks to identify potential impact of employer branding across all the factors affecting employees.Keywords: alignment, external branding, internal branding, leadership
Procedia PDF Downloads 303239 A Review of the Potential Impact of Employer Branding on Employee
Authors: K. V. N. K. C. Sharma
Abstract:
Globalization, coupled with increase in competition is compelling organizations to adopt innovative strategies and identify core competencies in order to distinguish themselves from the competition. The capability of an organization is no longer determined by their products or services alone. The intellectual assets and quality of the human resource are fast emerging as key differentiators. Corporations are now positioning themselves as ‘brands’ not solely to market their products and services, but also to lure and to retain the best talent in the business. This paper identifies leadership as the ‘key element’ in developing an organization’s brand, which has a significant influence on the employee’s eventual perception of this external brand as portrayed by the organization. External branding incorporates innovation, consumer concern, trust, quality and sustainability. The paper contends that employees are indeed an organization’s ‘brand ambassadors. Internal branding involves taking care of these ambassadors of corporate brand i.e. human resource. If employees of an organization are not exposed to the organization’s branding (an ongoing process that functionally aligns, motivates and empower employees at all levels to consistently provide a satisfying customer experience), the external brand could be jeopardized. Internal branding, on the other hand, refers to employee’s perception of the organization’s brand. The current business environment can at best, be termed as volatile. Employees with the right technical and behavioral skills remain a scarce resource and the employers need to be ready to capture the attention, interest and commitment of the best and brightest candidates. This paper attempts to review and understand the relationship between employer branding and employee retention. The paper also seeks to identify potential impact of employer branding across all the factors affecting employees.Keywords: external branding, organisation personnel, internal branding, leadership
Procedia PDF Downloads 239238 Knowledge Sharing Model Based on Individual and Organizational Factors Related to Faculty Members of University
Authors: Mitra Sadoughi
Abstract:
This study presents the knowledge-sharing model based on individual and organizational factors related to faculty members. To achieve this goal, individual and organizational factors were presented through qualitative research in the form of open codes, axial, and selective observations; then, the final model was obtained using structural equation model. Participants included 1,719 faculty members of the Azad Universities, Mazandaran Province, Region 3. The samples related to the qualitative survey included 25 faculty members experienced at teaching and the samples related to the quantitative survey included 326 faculty members selected by multistage cluster sampling. A 72-item questionnaire was used to measure the quantitative variables. The reliability of the questionnaire was 0.93. Its content and face validity was determined with the help of faculty members, consultants, and other experts. For the analysis of quantitative data obtained from structural model and regression, SPSS and LISREL were used. The results showed that the status of knowledge sharing is moderate in the universities. Individual factors influencing knowledge sharing included the sharing of educational materials, perception, confidence and knowledge self-efficiency, and organizational factors influencing knowledge sharing included structural social capital, cognitive social capital, social capital relations, organizational communication, organizational structure, organizational culture, IT infrastructure and systems of rewards. Finally, it was found that the contribution of individual factors on knowledge sharing was more than organizational factors; therefore, a model was presented in which contribution of individual and organizational factors were determined.Keywords: knowledge sharing, social capital, organizational communication, knowledge self-efficiency, perception, trust, organizational culture
Procedia PDF Downloads 393237 Executing the Law: The Practical Absence of Law and Its Effects on Death Row Inmates and Their Families in Egypt
Authors: Amira M. Othman
Abstract:
Despite the massive array of literature that engages with the Egyptian legislative system on a theoretical level, very little attention has been dedicated to the comparison between the legislative clauses on the one hand, and the (absence of their) real-world implementation on the other. This paper starts with this discrepancy, focusing on the legal proceedings in some recent cases dubbed ‘political,’ in which defendants received death sentences. Then, it sheds light on the trend of practical disregard of the law on behalf of the criminal justice apparatuses (whether security forces, public prosecution offices, lawyers, judges, prison wardens, and executioners) through the examination of case files and the conduction of interviews with some defense lawyers in the cases in question. It also identifies the resultant state of confusion among prison staff, as manifest in their treatment of defendants even before the death sentences against them is pronounced; in other words, the application of some aspects of the law in certain cases, and their simultaneous disregard of others. Then, the paper explores the effects of such execution of the law on the death row inmates, as it identifies the different strategies through which defendants who are sentenced to death appropriate a number of legal clauses to their benefit, thereby embarrassing - or highly irritating - the judges that pronounce their death sentences. In addition to appropriation, other strategies include the contestation of the law and their presence before the courts in general, as well as the complete disregard and dismissal of the legal system altogether. Finally, the paper investigates the consequent conceptual effect on the first degree families of death row inmates, namely how their daily encounters with the Egyptian legislative system - particularly its emphasis on the absence of the otherwise binding local legislation - continue to shape their conceptions of the ‘law,’ of ‘justice,’ and their trust in the ‘state.’Keywords: death penalty, Egyptian law absence, justice, political cases
Procedia PDF Downloads 175236 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach
Authors: Jumana Majdi Qutub
Abstract:
Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.Keywords: cloud computing, cyber crime, data protection, privacy
Procedia PDF Downloads 262235 Overcoming Open Innovation Challenges with Technology Intelligence: Case of Medium-Sized Enterprises
Authors: Akhatjon Nasullaev, Raffaella Manzini, Vincent Frigant
Abstract:
The prior research largely discussed open innovation practices both in large and small and medium-sized enterprises (SMEs). Open Innovation compels firms to observe and analyze the external environment in order to tap new opportunities for inbound and/or outbound flows of knowledge, ideas, work in progress innovations. As SMEs are different from their larger counterparts, they face several limitations in utilizing open innovation activities, such as resource scarcity, unstructured innovation processes and underdeveloped innovation capabilities. Technology intelligence – the process of systematic acquisition, assessment and communication of information about technological trends, opportunities and threats can mitigate this limitation by enabling SMEs to identify technological and market opportunities in timely manner and undertake sound decisions, as well as to realize a ‘first mover advantage’. Several studies highlighted firm-level barriers to successful implementation of open innovation practices in SMEs, namely challenges in partner selection, intellectual property rights and trust, absorptive capacity. This paper aims to investigate the question how technology intelligence can be useful for SMEs to overcome the barriers to effective open innovation. For this, we conduct a case study in four Estonian life-sciences SMEs. Our findings revealed that technology intelligence can support SMEs not only in inbound open innovation (taking into account inclination of most firms toward technology exploration aspects of open innovation) but also outbound open innovation. Furthermore, the results of this study state that, although SMEs conduct technology intelligence in unsystematic and uncoordinated manner, it helped them to increase their innovative performance.Keywords: technology intelligence, open innovation, SMEs, life sciences
Procedia PDF Downloads 167234 Cyber Security and Risk Assessment of the e-Banking Services
Authors: Aisha F. Bushager
Abstract:
Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.Keywords: cyber security, e-banking, risk assessment, threats identification
Procedia PDF Downloads 350233 Patient Advocates to Improve Access to Justice in Involuntary Hospitalisation
Authors: Zuzana Durajova, Natasa Diatkova, Shreya Bhardwaj
Abstract:
This paper introduces the project START, its activities, goals, evaluation and final results. Over the past few decades, the legal discourse surrounding mental health has resulted in improvement in patient rights (in Netherlands, etc.), the appointment of Ombudspersons for psychiatric patients (in Austria, Sweden) and facilitating the participation of patients in decision-making processes. Czech legislation already recognizes the position of “patient’s advocate” as a person of trust. However, this instrument is not very widely known and rarely used in practice. In the pilot study of the project, legal training for patient advocacy is provided to persons with experience with mental health problems/psychiatric hospitalization chosen from a Czech-based NGO. These persons (patient advocates) visit patients in involuntary hospitalization in one closed ward in the chosen psychiatric institution. During visits, the patient advocates inform patients about their legal standing, their procedural rights and also offer them individual support in contacting their counsel, family members etc. To understand the effect of the intervention, qualitative interviews and participant observations are conducted with the patients, advocates, the hospital management and staff and other identifiable stakeholders, such as government officials responsible for mental health care reform. The interviews are held before, during and after the intervention (support from patient advocates in hospitals). Given the ethical quandaries arising from using psychiatric wards as a field setting, we assume a participatory approach to ensure respect for patient boundaries and dignity. Through this project, we seek to establish a profession of patient advocates based on professional standards.Keywords: patient advocacy, involuntary hospitalization, Czech Republic, patient Rights, professionalization
Procedia PDF Downloads 196232 Effect of Distance Education Students Motivation with the Turkish Language and Literature Course
Authors: Meva Apaydin, Fatih Apaydin
Abstract:
Role of education in the development of society is great. Teaching and training started with the beginning of the history and different methods and techniques which have been applied as the time passed and changed everything with the aim of raising the level of learning. In addition to the traditional teaching methods, technology has been used in recent years. With the beginning of the use of internet in education, some problems which could not be soluted till that time has been dealt and it is inferred that it is possible to educate the learners by using contemporary methods as well as traditional methods. As an advantage of technological developments, distance education is a system which paves the way for the students to be educated individually wherever and whenever they like without the needs of physical school environment. Distance education has become prevalent because of the physical inadequacies in education institutions, as a result; disadvantageous circumstances such as social complexities, individual differences and especially geographical distance disappear. What’s more, the high-speed of the feedbacks between teachers and learners, improvement in student motivation because there is no limitation of time, low-cost, the objective measuring and evaluation are on foreground. In spite of the fact that there is teaching beneficences in distance education, there are also limitations. Some of the most important problems are that : Some problems which are highly possible to come across may not be solved in time, lack of eye-contact between the teacher and the learner, so trust-worthy feedback cannot be got or the problems stemming from the inadequate technological background are merely some of them. Courses are conducted via distance education in many departments of the universities in our country. In recent years, giving lectures such as Turkish Language, English, and History in the first grades of the academic departments in the universities is an application which is constantly becoming prevalent. In this study, the application of Turkish Language course via distance education system by analyzing advantages and disadvantages of the distance education system which is based on internet.Keywords: distance education, Turkish language, motivation, benefits
Procedia PDF Downloads 437231 Strengthening Governance in Public Administration: The Strategic Role of Internal Auditing in Enhancing Accountability and Transparency
Authors: Iulian Clain
Abstract:
In contemporary public administration, the demand for greater accountability, transparency, and efficient governance has intensified, particularly in the face of increasing public scrutiny and fiscal constraints. Internal auditing has emerged as a vital tool in strengthening governance structures, enhancing the effectiveness of public sector institutions, and ensuring compliance with regulatory frameworks. This paper examines the evolving role of internal auditing within public administration, with an emphasis on risk management, regulatory compliance, and fraud prevention. Building on institutional theory and risk management frameworks, this study explores how internal audits contribute to identifying operational inefficiencies, minimizing financial irregularities, and promoting ethical governance practices. Through case studies and comparative analysis of auditing practices across OECD nations, this research provides insights into how strategic internal audits can be harnessed to reinforce public sector governance, thereby improving the delivery of public services. The paper argues that the integration of internal audit findings into decision-making processes enhances not only financial accountability but also policy outcomes, fostering greater public trust in government institutions. Key recommendations are presented on how public institutions can further integrate internal auditing processes to enhance governance outcomes, focusing on best practices for institutionalizing audit functions within public sector governance frameworks. These findings are particularly relevant for policymakers, audit professionals, and public administration leaders striving to achieve better governance, operational efficiency, and integrity in the public sector.Keywords: internal auditing role, public administration sciences, public administration audit, internal auditing in universities
Procedia PDF Downloads 21230 Improvement Performances of the Supersonic Nozzles at High Temperature Type Minimum Length Nozzle
Authors: W. Hamaidia, T. Zebbiche
Abstract:
This paper presents the design of axisymmetric supersonic nozzles, in order to accelerate a supersonic flow to the desired Mach number and that having a small weight, in the same time gives a high thrust. The concerned nozzle gives a parallel and uniform flow at the exit section. The nozzle is divided into subsonic and supersonic regions. The supersonic portion is independent to the upstream conditions of the sonic line. The subsonic portion is used to give a sonic flow at the throat. In this case, nozzle gives a uniform and parallel flow at the exit section. It’s named by minimum length Nozzle. The study is done at high temperature, lower than the dissociation threshold of the molecules, in order to improve the aerodynamic performances. Our aim consists of improving the performances both by the increase of exit Mach number and the thrust coefficient and by reduction of the nozzle's mass. The variation of the specific heats with the temperature is considered. The design is made by the Method of Characteristics. The finite differences method with predictor-corrector algorithm is used to make the numerical resolution of the obtained nonlinear algebraic equations. The application is for air. All the obtained results depend on three parameters which are exit Mach number, the stagnation temperature, the chosen mesh in characteristics. A numerical simulation of nozzle through Computational Fluid Dynamics-FASTRAN was done to determine and to confirm the necessary design parameters.Keywords: flux supersonic flow, axisymmetric minimum length nozzle, high temperature, method of characteristics, calorically imperfect gas, finite difference method, trust coefficient, mass of the nozzle, specific heat at constant pressure, air, error
Procedia PDF Downloads 150229 The Quest for Institutional Independence to Advance Police Pluralism in Ethiopia
Authors: Demelash Kassaye Debalkie
Abstract:
The primary objective of this study is to report the tributes that are significantly impeding the Ethiopian police's ability to provide quality services to the people. Policing in Ethiopia started in the medieval period. However, modern policing was introduced instead of vigilantism in the early 1940s. The progress counted since the date police became modernized is, however, under contention when viewed from the standpoint of officers’ development and technologies in the 21st century. The police in Ethiopia are suffering a lot to be set free from any form of political interference by the government and to be loyal to impartiality, equity, and justice in enforcing the law. Moreover, the institutional competence of the police in Ethiopia is currently losing its power derived from the constitution as a legitimate enforcement agency due to the country’s political landscape encouraging ethnic-based politics. According to studies, the impact of ethnic politics has been a significant challenge for police in controlling conflicts between two ethnic groups. The study used qualitative techniques and data was gathered from key informants selected purposely. The findings indicate that governments in the past decades were skeptical about establishing a constitutional police force in the country. This has certainly been one of the challenges of pluralizing the police: building police-community relations based on trust. The study conducted to uncover the obstructions has finally reported that the government’s commitment to form a non-partisan, functionally decentralized, and operationally demilitarized police force is too minimal and appalling. They mainly intend to formulate the missions of the police in accordance with their interests and political will to remain in power. It, therefore, reminds the policymakers, law enforcement officials, and the government in power to revise its policies and working procedures already operational to strengthen the police in Ethiopia based on public participation and engagement.Keywords: community, constitution, Ethiopia, law enforcement
Procedia PDF Downloads 86228 A Primary Care Diagnosis of Middle-Aged Men with Oral Cancer Who Underwent Extensive Resection and Flap Repair: A Case Report
Authors: Ching-Yi Huang, Pi-Fen Cheng, Hui-Zhu Chen, Shi Ting Huang, Heng-Hua Wang
Abstract:
This is a case of oral cancer after extensive resection and modified right lateral neck lymph node dissection followed by reconstruction with a skin flap. The nursing period lasted From September 25 to October 3, 2017, through observation, interview, physical assessment, and medical record review, the author identified the following nursing problems: acute pain, impaired oral mucous membrane, and body image change. During the nursing period, the author provided individual and overall nursing care and established mutual trust through the use of empathy. Author listened and eased the patient's physical indisposition, such as wound pain, we use medications and acupuncture massage to relieve pain. However, for oral mucosa change caused by surgery, provide continuous and complete oral care and oral exercise training to improve oral mucosal healing and restore swallowing function. In the body-image changes, guided him to express his feeling after the body-image change, and enhanced support and from the family, and encouraged him to attend head and neck cancer survivor alliance which allowed the patient to accept the altered body image and reaffirm self-worth. Hopefully, through sharing this nursing experience will help to the nursing care quality of nursing care for oral cancer patients after extensive resection and modified right lateral neck lymph node dissection followed by reconstruction with a skin flap.Keywords: oral cancer, acute pain, impaired oral mucous membrane, body image change
Procedia PDF Downloads 188227 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework
Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad
Abstract:
This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.Keywords: unified theory of acceptance and use of technology (UTAUT) model, UTAUT2 model, smart national identity card (SNIC), health information application, privacy calculus model (PCM)
Procedia PDF Downloads 470226 Splinting in Plastic Surgery Hand Trauma Setting
Authors: Samar Mousa, Rebecca Shirley
Abstract:
Injuries to the hand account for 20% of all emergency department attendances, with an estimated annual treatment cost of over £100 million in the UK. Functional impairments as a result of hand injuries often necessitate absence from employment, resulting in reduced productivity estimated to incur an additional £600m loss to the UK economy. Appropriate and early management is vital to preserve anatomy, prevent stiffness and allow function. The initial assessment and management of hand injuries are usually undertaken by junior staff, many of whom have little or no training or experience in splinting hand fractures. In our plastic surgery department at Stoke Mandeville hospital Buckinghamshire trust, we carried out an audit project to detect errors in hand splinting in the period between April 2022 and July 2022 and find out measures to support junior doctors, nurses and hand therapists in providing the best possible care for hand trauma patients. Our standards were The British Society for Surgery of the Hand (BSSH) standard of care in hand trauma, AO surgery reference and Stoke Mandeville hospital hand therapy mini protocol Feb 2022 During the period of 4 months, 5 cases were identified. Two cases of wrong splint choice, two cases of early removal of the splint and one tight splint that required change. In order to avoid those mistakes, a training program was given to junior doctors and nurses in collaboration with the hand therapy team regarding ways of splinting the hand in different injuries like fractures, tendons injuries, muscle injuries and ligamentous injuries. In addition to, a poster hung in the examination rooms and theatres to help junior doctors reach the correct decision.Keywords: splinting, hand trauma, plastic surgery, tendon injury, hand fracrture
Procedia PDF Downloads 87225 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 141224 Agro-Insurance and Farming Development Opportunities in Georgia
Authors: Tamar Lazariashvili
Abstract:
Introduction: The agro-insurance has great importance for agricultural development in the country. In the article, the insurance market of the Georgian agricultural sector has been studied, the level of interest of farmers with insurance products and the trend of demand for those products are revealed; also, the importance of insurance is substantiated. Methodology: The following research methods are applied in the presented paper: statistical (selection, grouping, observation, trend) and qualitative research (in-depth interview with farmers). They claim that the main reason for aggravation is the low level of trust, less awareness about the conditions of the insurance contract. In order to eradicate distrust towards agro-insurance, it is recommended to increase awareness of insured farmers in terms of an insurance agreement. In the case of disputable issues between insurance companies and the customers (farmers), it is advisable to enact the Mediation Service, which will be able to protect the rights of insured farmers. Main Findings: Insurance companies prefer to deal with large farmers, the number of them is very small in Georgia as the credit market. The government interference in this sector is also a very cautious topic. However, the government can strengthen the awareness of farmers about the characteristics and advantages of the insurance system in order to increase the number of insured and reduce insurance premiums for farmers. Conclusion: Enactment of agro-insurance will increase the interest and confidence of financial institutions in the farming sector, financial resources will be accessible to the farmers that will facilitate the stable development of the sector in the country. The size of the agro-insurance market in the country should be increased, and the new territories should be covered. The State must have an obligation to ensure the risk of farmers and subsidize insurance companies. Based on the analysis of the insurance market, the conclusions on agro-insurance issues and the relevant recommendations are proposed.Keywords: Agro-insurance, agricultural product, Agro-market, farming
Procedia PDF Downloads 123223 Commercial Law Between Custom and Islamic Law
Authors: Mohamed Zakareia Ghazy Aly Belal
Abstract:
Commercial law is the set of legal rules that apply to business and regulates the trade of trade. The meaning of this is that the commercial law regulates certain relations only that arises as a result of carrying out certain businesses. which are business, as it regulates the activity of a specific sect, the sect of merchants, and the commercial law as other branches of the law has characteristics that distinguish it from other laws and various, and various sources from which its basis is derived from It is the objective or material source. the historical source, the official source and the interpretative source, and we are limited to official sources and explanatory sources. so what do you see what these sources are, and what is their degree and strength in taking it in commercial disputes. The first topic / characteristics of commercial law. Commercial law has become necessary for the world of trade and economics, which cannot be dispensed with, given the reasons that have been set as legal rules for commercial field. In fact, it is sufficient to refer to the stability and stability of the environment, and in exchange for the movement and the speed in which the commercial environment is in addition to confidence and credit. the characteristic of speed and the characteristic of trust, and credit are the ones that justify the existence of commercial law. Business is fast, while civil business is slow, stable and stability. The person concludes civil transactions in his life only a little. And before doing any civil action. he must have a period of thinking and scrutiny, and the investigation is the person who wants the husband, he must have a period of thinking and scrutiny. as if the person who wants to acquire a house to live with with his family, he must search and investigate Discuss the price before the conclusion of a purchase contract. In the commercial field, transactions take place very quickly because the time factor has an important role in concluding deals and achieving profits. This is because the merchant in contracting about a specific deal would cause a loss to the merchant due to the linkage of the commercial law with the fluctuations of the economy and the market. The merchant may also conclude more than one deal in one and short time. And that is due to the absence of commercial law from the formalities and procedures that hinder commercial transactions.Keywords: law, commercial law, business, commercial field
Procedia PDF Downloads 70222 Comparison of Blockchain Ecosystem for Identity Management
Authors: K. S. Suganya, R. Nedunchezhian
Abstract:
In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity
Procedia PDF Downloads 130221 Voters' Acceptance of Anti-guardians' Narratives: Electoral Politics in Establishmentarian Democracies
Authors: Rai Mansoor Imtiaz
Abstract:
Guardians in hybrid regimes fragment opposition parties and ban their political leaders, and disenfranchise their voters' political participation. When guardians in hybrid regimes are so powerful that they remain decisive on electoral politics of states, and have powers to ban political parties and their leadership, then "why do political parties backed by those powerful guardians lose elections" and "how do anti-establishment parties make electoral inroads at the local and national levels." These two questions are interrelated with the key research question of my research "why do people vote for political parties rejected by powerful guardians in establishmentarian democracies." Furthermore, this research question is important to be explored for two reasons. First, existing literature only reflects the electoral victories of opposition parties or defeats of military-sponsored parties (see Thailand and Turkey) but remains silent on political change that led the anti-military parties to win the elections. Second, why is it a case that people belonging to the countries where militaries remain popular among the public (see Turkey and Pakistan) have started putting their trust in anti-establishment politicians who criticise the military against their intervention in politics? For instance, in Pakistan, where commenting against the military is meant to comment against the state –– an anti-military narrative is getting popular support. The conceptual framework of hybrid states in this research relies on the concept of a 'reserved domain/tutelary body' (guardians of hybrid states). However, this research makes a case that hybrid states are not consolidated separate political entities but rather vacillated states that fluctuate between democratic and authoritarian practices. This paper, therefore, uses the term establishmentarian democracy as a subtype of the hybrid regime, which is more consolidated than a hybrid democracy.Keywords: Guardians, Hybrid Regimes, Voters, Elections, Democracy, South Asia
Procedia PDF Downloads 107