Search results for: impersonal trust
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 769

Search results for: impersonal trust

229 Improvement Performances of the Supersonic Nozzles at High Temperature Type Minimum Length Nozzle

Authors: W. Hamaidia, T. Zebbiche

Abstract:

This paper presents the design of axisymmetric supersonic nozzles, in order to accelerate a supersonic flow to the desired Mach number and that having a small weight, in the same time gives a high thrust. The concerned nozzle gives a parallel and uniform flow at the exit section. The nozzle is divided into subsonic and supersonic regions. The supersonic portion is independent to the upstream conditions of the sonic line. The subsonic portion is used to give a sonic flow at the throat. In this case, nozzle gives a uniform and parallel flow at the exit section. It’s named by minimum length Nozzle. The study is done at high temperature, lower than the dissociation threshold of the molecules, in order to improve the aerodynamic performances. Our aim consists of improving the performances both by the increase of exit Mach number and the thrust coefficient and by reduction of the nozzle's mass. The variation of the specific heats with the temperature is considered. The design is made by the Method of Characteristics. The finite differences method with predictor-corrector algorithm is used to make the numerical resolution of the obtained nonlinear algebraic equations. The application is for air. All the obtained results depend on three parameters which are exit Mach number, the stagnation temperature, the chosen mesh in characteristics. A numerical simulation of nozzle through Computational Fluid Dynamics-FASTRAN was done to determine and to confirm the necessary design parameters.

Keywords: flux supersonic flow, axisymmetric minimum length nozzle, high temperature, method of characteristics, calorically imperfect gas, finite difference method, trust coefficient, mass of the nozzle, specific heat at constant pressure, air, error

Procedia PDF Downloads 150
228 The Quest for Institutional Independence to Advance Police Pluralism in Ethiopia

Authors: Demelash Kassaye Debalkie

Abstract:

The primary objective of this study is to report the tributes that are significantly impeding the Ethiopian police's ability to provide quality services to the people. Policing in Ethiopia started in the medieval period. However, modern policing was introduced instead of vigilantism in the early 1940s. The progress counted since the date police became modernized is, however, under contention when viewed from the standpoint of officers’ development and technologies in the 21st century. The police in Ethiopia are suffering a lot to be set free from any form of political interference by the government and to be loyal to impartiality, equity, and justice in enforcing the law. Moreover, the institutional competence of the police in Ethiopia is currently losing its power derived from the constitution as a legitimate enforcement agency due to the country’s political landscape encouraging ethnic-based politics. According to studies, the impact of ethnic politics has been a significant challenge for police in controlling conflicts between two ethnic groups. The study used qualitative techniques and data was gathered from key informants selected purposely. The findings indicate that governments in the past decades were skeptical about establishing a constitutional police force in the country. This has certainly been one of the challenges of pluralizing the police: building police-community relations based on trust. The study conducted to uncover the obstructions has finally reported that the government’s commitment to form a non-partisan, functionally decentralized, and operationally demilitarized police force is too minimal and appalling. They mainly intend to formulate the missions of the police in accordance with their interests and political will to remain in power. It, therefore, reminds the policymakers, law enforcement officials, and the government in power to revise its policies and working procedures already operational to strengthen the police in Ethiopia based on public participation and engagement.

Keywords: community, constitution, Ethiopia, law enforcement

Procedia PDF Downloads 86
227 A Primary Care Diagnosis of Middle-Aged Men with Oral Cancer Who Underwent Extensive Resection and Flap Repair: A Case Report

Authors: Ching-Yi Huang, Pi-Fen Cheng, Hui-Zhu Chen, Shi Ting Huang, Heng-Hua Wang

Abstract:

This is a case of oral cancer after extensive resection and modified right lateral neck lymph node dissection followed by reconstruction with a skin flap. The nursing period lasted From September 25 to October 3, 2017, through observation, interview, physical assessment, and medical record review, the author identified the following nursing problems: acute pain, impaired oral mucous membrane, and body image change. During the nursing period, the author provided individual and overall nursing care and established mutual trust through the use of empathy. Author listened and eased the patient's physical indisposition, such as wound pain, we use medications and acupuncture massage to relieve pain. However, for oral mucosa change caused by surgery, provide continuous and complete oral care and oral exercise training to improve oral mucosal healing and restore swallowing function. In the body-image changes, guided him to express his feeling after the body-image change, and enhanced support and from the family, and encouraged him to attend head and neck cancer survivor alliance which allowed the patient to accept the altered body image and reaffirm self-worth. Hopefully, through sharing this nursing experience will help to the nursing care quality of nursing care for oral cancer patients after extensive resection and modified right lateral neck lymph node dissection followed by reconstruction with a skin flap.

Keywords: oral cancer, acute pain, impaired oral mucous membrane, body image change

Procedia PDF Downloads 187
226 Campaign Contributions as Freedom of Expression: A Comparative Study Between the United States and Germany

Authors: Kristof Lukas Heidemann

Abstract:

In times of democratic backsliding in Western nations restoring public trust in the electoral process ranks among the most urgent tasks on the public agenda. Addressing the role of money in politics is one major part of this effort, however, such an endeavor might affect the constitutional freedom of expression. Attempts to regulate political spending in the U.S. have in recent decades increasingly been overruled by the U.S. Supreme through an expansion of the protective umbrella of the First Amendment over campaign contributions by private organizations, especially in the decisions Buckley v. Valeo and Citizens United v. FEC. In Germany on the other hand this line of argumentation has so far not been submitted to the national Supreme Court. Given that voices calling for stricter and more transparent political financing laws in Germany are growing, it seems only a matter of time until the issue will have to be addressed by the country’s judiciary as well. Therefore, this paper conducts a comparative analysis of the constitutional right to free expression in these two leading democracies in to assess whether the problem of a lack of regulatory options to achieve stricter campaign spending laws due to constitutional restrictions will also arise in Germany. In order to present a comprehensive picture of the subject, the analysis does not only touch upon doctrinal aspects of both systems but also scrutinizes the practical implications from a socio-legal perspective. Although the list of forms of expression in the wording of Art. 5 of the German constitution is generally considered to be non-exhaustive, the investigation concludes that the subsumption of election campaign donations under it is not justifiable using recognized methods of interpretation, in particular concerning a systematic interpretation in light of the principle of equality in Art. 3 of the German constitution.

Keywords: comparative constitutional law, constitutional justice, constitutional law, election law, freedom of speech, fundamental rights, law reform

Procedia PDF Downloads 6
225 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: unified theory of acceptance and use of technology (UTAUT) model, UTAUT2 model, smart national identity card (SNIC), health information application, privacy calculus model (PCM)

Procedia PDF Downloads 467
224 Splinting in Plastic Surgery Hand Trauma Setting

Authors: Samar Mousa, Rebecca Shirley

Abstract:

Injuries to the hand account for 20% of all emergency department attendances, with an estimated annual treatment cost of over £100 million in the UK. Functional impairments as a result of hand injuries often necessitate absence from employment, resulting in reduced productivity estimated to incur an additional £600m loss to the UK economy. Appropriate and early management is vital to preserve anatomy, prevent stiffness and allow function. The initial assessment and management of hand injuries are usually undertaken by junior staff, many of whom have little or no training or experience in splinting hand fractures. In our plastic surgery department at Stoke Mandeville hospital Buckinghamshire trust, we carried out an audit project to detect errors in hand splinting in the period between April 2022 and July 2022 and find out measures to support junior doctors, nurses and hand therapists in providing the best possible care for hand trauma patients. Our standards were The British Society for Surgery of the Hand (BSSH) standard of care in hand trauma, AO surgery reference and Stoke Mandeville hospital hand therapy mini protocol Feb 2022 During the period of 4 months, 5 cases were identified. Two cases of wrong splint choice, two cases of early removal of the splint and one tight splint that required change. In order to avoid those mistakes, a training program was given to junior doctors and nurses in collaboration with the hand therapy team regarding ways of splinting the hand in different injuries like fractures, tendons injuries, muscle injuries and ligamentous injuries. In addition to, a poster hung in the examination rooms and theatres to help junior doctors reach the correct decision.

Keywords: splinting, hand trauma, plastic surgery, tendon injury, hand fracrture

Procedia PDF Downloads 85
223 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 141
222 Agro-Insurance and Farming Development Opportunities in Georgia

Authors: Tamar Lazariashvili

Abstract:

Introduction: The agro-insurance has great importance for agricultural development in the country. In the article, the insurance market of the Georgian agricultural sector has been studied, the level of interest of farmers with insurance products and the trend of demand for those products are revealed; also, the importance of insurance is substantiated. Methodology: The following research methods are applied in the presented paper: statistical (selection, grouping, observation, trend) and qualitative research (in-depth interview with farmers). They claim that the main reason for aggravation is the low level of trust, less awareness about the conditions of the insurance contract. In order to eradicate distrust towards agro-insurance, it is recommended to increase awareness of insured farmers in terms of an insurance agreement. In the case of disputable issues between insurance companies and the customers (farmers), it is advisable to enact the Mediation Service, which will be able to protect the rights of insured farmers. Main Findings: Insurance companies prefer to deal with large farmers, the number of them is very small in Georgia as the credit market. The government interference in this sector is also a very cautious topic. However, the government can strengthen the awareness of farmers about the characteristics and advantages of the insurance system in order to increase the number of insured and reduce insurance premiums for farmers. Conclusion: Enactment of agro-insurance will increase the interest and confidence of financial institutions in the farming sector, financial resources will be accessible to the farmers that will facilitate the stable development of the sector in the country. The size of the agro-insurance market in the country should be increased, and the new territories should be covered. The State must have an obligation to ensure the risk of farmers and subsidize insurance companies. Based on the analysis of the insurance market, the conclusions on agro-insurance issues and the relevant recommendations are proposed.

Keywords: Agro-insurance, agricultural product, Agro-market, farming

Procedia PDF Downloads 122
221 Commercial Law Between Custom and Islamic Law

Authors: Mohamed Zakareia Ghazy Aly Belal

Abstract:

Commercial law is the set of legal rules that apply to business and regulates the trade of trade. The meaning of this is that the commercial law regulates certain relations only that arises as a result of carrying out certain businesses. which are business, as it regulates the activity of a specific sect, the sect of merchants, and the commercial law as other branches of the law has characteristics that distinguish it from other laws and various, and various sources from which its basis is derived from It is the objective or material source. the historical source, the official source and the interpretative source, and we are limited to official sources and explanatory sources. so what do you see what these sources are, and what is their degree and strength in taking it in commercial disputes. The first topic / characteristics of commercial law. Commercial law has become necessary for the world of trade and economics, which cannot be dispensed with, given the reasons that have been set as legal rules for commercial field. In fact, it is sufficient to refer to the stability and stability of the environment, and in exchange for the movement and the speed in which the commercial environment is in addition to confidence and credit. the characteristic of speed and the characteristic of trust, and credit are the ones that justify the existence of commercial law. Business is fast, while civil business is slow, stable and stability. The person concludes civil transactions in his life only a little. And before doing any civil action. he must have a period of thinking and scrutiny, and the investigation is the person who wants the husband, he must have a period of thinking and scrutiny. as if the person who wants to acquire a house to live with with his family, he must search and investigate Discuss the price before the conclusion of a purchase contract. In the commercial field, transactions take place very quickly because the time factor has an important role in concluding deals and achieving profits. This is because the merchant in contracting about a specific deal would cause a loss to the merchant due to the linkage of the commercial law with the fluctuations of the economy and the market. The merchant may also conclude more than one deal in one and short time. And that is due to the absence of commercial law from the formalities and procedures that hinder commercial transactions.

Keywords: law, commercial law, business, commercial field

Procedia PDF Downloads 70
220 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 130
219 Voters' Acceptance of Anti-guardians' Narratives: Electoral Politics in Establishmentarian Democracies

Authors: Rai Mansoor Imtiaz

Abstract:

Guardians in hybrid regimes fragment opposition parties and ban their political leaders, and disenfranchise their voters' political participation. When guardians in hybrid regimes are so powerful that they remain decisive on electoral politics of states, and have powers to ban political parties and their leadership, then "why do political parties backed by those powerful guardians lose elections" and "how do anti-establishment parties make electoral inroads at the local and national levels." These two questions are interrelated with the key research question of my research "why do people vote for political parties rejected by powerful guardians in establishmentarian democracies." Furthermore, this research question is important to be explored for two reasons. First, existing literature only reflects the electoral victories of opposition parties or defeats of military-sponsored parties (see Thailand and Turkey) but remains silent on political change that led the anti-military parties to win the elections. Second, why is it a case that people belonging to the countries where militaries remain popular among the public (see Turkey and Pakistan) have started putting their trust in anti-establishment politicians who criticise the military against their intervention in politics? For instance, in Pakistan, where commenting against the military is meant to comment against the state –– an anti-military narrative is getting popular support. The conceptual framework of hybrid states in this research relies on the concept of a 'reserved domain/tutelary body' (guardians of hybrid states). However, this research makes a case that hybrid states are not consolidated separate political entities but rather vacillated states that fluctuate between democratic and authoritarian practices. This paper, therefore, uses the term establishmentarian democracy as a subtype of the hybrid regime, which is more consolidated than a hybrid democracy.

Keywords: Guardians, Hybrid Regimes, Voters, Elections, Democracy, South Asia

Procedia PDF Downloads 105
218 Analyzing Apposition and the Typology of Specific Reference in Newspaper Discourse in Nigeria

Authors: Monday Agbonica Bello Eje

Abstract:

The language of the print media is characterized by the use of apposition. This linguistic element function strategically in journalistic discourse where it is communicatively necessary to name individuals and provide information about them. Linguistic studies on the language of the print media with bias for apposition have largely dwelt on other areas but the examination of the typology of appositive reference in newspaper discourse. Yet, it is capable of revealing ways writers communicate and provide information necessary for readers to follow and understand the message. The study, therefore, analyses the patterns of appositional occurrences and the typology of reference in newspaper articles. The data were obtained from The Punch and Daily Trust Newspapers. A total of six editions of these newspapers were collected randomly spread over three months. News and feature articles were used in the analysis. Guided by the referential theory of meaning in discourse, the appositions identified were subjected to analysis. The findings show that the semantic relation of coreference and speaker coreference have the highest percentage and frequency of occurrence in the data. This is because the subject matter of news reports and feature articles focuses on humans and the events around them; as a result, readers need to be provided with some form of detail and background information in order to identify as well as follow the discourse. Also, the non-referential relation of absolute synonymy and speaker synonymy no doubt have fewer occurrences and percentages in the analysis. This is tied to a major feature of the language of the media: simplicity. The paper concludes that appositions is mainly used for the purpose of providing the reader with much detail. In this way, the writer transmits information which helps him not only to give detailed yet concise descriptions but also in some way help the reader to follow the discourse.

Keywords: apposition, discourse, newspaper, Nigeria, reference

Procedia PDF Downloads 173
217 The Problem of Child Exploitation on Twitter: A Socio-Anthropological Perspective on Content Filtering Gaps

Authors: Samig Ibayev

Abstract:

This research addresses the problem of illegal child abuse content on the Twitter platform bypassing filtering systems and appearing before users from a social-anthropological perspective. Although the wide access opportunities provided by social media platforms to their users are beneficial in many ways, it is seen that they contain gaps that pave the way for the spread of harmful and illegal content. The aim of the study is to examine the inadequacies of the current content filtering mechanisms of the Twitter platform, to understand the psychological effects of young users unintentionally encountering such content and the social dimensions of this situation. The research was conducted with a qualitative approach and was conducted using digital ethnography, content analysis and user experiences on the Twitter platform. Digital ethnography was used to observe the frequency of child abuse content on the platform and how these contents were presented. The content analysis method was used to reveal the gaps in Twitter's current filtering mechanisms. In addition, detailed information was collected on the extent of psychological effects and how the perception of trust in social media changed through interviews with young users exposed to such content. The main contributions of the research are to highlight the weaknesses in the content moderation and filtering mechanisms of social media platforms, to reveal the negative effects of illegal content on users, and to offer suggestions for preventing the spread of such content. As a result, it is suggested that platforms such as Twitter should improve their content filtering policies in order to increase user security and fulfill their social responsibilities. This research aims to create significant awareness about social media content management and ethical responsibilities on digital platforms.

Keywords: Twitter, child exploitation, content filtering, digital ethnography, social anthropology

Procedia PDF Downloads 9
216 The Role of Leader, Member Exchange on Psychological Capital, Mediated by Person-Organisational Fit

Authors: Sonja Grobler

Abstract:

Background: Leadership and specifically Leader, member exchange has a definite impact on employee behaviour and attitudes, and specifically their state of psychological capital. The interactionist construct of person-organisational fit (P-O fit), consisting of a combination of supplementary fit (indirect fit or value congruence) and complementary fit (direct or person-job fit, as well as needs-supply fit) may, however, impact on the relationship between LMX and psychological capital. The unique permutations of these relationships are important not only for conceptualisation purposes but also for intervention design to enhance the employees’ psychological capital; this would contribute to positive employee behaviour and attitudes. Aim: The purpose of this study was to determine whether a relationship exists between Leader, Member Exchange (LMX) and psychological capital, with possible mediation by P-O fit. Setting: The research was conducted with ± 60 employees from each of 43 private sectors and four public sector organisations in South Africa. Method: This study utilised a positivist methodology based on an empirical approach while using a cross-sectional design and quantitative analysis. The sample is relatively representative (in terms of race, gender, and the South African work force), as it consisted of 60 employees from each of the 43 South African organisations that participated in the study, with 2 486 respondents in total. Results: Significant, positive relationships were found between LMX, P-O fit, and psychological capital. Additionally, it was found that P-O fit partially mediates the relationship between ethical leadership and supervisory trust, confirming the proposed model. Conclusion: A strong, positive relationship exists between LMX (consisting of Affect, Loyalty, Contribution, and Professional Respect) and psychological capital (consisting of Self-efficacy, Hope, Resilience and Optimism) which is partially mediated by P-O fit (consisting of supplementary fit and complementary fit).

Keywords: leader and member exchange, person-organisational fit, psychological capital, positive psychology, interactionist approach

Procedia PDF Downloads 152
215 Navigating Shadows: Examining a Moderation Mediation model of Punitive supervision, Innovative Work Behavior and Employee’s Knowledge Hiding

Authors: Sadia Anwara, Weng Qingxionga, Jahan Zeb Aslamb

Abstract:

Drawing on the Conservation of Resources Theory and Theory of Displaced Aggression, current research study aims to explore the impact of an emerging destructive leadership style i.e., Punitive Supervision on the Employees’ Innovative Work Behavior (IWB) and Employee’s Knowledge Hiding (EKH) within the hospitality sector of Pakistan. This paper further elaborates the underlying mechanism by introducing job security as the mediator and Perceived Organisational Support (POS) as the coping mechanism to manage the deteriorating effects of Punitive supervision on the IWS and EKH. Two wave data (N=267) was obtained from the frontline employees of the hospitality sector of Pakistan in order to test the hypothesized moderation mediation model. Study findings unveiled that, punitive supervision negatively affects employees' innovative work behavior (IWB) and increases employee’s knowledge hiding (EKH), with job insecurity serving as a significant mediator in these relationships. Specifically, punitive supervision increases employees' perceptions of job insecurity, decreasing their innovative work behaviors and increasing their tendencies to engage in knowledge hiding. From a managerial perspective, this research study suggests that managers must evaluate their behavior and leadership style to prevent the drastic effect of dark leadership on the employee’s IWB and EKH. In addition, organizations must strive to foster an organizational culture of trust and open communication to reduce job insecurity. Employees should receive sufficient training and development opportunities to reduce job insecurity, while clear performance expectations and constructive feedback should be encouraged to help them excel.

Keywords: punitive supervision, job insecurity, perceived organisational support, innovative work behavior, knowledge hiding

Procedia PDF Downloads 22
214 Commercial Law Between Custom and Islamic Law

Authors: Shimaa Abdel-Rahman Amin El-Badawy

Abstract:

Commercial law is the set of legal rules that apply to business and regulates the trade of trade. The meaning of this is that the commercial law regulates certain relations only that arises as a result of carrying out certain businesses. which are business, as it regulates the activity of a specific sect, the sect of merchants, and the commercial law as other branches of the law has characteristics that distinguish it from other laws and various, and various sources from which its basis is derived from It is the objective or material source. the historical source, the official source and the interpretative source, and we are limited to official sources and explanatory sources. so what do you see what these sources are, and what is their degree and strength in taking it in commercial disputes. The first topic / characteristics of commercial law. Commercial law has become necessary for the world of trade and economics, which cannot be dispensed with, given the reasons that have been set as legal rules for commercial field.In fact, it is sufficient to refer to the stability and stability of the environment, and in exchange for the movement and the speed in which the commercial environment is in addition to confidence and credit. the characteristic of speed and the characteristic of trust, and credit are the ones that justify the existence of commercial law.Business is fast, while civil business is slow, stable and stability. The person concludes civil transactions in his life only a little. And before doing any civil action. he must have a period of thinking and scrutiny, and the investigation is the person who wants the husband, he must have a period of thinking and scrutiny. as if the person who wants to acquire a house to live with with his family, he must search and investigate. Discuss the price before the conclusion of a purchase contract. In the commercial field, transactions take place very quickly because the time factor has an important role in concluding deals and achieving profits. This is because the merchant in contracting about a specific deal would cause a loss to the merchant due to the linkage of the commercial law with the fluctuations of the economy and the market. The merchant may also conclude more than one deal in one and short time. And that is due to the absence of commercial law from the formalities and procedures that hinder commercial transactions.

Keywords: law, commercial law, Islamic law, custom and Islamic law

Procedia PDF Downloads 73
213 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 361
212 Impact of Social Networks on Agricultural Technology Adoption: A Case Study of Ongoing Extension Programs for Paddy Cultivation in Matara District in Sri Lanka

Authors: Paulu Saramge Shalika Nirupani Seram

Abstract:

The study delves into the complex dynamics of social networks and how they affect paddy farmers’ adoption of agricultural technologies, which are included in Yaya Development program, Weedy rice program and Good Agricultural Practices (GAP) program in Matara district. Identify the social networks among the farmers of ongoing Extension Programs in Matara district, examine the farmers’ adoption level to the ongoing extension programs in Matara district, analyze the impacts of social networks for the adoption to the technologies of ongoing extension programs and give suggestions and recommendations to improve the social network of paddy farmers in Matara District for ongoing extension programs are the objectives of this research. A structured questionnaire survey was conducted with 25 farmers from Matara-North (Wilpita), 25 farmers from Matara-Central (Kamburupitiya), and 25 farmers from Matara-South (Malimbada). UCINET (Version -6.771) software was used for social network analysis, and other than that, descriptive statistics and inferential statistics were used to analyze the findings. Matara-North has the highest social network density, and Matara-South has the lowest social network density according to the social network analysis. Dissemination of intensive technologies requires the most prominent actors of the social network, and in Matara district, agricultural instructors have the highest ability to disseminate technologies. The influence of actors in the social network, the trustworthiness of AI officers, and the trust of indigenous knowledge about paddy cultivation have a significant effect on the technology adoption of farmers. The research endeavors to contribute a nuanced understanding of the social networks and agricultural technology adoption in Matara District, offering practical insights for stakeholders involved in agricultural extension services.

Keywords: agricultural extension, paddy cultivation, social network, technology adoption

Procedia PDF Downloads 63
211 Factors Affecting M-Government Deployment and Adoption

Authors: Saif Obaid Alkaabi, Nabil Ayad

Abstract:

Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.

Keywords: e-government, m-government, system dependability, system security, trust

Procedia PDF Downloads 381
210 Bahrain Experience in Supporting Small and Medium Enterprises by the Utilization of E-Government

Authors: Najla Alhkalaf

Abstract:

The focus of this study is answering the following question: How do e-government services in Bahrain support the productivity of SMEs? This study examines the current E-government function in enhancing SME productivity in Bahrain through analysing the efficiency of e- government by viewing its facilitators and barriers from the perspective of different stakeholders. The study aims to identify and develop best practice guidelines with the end-goal of creating a standardised channel of communication between e-government and SMEs that fulfil the requirement of SME owners, and thus achieve the prime objective of e-government. E-government services for SMEs have been offered in Bahrain since 2005. However, the current services lack the required mechanism for SMEs to fully take advantage of these services because of lagging communication between service provider and end-user. E-government employees believe that a lack of awareness and trust are the main stumbling block, whereas the SME owners believe that there is a lack of sufficiency in the content and efficiency provided through e- services. A questionnaire has been created based on a pilot study that highlighted the main indicators of e-government efficiency and SMEs productivity as well as previous studies conducted on this subject. This allowed for quantitative data to be extracted. Also interviews were conducted with SME owners and government employees from both case studies, which formed the qualitative data for this study. The findings portray that both the service provider and service receiver largely agree on the existence of most of the technical and administrative barriers. However, the data reflects a level of dissatisfaction from the SME side, which contradicts with the perceived level of satisfaction from the government employees. Therefore, the data supports the argument that assures the existence of a communication gap between stakeholders. To this effect, this research would help build channels of communication between stakeholders, and then induces a plan unlocking the potential of e-government application. The conclusions of this study will help devise an optimised E-government strategy for Bahrain.

Keywords: e-government, SME, e-services, G2B, government employees' perspective, entrepreneurs' perspective, enterprise

Procedia PDF Downloads 231
209 A Self-Study of the Facilitation of Science Teachers’ Action Research

Authors: Jawaher A. Alsultan, Allen Feldman

Abstract:

With the rapid switch to remote learning due to the COVID-19 pandemic, science teachers were suddenly required to teach their classes online. This breakneck shift to eLearning raised the question of how teacher educators could support science teachers who wanted to use reform-based methods of instruction while using virtual technologies. In this retrospective self-study, we, two science teacher educators, examined our practice as we worked with science teachers to implement inquiry, discussion, and argumentation [IDA] through eLearning. Ten high school science teachers from a large school district in the southeastern US participated virtually in the COVID-19 Community of Practice [COVID-19 CoP]. The CoP met six times from the end of April through May 2020 via Zoom. Its structure was based on a model of action research called enhanced normal practice [ENP], which includes exchanging stories, trying out ideas, and systematic inquiry. Data sources included teacher educators' meeting notes and reflective conversations, audio recordings of the CoP meetings, teachers' products, and post-interviews of the teachers. Findings included a new understanding of the role of existing relationships, shared goals, and similarities in the participants' situations, which helped build trust in the CoP, and the effects of our paying attention to the science teachers’ needs led to a well-functioning CoP. In addition, we became aware of the gaps in our knowledge of how the teachers already used apps in their practice, which they then shared with all of us about how they could be used for online teaching using IDA. We also identified the need to pay attention to feelings about tensions between the teachers and us around the expectations for final products and the project's primary goals. We found that if we are to establish relationships between us as facilitators and teachers that are honest, fair, and kind, we must express those feelings within the collective, dialogical processes that can lead to learning by all members of the CoP, whether virtual or face-to-face.

Keywords: community of practice, facilitators, self-study, action research

Procedia PDF Downloads 124
208 A Study of Industrial Symbiosis and Implementation of Indigenous Circular Economy Technique on an Indian Industrial Area

Authors: A. Gokulram

Abstract:

Industrial waste is often categorized as commercial and non-commercial waste by market value. In many Indian industries and other industrialized countries, the commercial value waste is capitalized and non-commercial waste is dumped to landfill. A lack of adequate research on industrial waste leads to the failure of effective resource management and the non-commercial waste are being considered as commercially non-viable residues. The term Industrial symbiosis refers to the direct inter-firm reuse or exchange of material and energy resource. The resource efficiency of commercial waste is mainly followed by an informal symbiosis in our research area. Some Industrial residues are reused within the facility where they are generated, others are reused directly nearby industrial facilities and some are recycled via the formal and informal market. The act of using industrial waste as a resource for another product faces challenges in India. This research study has observed a major negligence of trust and communication among several bodies to implement effective circular economy in India. This study applies interviewing process across researchers, government bodies, industrialist and designers to understand the challenges of circular economy in India. The study area encompasses an industrial estate in Ahmedabad in the state of Gujarat which comprises of 1200 industries. The research study primarily focuses on making industrial waste as commercial ready resource and implementing Indigenous sustainable practice in modern context to improve resource efficiency. This study attempted to initiate waste exchange platform among several industrialist and used varied methodologies from mail questionnaire to telephone survey. This study makes key suggestions to policy change and sustainable finance to improve circular economy in India.

Keywords: effective resource management, environmental policy, indigenous technique, industrial symbiosis, sustainable finance

Procedia PDF Downloads 135
207 Aristotelian Techniques of Communication Used by Current Affairs Talk Shows in Pakistan for Creating Dramatic Effect to Trigger Emotional Relevance

Authors: Shazia Anwer

Abstract:

The current TV Talk Shows, especially on domestic politics in Pakistan are following the Aristotelian techniques, including deductive reasoning, three modes of persuasion, and guidelines for communication. The application of “Approximate Truth is also seen when Talk Show presenters create doubts against political personalities or national issues. Mainstream media of Pakistan, being a key carrier of narrative construction for the sake of the primary function of national consensus on regional and extended public diplomacy, is failing the purpose. This paper has highlighted the Aristotelian communication methodology, its purposes and its limitations for a serious discussion, and its connection to the mistrust among the Pakistani population regarding fake or embedded, funded Information. Data has been collected from 3 Pakistani TV Talk Shows and their analysis has been made by applying the Aristotelian communication method to highlight the core issues. Paper has also elaborated that current media education is impaired in providing transparent techniques to train the future journalist for a meaningful, thought-provoking discussion. For this reason, this paper has given an overview of HEC’s (Higher Education Commission) graduate-level Mass Com Syllabus for Pakistani Universities. The idea of ethos, logos, and pathos are the main components of TV Talk Shows and as a result, the educated audience is lacking trust in the mainstream media, which eventually generating feelings of distrust and betrayal in the society because productions look like the genre of Drama instead of facts and analysis thus the line between Current Affairs shows and Infotainment has become blurred. In the last section, practical implication to improve meaningfulness and transparency in the TV Talk shows has been suggested by replacing the Aristotelian communication method with the cognitive semiotic communication approach.

Keywords: Aristotelian techniques of communication, current affairs talk shows, drama, Pakistan

Procedia PDF Downloads 204
206 Case Study of Sexual Violence Victim Assessment in Semarang Regency

Authors: Sujana T, Kurniasari MD, Ayakeding AM

Abstract:

Background: Sexual violence is one of the violence with high incidence in Indonesia. Purpose: This research aims to describe the implementation of sexual violence victim assessment in Semarang Regency. Method: This research is a qualitative research with embeded single case study design. Data is analized with two units of analysis. The first unit of analysis is victim’s examiner with minimum one year of work experience. Semi-structured interview method is used to obtain the data. The second unit of analysis is document related. The data is taken by observing the pathway and description of every document and how it supported each implementation of assessment. Results: This study is resulted with three themes, which are: The first theme is assessments of sexual violence in Semarang regency has been standardized. The laws of the Republic of Indonesia have regulated the handling of victims of sexual violence in outline. Victims of sexual violence can be dealt with by the police, the Integrated Service Center for Women and Children Empowerment and the Regional General Hospital. Each examination site has different operational procedures standards for dealing with victims of sexual violence. Cooperation with family and witnesses is also required in the review process to obtain accurate results and evidence; The second idea that resulted from this study is there are inhibits factors in the assessments process. Victims sometimes feel embarrassed and reluctant to recount the chronological events during reporting. The examining officer should be able to approach and build a trust to convince the victim to be able to cooperate. The third theme is there are other things to consider in the process of assessing victims of sexual violence. Ensuring implementation in accordance with applicable operational procedures standards, providing exclusive examination rooms, counseling and safeguarding the privacy of victims are important to be considered in the assessment.

Keywords: assessment, case study, Semarang regency, sexual violence

Procedia PDF Downloads 140
205 Dermoscopy Compliance: Improving Melanoma Detection Pathways Through Quality Improvement

Authors: Max Butler

Abstract:

Melanoma accounts for 80% of skin cancer-related deaths globally. The poor prognosis and increasing incidence of melanoma impose a significant burden on global healthcare systems. Early detection, precise diagnosis, and preventative strategies are critical to improving patient outcomes. Dermoscopy is the gold standard for specialist assessments of pigmented skin lesions, as it can differentiate between benign and malignant growths with greater accuracy than visual inspection. In the United Kingdom, guidelines from the National Institute of Clinical Excellence (NICE) state dermoscopy should be used in all specialist assessments of pigmented skin lesions. Compliance with this guideline is low, resulting in missed and delayed melanoma diagnoses. To address this problem, a quality improvement project was initiated at Buckinghamshire Healthcare Trust (BHT) within the plastic surgery department. The target group was a trainee and consultant plastic surgeons conducting outpatient skin cancer clinics. Analysis of clinic documentation over a one-month period found that only 62% (38/61) of patients referred with pigmented skin lesions were examined using dermoscopy. To increase dermoscopy rates, teaching was delivered to the department highlighting national guidelines and the evidence base for dermoscopic examination. In addition, clinic paperwork was redesigned to include a text box for dermoscopic examination. Reauditing after the intervention found a significant increase in dermoscopy rates (52/61, p = 0.014). In conclusion, implementing a quality improvement project with targeted teaching and documentation template templates successfully increased dermoscopy rates. This is a promising step toward improving early melanoma detection and patient outcomes.

Keywords: melanoma, dermoscopy, plastic surgery, quality improvement

Procedia PDF Downloads 70
204 Intuition in Negotiation within Ghanaian Social Contexts: Exploring Female Leadership Strategies for Conflict Transformation

Authors: Nadia Naadu Nartey, Esther A.O.G. Tetteh

Abstract:

Male negotiator representations and the appreciation of masculine traits in negotiation contexts dominate negotiation research in the field of conflict management and resolution. This study switched focus to pay attention to rarely examined gendered criteria and social contexts in negotiation research by investigating how intuition has been used in negotiations by female leaders toward conflict transformation in Ghanaian social contexts. Using the theoretical lenses of Klein’s Recognition-Primed Decisions (RPD) and Unconscious Information Processing (UIP) models, this study employs narrative inquiry in qualitative research. Semi-structured interviews of five (5) female leaders of Ghanaian social contexts in the United States (US) revealed that the use of intuition is necessary for effective negotiation outcomes due to its primal focus on relationship-building toward transforming conflicts. The knowledge added to the body of research by this study is summed up in the study’s conceptual framework. Female leaders, in negotiation situations where there are conflicting parties, prioritize the greater need for stronger relationships and win-win outcomes. The participant female leaders in negotiation contexts utilize their intuition as a bonding mechanism by effectively timing their actions, using an appropriate communication tone, emphasizing relationship building, and drawing from experience to make sound situational judgments (as in assessing a situation in the RPD model). Female leaders’ use of intuition in negotiations then translates to creating a force that bridges the gap between the conflicting parties. That force is noticed as conflict transformation that manifests as a reduction in anger and a promotion of trust and mutual understanding toward strengthening relationships. Future studies can expand the scope of the findings of this research by conducting a comparative analysis between male and female leaders on their use of intuition in negotiations in Ghanaian contexts.

Keywords: intuition, negotiation, conflict transformation, female leaders, ghanaian social contexts

Procedia PDF Downloads 11
203 An Analysis of the Dominance of Migrants in the South African Spaza and Retail market: A Relationship-Based Network Perspective

Authors: Meron Okbandrias

Abstract:

The South African formal economy is rule-based economy, unlike most African and Asian markets. It has a highly developed financial market. In such a market, foreign migrants have dominated the small or spaza shops that service the poor. They are highly competitive and capture significant market share in South Africa. This paper analyses the factors that assisted the foreign migrants in having a competitive age. It does that by interviewing Somali, Bangladesh, and Ethiopian shop owners in Cape Town analysing the data through a narrative analysis. The paper also analyses the 2019 South African consumer report. The three migrant nationalities mentioned above dominate the spaza shop business and have significant distribution networks. The findings of the paper indicate that family, ethnic, and nationality based network, in that order of importance, form bases for a relationship-based business network that has trust as its mainstay. Therefore, this network ensures the pooling of resources and abiding by certain principles outside the South African rule-based system. The research identified practises like bulk buying within a community of traders, sharing information, buying from a within community distribution business, community based transportation system and providing seed capital for people from the community to start a business is all based on that relationship-based system. The consequences of not abiding by the rules of these networks are social and economic exclusion. In addition, these networks have their own commercial and social conflict resolution mechanisms aside from the South African justice system. Network theory and relationship based systems theory form the theoretical foundations of this paper.

Keywords: migrant, spaza shops, relationship-based system, South Africa

Procedia PDF Downloads 127
202 Judging Restoration Success of Kamisaigo River Japan

Authors: Rita Lopa, Yukihiro Shimatani

Abstract:

The focus of this research is 880m extension development along the Kamisaigo River. The river is flowing tributary of grade 2 rivers Fukutsu City, Fukuoka Prefecture. This river is a small-scale urban river and the river was formerly a straight concrete sea wall construction. The river runs through National Highway No. 3 from the confluence of Saigo River. The study covers the river basin about 326 ha with a catchment area of 20.63 ha and 4,700 m3 capacity regulating pond. The river is not wide, shallow, and has a straight alignment with active (un-vegetated) river channel sinuosity (ratio of river length to valley length) ranging between 1 and 1.3. However, the alignment of the low-flow river channel does have meandering or sinuous characteristics. Flooding is likely to occur. It has become difficult to live in the environment for organisms of the river. Hydrophilic is very low (children cannot play). There is little connection with the local community. Overall, the Kamisaigo River watershed is heavily urbanized and from a morphological, biological and habitat perspective, Kamisaigo River functions marginally not well. For river improvement and maintenance of the Kamisaigo River, the workshop was conducted in the form of planning for the proposed model is presented by the Watershed Management Laboratory. This workshop showed the relationship between citizens, City Government, and University of mutual trust has been established, that have been made landscape, environment, usage, etc.: retaining wall maintenance, hydrophilic zone, landscape zone, nature walks zone: adjacent medical facilities and adjacent to large commercial facilities. Propose of Nature walks zone with point of the design: provide slope that the wheelchair can access and walking paths to enjoy the scenery, and summary of the Kamisaigo River workshop: creating a multi-model study and creation of natural rivers.

Keywords: river restoration, river improvement, natural rivers, Saigo River

Procedia PDF Downloads 356
201 The Role of Institutions in Community Wildlife Conservation in Zimbabwe

Authors: Herbert Ntuli, Edwin Muchapondwa

Abstract:

This study used a sample of 336 households and community level data from 30 communities around the Gonarezhou National Park in Zimbabwe to analyse the association between ability to self-organize or cooperation and institutions on one hand and the relationship between success of biodiversity outcomes and cooperation on the other hand. Using both the ordinary least squares and instrumental variables estimation with heteroskedasticity-based instruments, our results confirmed that sound institutions are indeed an important ingredient for cooperation in the respective communities and cooperation positively and significantly affects biodiversity outcomes. Group size, community level trust, the number of stakeholders and punishment were found to be important variables explaining cooperation. From a policy perspective, our results show that external enforcement of rules and regulations does not necessarily translate into sound ecological outcomes but better outcomes are attainable when punishment is rather endogenized by local communities. This seems to suggest that communities should rather be supported in such a way that robust institutions that are tailor made to suit the needs of local condition will emerge that will in turn facilitate good environmental husbandry. Cooperation, training, benefits, distance from the nearest urban canter, distance from the fence, social capital average age of household head, fence and information sharing were found to be very important variables explaining the success of biodiversity outcomes ceteris paribus. Government programmes should target capacity building in terms of institutional capacity and skills development in order to have a positive impact on biodiversity. Hence, the role of stakeholders (e.g., NGOs) in capacity building and government effort should complement each other to ensure that the necessary resources are mobilized and all communities receive the necessary training and resources.

Keywords: institutions, self-organize, common pool resources, wildlife, conservation, Zimbabwe

Procedia PDF Downloads 281
200 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 77