Search results for: new edge trust company
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3153

Search results for: new edge trust company

2613 An Examination of Internal Control System, Executive Duality and Audit Alarm Committee of Listed Nigerian Companies

Authors: Mansur Lubabah Kwanbo

Abstract:

Existing literatures have demonstrated the importance of executive duality (ED) and audit committee (AC) in the financial growth of companies. To some extent this points to corporate governance mechanism aiming at addressing makers and implementers of company policies to be centered on promoting only company objectives. However, furthering organizational objectives needs an adequate structure of control to realize that. Recent development in the various industries in Nigeria have indicated the internal control system (ICS)has not been able to adequately address most of the activities that results in ills of sustaining growth for these industries. It is from this premise the study has as one of its objective to determine the extent to which ICS significantly relates to ED and AC in listed Nigerian corporation. Data were sourced from 308 financial statements and accounts of the corporations that made the sample of the study. Logistic regression aided the test of the hypothesis formulated for the study. Findings revealed a significant relationship between the study variables. The study concludes that the internal control system (ICS) is effective despite the bifurcation of executive duality (ED) and the presence of the Audit Committee (AC) to the extent of preventing ills that encourage lack of sustainability of company’s growth. Sustaining legitimate policies that translate into huge earnings, and create value to stake holders should be pursued.

Keywords: audit committee (AC), executive duality (ED), internal control system (ICS), Nigeria

Procedia PDF Downloads 297
2612 The Characteristics of the Chairman of Board of Directors That Are Associated with Better Levels of Performance

Authors: Abilio Pires Zacarias

Abstract:

Analyzing company boards of directors is a relevant and timely topic. As the representative of shareholders, the board is the most senior management body of this type of company. Therefore, ascertaining the best kind of candidates to nominate, namely the most appropriate characteristics for leading the board to achieve better levels of performance, is certainly of great interest. The companies selected for this study were the 1,000 largest non-financial companies and the 100 largest financial companies in Portugal according to the Instituto Nacional de Estatística for 2010. The information stemmed from a questionnaire addressed to the person in charge of daily company management and then processed through STATA 17 with the multivariate analysis of variables - MANOVA. The study may correspondingly report that the vast majority of boards in the sample operate a dual leadership structure. By in terms of its prevalence, unitary leadership represents only a minority. Agency theory and stewardship theory postulate different characteristics for the ideal chairman but neither receive confirmation from our results. On the other hand, our findings do validate the behavioral theory of firms (BToF), concluding that experience is associated with organizational performance. This study is also relevant due to its analysis of companies not listed on the financial markets not only because of their weighting in the economy but also because they remain only very poorly studied in this field and thus also correspondingly contributing to deepening the literature.

Keywords: agency theory, behavioral theory of the firm, board of directors, corporate governance, stewardship theory

Procedia PDF Downloads 182
2611 New Innovation and Sustainability in a Developing Country: The Case of Cameroon

Authors: Lema Catherine Forje

Abstract:

Innovation activates the system of an economy to a new level. Innovation follows a process. The first step in innovation is the idea-generation process. There is widespread appreciation that people go to great lengths, incur expenses: energy and materials to generate innovative ideas. People get inspired, create, and connect. The inspiration also enables the building of a culture of innovation. Data collection was done through a face-to-face interview with the producer of the first Cameroon beer that came out in the early 1960s, a rice producing company, a cement producing company, and 100 women following a type of dressing commonly worn by Cameroonian women (wrappa). There were a total number of one hundred and three interviewees. The implication of this study is for everybody. It sheds light on the factors that are likely to sustain an innovation. Conclusion emphasises continuous research to keep giving the innovation a face lift.

Keywords: entrepreneurship, ideas, innovation, sustainability

Procedia PDF Downloads 297
2610 Contribution to the Success of the Energy Audit in the Industrial Environment: A Case Study about Audit of Interior Lighting for an Industrial Site in Morocco

Authors: Abdelkarim Ait Brik, Abdelaziz Khoukh, Mustapha Jammali, Hamid Chaikhy

Abstract:

The energy audit is the essential initial step to ensure a good definition of energy control actions. The in-depth study of the various energy-consuming equipments makes it possible to determine the actions and investments with best cost for the company. The analysis focuses on the energy consumption of production equipment and utilities (lighting, heating, air conditioning, ventilation, transport). Successful implementation of this approach requires, however, to take into account a number of prerequisites. This paper proposes a number of useful recommendations concerning the energy audit in order to achieve better results, and a case study concerning the lighting audit of a Moroccan company by showing the gains that can be made through this audit.

Keywords: energy audit, energy diagnosis, consumption, electricity, energy efficiency, lighting audit

Procedia PDF Downloads 697
2609 An Image Segmentation Algorithm for Gradient Target Based on Mean-Shift and Dictionary Learning

Authors: Yanwen Li, Shuguo Xie

Abstract:

In electromagnetic imaging, because of the diffraction limited system, the pixel values could change slowly near the edge of the image targets and they also change with the location in the same target. Using traditional digital image segmentation methods to segment electromagnetic gradient images could result in lots of errors because of this change in pixel values. To address this issue, this paper proposes a novel image segmentation and extraction algorithm based on Mean-Shift and dictionary learning. Firstly, the preliminary segmentation results from adaptive bandwidth Mean-Shift algorithm are expanded, merged and extracted. Then the overlap rate of the extracted image block is detected before determining a segmentation region with a single complete target. Last, the gradient edge of the extracted targets is recovered and reconstructed by using a dictionary-learning algorithm, while the final segmentation results are obtained which are very close to the gradient target in the original image. Both the experimental results and the simulated results show that the segmentation results are very accurate. The Dice coefficients are improved by 70% to 80% compared with the Mean-Shift only method.

Keywords: gradient image, segmentation and extract, mean-shift algorithm, dictionary iearning

Procedia PDF Downloads 267
2608 Redesigning the Plant Distribution of an Industrial Laundry in Arequipa

Authors: Ana Belon Hercilla

Abstract:

The study is developed in “Reactivos Jeans” company, in the city of Arequipa, whose main business is the laundry of garments at an industrial level. In 2012 the company initiated actions to provide a dry cleaning service of alpaca fiber garments, recognizing that this item is in a growth phase in Peru. Additionally this company took the initiative to use a new greenwashing technology which has not yet been developed in the country. To accomplish this, a redesign of both the process and the plant layout was required. For redesigning the plant, the methodology used was the Systemic Layout Planning, allowing this study divided into four stages. First stage is the information gathering and evaluation of the initial situation of the company, for which a description of the areas, facilities and initial equipment, distribution of the plant, the production process and flows of major operations was made. Second stage is the development of engineering techniques that allow the logging and analysis procedures, such as: Flow Diagram, Route Diagram, DOP (process flowchart), DAP (analysis diagram). Then the planning of the general distribution is carried out. At this stage, proximity factors of the areas are established, the Diagram Paths (TRA) is developed, and the Relational Diagram Activities (DRA). In order to obtain the General Grouping Diagram (DGC), further information is complemented by a time study and Guerchet method is used to calculate the space requirements for each area. Finally, the plant layout redesigning is presented and the implementation of the improvement is made, making it possible to obtain a model much more efficient than the initial design. The results indicate that the implementation of the new machinery, the adequacy of the plant facilities and equipment relocation resulted in a reduction of the production cycle time by 75.67%, routes were reduced by 68.88%, the number of activities during the process were reduced by 40%, waits and storage were removed 100%.

Keywords: redesign, time optimization, industrial laundry, greenwashing

Procedia PDF Downloads 394
2607 The Influence of Employer Branding Campaign on Organization Commitment and Employee Satisfaction towards Voluntary Intention

Authors: Prabukusumo Prakoso

Abstract:

The topic research aims to analyze the influence of employer branding towards the voluntary turnover intention on employee by projecting the variable of organization commitment and employee satisfaction. To measure each components of employer branding, the author conducted an exploratory study to confirm the items in the questionnaire. There are 80 respondents that are mostly permanent employees at an IT company in Indonesia, including partner and clients to get external viewpoints of employer branding. The result of this research indicates that employer branding has an influence on the voluntary turnover. Furthermore, to maintain the organization commitment in the company, the management can develop employer branding strategy in order to increase employee’s organization commitment.

Keywords: employer branding, organization commitment, employee satisfaction, voluntary intention turnover

Procedia PDF Downloads 327
2606 Improvement of Brain Tumors Detection Using Markers and Boundaries Transform

Authors: Yousif Mohamed Y. Abdallah, Mommen A. Alkhir, Amel S. Algaddal

Abstract:

This was experimental study conducted to study segmentation of brain in MRI images using edge detection and morphology filters. For brain MRI images each film scanned using digitizer scanner then treated by using image processing program (MatLab), where the segmentation was studied. The scanned image was saved in a TIFF file format to preserve the quality of the image. Brain tissue can be easily detected in MRI image if the object has sufficient contrast from the background. We use edge detection and basic morphology tools to detect a brain. The segmentation of MRI images steps using detection and morphology filters were image reading, detection entire brain, dilation of the image, filling interior gaps inside the image, removal connected objects on borders and smoothen the object (brain). The results of this study were that it showed an alternate method for displaying the segmented object would be to place an outline around the segmented brain. Those filters approaches can help in removal of unwanted background information and increase diagnostic information of Brain MRI.

Keywords: improvement, brain, matlab, markers, boundaries

Procedia PDF Downloads 516
2605 The Relationship between Top Management Replacement and Risk, Sale and Cash Volatilities with Respect to Unqualified Audit Opinion

Authors: Mehdi Dasineh, Yadollah Tariverdi, Marzieh H. Takhti

Abstract:

This paper investigated the relationship between top management turnover with risk volatility, sale volatility and fluctuations in the company's cash depending on the unqualified audit report in Tehran Stock Exchange (TSE). In this study, we examined 104 firms over the period 2009-2014 which were selected from (TSE). There was 624 observed year-company data in this research. Hypotheses of this research have been evaluated by using regression tests for example F-statistical and Durbin-Watson. Based on our sample we found significant relationship between top management replacement and risk volatility, sale Volatility and cash volatility with tendency unqualified audit opinion.

Keywords: top management replacement, risk volatility, sale volatility, cash volatility, unqualified audit opinion

Procedia PDF Downloads 284
2604 Total Quality Management in Algerian Manufacturing

Authors: Nadia Fatima Zahra Malki

Abstract:

The aim of the study is to show the role of total Quality Management on firm performance, research relied on the views of a sample managers working in the Marinel pharmaceutical company. The research aims to achieve many objectives, including increasing awareness of the concepts of Total Quality Management on Firm Performance, especially in the manufacturing firm, providing a future vision of the possibility of success, and the actual application of the Principles of Total Quality Management in the manufacturing company. The research adopted a default model was built after a review and analysis of the literature review in the context of one hypothesis's main points at the origin of a group of sub-hypotheses. The research presented a set of conclusions, and the most important of these conclusions was that there is a relationship between the Principles of TQM and Firm Performance.

Keywords: total quality management, competitive advantage, companies, objectives

Procedia PDF Downloads 66
2603 Psychosocial Development: The Study of Adaptation and Development and Post-Retirement Satisfaction in Ageing Australians

Authors: Sahar El-Achkar, Mizan Ahmad

Abstract:

Poor adaptation of developmental milestones over the lifespan can significantly impact emotional experiences and Satisfaction with Life (SWL) post-retirement. Thus, it is important to understand how adaptive behaviour over the life course can predict emotional experiences. Broadly emotional experiences are either Positive Affect (PA) or Negative Affect (NA). This study sought to explore the impact of successful adaptation of developmental milestones throughout one’s life on emotional experiences and satisfaction with life following retirement. A cross-sectional self-report survey was completed by 132 Australian retirees between the ages 55 and 70 years. Three hierarchical regression models were fitted, controlling for age and gender, to predict PA, NA, and SWL. The full model predicting PA was statistically significant overall, F (8, 121) = 17.97, p < .001, account for 57% of the variability in PA. Industry/Inferiority were significantly predictive of PA. The full model predicting NA was statistically significant overall, F (8, 121) = 12.00, p < .001, accounting for 51% of the variability in NA. Age and Trust/Mistrust were significantly predictive of NA. The full model predicting NA was statistically significant overall, F (8, 121) = 12.00, p < .001, accounting for 51% of the variability in NA. Age and Trust/Mistrust were significantly predictive of NA. The full model predicting SWL, F (8, 121) = 11.05, p < .001, accounting for 45% of the variability in SWL. Trust/Mistrust and Ego Integrity/Despair were significantly predictive of SWL. A sense of industry post-retirement is important in generating PA. These results highlight that individuals presenting with adaptation and identity issues are likely to present with adjustment challenges and unpleasant emotional experiences post-retirement. This supports the importance of identifying and understanding the benefits of successful adaptation and development throughout the lifespan and its significance for the self-concept. Most importantly, the quality of lives of many may be improved, and the future risk of continued poor emotional experiences and SWL post-retirement may be mitigated. Specifically, the clinical implications of these findings are that they support the promotion of successful adaption over the life course and healthy ageing.

Keywords: adaptation, development, negative affect, positive affect, retirement, satisfaction with life

Procedia PDF Downloads 74
2602 Antecedents of Knowledge Sharing: Investigating the Influence of Knowledge Sharing Factors towards Postgraduate Research Supervision

Authors: Arash Khosravi, Mohamad Nazir Ahmad

Abstract:

Today’s economy is a knowledge-based economy in which knowledge is a crucial facilitator to individuals, as well as being an instigator of success. Due to the impact of globalization, universities face new challenges and opportunities. Accordingly, they ought to be more innovative and have their own competitive advantages. One of the most important goals of universities is the promotion of students as professional knowledge workers. Therefore, knowledge sharing and transferring at tertiary level between students and supervisors is vital in universities, as it decreases the budget and provides an affordable way of doing research. Knowledge-sharing impact factors can be categorized into three groups, namely: organizational, individual and technical factors. There are some individual barriers to knowledge sharing, namely: lack of time and trust, lack of communication skills and social networks. IT systems such as e-learning, blogs and portals can increase knowledge sharing capability. However, it must be stated that IT systems are only tools and not solutions. Individuals are still responsible for sharing information and knowledge. This paper proposes new research model to examine the effect of individual factors and organisational factors, namely: learning strategy, trust culture, supervisory support, as well as technological factor on knowledge sharing in a research supervision process at the University of Technology Malaysia.

Keywords: knowledge management, knowledge sharing, research supervision, knowledge transferring

Procedia PDF Downloads 449
2601 Application of Corporate Social Responsibility in Small Manufacturing Enterprises

Authors: Winai Rungrittidetch

Abstract:

This paper investigated the operational system, procedures, outcomes, and obstacles during the application of the Corporate Social Responsibility by the small enterprises and other involved groups in the anchor production business of the core firm, Jatura Charoen Chai Company Limited. The paper also aimed to discover ways to improve the stakeholders who participated in the CSR training and advisory programme. The paper utilized the qualitative methodology which included documentary review and semi- structured interview. The interviews were made with 8 respondents as the representative of different groups of the company’s stakeholder. The findings drew out the lessons learned from the participation of the selected small manufacturing enterprises in the CSR training and advisory programme. Some suggestions were also made, addressing the significance of the Philosophy of Sufficiency Economy.

Keywords: corporate, social, responsibility, enterprises

Procedia PDF Downloads 349
2600 Experimental Evaluation of Most Sustainable Companies: Impact on Economic Growth, Return on Equity (ROE) and Methodological Comparison

Authors: Milena Serzante, Viktoriia Stankevich, Yousre Badir

Abstract:

Companies have a significant impact on the environment and society, and sustainability is important not only for ethical concerns but also for financial and economic reasons. The aim of the study is to analyze how the sustainable performance of the company impacts the economy and the business's economic performance. To achieve this goal, such methods as the Pearson correlation, Multiple Linear Regression, Cook's distance method, K-nearest neighbor and COPRAS technique were implemented. The results revealed that there is no significant correlation between different indicators of sustainable development of the company and both GDP and Return on Equity. It indicates that the methodology of evaluating sustainability causes the difference in ranking companies based on sustainable performance.

Keywords: economic impact, sustainability evaluation, sustainable companies, economic indicators, sustainability, GDP, return on equity

Procedia PDF Downloads 92
2599 Evaluating Effectiveness of Training and Development Corporate Programs: The Russian Agribusiness Context

Authors: Ekaterina Tikhonova

Abstract:

This research is aimed to evaluate the effectiveness of T&D (Training and Development) on the example of two T&D programs for the Executive TOP Management run in 2012, 2015-2016 in Komos Group. This study is commissioned to research the effectiveness of two similar corporate T&D programs (within one company) in two periods of time (2012, 2015-2016) through evaluating the programs’ effectiveness using the four-level Kirkpatrick’s model of evaluating T&D programs and calculating ROI as an instrument for T&D program measuring by Phillips’ formula. The research investigates the correlation of two figures: the ROI calculated and the rating percentage scale per the ROI implementation (Wagle’s scale). The study includes an assessment of feedback 360 (Kirkpatrick's model) and Phillips’ ROI Methodology that provides a step-by-step process for collecting data, summarizing and processing the collected information. The data is collected from the company accounting data, the HR budgets, MCFO and the company annual reports for the research periods. All analyzed data and reports are organized and presented in forms of tables, charts, and graphs. The paper also gives a brief description of some constrains of the research considered. After ROI calculation, the study reveals that ROI ranges between the average implementation (65% to 75%) by Wagle’s scale that can be considered as a positive outcome. The paper also gives some recommendations how to use ROI in practice and describes main benefits of ROI implementation.

Keywords: ROI, organizational performance, efficacy of T&D program, employee performance

Procedia PDF Downloads 252
2598 Taguchi Robust Design for Optimal Setting of Process Wastes Parameters in an Automotive Parts Manufacturing Company

Authors: Charles Chikwendu Okpala, Christopher Chukwutoo Ihueze

Abstract:

As a technique that reduces variation in a product by lessening the sensitivity of the design to sources of variation, rather than by controlling their sources, Taguchi Robust Design entails the designing of ideal goods, by developing a product that has minimal variance in its characteristics and also meets the desired exact performance. This paper examined the concept of the manufacturing approach and its application to brake pad product of an automotive parts manufacturing company. Although the firm claimed that only defects, excess inventory, and over-production were the few wastes that grossly affect their productivity and profitability, a careful study and analysis of their manufacturing processes with the application of Single Minute Exchange of Dies (SMED) tool showed that the waste of waiting is the fourth waste that bedevils the firm. The selection of the Taguchi L9 orthogonal array which is based on the four parameters and the three levels of variation for each parameter revealed that with a range of 2.17, that waiting is the major waste that the company must reduce in order to continue to be viable. Also, to enhance the company’s throughput and profitability, the wastes of over-production, excess inventory, and defects with ranges of 2.01, 1.46, and 0.82, ranking second, third, and fourth respectively must also be reduced to the barest minimum. After proposing -33.84 as the highest optimum Signal-to-Noise ratio to be maintained for the waste of waiting, the paper advocated for the adoption of all the tools and techniques of Lean Production System (LPS), and Continuous Improvement (CI), and concluded by recommending SMED in order to drastically reduce set up time which leads to unnecessary waiting.

Keywords: lean production system, single minute exchange of dies, signal to noise ratio, Taguchi robust design, waste

Procedia PDF Downloads 127
2597 Deep-Learning to Generation of Weights for Image Captioning Using Part-of-Speech Approach

Authors: Tiago do Carmo Nogueira, Cássio Dener Noronha Vinhal, Gélson da Cruz Júnior, Matheus Rudolfo Diedrich Ullmann

Abstract:

Generating automatic image descriptions through natural language is a challenging task. Image captioning is a task that consistently describes an image by combining computer vision and natural language processing techniques. To accomplish this task, cutting-edge models use encoder-decoder structures. Thus, Convolutional Neural Networks (CNN) are used to extract the characteristics of the images, and Recurrent Neural Networks (RNN) generate the descriptive sentences of the images. However, cutting-edge approaches still suffer from problems of generating incorrect captions and accumulating errors in the decoders. To solve this problem, we propose a model based on the encoder-decoder structure, introducing a module that generates the weights according to the importance of the word to form the sentence, using the part-of-speech (PoS). Thus, the results demonstrate that our model surpasses state-of-the-art models.

Keywords: gated recurrent units, caption generation, convolutional neural network, part-of-speech

Procedia PDF Downloads 103
2596 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.

Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19

Procedia PDF Downloads 69
2595 Implementation of Enterprise Asset Management (E-AM) System at Oman Electricity Transmission Company

Authors: Omran Al Balushi, Haitham Al Rawahi

Abstract:

Enterprise Asset Management (eAM) has been implemented across different Generation, Transmission and Distribution subsidiaries in Nama Group companies. As part of Nama group, Oman Electricity Transmission Company (OETC) was the first company to implement this system. It was very important for OETC to implement and maintain such a system to achieve its business objectives and for effective operations, which will also support the delivery of the asset management strategy. Enterprise Asset Management (eAM) addresses the comprehensive asset maintenance requirements of Oman Electricity Transmission Company (OETC). OETC needs to optimize capacity and increase utilization, while lowering unit production. E-AM will enable OETC to adopt this strategy. Implementation of e-AM has improved operation performance with preventive and scheduled maintenance as well as it increased safety. Implementation of e-AM will also enable OETC to create optimal asset management strategy which will increase revenue and decrease cost by effectively monitoring operational data such as maintenance history and operation conditions. CMMS (Computerised Maintenance Management System) is the main software and the back-bone of e-AM system. It is used to provide an improved working practice to properly establish information and data flow related to maintenance activities. Implementation of e-AM system was one of the factors that supported OETC to achieve ISO55001 Certificate on fourth quarter of 2016. Also, full implementation of e-AM system will result in strong integration between CMMS and Geographical Information Systems (GIS) application and it will improve OETC to build a reliable maintenance strategy for all asset classes in its Transmission network. In this paper we will share our experience and knowledge of implementing such a system and how it supported OETC’s management to make decisions. Also we would highlight the challenges and difficulties that we encountered during the implementation of e-AM. Also, we will list some features and advantages of e-AM in asset management, preventive maintenance and maintenance cost management.

Keywords: CMMS, Maintenance Management, Asset Management, Maintenance Strategy

Procedia PDF Downloads 147
2594 The Comparative Analysis of International Financial Reporting Standart Adoption through Earnings Response Coefficient and Conservatism Principle: Case Study in Jakarta Islamic Index 2010 – 2014

Authors: Dwi Wijiastutik, Tarjo, Yuni Rimawati

Abstract:

The purpose of this empirical study is to analyse how to the market reaction and the conservative degree changes on the adoption of International Financial Reporting Standart (IFRS) through Jakarta Islamic Index. The study also has given others additional analysis on the profitability, capital structure and size company toward IFRS adoption. The data collection methods used in this study reveals as secondary data and deep analysis to the company’s annual report and daily price stock at yahoo finance. We analyse 40 companies listed on Jakarta Islamic Index from 2010 to 2014. The result of the study concluded that IFRS has given a different on the depth analysis to the two of variance analysis: Moderated Regression Analysis and Wilcoxon Signed Rank to test developed hypotheses. Our result on the regression analysis shows that market response and conservatism principle is not significantly after IFRS Adoption in Jakarta Islamic Index. Furthermore, in addition, analysis on profitability, capital structure, and company size show that significantly after IFRS adoption. The findings of our study help investor by showing the impact of IFRS for making decided investment.

Keywords: IFRS, earnings response coefficient, conservatism principle

Procedia PDF Downloads 273
2593 Total Quality Management in Companies Manufacturing

Authors: Malki Nadia Fatima Zahra, Kellal Cheimaa, Brahimi Houria

Abstract:

Aim of the study is to show the role of total Quality Management on firm performance; the research relied on the views of sample managers working in the Marinel pharmaceutical company. The research aims to achieve many objectives, including increasing awareness of the concepts of Total Quality Management on Firm Performance, especially in the manufacturing firm, providing a future vision of the possibility of success, and the actual application of the Principles of Total Quality Management in the manufacturing company. The research adopted a default model was built after a review and analysis of the literature review in the context of one hypothesis main points at the origin of a group of sub-hypotheses. The research presented a set of conclusions, and the most important of these conclusions was there is a relationship between the Principles of TQM and Firm Performance.

Keywords: total quality management, TQM dimension, firm performance, strategies

Procedia PDF Downloads 72
2592 Analysis of the Reasons behind the Deteriorated Standing of Engineering Companies during the Financial Crisis

Authors: Levan Sabauri

Abstract:

In this paper, we discuss the deteriorated standing of engineering companies, some of the reasons behind it and the problems facing engineering enterprises during the financial crisis. We show the part that financial analysis plays in the detection of the main factors affecting the standing of a company, classify internal problems and the reasons influencing efficiency thereof. The publication contains the analysis of municipal engineering companies in post-Soviet transitional economies. In the wake of the 2008 world financial crisis the issue became even more poignant. It should be said though that even before the problem had been no less acute for some post-Soviet states caught up in a lengthy transitional period. The paper highlights shortcomings in the management of transportation companies, with new, more appropriate methods suggested. In analyzing the financial stability of a company, three elements need to be considered: current assets, investment policy and structural management of the funding sources leveraging the stability, should be focused on. Inappropriate management of the three may create certain financial problems, with timely and accurate detection thereof being an issue in terms of improved standing of an enterprise. In this connection, the publication contains a diagram reflecting the reasons behind the deteriorated financial standing of a company, as well as a flow chart thereof. The main reasons behind low profitability are also discussed.

Keywords: efficiency, financial management, financial analysis funding structure, financial sustainability, investment policy, profitability, solvency, working capital

Procedia PDF Downloads 305
2591 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 486
2590 How Whatsappization of the Chatbot Affects User Satisfaction, Trust, and Acceptance in a Drive-Sharing Task

Authors: Nirit Gavish, Rotem Halutz, Liad Neta

Abstract:

Nowadays, chatbots are gaining more and more attention due to the advent of large language models. One of the important considerations in chatbot design is how to create an interface to achieve high user satisfaction, trust, and acceptance. Since WhatsApp conversations sometimes substitute for face-to-face communication, we studied whether WhatsAppization of the chatbot -making the conversation resemble a WhatsApp conversation more- will improve user satisfaction, trust, and acceptance, or whether the opposite will occur due to the Uncanny Valley (UV) effect. The task was a drive-sharing task, in which participants communicated with a textual chatbot via WhatsApp and could decide whether to participate in a ride to college with a driver suggested by the chatbot. WhatsAppization of the chatbot was done in two ways: By a dialog-style conversation (Dialog versus No Dialog), and by adding WhatsApp indicators – “Last Seen”, “Connected”, “Read Receipts”, and “Typing…” (Indicators versus No Indicators). Our 120 participants were randomly assigned to one of the four 2 by 2 design groups, with 30 participants in each. They interacted with the WhatsApp chatbot and then filled out a questionnaire. The results demonstrated that, as expected from the manipulation, the interaction with the chatbot was longer for the dialog condition compared to the no dialog. This extra interaction, however, did not lead to higher acceptance -quite the opposite, since participants in the dialog condition were less willing to implement the decision made at the end of the conversation with the chatbot and continue the interaction with the driver they chose. The results are even more striking when considering the Indicators condition. Both for the satisfaction measures and the trust measures, participants’ ratings were lower in the Indicators condition compared to the No Indicators. Participants in the Indicators condition felt that the ride search process was harder to operate, and slower (even though the actual interaction time was similar). They were less convinced that the chatbot suggested real trips and they trusted the person offering the ride and referred to them by the chatbot less. These effects were more evident for participants who preferred to share their rides using WhatsApp compared to participants who preferred chatbots for that purpose. Considering our findings, we can say that the WhatsAppization of the chatbot was detrimental. This is true for the both chatbot WhatsAppization methods – by making the conversation more a dialog and adding WhatsApp indicators. For the chosen drive-sharing task, the results were, in addition to lower satisfaction, less trust in the chatbot’s suggestion and even in the driver suggested by the chatbot, and lower willingness to actually undertake the suggested ride. In addition, it seems that the most problematic WhatsAppization method was using WhatsApp’s indicators during the interaction with the chatbot. The current study suggests that a conversation with an artificial agent should also not imitate a WhatsApp conversation very closely. With the proliferation of WhatsApp use, the emotional and social aspect of face-to face commination are moving to WhatsApp communication. Based on the current study’s findings, it is possible that the UV effect also occurs in WhatsAppization, and not only in humanization, of the chatbot, with a similar feeling of eeriness, and is more pronounced for people who prefer to use WhatsApp over chatbots. The current research can serve as a starting point to study the very interesting and important topic of chatbots WhatsAppization. More methods of WhatsAppization and other tasks could be the focus of further studies.

Keywords: chatbot, WhatsApp, humanization, Uncanny Valley, drive sharing

Procedia PDF Downloads 49
2589 Improving Operational Excellence Adopting TPM Practices in an Indian Automobile Industry: A Case Study

Authors: Pardeep Gupta

Abstract:

The purpose of this paper is to present a case study on TPM implementation methodology and to highlight the benefits achieved after TPM in an engineering industry XYZ Ltd. (name changed) situated in Mohali, Punjab. The improvements in key performance indicators (PQCDSM) after implementing the TPM proved that its implementation helped the company significantly to achieve higher productivity, customer satisfaction, morale, and profits. The manufacturing cost reduced by 30%, overall equipment efficiency increased from 63% in 2010 to 84% after three years and productivity improved by 67%. The Company has won the TPM Excellence Award, Category-A in 2013 and after that continued implementing second phase of TPM. The findings of the study govern that the strategic TPM implementation can significantly contribute for the realization of operational excellence in almost all types of industry.

Keywords: total productive maintenance, overall equipment efficiency, continuous improvement, manufacturing excellence, availability, TPM initiatives, productivity

Procedia PDF Downloads 399
2588 Older Consumer’s Willingness to Trust Social Media Advertising: An Australian Case

Authors: Simon J. Wilde, David M. Herold, Michael J. Bryant

Abstract:

Social media networks have become the hotbed for advertising activities, due mainly to their increasing consumer/user base, and secondly, owing to the ability of marketers to accurately measure ad exposure and consumer-based insights on such networks. More than half of the world’s population (4.8 billion) now uses social media (60%), with 150 million new users having come online within the last 12 months (to June 2022). As the use of social media networks by users grows, key business strategies used for interacting with these potential customers have matured, especially social media advertising. Unlike other traditional media outlets, social media advertising is highly interactive and digital channel-specific. Social media advertisements are clearly targetable, providing marketers with an extremely powerful marketing tool. Yet despite the measurable benefits afforded to businesses engaged in social media advertising, recent controversies (such as the relationship between Facebook and Cambridge Analytica in 2018) have only heightened the role trust and privacy play within these social media networks. The purpose of this exploratory paper is to investigate the extent to which social media users trust social media advertising. Understanding this relationship will fundamentally assist marketers in better understanding social media interactions and their implications for society. Using a web-based quantitative survey instrument, survey participants were recruited via a reputable online panel survey site. Respondents to the survey represented social media users from all states and territories within Australia. Completed responses were received from a total of 258 social media users. Survey respondents represented all core age demographic groupings, including Gen Z/Millennials (18-45 years = 60.5% of respondents) and Gen X/Boomers (46-66+ years = 39.5% of respondents). An adapted ADTRUST scale, using a 20 item 7-point Likert scale, measured trust in social media advertising. The ADTRUST scale has been shown to be a valid measure of trust in advertising within traditional different media, such as broadcast media and print media, and more recently, the Internet (as a broader platform). The adapted scale was validated through exploratory factor analysis (EFA), resulting in a three-factor solution. These three factors were named reliability, usefulness and affect, and the willingness to rely on. Factor scores (weighted measures) were then calculated for these factors. Factor scores are estimates of the scores survey participants would have received on each of the factors had they been measured directly, with the following results recorded (Reliability = 4.68/7; Usefulness and Affect = 4.53/7; and Willingness to Rely On = 3.94/7). Further statistical analysis (independent samples t-test) determined the difference in factor scores between the factors when age (Gen Z/Millennials vs. Gen X/Boomers) was utilised as the independent, categorical variable. The results showed the difference in mean scores across all three factors to be statistically significant (p<0.05) for these two core age groupings: Gen Z/Millennials Reliability = 4.90/7 vs Gen X/Boomers Reliability = 4.34/7; Gen Z/Millennials Usefulness and Affect = 4.85/7 vs Gen X/Boomers Usefulness and Affect = 4.05/7; and Gen Z/Millennials Willingness to Rely On = 4.53/7 vs Gen X/Boomers Willingness to Rely On = 3.03/7. The results clearly indicate that older social media users lack trust in the quality of information conveyed in social media ads, when compared to younger, more social media-savvy consumers. This is especially evident with respect to Factor 3 (Willingness to Rely On), whose underlying variables reflect one’s behavioural intent to act based on the information conveyed in advertising. These findings can be useful to marketers, advertisers, and brand managers in that the results highlight a critical need to design ‘authentic’ advertisements on social media sites to better connect with these older users, in an attempt to foster positive behavioural responses from within this large demographic group – whose engagement with social media sites continues to increase year on year.

Keywords: social media advertising, trust, older consumers, online

Procedia PDF Downloads 83
2587 Energizing Value Added Farming in Agriculture Economic Aspects towards Sustaining Crop Yield, Quality and Food Safety of Small-Scale Cocoa Farmer in Indonesia

Authors: Burmansyah Muhammad, Supriyoto Supriyoto

Abstract:

Crop yield, quality and food safety are three important components that all estate and food crops must put into consideration to lifting the economic value. These measurements should be evaluated because marketplace demand is simultaneously changing and farmers must adapt quickly to remain competitive. The increase in economic value could be done by producing high quality product that aligns with harvest collector preferences. The purpose of this study is to examine the causal effects of value added farming in agriculture economic aspects towards crop yield, quality and food security. This research is using descriptive survey research by employing data from small-scale cocoa farmers listed to off-taker company, located on Sulawesi area of Indonesia. The questionnaire was obtained from 650 cocoa farmers, selected randomly. Major findings of the study indicate that 78% of respondents agree that agriculture inputs have positive effect on crop yield, quality and food safety. The study recommended that cocoa stakeholders should ensure access to agriculture inputs in first priority and then followed by ensuring access to cocoa supply chain trader and micro-financing. Value Added Farming refers to lifting the economic value of a commodity through particular intervention. Regarding access to agriculture inputs, one of significant intervention is fertilization and plant nutrition management, both organic and inorganic fertilizer. Small-scale cocoa farmers can get access to fertilizer intervention through establishment of demo farm. Ordinary demo farm needs large area, selective requirements, lots of field resources and centralization impact. On the contrary, satellite demo farm is developing to wide-spread the impact of agriculture economic aspects and also the involvement in number of farmers. In Sulawesi Project, we develop leveling strata of small-scale demo farm with group of farmers and local cooperative. With this methodology, all of listed small-scale farmers can get access to agriculture input, micro-financing and how to deliver quality output. PT Pupuk Kaltim is member firm of holding company PT Pupuk Indonesia, private company belongs to the government of Indonesia. The company listed as Indonesia's largest producer of urea fertilizers, besides ammonia, Compound Fertilizer (NPK) and biological fertilizers. To achieve strategic objectives, the company has distinguished award such as SNI Platinum, SGS Award IFA Protect and Sustain Stewardship and Gold Rank of Environment Friendly Company. This achievement has become the strategic foundation for our company to energize value added farming in sustaining food security program. Moreover, to ensure cocoa sustainability farming the company has developed partnership with international companies and Non-Government Organization (NGO).

Keywords: fertilizer and plant nutrition management, good agriculture practices, agriculture economic aspects, value-added farming

Procedia PDF Downloads 103
2586 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 228
2585 Subsidiary Strategy and Importance of Standards: Re-Interpreting the Integration-Responsiveness Framework

Authors: Jo-Ann Müller

Abstract:

The integration-responsiveness (IR) framework presents four distinct internationalization strategies which differ depending on the extent of pressure the company faces for local responsiveness and global integration. This study applies the framework to standards by examining differences in the relative importance of three types of standards depending on the role the subsidiary plays within the corporate group. Hypotheses are tested empirically in a two-stage procedure. First, the subsidiaries are grouped performing cluster analysis. In the second step, the relationship between cluster affiliation and subsidiary strategy is tested using multinomial Probit estimation. While the level of local responsiveness of a firm relates to the relative importance of national and international formal standards, the degree of vertical integration is associated with the application of internal company.

Keywords: FDI, firm-level data, standards, subsidiary strategy

Procedia PDF Downloads 287
2584 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 187