Search results for: loyalty of bank clients
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1418

Search results for: loyalty of bank clients

758 A Novel Gateway Location Algorithm for Wireless Mesh Networks

Authors: G. M. Komba

Abstract:

The Internet Gateway (IGW) has extra ability than a simple Mesh Router (MR) and the responsibility to route mostly the all traffic from Mesh Clients (MCs) to the Internet backbone however, IGWs are more expensive. Choosing strategic locations for the Internet Gateways (IGWs) best location in Backbone Wireless Mesh (BWM) precarious to the Wireless Mesh Network (WMN) and the location of IGW can improve a quantity of performance related problem. In this paper, we propose a novel algorithm, namely New Gateway Location Algorithm (NGLA), which aims to achieve four objectives, decreasing the network cost effective, minimizing delay, optimizing the throughput capacity, Different from existing algorithms, the NGLA increasingly recognizes IGWs, allocates mesh routers (MRs) to identify IGWs and promises to find a feasible IGW location and install minimum as possible number of IGWs while regularly conserving the all Quality of Service (QoS) requests. Simulation results showing that the NGLA outperforms other different algorithms by comparing the number of IGWs with a large margin and it placed 40% less IGWs and 80% gain of throughput. Furthermore the NGLA is easy to implement and could be employed for BWM.

Keywords: Wireless Mesh Network, Gateway Location Algorithm, Quality of Service, BWM

Procedia PDF Downloads 356
757 Corporate Social Responsibility in Indian Apparel Industry

Authors: Archana Gandhi

Abstract:

Indian apparel manufacturers see several benefits of Corporate Social Responsibility (CSR). At the same time, they clearly face steep challenges in its implementation. From the perspective of the participants, the challenges tend to outweigh the benefits. The short-term expenses, misperceptions about the financial benefits of CSR and the additional burden of implementing CSR-related policies and activities tend to overshadow perceptions of the long-term benefits. CSR activities currently seen in the Indian apparel industry are primarily people focused, society-focused or environment-focused. However, most CSR activities focus on employee welfare, including teaching employees about health and safety awareness, creating opportunities for community building, and providing general education to employees. Employee retention is very high in socially responsible Indian firms as compared to non-CSR firms, largely because CSR plays a crucial role in overall employee satisfaction, which translates to worker loyalty and low turnover. Employee retention and commitment are not the​ only potential benefits of CSR in the Indian apparel industry. CSR can also enhance a company’s image. Although it is a long-term benefit, being socially responsible can build a company’s social reputation and help it to gain others’ trust. Buyers do not hesitate to do business with these companies, since it is difficult to find socially responsible firms in India.

Keywords: corporate social responsibility, apparel industry, workers, improve work life

Procedia PDF Downloads 351
756 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 491
755 Crowdfunding and Financial Inclusion

Authors: Lawrence Ngalim

Abstract:

The paucity of entrepreneurial finance in Sub-Saharan Africa (SSA) can plausibly be tied to her comparatively less-developed capital markets, which potentially hurts entrepreneurial activities. The high rate of informality in SSA worsens information asymmetry, which restricts the supply of funds in a heavily bank-led environment. In this paper, we ask whether the adoption of recent technological improvements in delivering financial services, such as crowdfunding, assists the financially excluded within Africa. Secondly, we investigate the individual determinants of crowdfunding, such as income, level of education, demographics, culture/trust, and the effects of crowdfunding on households’ usage of formal financial services. The paper discusses the long-term policy implications of this particular type of fintech in achieving financial inclusion within the regional bloc and its advantage for Africa-Agenda-2063.

Keywords: fintech, banks, entrepreneurship, regional integration

Procedia PDF Downloads 67
754 The Deprivation of Human Rights Experienced by African Children with Disabilities

Authors: Anna Wiltshire, Rebecca Markham

Abstract:

Over the last decade, a growing body of evidence has indicated that children with disabilities are often amongst the most excluded and vulnerable in society. The World Bank estimates that 20% of those living in poverty in developing countries are disabled which means that those with the least bear the greatest burden. Furthermore, children with disabilities in Africa have to face a multitude of difficulties ranging from the physical to the psychological. Misconceptions and cultural beliefs are used to justify violence against, or complete shunning of these individuals and their families. In addition, discrimination can prevent access to both education and health services, further compromising these individuals. All children, irrespective of their disability should be able to enjoy human rights without discrimination, but this is often not the case. This poster explores how and why children with disabilities in Africa are subject to violations of their human rights, and suggests ways of addressing these problems.

Keywords: Africa, children, disability, discrimination, human rights

Procedia PDF Downloads 551
753 Nutritional Benefits of Soy: An Implication for Health Education

Authors: Mbadugha Esther Ifeoma

Abstract:

Soybeans, like other legumes are rich in nutrients. However, the nutrient profile of soybeans differs in some important ways from most other legumes. Among other nutrients, soy is high in protein, carbohydrates, and fibers, is rich in vitamins, minerals and unsaturated fatty acids and is low in saturated fatty acids. Because of its high nutritional value, it has been rated to be equivalent to meats, eggs and milk. Soy has many health benefits including prevention of coronary heart disease, prevention of cancer growth, improvement of cognitive function, promotion of bone health, prevention of obesity, prevention of type II diabetes and promotion of growth of normal floras in the colon. Soybean consumption is also associated with some side effects which include allergy, flatulence and abdominal discomfort. Nurses/health care providers should therefore, educate clients on the precautionary measures to be taken in preparing soy food products in order to reduce to the barest minimum the side effects, while encouraging them to include soy as part of their daily meals for optimal health and vitality.

Keywords: health benefit, health education, nutritional benefit, soybeans

Procedia PDF Downloads 476
752 Evaluation and Strategic Development of IT in Accounting in Turkey

Authors: Eda Kocakaya, Sebahat Seker, Dogan Argun

Abstract:

The aim of this study is to determine the process of information technologies and the connections between concepts in accounting management services in Turkey. The objective of this study is to determine the adaptation and evaluation process of information technologies and the connections between concepts and differences in accounting management services in Turkey. The situation and determination of the IT applications of Accounting Management were studied. The applications of • Billing • Order Processing • Accounts Receivable/Payable Management • Contract Management • Bank Account Management Were discussed in this study. The IT applications were demonstrated and realized in actual accounting services. The sectoral representative's companies were selected, and the IT application was searched by bibliometric analysis.

Keywords: management, accounting, information technologies, adaptation

Procedia PDF Downloads 301
751 Big Data-Driven Smart Policing: Big Data-Based Patrol Car Dispatching in Abu Dhabi, UAE

Authors: Oualid Walid Ben Ali

Abstract:

Big Data has become one of the buzzwords today. The recent explosion of digital data has led the organization, either private or public, to a new era towards a more efficient decision making. At some point, business decided to use that concept in order to learn what make their clients tick with phrases like ‘sales funnel’ analysis, ‘actionable insights’, and ‘positive business impact’. So, it stands to reason that Big Data was viewed through green (read: money) colored lenses. Somewhere along the line, however someone realized that collecting and processing data doesn’t have to be for business purpose only, but also could be used for other purposes to assist law enforcement or to improve policing or in road safety. This paper presents briefly, how Big Data have been used in the fields of policing order to improve the decision making process in the daily operation of the police. As example, we present a big-data driven system which is sued to accurately dispatch the patrol cars in a geographic environment. The system is also used to allocate, in real-time, the nearest patrol car to the location of an incident. This system has been implemented and applied in the Emirate of Abu Dhabi in the UAE.

Keywords: big data, big data analytics, patrol car allocation, dispatching, GIS, intelligent, Abu Dhabi, police, UAE

Procedia PDF Downloads 477
750 Religious Coercion as Means of Trafficking in Women and Faith Communities’ Role in Ending Such Religious Exploitation

Authors: Xiaoyu Stephanie Ren

Abstract:

With the increase of massive migration, economic polarization, as well as increasing awareness and respects for religious freedom in the world, women have become unprecedentedly vulnerable to trafficking involving religious coercion. Such cases can also bring enormous challenges for prosecution in which the prosecutor bears the burden of proving that the victim acted, or not acted in a certain way due to the exploitation of her belief system: (1) Jurors who are nonbelievers tend not to be convinced that something of intangible nature can act as the force to get victim into women trafficking situation; (2) Court more often than not rules in favor of victims in women trafficking cases involving religious exploitation only when there is physical coercion in addition to religious coercion; (3) Female victims are often reluctant to testify at court due to their godly fear and loyalty to trafficker. Using case study methodology, this paper examines the unique characteristics of religious coercion as means of trafficking in women from a legal perspective and proposes multiple ways based on communal beliefs that faith communities, as victims for such crime themselves, can act in order to help to end religious exploitation. The purpose of this paper is threefold: to improve acknowledgment for the role of religious coercion as a sole force for women trafficking situation; to discuss legal hurdles in prosecuting women trafficking cases involving religious coercion; and to propose collaboration across borders among faith communities to end such exploitation.

Keywords: women trafficking, sex violence, religious exploitation, faith community, prosecution, law

Procedia PDF Downloads 152
749 Formation of Self Help Groups (SHGs) Protected Human Rights and Ensured Human Security of Female Sex Workers at Brothel in Bangladesh

Authors: Md. Nurul Alom Siddikqe

Abstract:

The purpose of this intervention was to describe how the marginalized people protect their rights and increase their self-dignity and self-esteem among brothel-based sex workers in 6 cities which are the victim of trafficked who came from different periphery areas Bangladesh. Eventually the sex workers are tortured by the pimp, clients, Msahi (so called guardian of bonded sex workers), Babu (So called husband) highly discriminated, vulnerable and stigmatized due to their occupation, movement, behavior and activities, which has got social disapproval. However, stigma, discrimination and violation of human rights not only bar them to access legal services, education of their kids, health, movement of outside of brothel, deprived of funeral after death, but also make them inaccessible due to their invisibility. Conducted an assessment among brothel-based sex workers setup to know their knowledge on human rights and find out their harassment and violence in their community. Inspired them to think about to be united and also assisted them to formation of self help group (SHG). Developed capacity of the SHG and developed leadership of its members through different trainings like administrative, financial management, public speaking and resource mobilization. Developed strategy to enhance the capacity of SHG so that they can collectively claim their rights and develop strategic partnership and network with the relevant service provider’s for restoring all sorts of rights. Conducted meeting with stakeholder including duty bearers, civil society organizations, media people and local government initiatives. Developed Networking with human rights commission, local elite, religious leaders and form human right watch committees at community level. Organized rally and observed national and international days along with government counterparts. By utilizing the project resources the members of SHG became capable to raise their collective voices against violence, discrimination and stigma as well as protected them from insecurity. The members of SHG have been participating in social program/event the SHG got membership of district level NGO coordination meeting through invitation from Deputy Commissioner, Civil Surgeon and Social welfare office of Government of Bangladesh. The Law Enforcement Agency is ensuring safety and security and the education department of government enrolled their children in primary level education. The Government provided land for grave yard after death for the Muslim sex workers and same for the other religious group. The SHGs are registered with government respective authorities. The SHGs are working with support from different development partners and implementing different projects sometime as consortium leaders. Opportunity created to take the vocational training from the government reputed department. The harassment by the clients reduced remarkably, babu, Mashi and other counterparts recognized the sex workers rights and ensure security with government counterpart access increased in legal, health and education. Indications are that the brothel based sex workers understood about their rights and became capable of ensuring their security through working under the self-help groups meaningfully.

Keywords: brothel, discrimination, harassment, stigma

Procedia PDF Downloads 345
748 The Right to Data Portability and Its Influence on the Development of Digital Services

Authors: Roman Bieda

Abstract:

The General Data Protection Regulation (GDPR) will come into force on 25 May 2018 which will create a new legal framework for the protection of personal data in the European Union. Article 20 of GDPR introduces a right to data portability. This right allows for data subjects to receive the personal data which they have provided to a data controller, in a structured, commonly used and machine-readable format, and to transmit this data to another data controller. The right to data portability, by facilitating transferring personal data between IT environments (e.g.: applications), will also facilitate changing the provider of services (e.g. changing a bank or a cloud computing service provider). Therefore, it will contribute to the development of competition and the digital market. The aim of this paper is to discuss the right to data portability and its influence on the development of new digital services.

Keywords: data portability, digital market, GDPR, personal data

Procedia PDF Downloads 462
747 Transaction Cost Analysis, Execution Quality, and Best Execution under MiFID II

Authors: Rodrigo Zepeda

Abstract:

Transaction cost analysis (TCA) is a way of analyzing the relative performance of different intermediaries and different trading strategies for trades undertaken in financial instruments. It is a way for an investor to determine the overall quality of execution of a particular trade, and there are many different approaches to undertaking TCA. Under the updated Markets in Financial Instruments Directive (2014/65/EU) (MiFID II), investment firms are required when executing orders, to take all sufficient steps to obtain the best possible result for their clients. This requirement for 'Best Execution' must take into account price, costs, speed, likelihood of execution and settlement, size, nature or any other consideration relevant to the execution of the order. The new regulatory compliance framework under MiFID II will now also apply across a very broad range of financial instruments. This article will provide a comprehensive technical analysis of how TCA and Best Execution will significantly change under MiFID II. It will also explain why harmonization of post-trade reporting requirements under MiFID II could potentially support the development of peer group analysis, which in turn could provide a new and highly advanced framework for TCA that could more effectively support Best Execution requirements under MiFID II. The study is significant because there are no studies that have dealt with TCA and Best Execution under MiFID II in the literature.

Keywords: transaction cost analysis, execution quality, best execution, MiFID II, financial instruments

Procedia PDF Downloads 281
746 Factors Affecting Time Performance in Building Construction Projects

Authors: Ibraheem A. K. Mahameed

Abstract:

The aim of this study is to identify the risks affecting time performance of building construction projects in the West Bank in Palestine from contractors’ viewpoint. 38 risks that might affect time performance of building construction projects were defined through a detailed literature review. These risks have been classified into 6 groups: project, managerial, consultant, financial, external, and construction items. A questionnaire survey was performed to rank the considered risks in terms of severity and frequency. The analysis of the survey indicated that the top five risks affecting time performance of building construction projects in Palestine are: award project to the lowest price, political situation, poor communication and coordination between construction parties, change orders, and financial status of contractor.

Keywords: delay, time performance, construction, building

Procedia PDF Downloads 452
745 Construction and Validation of Allied Bank-Teller Aptitude Test

Authors: Muhammad Kashif Fida

Abstract:

In the bank, teller’s job (cash officer) is highly important and critical as at one end it requires soft and brisk customer services and on the other side, handling cash with integrity. It is always challenging for recruiters to hire competent and trustworthy tellers. According to author’s knowledge, there is no comprehensive test available that may provide assistance in recruitment in Pakistan. So there is a dire need of a psychometric battery that could provide support in recruitment of potential candidates for the teller’ position. So, the aim of the present study was to construct ABL-Teller Aptitude Test (ABL-TApT). Three major phases have been designed by following American Psychological Association’s guidelines. The first phase was qualitative, indicators of the test have been explored by content analysis of the a) teller’s job descriptions (n=3), b) interview with senior tellers (n=6) and c) interview with HR personals (n=4). Content analysis of above yielded three border constructs; i). Personality, ii). Integrity/honesty, iii). Professional Work Aptitude. Identified indicators operationalized and statements (k=170) were generated using verbatim. It was then forwarded to the five experts for review of content validity. They finalized 156 items. In the second phase; ABL-TApT (k=156) administered on 323 participants through a computer application. The overall reliability of the test shows significant alpha coefficient (α=.81). Reliability of subscales have also significant alpha coefficients. Confirmatory Factor Analysis (CFA) performed to estimate the construct validity, confirms four main factors comprising of eight personality traits (Confidence, Organized, Compliance, Goal-oriented, Persistent, Forecasting, Patience, Caution), one Integrity/honesty factor, four factors of professional work aptitude (basic numerical ability and perceptual accuracy of letters, numbers and signature) and two factors for customer services (customer services, emotional maturity). Values of GFI, AGFI, NNFI, CFI, RFI and RMSEA are in recommended range depicting significant model fit. In third phase concurrent validity evidences have been pursued. Personality and integrity part of this scale has significant correlations with ‘conscientiousness’ factor of NEO-PI-R, reflecting strong concurrent validity. Customer services and emotional maturity have significant correlations with ‘Bar-On EQI’ showing another evidence of strong concurrent validity. It is concluded that ABL-TAPT is significantly reliable and valid battery of tests, will assist in objective recruitment of tellers and help recruiters in finding a more suitable human resource.

Keywords: concurrent validity, construct validity, content validity, reliability, teller aptitude test, objective recruitment

Procedia PDF Downloads 213
744 Mapping the Ties That Bind: Corruption, Political Alienation and Culture of Corruption

Authors: Mabrouka Immhemd Al-Werfalli

Abstract:

How are political alienation and corruption related? What is the nature of relationship linking corruption and political alienation? When citizens withdraw their loyalty from their political regime and leaders, they highlight their alienation from them. The link between corruption and political alienation is that the individual would intentionally involve in corruption particularly when a state of lawlessness prevails. This paper represents a challenge- how to gauge a link between political alienation culture of corruption and corruption. It aims to highlight the political alienation related factors that determine the levels of corruption in Libya. One of the most prominent reasons for the Libyan uprising in February 2011 was the pervasiveness of corruption. Corruption in Libya remained a significant problem despite a robust anti-corruption discourse and harsh legislation undertaken by the previous regime. The long-standing political corruption in Libya has offered ample opportunity for the evolution of a structure of negative values and morals. This has formed what is termed as a ‘culture of corruption’, which has induced people to accept and justify corrupt behavior. The paper is a part of a study concerns the phenomenon of political alienation in Libya which was based on a survey conducted in 2001 in the city of Benghazi. The finding shows that abuse of power, embezzlement and misuse of public funds for personal enrichment was thought to be rife within public bodies, institutions, companies, factories, banks and enterprises owned entirely or partially by the state.

Keywords: Libya, abuse of power, anti-corruption, corruption, culture of corruption, embezzlement, participation in corruption, political alienation

Procedia PDF Downloads 299
743 Together - A Decentralized Application Connects Ideas and Investors

Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith

Abstract:

Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).

Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding

Procedia PDF Downloads 202
742 Business Ethics in Islamic and Economic Perspective

Authors: Mohammad Iqbal Malik

Abstract:

Economic development of a country depends on its business ethics and values. Islamic teachings provide obvious guidelines in this regard. Mutual understanding, honesty and ethics possess central place in Islamic teachings. These teachings not only prohibit from amalgamation, black-marketing, hoarding and deception but also force to treat a customer amiably. Business ethics are broad spectrum in Islamic society due to these high moral values. One can estimate the importance of business ethics in Islam for economic development in Islamic society is evident by the Hadith of Prophet Muhammad (PBUH) in which He excluded a trader from Muslim community who did not behave in good manners with his clients. In this study we present impact of business ethics on economic development of a Muslim society. This study is based on basic teachings of Quran and Sunnah, Fiqh, Economics and other books. This study explores the behavior of Muslim traders and reveals useful inferences. Policy makers, traders, academia, scholars, and general public may learn lessons from this study with respect to business ethics in Islamic perspective.

Keywords: ethics, business, Islam, economic perspective

Procedia PDF Downloads 392
741 Stochastic Analysis of Linux Operating System through Copula Distribution

Authors: Vijay Vir Singh

Abstract:

This work is focused studying the Linux operating system connected in a LAN (local area network). The STAR topology (to be called subsystem-1) and BUS topology (to be called subsystem-2) are taken into account, which are placed at two different locations and connected to a server through a hub. In the both topologies BUS topology and STAR topology, we have assumed n clients. The system has two types of failures i.e. partial failure and complete failure. Further, the partial failure has been categorized as minor and major partial failure. It is assumed that the minor partial failure degrades the sub-systems and the major partial failure make the subsystem break down mode. The system may completely fail due to failure of server hacking and blocking etc. The system is studied using supplementary variable technique and Laplace transform by using different types of failure and two types of repair. The various measures of reliability for example, availability of system, reliability of system, MTTF, profit function for different parametric values have been discussed.

Keywords: star topology, bus topology, blocking, hacking, Linux operating system, Gumbel-Hougaard family copula, supplementary variable

Procedia PDF Downloads 357
740 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks

Authors: Neetesh Saxena, Narendra S. Chaudhari

Abstract:

Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.

Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS

Procedia PDF Downloads 399
739 New Security Approach of Confidential Resources in Hybrid Clouds

Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel

Abstract:

Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.

Keywords: cloud, confidentiality, cryptography, security issues, trust issues

Procedia PDF Downloads 365
738 Inverse Heat Transfer Analysis of a Melting Furnace Using Levenberg-Marquardt Method

Authors: Mohamed Hafid, Marcel Lacroix

Abstract:

This study presents a simple inverse heat transfer procedure for predicting the wall erosion and the time-varying thickness of the protective bank that covers the inside surface of the refractory brick wall of a melting furnace. The direct problem is solved by using the Finite-Volume model. The melting/solidification process is modeled using the enthalpy method. The inverse procedure rests on the Levenberg-Marquardt method combined with the Broyden method. The effect of the location of the temperature sensors and of the measurement noise on the inverse predictions is investigated. Recommendations are made concerning the location of the temperature sensor.

Keywords: melting furnace, inverse heat transfer, enthalpy method, levenberg–marquardt method

Procedia PDF Downloads 311
737 Feasibility of Risk Assessment for Type 2 Diabetes in Community Pharmacies Using Two Different Approaches: A Pilot Study in Thailand

Authors: Thitaporn Thoopputra, Tipaporn Pongmesa, Shuchuen Li

Abstract:

Aims: To evaluate the application of non-invasive diabetes risk assessment tool in community pharmacy setting. Methods: Thai diabetes risk score was applied to assess individuals at risk of developing type 2 diabetes. Interactive computer-based risk screening (IT) and paper-based risk screening (PT) tools were applied. Participants aged over 25 years with no known diabetes were recruited in six participating pharmacies. Results: A total of 187 clients, mean aged (+SD) was 48.6 (+10.9) years. 35% were at high risk. The mean value of willingness-to-pay for the service fee in IT group was significantly higher than PT group (p=0.013). No significant difference observed for the satisfaction between groups. Conclusions: Non-invasive risk assessment tool, whether paper-based or computerized-based can be applied in community pharmacy to support the enhancing role of pharmacists in chronic disease management. Long term follow up is needed to determine the impact of its application in clinical, humanistic and economic outcomes.

Keywords: community pharmacy, intervention, prevention, risk assessment, type 2 diabetes

Procedia PDF Downloads 496
736 Northern Westerrn Ghats of India Possess an Indigenous Fish Fauna: A Survey from Kudali River

Authors: R. A. Jamdade, Rokade A. C., Deshpande V. Y.

Abstract:

The freshwater fish fauna of Kudali River, a northern right bank tributary of the Krishna River Western Ghats of India was studied. It is one of the smallest tributary of Krishna river and never been explored for fish fauna assessment. It extends over 23 Kms having 22 fish species belonging to 15 genera and 7 families, of these 3 species are endemic to Western Ghats, 2 are globaly endangered and 2 near to be threatened. Downstream the Kudal locality, the river is under the influence of anthropogenic activities and over fishing, where conservation action plans are needed to be undertaken for conservation of endangered and near to be threatened fish fauna.

Keywords: freshwater, fish, fauna, western Ghats, anthropogenic activity, conservation

Procedia PDF Downloads 536
735 Forensic Investigation: The Impact of Biometric-Based Solution in Combatting Mobile Fraud

Authors: Mokopane Charles Marakalala

Abstract:

Research shows that mobile fraud has grown exponentially in South Africa during the lockdown caused by the COVID-19 pandemic. According to the South African Banking Risk Information Centre (SABRIC), fraudulent online banking and transactions resulted in a sharp increase in cybercrime since the beginning of the lockdown, resulting in a huge loss to the banking industry in South Africa. While the Financial Intelligence Centre Act, 38 of 2001, regulate financial transactions, it is evident that criminals are making use of technology to their advantage. Money-laundering ranks among the major crimes, not only in South Africa but worldwide. This paper focuses on the impact of biometric-based solutions in combatting mobile fraud at the South African Risk Information. SABRIC had the challenges of a successful mobile fraud; cybercriminals could hijack a mobile device and use it to gain access to sensitive personal data and accounts. Cybercriminals are constantly looting the depths of cyberspace in search of victims to attack. Millions of people worldwide use online banking to do their regular bank-related transactions quickly and conveniently. This was supported by the SABRIC, who regularly highlighted incidents of mobile fraud, corruption, and maladministration in SABRIC, resulting in a lack of secure their banking online; they are vulnerable to falling prey to fraud scams such as mobile fraud. Criminals have made use of digital platforms since the development of technology. In 2017, 13 438 instances involving banking apps, internet banking, and mobile banking caused the sector to suffer gross losses of more than R250,000,000. The final three parties are forced to point fingers at one another while the fraudster makes off with the money. A non-probability sampling (purposive sampling) was used in selecting these participants. These included telephone calls and virtual interviews. The results indicate that there is a relationship between remote online banking and the increase in money-laundering as the system allows transactions to take place with limited verification processes. This paper highlights the significance of considering the development of prevention mechanisms, capacity development, and strategies for both financial institutions as well as law enforcement agencies in South Africa to reduce crime such as money-laundering. The researcher recommends that strategies to increase awareness for bank staff must be harnessed through the provision of requisite training and to be provided adequate training.

Keywords: biometric-based solution, investigation, cybercrime, forensic investigation, fraud, combatting

Procedia PDF Downloads 79
734 Materialisation of Good Governance Concept by Effective Investment Dispute Resolution in the European Union

Authors: Jagna Mucha, Anna Kańciak

Abstract:

The concept of good governance constitutes a wide perspective for academic discussion, because it provides a substantial theoretical background for settling many practical problems faced contemporarily by the EU. The basic assumptions of good governance have basically remained unchanged since the 90’s, when the concept was introduced by the World Bank, although the scholarly discussions reveal new facets of the said concept, when related to specific domains. The paper discusses the application of the specific elements of the concept of good governance in the field of the international investment law. Specifically, it seeks to demonstrate that the concept of good governance regulates the issue of international investments in that, among others, it requires the application of the alternative dispute resolution in order to make the investment law enforceable in the best possible way.

Keywords: dispute resolution, european union, investments, good governance

Procedia PDF Downloads 342
733 Drivers of Farmers' Contract Compliance Behaviour: Evidence from a Case Study of Dangote Tomato Processing Plant in Northern Nigeria.

Authors: Umar Shehu Umar

Abstract:

Contract farming is a viable strategy agribusinesses rely on to strengthen vertical coordination. However, low contract compliance remains a significant setback to agribusinesses' contract performance. The present study aims to understand what drives smallholder farmers’ contract compliance behaviour. Qualitative information was collected through Focus Group Discussions to enrich the design of the survey questionnaire administered on a sample of 300 randomly selected farmers contracted by the Dangote Tomato Processing Plant (DTPP) in four regions of northern Nigeria. Novel transaction level data of tomato sales covering one season were collected in addition to socio-economic information of the sampled farmers. Binary logistic model results revealed that open fresh market tomato prices and payment delays negatively affect farmers' compliance behaviour while quantity harvested, education level and input provision correlated positively with compliance. The study suggests that contract compliance will increase if contracting firms devise a reliable and timely payment plan (e.g., digital payment), continue input and service provisions (e.g., improved seeds, extension services) and incentives (e.g., loyalty rewards, bonuses) in the contract.

Keywords: contract farming, compliance, farmers and processors., smallholder

Procedia PDF Downloads 36
732 Semantic Based Analysis in Complaint Management System with Analytics

Authors: Francis Alterado, Jennifer Enriquez

Abstract:

Semantic Based Analysis in Complaint Management System with Analytics is an enhanced tool of providing complaints by the clients as well as a mechanism for Palawan Polytechnic College to gather, process, and monitor status of these complaints. The study has a mobile application that serves as a remote facility of communication between the students and the school management on the issues encountered by the student and the solution of every complaint received. In processing the complaints, text mining and clustering algorithms were utilized. Every module of the systems was tested and based on the results; these are 100% free from error before integration was done. A system testing was also done by checking the expected functionality of the system which was 100% functional. The system was tested by 10 students by forwarding complaints to 10 departments. Based on results, the students were able to submit complaints, the system was able to process accordingly by identifying to which department the complaints are intended, and the concerned department was able to give feedback on the complaint received to the student. With this, the system gained 4.7 rating which means Excellent.

Keywords: technology adoption, emerging technology, issues challenges, algorithm, text mining, mobile technology

Procedia PDF Downloads 190
731 Incentivize Contracting Partners of Public Projects

Authors: Sai On Cheung, Qiuwen Ma, Fong Chung Lee

Abstract:

Due to increased project complexity and technological advancement in the last decade, the designers and contractors are expected to put more efforts to achieve project goals. To render extra efforts from the agents, incentivization has become one of the primary strategies for the client. Despite increased academia interest in the design of incentive strategies, there is still a need for discussion about the underlying motivations and favourable conditions to make incentives effective. Therefore, this study focuses on the effects of motivations and favourable conditions for the use of incentives in public projects. Questionnaire survey is used as the data collection tool. The questionnaire survey was piloted through interviews with professionals from Hong Kong public sector. A total of 100 responses were collected for this survey. Accountability and organizational effectiveness were found to be the prime objectives of incentives installed by public clients. Furthermore, a list of favourable conditions for incentivization and its consequent effects on cost, schedule, risk and public opinions were identified. To conclude, this study analyses the means and ends of the use of incentives in public projects in Hong Kong.

Keywords: incentives, public accountability, project effectiveness, public opinions

Procedia PDF Downloads 53
730 The Effectiveness of Multiphase Flow in Well- Control Operations

Authors: Ahmed Borg, Elsa Aristodemou, Attia Attia

Abstract:

Well control involves managing the circulating drilling fluid within the wells and avoiding kicks and blowouts as these can lead to losses in human life and drilling facilities. Current practices for good control incorporate predictions of pressure losses through computational models. Developing a realistic hydraulic model for a good control problem is a very complicated process due to the existence of a complex multiphase region, which usually contains a non-Newtonian drilling fluid and the miscibility of formation gas in drilling fluid. The current approaches assume an inaccurate flow fluid model within the well, which leads to incorrect pressure loss calculations. To overcome this problem, researchers have been considering the more complex two-phase fluid flow models. However, even these more sophisticated two-phase models are unsuitable for applications where pressure dynamics are important, such as in managed pressure drilling. This study aims to develop and implement new fluid flow models that take into consideration the miscibility of fluids as well as their non-Newtonian properties for enabling realistic kick treatment. furthermore, a corresponding numerical solution method is built with an enriched data bank. The research work considers and implements models that take into consideration the effect of two phases in kick treatment for well control in conventional drilling. In this work, a corresponding numerical solution method is built with an enriched data bank. Software STARCCM+ for the computational studies to study the important parameters to describe wellbore multiphase flow, the mass flow rate, volumetric fraction, and velocity of each phase. Results showed that based on the analysis of these simulation studies, a coarser full-scale model of the wellbore, including chemical modeling established. The focus of the investigations was put on the near drill bit section. This inflow area shows certain characteristics that are dominated by the inflow conditions of the gas as well as by the configuration of the mud stream entering the annulus. Without considering the gas solubility effect, the bottom hole pressure could be underestimated by 4.2%, while the bottom hole temperature is overestimated by 3.2%. and without considering the heat transfer effect, the bottom hole pressure could be overestimated by 11.4% under steady flow conditions. Besides, larger reservoir pressure leads to a larger gas fraction in the wellbore. However, reservoir pressure has a minor effect on the steady wellbore temperature. Also as choke pressure increases, less gas will exist in the annulus in the form of free gas.

Keywords: multiphase flow, well- control, STARCCM+, petroleum engineering and gas technology, computational fluid dynamic

Procedia PDF Downloads 107
729 A Cross-Cultural Strategy for Managing an Organisation Located in a Diverse-Populated Community

Authors: Tsuu Faith Machingura, Daniel Madzanire, Doreen Nkala

Abstract:

High employment opportunities in various towns in Zimbabwe attracted linguistically-diverse ethnic groups to settle therein. This movement, which largely was economically-induced, concocted diverse-populated communities in towns and in surrounding areas. Service provisions in such domains as education and business need to be diverse-sensitive. Prompted by the prevalence of diversity in present day business organisations, the study sought to suggest a cross-cultural strategy for managing an organisation located in a diverse-populated community. A case study research design was used. A sample of 10 participants consisting of five diverse business owners and five diverse clients was purposively drawn. Document analysis and key informant interviews were used to gather data. The study revealed that organisations that are located in diverse populated communities were shaped by the prevailing ethos. A diverse-sensitive managerial strategy was suggested as a pertinent cross-cultural managerial tool.

Keywords: cross-cultural strategy, linguistic diversity, diverse-populated community, ethnic groups

Procedia PDF Downloads 54