Search results for: strategic attack
1435 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 851434 On the Right an Effective Administrative Justice in the Republic of Macedonia: Challenges and Problems
Authors: Arlinda Memetaj
Abstract:
A sound system of administrative justice represents a vital element of democratic governance. The proper control of public administration consists not only of a sound civil service framework and legislative oversight, but empowerment of the public and courts to hold public officials accountable for their decision-making through the application of fair administrative procedural rules and the use of appropriate administrative appeals processes and judicial review. The establishment of effective public administration, has been since 1990s among the most 'important and urgent' final strategic objectives of the Republic of Macedonia. To this aim the country has so far adopted a huge series of legislative and strategic documents related to any aspects of the administrative justice system. The latter is designed to strengthen the legal position of citizens, businesses, civic organizations, and other societal subjects. 'Changes and reforms' in this field have been thus the most frequent terms being used in the country for the last more than 20 years. Several years ago the County established Administrative Courts, while permanently amending the Law on the General Administrative procedure (LGAP). The new LGAP was adopted in 2015 and it introduced considerable innovations concerned. The most recent inputs in this regard includes the National Public Administration Reform Strategy 2017 – 2022, one of the key expected result of which includes both providing effective protection of the citizens` rights. In doing the aforesaid however there is still a series of interrelated shortcomings in this regard, such as (just to mention few) the complex appeal procedure, delays in enforcing court rulings, etc. Against the above background, the paper firstly describes the Macedonian institutional and legislative framework in the above field, and then illustrates the shortcomings therein. It finally claims that the current status quo situation may be overcome only if there is a proper implementation of the administrative courts decisions and far stricter international monitoring process thereof. A new approach and strong political commitment from the highest political leadership is thus absolutely needed to ensure the principles of transparency, accountability and merit in public administration. The main method used in this paper is the descriptive, analytical and comparative one due to the very character of the paper itself.Keywords: administrative justice, administrative procedure, administrative courts/disputes, European Human Rights Court, human rights, monitoring, reform, benefit.
Procedia PDF Downloads 1551433 An Empirical Study for the Data-Driven Digital Transformation of the Indian Telecommunication Service Providers
Authors: S. Jigna, K. Nanda Kumar, T. Anna
Abstract:
Being a major contributor to the Indian economy and a critical facilitator for the country’s digital India vision, the Indian telecommunications industry is also a major source of employment for the country. Since the last few years, the Indian telecommunication service providers (TSPs), however, are facing business challenges related to increasing competition, losses, debts, and decreasing revenue. The strategic use of digital technologies for a successful digital transformation has the potential to equip organizations to meet these business challenges. Despite an increased focus on digital transformation, the telecom service providers globally, including Indian TSPs, have seen limited success so far. The purpose of this research was thus to identify the factors that are critical for the digital transformation and to what extent they influence the successful digital transformation of the Indian TSPs. The literature review of more than 300 digital transformation-related articles, mostly from 2013-2019, demonstrated a lack of an empirical model consisting of factors for the successful digital transformation of the TSPs. This study theorizes a research framework grounded in multiple theories, and a research model consisting of 7 constructs that may be influencing business success during the digital transformation of the organization was proposed. The questionnaire survey of senior managers in the Indian telecommunications industry was seeking to validate the research model. Based on 294 survey responses, the validation of the Structural equation model using the statistical tool ADANCO 2.1.1 was found to be robust. Results indicate that Digital Capabilities, Digital Strategy, and Corporate Level Data Strategy in that order has a strong influence on the successful Business Performance, followed by IT Function Transformation, Digital Innovation, and Transformation Management respectively. Even though Digital Organization did not have a direct significance on Business Performance outcomes, it had a strong influence on IT Function Transformation, thus affecting the Business Performance outcomes indirectly. Amongst numerous practical and theoretical contributions of the study, the main contribution for the Indian TSPs is a validated reference for prioritizing the transformation initiatives in their strategic roadmap. Also, the main contribution to the theory is the possibility to use the research framework artifact of the present research for quantitative validation in different industries and geographies.Keywords: corporate level data strategy, digital capabilities, digital innovation, digital strategy
Procedia PDF Downloads 1291432 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 2211431 Role of Strategic Human Resource Practices and Knowledge Management Capacity
Authors: Ploychompoo Kittikunchotiwut
Abstract:
This study examines the relationships between human resource practices, knowledge management capacity, and innovation performance. The data were collected by using a questionnaire from 241 firms in the hotels in Thailand. The hypothesized relationships among variables are examined by using ordinary least square (OLS) regression analysis. The findings show that human resource practices have a positive effect on knowledge management capacity. Besides, knowledge management capacity was found to positively affect innovation performance. Finally, the limitations of the study and directions for future research are discussed.Keywords: human resource practices, knowledge management capacity, innovation performance
Procedia PDF Downloads 3021430 Developing Primal Teachers beyond the Classroom: The Quadrant Intelligence (Q-I) Model
Authors: Alexander K. Edwards
Abstract:
Introduction: The moral dimension of teacher education globally has assumed a new paradigm of thinking based on the public gain (return-on-investments), value-creation (quality), professionalism (practice), and business strategies (innovations). Abundant literature reveals an interesting revolutionary trend in complimenting the raising of teachers and academic performances. Because of the global competition in the knowledge-creation and service areas, the C21st teacher at all levels is expected to be resourceful, strategic thinker, socially intelligent, relationship aptitude, and entrepreneur astute. This study is a significant contribution to practice and innovations to raise exemplary or primal teachers. In this study, the qualities needed were considered as ‘Quadrant Intelligence (Q-i)’ model for a primal teacher leadership beyond the classroom. The researcher started by examining the issue of the majority of teachers in Ghana Education Services (GES) in need of this Q-i to be effective and efficient. The conceptual framing became determinants of such Q-i. This is significant for global employability and versatility in teacher education to create premium and primal teacher leadership, which are again gaining high attention in scholarship due to failing schools. The moral aspect of teachers failing learners is a highly important discussion. In GES, some schools score zero percent at the basic education certificate examination (BECE). The question is what will make any professional teacher highly productive, marketable, and an entrepreneur? What will give teachers the moral consciousness of doing the best to succeed? Method: This study set out to develop a model for primal teachers in GES as an innovative way to highlight a premium development for the C21st business-education acumen through desk reviews. The study is conceptually framed by examining certain skill sets such as strategic thinking, social intelligence, relational and emotional intelligence and entrepreneurship to answer three main burning questions and other hypotheses. Then the study applied the causal comparative methodology with a purposive sampling technique (N=500) from CoE, GES, NTVI, and other teachers associations. Participants responded to a 30-items, researcher-developed questionnaire. Data is analyzed on the quadrant constructs and reported as ex post facto analyses of multi-variances and regressions. Multiple associations were established for statistical significance (p=0.05). Causes and effects are postulated for scientific discussions. Findings: It was found out that these quadrants are very significant in teacher development. There were significant variations in the demographic groups. However, most teachers lack considerable skills in entrepreneurship, leadership in teaching and learning, and business thinking strategies. These have significant effect on practices and outcomes. Conclusion and Recommendations: It is quite conclusive therefore that in GES teachers may need further instructions in innovations and creativity to transform knowledge-creation into business venture. In service training (INSET) has to be comprehensive. Teacher education curricula at Colleges may have to be re-visited. Teachers have the potential to raise their social capital, to be entrepreneur, and to exhibit professionalism beyond their community services. Their primal leadership focus will benefit many clienteles including students and social circles. Recommendations examined the policy implications for curriculum design, practice, innovations and educational leadership.Keywords: emotional intelligence, entrepreneurship, leadership, quadrant intelligence (q-i), primal teacher leadership, strategic thinking, social intelligence
Procedia PDF Downloads 3111429 Applying Fuzzy Analytic Hierarchy Process for Subcontractor Selection
Authors: Halimi Mohamed Taher, Kordoghli Bassem, Ben Hassen Mohamed, Sakli Faouzi
Abstract:
Textile and clothing manufacturing industry is based largely on subcontracting system. Choosing the right subcontractor became a strategic decision that can affect the financial position of the company and even his market position. Subcontracting firms in Tunisia are lead to define an appropriate selection process which takes into account several quantitative and qualitative criteria. In this study, a methodology is proposed that includes a Fuzzy Analytic Hierarchy Process (AHP) in order to incorporate the ambiguities and uncertainties in qualitative decision. Best subcontractors for two Tunisian firms are determined based on model results.Keywords: AHP, subcontractor, multicriteria, selection
Procedia PDF Downloads 6861428 Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa
Authors: Eddy K. Mukadi
Abstract:
The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results.Keywords: asthma crisis, intensive care, general hospital, Kinshasa
Procedia PDF Downloads 2301427 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 1511426 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application
Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba
Abstract:
NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 3011425 A Density Functional Theory Study of Metal-Porphyrin Graphene for CO2 Hydration
Authors: Manju Verma, Parag A. Deshpande
Abstract:
Electronic structure calculations of hydrogen terminated metal-porphyrin graphene were carried out to explore the catalytic activity for CO2 hydration reaction. A ruthenium atom was substituted in place of carbon atom of graphene and ruthenium chelated carbon atoms were replaced by four nitrogen atoms in metal-porphyrin graphene system. Ruthenium atom created the active site for CO2 hydration reaction. Ruthenium-porphyrin graphene followed the mechanism of carbonic anhydrase enzyme for CO2 conversion to HCO3- ion. CO2 hydration reaction over ruthenium-porphyrin graphene proceeded via the elementary steps: OH- formation from H2O dissociation, CO2 bending in presence of nucleophilic attack of OH- ion, HCO3- ion formation from proton migration, HCO3- ion desorption by H2O addition. Proton transfer to yield HCO3- ion was observed as a rate limiting step from free energy landscape.Keywords: ruthenium-porphyrin graphene, CO2 hydration, carbonic anhydrase, heterogeneous catalyst, density functional theory
Procedia PDF Downloads 2571424 Delivering on Infrastructure Maintenance for Socio-Economic Growth: Exploration of South African Infrastructure for a Sustained Maintenance Strategy
Authors: Deenadayalan Govender
Abstract:
In South Africa, similar to nations globally, the prevailing tangible link between people and the state is public infrastructure. Services delivered through infrastructure to the people and to the state form a critical enabler for social development in communities and economic development in the country. In this regard, infrastructure, being the backbone to a nation’s prosperity, ideally should be effectively maintained for seamless delivery of services. South African infrastructure is in a state of deterioration, which is leading to infrastructure dysfunction and collapse and is negatively affecting development of the economy. This infrastructure deterioration stems from deficiencies in maintenance practices and strategies. From the birth of South African democracy, government has pursued socio-economic transformation and the delivery of critical basic services to decrease the broadening boundaries of disparity. In this regard, the National Infrastructure Plan borne from strategies encompassed in the National Development Plan is given priority by government in delivering strategic catalytic infrastructure projects. The National Infrastructure Plan is perceived to be the key in unlocking opportunities that generate economic growth, kerb joblessness, alleviate poverty, create new entrepreneurial prospects, and mitigate population expansion and rapid urbanisation. Socio-economic transformation benefits from new infrastructure spend is not being realised as initially anticipated. In this context, South Africa is currently in a state of weakening economic growth, with further amassed levels of joblessness, unremitting poverty and inequality. Due to investor reluctance, solicitation of strategic infrastructure funding is progressively becoming a debilitating challenge in all government institutions. Exacerbating these circumstances further, is substandard functionality of existing infrastructure subsequent to inadequate maintenance practices. This in-depth multi-sectoral study into the state of infrastructure is to understand the principal reasons for infrastructure functionality regression better; furthermore, prioritised investigations into progressive maintenance strategies is focused upon. Resultant recommendations reveal enhanced maintenance strategies, with a vision to capitalize on infrastructure design life, and also give special emphasis to socio-economic development imperatives in the long-term. The research method is principally based on descriptive methods (survey, historical, content analysis, qualitative).Keywords: infrastructure, maintenance, socio-economic, strategies
Procedia PDF Downloads 1401423 The Effect of Bunch in the Branch on Vegetative Characteristics of Pistacia vera
Authors: Alireza Sohrabi, Hamid Mohammadi
Abstract:
The pistachio fruit is a strategic product in Iran. One of the problems caused the reduction of pistachio proceeds is related to biennial- bearing or alternative bearing. Biennial- bearing is very important and is happened because of the fallen female bloom buds in vintage year. This test was done according to random blocks of 6 orchards in the type of Ahmad Aghaie with 4 iterations. Vegetative properties of branch are investigated. The results are shown that if the bunch numbers are increased, the possibility of falling is increased in bloom buds. The least possibility of falling of bloom buds is specified in trimming of one bunch and has significant difference with other trimming.Keywords: alternate bearing, pistachio, cluster, bud
Procedia PDF Downloads 4351422 Strategic Risk Issues for Film Distributors of Hindi Film Industry in Mumbai: A Grounded Theory Approach
Authors: Rashmi Dyondi, Shishir K. Jha
Abstract:
The purpose of the paper is to address the strategic risk issues surrounding Hindi film distribution in Mumbai for a film distributor, who acts as an entrepreneur when launching a product (movie) in the market (film territory).The paper undertakes a fundamental review of films and risk in the Hindi film industry and applies Grounded Theory technique to understand the complex phenomena of risk taking behavior of the film distributors (both independent and studios) in Mumbai. Rich in-depth interviews with distributors are coded to develop core categories through constant comparison leading to conceptualization of the phenomena of interest. This paper is a first-of-its-kind-attempt to understand risk behavior of a distributor, which is akin to entrepreneurial risk behavior under conditions of uncertainty. Unlike extensive scholarly work on dynamics of Hollywood motion picture industry, Hindi film industry is an under-researched area till now. Especially how do film distributors perceive risk is an unexplored study for the Hindi film industry. Films are unique experience products and the film distributor acts as an entrepreneur assuming high risks given the uncertainty in the motion picture business. With the entry of mighty corporate studios and astronomical film budgets posing serious business threats to the independent distributors, there is a need for an in-depth qualitative enquiry (applying grounded theory technique) for unraveling the definition of risk for the independent distributors in Mumbai vis-à-vis the corporate studios. Need for good content was a common challenge to both the groups in the present state of the industry, however corporate studios with their distinct ideologies, focus on own productions and financial power faced different set of challenges than the independents (like achieving sustainability in business). Softer issues like market goodwill and relations with producers, honesty in business dealings and transparency came out to be clear markers for success of independents in long run. The findings from the qualitative analysis stress on different elements of risk and challenges as perceived by the two groups of distributors in the Hindi film industry and provide a future research agenda for empirical investigation of determinants of box-office success of Hindi films distributed in Mumbai.Keywords: entrepreneurial risk behavior, film distribution strategy, Hindi film industry, risk
Procedia PDF Downloads 3131421 Importance of Human Capital Development and Management in Industries
Authors: Birce Boga Bakirli
Abstract:
In this paper, we investigate ideas on human capital development and management in industries. We structured a model to be able to gather the data from the interviews conducted with worker, specialists and owners of companies. Different aspects of the situation are found in these interviews, and we used the information to model the benefit of the business owners and workers perspectives. These are modelled as a bi-level programming problem. Several instances of the generic cases are solved. The results show the importance of education within and out of the company for workers, and it returns for the company.Keywords: bi-level programming, corporate strategy, cost tradeoffs, human capital, mixed integer programming, Stackelberg game, supplier relations, strategic planning
Procedia PDF Downloads 3541420 Towards Resilient Cloud Computing through Cyber Risk Assessment
Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar
Abstract:
Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment
Procedia PDF Downloads 1391419 Critical Success Factors for Implementation of E-Supply Chain Management
Authors: Mehrnoosh Askarizadeh
Abstract:
Globalization of the economy, e-business, and introduction of new technologies pose new challenges to all organizations. In recent decades, globalization, outsourcing, and information technology have enabled many organizations to successfully operate collaborative supply networks in which each specialized business partner focuses on only a few key strategic activities For this industries supply network can be acknowledged as a new form of organization. We will study about critical success factors (CSFs) for implementation of SCM in companies. It is shown that in different circumstances e- supply chain management has a higher impact on performance.Keywords: supply chain management, logistics management, critical success factors, information technology, top management support, human resource
Procedia PDF Downloads 4091418 A Framework for Customer Knowledge Management (CKM) as a Key Role in Relationship
Authors: Mehrnoosh Askarizadeh
Abstract:
The customer’s value has become obvious for the leading companies in today’s competitive environment. Therefore they are constantly trying to improve their relationship with customers. Customer Knowledge has been recognized as a strategic resource and a key to the success of any company. Talking about the Customer Knowledge Management is closely associated with Knowledge Management and Customer Relationship Management (CRM). Recent studies conducted in the fields of Knowledge Management (KM) and Customer Relationship Management (CRM) has explained that the two approaches can have great synergies. In this paper, our aim is to provide an understanding of Customer Knowledge Management (CKM) as an integrated management approach and competence it requires. We describe CKM as an ongoing process of generating, disseminating and using customer knowledge within an organization and between an organization and its customers. In addition, we propose a comprehensive framework of CKM, the ability to integrate customer knowledge into customer relationship management processes.Keywords: e-commerce, knowledge management (KM), customer relationship management (CRM), customer knowledge management (CKM)
Procedia PDF Downloads 5541417 Intellectual Property Protection of CRISPR Related Technologies
Authors: Zheng Miao, Dennis Fernandez
Abstract:
CRISPR research has the potential to completely transform life science, agriculture, live-stock and the health care industry. The Intellectual Property derived from its research has raised significant attention in the academic as well as the biopharmaceutical industry culminating an urgent need for strategic IP protection. We review the rudimentary concepts and key competitors of CRISPR technologies as well as the paramount strategies for intellectual property protection. Further, we elaborate on prosecution issues related to CRISPR patents as well as possible solutions to various patent laws, interferences and litigation. Finally, we address how the bioinformatics of the CRISPR technology begs an inquiry into issues of privacy and a host of ethical concerns.Keywords: bioinformatics, CRISPR, biotechnology, intellectual property
Procedia PDF Downloads 2501416 Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products
Authors: Varutorn Tulnawat, Padcharee Phasuk
Abstract:
This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed.Keywords: border trade, dea, textile, garment
Procedia PDF Downloads 2441415 Analysis of the Internationalisation of Spanish Enterprises in Colombia through Cooperation Agreements
Authors: Sandoval H. Leyla Angélica, Casani Fernando
Abstract:
The objective of this study is to analyse how enterprises in developed countries use cooperation agreements to expand into developing countries. Starting from the literature review, seven theoretical prepositions were derived. The qualitative methodology used includes case study, through interviews conducted with eight enterprises from Spain and Colombia. Results show that the cooperation agreements have provided a quick and solid connection that facilitates internationalization, bearing in mind aspects such as: strategic factors, partners, network, technology, experience, communication methods, social benefit and the connection between these aspects and allied enterprises.Keywords: internationalisation, firms, cooperation agreement, case study, Spain, Colombia
Procedia PDF Downloads 5531414 Leadership Styles and Adoption of Risk Governance in Insurance and Energy Industry: A Comparative Case Study
Authors: Ruchi Agarwal
Abstract:
In today’s world, companies are operating in dynamic, uncertain and ambiguous business environments. Globally, more companies are failing due to Environmental, Social and Governance (ESG) factors than ever. Corporate governance and risk management are intertwined in nature. For decades, corporate governance and risk management have been influenced by internal and external factors. Three schools of thought have influenced risk governance for decades: Agency theory, Contingency theory, and Institutional theory. Agency theory argues that agents have interests conflicting with principal interests and the information problem. Contingency theory suggests that risk management adoption is influenced by internal and external factors, while Institutional theory suggests that organizations legitimize risk management with regulators, competitors, and professional bodies. The conflicting objectives of theories have created problems for executives in organizations in the adoption of Risk Governance. So far, there are many studies that discussed risk culture and the role of actors in risk governance, but there are rare studies discussing the role of risk culture in the adoption of risk governance from a leadership style perspective. This study explores the adoption of risk governance in two contrasting industries, such as the Insurance and energy business, to understand whether risk governance is influenced by internal/external factors or whether risk culture is influenced by leaders. We draw empirical evidence by comparing the cases of an Indian insurance company and a renewable energy-based firm in India. We interviewed more than 20 senior executives of companies and collected annual reports, risk management policies, and more than 10 PPTs and other reports from 2017 to 2024. We visited the company for follow-up questions several times. The findings of my research revealed that both companies have used risk governance for strategic renewal of the company. Insurance companies use a transactional leadership style based on performance and reward for improving risk, while energy companies use rather symbolic management to make debt restructuring meaningful for stakeholders. Overall, both companies turned from loss-making to profitable ones in a few years. This comparative study highlights the role of different leadership styles in the adoption of risk governance. The study is also distinct as previous research rarely studied risk governance in two contrasting industries in reference to leadership styles.Keywords: leadership style, corporate governance, risk management, risk culture, strategic renewal
Procedia PDF Downloads 461413 Personality Composition in Senior Management Teams: The Importance of Homogeneity in Dynamic Managerial Capabilities
Authors: Shelley Harrington
Abstract:
As a result of increasingly dynamic business environments, the creation and fostering of dynamic capabilities, [those capabilities that enable sustained competitive success despite of dynamism through the awareness and reconfiguration of internal and external competencies], supported by organisational learning [a dynamic capability] has gained increased and prevalent momentum in the research arena. Presenting findings funded by the Economic Social Research Council, this paper investigates the extent to which Senior Management Team (SMT) personality (at the trait and facet level) is associated with the creation of dynamic managerial capabilities at the team level, and effective organisational learning/knowledge sharing within the firm. In doing so, this research highlights the importance of micro-foundations in organisational psychology and specifically dynamic capabilities, a field which to date has largely ignored the importance of psychology in understanding these important and necessary capabilities. Using a direct measure of personality (NEO PI-3) at the trait and facet level across 32 high technology and finance firms in the UK, their CEOs (N=32) and their complete SMTs [N=212], a new measure of dynamic managerial capabilities at the team level was created and statistically validated for use within the work. A quantitative methodology was employed with regression and gap analysis being used to show the empirical foundations of personality being positioned as a micro-foundation of dynamic capabilities. The results of this study found that personality homogeneity within the SMT was required to strengthen the dynamic managerial capabilities of sensing, seizing and transforming, something which was required to reflect strong organisational learning at middle management level [N=533]. In particular, it was found that the greater the difference [t-score gaps] between the personality profiles of a Chief Executive Officer (CEO) and their complete, collective SMT, the lower the resulting self-reported nature of dynamic managerial capabilities. For example; the larger the difference between a CEOs level of dutifulness, a facet contributing to the definition of conscientiousness, and their SMT’s level of dutifulness, the lower the reported level of transforming, a capability fundamental to strategic change in a dynamic business environment. This in turn directly questions recent trends, particularly in upper echelons research highlighting the need for heterogeneity within teams. In doing so, it successfully positions personality as a micro-foundation of dynamic capabilities, thus contributing to recent discussions from within the strategic management field calling for the need to empirically explore dynamic capabilities at such a level.Keywords: dynamic managerial capabilities, senior management teams, personality, dynamism
Procedia PDF Downloads 2681412 Riverine Urban Heritage: A Basis for Green Infrastructure
Authors: Ioanna H. Lioliou, Despoina D. Zavraka
Abstract:
The radical reformation that Greek urban space, has undergone over the last century, due to the socio-historical developments, technological development and political–geographic factors, has left its imprint on the urban landscape. While the big cities struggle to regain urban landscape balance, small towns are considered to offer high quality lifescapes, ensuring sustainable development potential. However, their unplanned urbanization process led to the loss of significant areas of nature, lack of essential infrastructure, chaotic built environment, incompatible land uses and urban cohesiveness. Natural environment reference points, such as springs, streams, rivers, forests, suburban greenbelts, and etc.; seems to be detached from urban space, while the public, open and green spaces, unequally distributed in the built environment, they are no longer able to offer a complete experience of nature in the city. This study focuses on Greek mainland, a small town Elassona, and aims to restore spatial coherence between the city’s homonymous river and its urban space surroundings. The existence of a linear aquatic ecosystem, is considered a precious greenway, also referred as blueway, able to initiate natural penetrations and ecosystems empowering. The integration of disconnected natural ecosystems forms the basis of a strategic intervention scheme, where the river becomes the urban integration tool / feature, constituting the main urban corridor and an indispensible part of a wider green network that connects open and green spaces, ensuring the function of all the established networks (transportation, commercial, social) of the town. The proposed intervention, introduces a green network highlighting the old stone bridge at the ‘entrance’ of the river in the town and expanding throughout the town with strategic uses and activities, providing accessibility for all the users. The methodology used, is based on the collection of design tools used in related urban river-design interventions around the world. The reinstallation/reactivation of the balance between natural and urban landscape, besides the environmental benefits, contributes decisively to the illustration/projection of urban green identity and re-enhancement of the quality of lifescape qualities and social interaction.Keywords: green network, rehabilitation scheme, urban landscape, urban streams
Procedia PDF Downloads 2801411 Mobile Agent Security Using Reference Monitor Based Security Framework
Authors: Sandhya Armoogum
Abstract:
In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.Keywords: security, mobile agents, reference monitor, trust
Procedia PDF Downloads 4391410 IP Management Tools, Strategies, Best Practices, and Business Models for Pharmaceutical Products
Authors: Nerella Srinivas
Abstract:
This study investigates the role of intellectual property (IP) management in pharmaceutical development, focusing on tools, strategies, and business models for leveraging IP effectively. Using a mixed-methods approach, we conducted case studies and qualitative analyses of IP management frameworks within the pharmaceutical sector. Our methodology included a review of IP tools tailored for pharmaceutical applications, strategic IP models for maximizing competitive advantages, and best practices for organizational efficiency. Findings emphasize the importance of understanding IP law and adopting adaptive strategies, illustrating how IP management can drive industry growth.Keywords: intellectual property management, pharmaceutical products, IP tools, IP strategies, best practices, business models, innovation
Procedia PDF Downloads 111409 About the Case Portfolio Management Algorithms and Their Applications
Authors: M. Chumburidze, N. Salia, T. Namchevadze
Abstract:
This work deal with case processing problems in business. The task of strategic credit requirements management of cases portfolio is discussed. The information model of credit requirements in a binary tree diagram is considered. The algorithms to solve issues of prioritizing clusters of cases in business have been investigated. An implementation of priority queues to support case management operations has been presented. The corresponding pseudo codes for the programming application have been constructed. The tools applied in this development are based on binary tree ordering algorithms, optimization theory, and business management methods.Keywords: credit network, case portfolio, binary tree, priority queue, stack
Procedia PDF Downloads 1471408 A Socio-Technical Approach to Cyber-Risk Assessment
Authors: Kitty Kioskli, Nineta Polemi
Abstract:
Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005
Procedia PDF Downloads 1641407 Hawaii, Colorado, and Netherlands: A Comparative Analysis of the Respective Space Sectors
Authors: Mclee Kerolle
Abstract:
For more than 50 years, the state of Hawaii has had the beginnings of a burgeoning commercial aerospace presence statewide. While Hawaii provides the aerospace industry with unique assets concerning geographic location, lack of range safety issues and other factors critical to aerospace development, Hawaii’s strategy and commitment for aerospace have been unclear. For this reason, this paper presents a comparative analysis of Hawaii’s space sector with two of the world’s leading space sectors, Colorado and the Netherlands, in order to provide a strategic plan that establishes a firm position going forward to support Hawaii’s aerospace development statewide. This plan will include financial and other economic incentives legislatively supported by the State to help grow and diversify Hawaii’s aerospace sector. The first part of this paper will examine the business model adopted by the Colorado Space Coalition (CSC), a group of industry stakeholders working to make Colorado a center of excellence for aerospace, as blueprint for growth in Hawaii’s space sector. The second section of this paper will examine the business model adopted by the Netherlands Space Business Incubation Centre (NSBIC), a European Space Agency (ESA) affiliated program that offers business support for entrepreneurs to turn space-connected business ideas into commercial companies. This will serve as blueprint to incentivize space businesses to launch and develop in Hawaii. The third section of this paper will analyze the current policies both CSC, and NSBIC implores to promote industry expansion and legislative advocacy. The final section takes the findings from both space sectors and applies their most adaptable features to a Hawaii specific space business model that takes into consideration the unique advantage and disadvantages found in developing Hawaii’s space sector. The findings of this analysis will show that the development of a strategic plan based on a comparative analysis that creates high technology jobs and new pathways for a trained workforce in the space sector, as well as elicit state support and direction, will achieve the goal of establishing Hawaii as a center of space excellence. This analysis will also serve as a signal to the federal, private sector and international community that Hawaii is indeed serious about developing its’ aerospace industry. Ultimately this analysis and subsequent aerospace development plan will serve as a blueprint for the benefit of all space-faring nations seeking to develop their space sectors.Keywords: Colorado, Hawaii, Netherlands, space policy
Procedia PDF Downloads 1671406 Comprehensive Ultrasonography During Low-flow Bypass in Patients with Symptomatic Internal Carotid Artery (ICA) Occlusion
Authors: G. K. Guseynova, V. V. Krylov, L. T. Khamidova, N. A. Polunina, V. A. Lukyanchikov
Abstract:
The report presents complex ultrasound diagnostics in patients with symptomatic steno-occlusive lesions of extra- and intracranial branches of brachiocephalic arteries (BCA). The tasks and possibilities of ultrasound diagnostics at different stages of treatment of patients with symptomatic occlusion of internal carotid artery (ICA) are covered in detail; qualitative and quantitative characteristics of blood flow; parameters of the wall and lumen of the main arteries of the head; methods of ultrasound examination of indirect assessment of the functional status are presented. Special attention is paid to the description of indicators that are predictors of the consistency of formed extra-intracranial low-flow shunts, examples of functioning and failed anastomoses are analyzed.Keywords: CBF, cerebral blood flow; CTA, external carotid artery; ICA, internal carotid artery; MCA, middle cerebral artery; MRA, magnetic resonance angiography; OEF, oxygen extraction fraction; TIA, transient ischaemic attack, ultrasound, low-flow bypass, anastomoses
Procedia PDF Downloads 42