Search results for: totalistic organizations
1534 Festival Gamification: Conceptualization and Scale Development
Authors: Liu Chyong-Ru, Wang Yao-Chin, Huang Wen-Shiung, Tang Wan-Ching
Abstract:
Although gamification has been concerned and applied in the tourism industry, limited literature could be found in tourism academy. Therefore, to contribute knowledge in festival gamification, it becomes essential to start by establishing a Festival Gamification Scale (FGS). This study defines festival gamification as the extent of a festival to involve game elements and game mechanisms. Based on self-determination theory, this study developed an FGS. Through the multi-study method, in study one, five FGS dimensions were sorted through literature review, followed by twelve in-depth interviews. A total of 296 statements were extracted from interviews and were later narrowed down to 33 items under six dimensions. In study two, 226 survey responses were collected from a cycling festival for exploratory factor analysis, resulting in twenty items under five dimensions. In study three, 253 survey responses were obtained from a marathon festival for confirmatory factor analysis, resulting in the final sixteen items under five dimensions. Then, results of criterion-related validity confirmed the positive effects of these five dimensions on flow experience. In study four, for examining the model extension of the developed five-dimensional 16-item FGS, which includes dimensions of relatedness, mastery, competence, fun, and narratives, cross-validation analysis was performed using 219 survey responses from a religious festival. For the tourism academy, the FGS could further be applied in other sub-fields such as destinations, theme parks, cruise trips, or resorts. The FGS serves as a starting point for examining the mechanism of festival gamification in changing tourists’ attitudes and behaviors. Future studies could work on follow-up studies of FGS by testing outcomes of festival gamification or examining moderating effects of enhancing outcomes of festival gamification. On the other hand, although the FGS has been tested in cycling, marathon, and religious festivals, the research settings are all in Taiwan. Cultural differences of FGS is another further direction for contributing knowledge in festival gamification. This study also contributes to several valuable practical implications. First, this FGS could be utilized in tourist surveys for evaluating the extent of gamification of a festival. Based on the results of the performance assessment by FGS, festival management organizations and festival planners could learn the relative scores among dimensions of FGS, and plan for future improvement of gamifying the festival. Second, the FGS could be applied in positioning a gamified festival. Festival management organizations and festival planners could firstly consider the features and types of their festival, and then gamify their festival based on investing resources in key FGS dimensions.Keywords: festival gamification, festival tourism, scale development, self-determination theory
Procedia PDF Downloads 1471533 Determinants of Youth Engagement with Health Information on Social Media Platforms in United Arab Emirates
Authors: Niyi Awofeso, Yunes Gaber, Moyosola Bamidele
Abstract:
Since most social media platforms are accessible anytime and anywhere where Internet connections and smartphones are available, the invisibility of the reader raises questions about accuracy, appropriateness and comprehensibility of social media communication. Furthermore, the identity and motives of individuals and organizations who post articles on social media sites are not always transparent. In the health sector, through socially networked platforms constitute a common source of health-related information, given their purported wealth of information. Nevertheless, fake blogs and sponsored postings for marketing 'natural cures' pervade most commonly used social media platforms, thus complicating readers’ abilities to access and understand trustworthy health-related information. This purposive sampling study of 120 participants aged 18-35 year in UAE was conducted between September and December 2017, and explored commonly used social media platforms, frequency of use of social media for accessing health related information, and approaches for assessing the trustworthiness of health information on social media platforms. Results indicate that WhatsApp (95%), Instagram (87%) and Youtube (82%) were the most commonly used social media platforms among respondents. Majority of respondents (81%) indicated that they regularly access social media to get health-associated information. More than half of respondents (55%) with non-chronic health status relied on unsolicited messages to obtain health-related information. Doctors’ health blogs (21%) and social media sites of international healthcare organizations (20%) constitute the most trusted source of health information among respondents, with UAE government health agencies’ social media accounts trusted by 15% of respondents. Cardiovascular diseases, diabetes, and hypertension were the most commonly searched topics on social media (29%), followed by nutrition (20%) and skin care (16%). Majority of respondents (41%) rely on reliability of hits on Google search engines, 22% check for health information only from 'reliable' social media sites, while 8% utilize 'logic' to ascertain reliability of health information. As social media has rapidly become an integral part of the health landscape, it is important that health care policy makers, healthcare providers and social media companies collaborate to promote the positive aspects of social media for young people, whilst mitigating the potential negatives. Utilizing popular social media platforms for posting reader-friendly health information will achieve high coverage. Improving youth digital literacy will facilitate easier access to trustworthy information on the internet.Keywords: social media, United Arab Emirates, youth engagement, digital literacy
Procedia PDF Downloads 1191532 Critical Core Skills Profiling in the Singaporean Workforce
Authors: Bi Xiao Fang, Tan Bao Zhen
Abstract:
Soft skills, core competencies, and generic competencies are exchangeable terminologies often used to represent a similar concept. In the Singapore context, such skills are currently being referred to as Critical Core Skills (CCS). In 2019, SkillsFuture Singapore (SSG) reviewed the Generic Skills and Competencies (GSC) framework that was first introduced in 2016, culminating in the development of the Critical Core Skills (CCS) framework comprising 16 soft skills classified into three clusters. The CCS framework is part of the Skills Framework, and whose stated purpose is to create a common skills language for individuals, employers and training providers. It is also developed with the objectives of building deep skills for a lean workforce, enhance business competitiveness and support employment and employability. This further helps to facilitate skills recognition and support the design of training programs for skills and career development. According to SSG, every job role requires a set of technical skills and a set of Critical Core Skills to perform well at work, whereby technical skills refer to skills required to perform key tasks of the job. There has been an increasing emphasis on soft skills for the future of work. A recent study involving approximately 80 organizations across 28 sectors in Singapore revealed that more enterprises are beginning to recognize that soft skills support their employees’ performance and business competitiveness. Though CCS is of high importance for the development of the workforce’s employability, there is little attention paid to the CCS use and profiling across occupations. A better understanding of how CCS is distributed across the economy will thus significantly enhance SSG’s career guidance services as well as training providers’ services to graduates and workers and guide organizations in their hiring for soft skills. This CCS profiling study sought to understand how CCS is demanded in different occupations. To achieve its research objectives, this study adopted a quantitative method to measure CCS use across different occupations in the Singaporean workforce. Based on the CCS framework developed by SSG, the research team adopted a formative approach to developing the CCS profiling tool to measure the importance of and self-efficacy in the use of CCS among the Singaporean workforce. Drawing on the survey results from 2500 participants, this study managed to profile them into seven occupation groups based on the different patterns of importance and confidence levels of the use of CCS. Each occupation group is labeled according to the most salient and demanded CCS. In the meantime, the CCS in each occupation group, which may need some further strengthening, were also identified. The profiling of CCS use has significant implications for different stakeholders, e.g., employers could leverage the profiling results to hire the staff with the soft skills demanded by the job.Keywords: employability, skills profiling, skills measurement, soft skills
Procedia PDF Downloads 951531 Examining Moderating Mechanisms of Alignment Practice and Community Response through the Self-Construal Perspective
Authors: Chyong-Ru Liu, Wen-Shiung Huang, Wan-Ching Tang, Shan-Pei Chen
Abstract:
Two of the biggest challenges companies involved in sports and exercise information services face are how to strengthen participation in virtual sports/exercise communities and how to increase the ongoing participatoriness of those communities. In the past, relatively little research has explored mechanisms for strengthening alignment practice and community response from the perspective of self-construal, and as such this study seeks to explore the self-construal of virtual sports/exercise communities, the role it plays in the emotional commitment of forming communities, and the factor that can strengthen alignment practice. Moreover, which factor of the emotional commitment of forming virtual communities have the effect of strengthening interference in the process of transforming customer citizenship behaviors? This study collected 625 responses from the two leading websites in terms of fan numbers in the provision of information on road race and marathon events in Taiwan, with model testing conducted through linear structural equation modelling and the bootstrapping technique to test the proposed hypotheses. The results proved independent construal had a stronger positive direct effect on affective commitment to fellow customers than did interdependent construal, and the influences of affective commitment to fellow customers in enhancing customer citizenship behavior. Public self-consciousness moderates the relationships among independent self-construal and interdependent self-construal on effective commitment to fellow customers. Perceived playfulness moderates the relationships between effective commitment to fellow customers and customer citizenship behavior. The findings of this study provide significant insights for the researchers and related organizations. From the theoretical perspective, this is empirical research that investigated the self-construal theory and responses (i.e., affective commitment to fellow customers, customer citizenship behavior) in virtual sports/exercise communities. We further explore how to govern virtual sports/exercise community participants’ heterogeneity through public self-consciousness mechanism to align participants’ affective commitment. Moreover, perceived playfulness has the effect of strengthening effective commitment to fellow customers with customer citizenship behaviors. The results of this study can provide a foundation for the construction of future theories and can be provided to related organizations for reference in their planning of virtual communities.Keywords: self-construal theory, public self-consciousness, affective commitment, customer citizenship behavior
Procedia PDF Downloads 1061530 Indicators of Sustainable Intensification: Views from British Stakeholders
Authors: N. Mahon, I. Crute, M. Di Bonito, E. Simmons, M. M. Islam
Abstract:
Growing interest in the concept of the sustainable intensification (SI) of agriculture has been shown by, national governments, transnational agribusinesses, intergovernmental organizations and research institutes, amongst others. This interest may be because SI is seen as a ‘third way’ for agricultural development, between the seemingly disparate paradigms of ‘intensive’ agriculture and more ‘sustainable’ forms of agriculture. However, there is a lack of consensus as to what SI means in practice and how it should be measured using indicators of change. This has led to growing confusion, disagreement and skepticism regarding the concept, especially amongst civil society organizations, both in the UK and other countries. This has prompted the need for bottom-up, participatory approaches to identify indicators of SI. Our aim is to identify the views of British stakeholders regarding the areas of agreement and disagreement as to what SI is and how it should be measured in the UK using indicators of change. Data for this investigation came from 32 semi-structured interviews, conducted between 2015 and 2016, with stakeholders from throughout the UK food system. In total 110 indicators of SI were identified. These indicators covered a wide variety of subjects including biophysical, social and political considerations. A number of indicators appeared to be widely applicable and were similar to those suggested in the global literature. These include indicators related to the management of the natural resources on which agriculture relies e.g., ‘Soil organic matter’, ‘Number of pollinators per hectare’ and ‘Depth of water table’. As well as those related to agricultural externalities, e.g., ‘Greenhouse gas emissions’ and ‘Concentrations of agro-chemicals in waterways’. However, many of the indicators were much more specific to the context of the UK. These included, ‘Areas of high nature value farmland’, ‘Length of hedgerows per hectare’ and ‘Age of farmers’. Furthermore, tensions could be seen when participants considered the relative importance of agricultural mechanization versus levels of agricultural employment, the pros and cons of intensive, housed livestock systems and value of wild biodiversity versus the desire to increase agricultural yields. These areas of disagreement suggest the need to carefully consider the trade-offs inherent in the concept. Our findings indicate that in order to begin to resolve the confusions surrounding SI it needs to be considered in a context specific manner, rather than as a single uniform concept. Furthermore, both the environmental and the social parameters in which agriculture operates need to be considered in order to operationalize SI in a meaningful way. We suggest that participatory approaches are key to this process, facilitating dialogue and collaborative-learning between all the stakeholders, allowing them to reach a shared vision for the future of agricultural development.Keywords: agriculture, indicators, participatory approach, sustainable intensification
Procedia PDF Downloads 2241529 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 1481528 An Observation of the Information Technology Research and Development Based on Article Data Mining: A Survey Study on Science Direct
Authors: Muhammet Dursun Kaya, Hasan Asil
Abstract:
One of the most important factors of research and development is the deep insight into the evolutions of scientific development. The state-of-the-art tools and instruments can considerably assist the researchers, and many of the world organizations have become aware of the advantages of data mining for the acquisition of the knowledge required for the unstructured data. This paper was an attempt to review the articles on the information technology published in the past five years with the aid of data mining. A clustering approach was used to study these articles, and the research results revealed that three topics, namely health, innovation, and information systems, have captured the special attention of the researchers.Keywords: information technology, data mining, scientific development, clustering
Procedia PDF Downloads 2781527 Decision Tree Modeling in Emergency Logistics Planning
Authors: Yousef Abu Nahleh, Arun Kumar, Fugen Daver, Reham Al-Hindawi
Abstract:
Despite the availability of natural disaster related time series data for last 110 years, there is no forecasting tool available to humanitarian relief organizations to determine forecasts for emergency logistics planning. This study develops a forecasting tool based on identifying probability of disaster for each country in the world by using decision tree modeling. Further, the determination of aggregate forecasts leads to efficient pre-disaster planning. Based on the research findings, the relief agencies can optimize the various resources allocation in emergency logistics planning.Keywords: decision tree modeling, forecasting, humanitarian relief, emergency supply chain
Procedia PDF Downloads 4831526 Quality Business Ethics: A Case Study
Authors: Fotis Vouzas
Abstract:
This paper is an attempt to investigate the Business Ethics link to Quality Management. Business Ethics as a management practice is well rooted in many organizations, but its contribution to quality management implementation programs and practices is not well documented. The ISO 9000 and the Business Excellence frameworks and Awards seem to provide a basis for the implementation of a TQM philosophy contributing to efficiency, enhanced performance and sustainability. The author examines a series of Corporate Ethics initiatives and investigates the relationship to Total Quality Management in an MNC operating in Greece. The data gathering was carried out through extensive and in-depth interviews with several multiple informants, i.e., the plant manager, the production manager, and the personnel manager, using a semi-structured questionnaire with open-ended questions.Keywords: total quality management, business ethics, Greece, ISO 9000
Procedia PDF Downloads 771525 A Conceptual Analysis of Teams’ Climate Role in the Intrapreneurial Process
Authors: Georgia C. Kosta, Christos S. Nicolaidis
Abstract:
The present paper discusses the role of teams’ climate in the intrapreneurial process. Intrapreneurship, which corresponds for entrepreneurship in existing organizations, puts special emphasis on climate as an influential factor of the intrapreneurial behavior. Although climate exists at every level and in every subgroup of the organizational structure, research focuses mainly on the study of climate that characterizes organization as a whole. However, the climate of a work team may differ radically from the organizational climate, and in fact it can be far more influential. The paper provides a conceptual analysis of organizational climate from the intrapreneurial point of view, and sheds light upon teams’ climate role in the intrapreneurial posture.Keywords: entrepreneurship, innovation, intrapreneurship, organizational climate, teams’ climate
Procedia PDF Downloads 2831524 A Holistic Approach to Institutional Cyber Security
Authors: Mehmet Kargaci
Abstract:
It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.Keywords: cyber defence, information, critical infrastructure, security
Procedia PDF Downloads 5371523 An Investigation into Enablers and Barriers of Reverse Technology Transfer
Authors: Nirmal Kundu, Chandan Bhar, Visveswaran Pandurangan
Abstract:
Technology is the most valued possession for a country or an organization. The economic development depends not on stock of technology but on the capabilities how the technology is being exploited. The technology transfer is the best way how the developing countries have an access to state-of- the-art technology. Traditional technology transfer is a unidirectional phenomenon where technology is transferred from developed to developing countries. But now there is a change of wind. There is a general agreement that global shift of economic power is under way from west to east. As China and India are making the transition from users to producers, and producers to innovators, this has increasing important implications on economy, technology and policy of global trade. As a result, Reverse technology transfer has become a phenomenon and field of study in technology management. The term “Reverse Technology Transfer” is not well defined. Initially the concept of Reverse technology transfer was associated with the phenomenon of “Brain drain” from developing to developed countries. In the second phase, Reverse Technology Transfer was associated with the transfer of knowledge and technology from subsidiaries to multinationals. Finally, time has come now to extend the concept of reverse technology transfer to two different organizations or countries related or unrelated by traditional technology transfer but the transfer or has essentially received the technology through traditional mode of technology transfer. The objective of this paper is to study; 1) the present status of Reverse technology transfer, 2) the factors which are the enablers and barriers of Reverse technology transfer and 3) how the reverse technology transfer strategy can be integrated in the technology policy of a country which will give the countries an economic boost. The research methodology used in this study is a combination of literature review, case studies and key informant interviews. The literature review includes both published as well as unpublished sources of literature. In case study, attempt has been made to study the records of reverse technology transfer that have been occurred in developing countries. In case of key informant interviews, informal telephonic discussions have been carried out with the key executives of the organizations (industry, university and research institutions) who are actively engaged in the process of technology transfer- traditional as well as reverse. Reverse technology transfer is possible only by creating technological capabilities. Following four important enablers coupled with government active and aggressive action can help to build technology base to reach to the goal of Reverse technology transfer 1) Imitation to innovation, 2) Reverse engineering, 3) Collaborative R & D approach, and 4) Preventing reverse brain drain. The barriers that come in the way are the mindset of over dependence, over subordination and parent–child attitude (not adult attitude). Exploitation of these enablers and overcoming the barriers of reverse technology transfer, the developing countries like India and China can prove that going “reverse” is the best way to move forward and again establish themselves as leader of the future world.Keywords: barriers of reverse technology transfer, enablers of reverse technology transfer, knowledge transfer, reverse technology transfer, technology transfer
Procedia PDF Downloads 3991522 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country
Authors: Meszár Tárik
Abstract:
The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.Keywords: Middle East, Iraq, Islamic State, minorities
Procedia PDF Downloads 881521 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego
Procedia PDF Downloads 811520 Leader-Member Exchange and Affective Commitment: The Moderating Role of Exchange Ideology
Authors: Seung Yeon Son
Abstract:
In today’s rapidly changing and increasingly complex environment, organizations have relied on their members’ positive attitude toward their employers. In particular, employees’ organizational commitment (primarily, the effective component) has been recognized as an essential component of organizational functioning and success. Hence, identifying the determinants of effective commitment is one of the most important research issues. This study tested the influence of leader-member exchange (LMX) and exchange ideology on employee’s effective commitment. In addition, the interactive effect of LMX and exchange ideology was examined. Data from 198 members of the Korean military supports each of the hypotheses. Lastly, implications for research and directions for future research are discussed.Keywords: affective commitment, exchange ideology, leader-member exchange, commitment
Procedia PDF Downloads 4411519 Development of Modular Shortest Path Navigation System
Authors: Nalinee Sophatsathit
Abstract:
This paper presents a variation of navigation systems which tallies every node along the shortest path from start to destination nodes. The underlying technique rests on the well-established Dijkstra Algorithm. The ultimate goal is to serve as a user navigation guide that furnishes stop over cost of every node along this shortest path, whereby users can decide whether or not to visit any specific nodes. The output is an implementable module that can be further refined to run on the Internet and smartphone technology. This will benefit large organizations having physical installations spreaded over wide area such as hospitals, universities, etc. The savings on service personnel, let alone lost time and unproductive work, are attributive to innovative navigation system management.Keywords: navigation systems, shortest path, smartphone technology, user navigation guide
Procedia PDF Downloads 3381518 Ontology as Knowledge Capture Tool in Organizations: A Literature Review
Authors: Maria Margaretha, Dana Indra Sensuse, Lukman
Abstract:
Knowledge capture is a step in knowledge life cycle to get knowledge in the organization. Tacit and explicit knowledge are needed to organize in a path, so the organization will be easy to choose which knowledge will be use. There are many challenges to capture knowledge in the organization, such as researcher must know which knowledge has been validated by an expert, how to get tacit knowledge from experts and make it explicit knowledge, and so on. Besides that, the technology will be a reliable tool to help the researcher to capture knowledge. Some paper wrote how ontology in knowledge management can be used for proposed framework to capture and reuse knowledge. Organization has to manage their knowledge, process capture and share will decide their position in the business area. This paper will describe further from literature review about the tool of ontology that will help the organization to capture its knowledge.Keywords: knowledge capture, ontology, technology, organization
Procedia PDF Downloads 6061517 The Contemporary Issues of Quality Management: Relationship between Total Quality Management and Knowledge Management
Authors: Mehrnoosh Askarizadeh
Abstract:
To meet the challenges of the new global environment, companies have started paying great attention towards quality management as an integral part of their strategic business plans. The purpose of this article is to investigate the relationship between total quality management (TQM) and knowledge management (KM). Successful total quality management implementation throughout the organizations requires major changes in the main four aspects of knowledge management, namely: Creating, storage, sharing and application. Skill, knowledge and productivity are important factors in organization’s success and have important role. Therefore, TQM management system pays special attention to it. However, knowledge as the source is essential for organization’s survival. Our study points out how the quality management and knowledge management have been incorporated into each other for the development of the quality culture within the organization.Keywords: knowledge management (KM), total quality management (TQM), organizational performance (OP), deming cycle
Procedia PDF Downloads 4811516 Preceptor Program: A Way to Reduce Absconding Rate and Increase Patient Satisfaction
Authors: Akanksha Dicholkar, Celin Jacob, Omkar More
Abstract:
Work force instability, as demonstrated by high rates of staff turnover and lingering vacancy rates, continues to be a major challenge faced by health care organizations. The impact is manifested in workflow inefficiencies, delays in delivering patient care, and dissatisfaction among patients and staff, all of which can have significant negative effects on quality of care and patient safety. In addition, the staggering administrative costs created by a transient work force threaten health care organizations financial viability. One nurse retention strategy is to have newly hired nurses partake in Preceptorship. Precepting is a way to enculturate new employees into their role. Also good professional, collegial relationship between an experienced nurse and a newly hired nurse relations was evidenced. This study demonstrates impact of preceptor program on absconding rate, employee satisfaction & Patient satisfaction. Purpose of study: To decrease absconding rate. Objective: 1. To reduce the high absconding rate among nurses in Aster Medcity (AMC). 2. To facilitate the acclimatization of the newly hired nurse into their role, focusing on professional growth, inter-professional relationships and clinical skills required for the job. Methodology: Descriptive study by Convenience sampling method and collect data by direct observation, questionnaire, interviews. Sample size as per Sample size statistical table at 95 % CI. We conducted a pre and post intervention analysis to assess the impact of Preceptorship at AMC, with a daily occupancy of approx. 300 patients. Result: Preceptor program has had a significant improvement positive impact on all measured parameters. Absconding rate came down from 20% to 0% (P= 0.001). Patient satisfaction scores rose from 85% to 95%. Employee satisfaction rose form 65% to 85%. Conclusion: The project proved that Preceptor Development Programme and the steps taken in hand holding of the new joinees were effective in reducing the absconding rate among nurses and improved the overall satisfaction of new nurses. Preceptee satisfaction with the preceptorship experience was correlated with favorable evaluation of the relationship between the preceptee and preceptor. These findings indicate that when preceptors and preceptees have the benefit of formal preceptorship programs that are well supported, and when the preceptors’ efforts are rewarded, satisfaction is enhanced for both participants, preceptor commitment to the role is reinforced.Keywords: absconding rate, preceptor, employee satisfaction index, satisfaction index
Procedia PDF Downloads 3081515 Talking to Ex-Islamic State Fighters inside Iraqi Prisons: An Arab Woman’s Perspective on Radicalization and Deradicalization
Authors: Suha Hassen
Abstract:
This research aims to untangle the complexity of conducting face-to-face interviews with 80 ex-Islamic State fighters, encompassing three groups: local Iraqis, Arabs from the Middle East, and international fighters from around the globe. Each interview lasted approximately two hours and was conducted in both Arabic and English, focusing on the motivations behind joining the Islamic State and the pathways and mechanisms facilitating their involvement. The phenomenon of individuals joining violent Islamist extremist and jihadist organizations is multifaceted, drawing substantial attention within terrorism and security studies. Organizations such as the Islamic State, Hezbollah, Hamas, and Al-Qaeda pose formidable threats to international peace and stability, employing various terrorist tactics for radicalization and recruitment. However, significant gaps remain in current studies, including a lack of firsthand accounts, an inadequate understanding of original narratives (religious and linguistic) due to abstraction and misinterpretation of motivations, and a lack of Arab women's perspectives from the region. This study addresses these gaps by exploring the cultural, religious, and historical complexities that shape the narratives of ex-ISIS fighters. The paper will showcase three distinct cases: one French prisoner, one Moroccan fighter, and a local Iraqi, illustrating the diverse motivations and experiences that contribute to joining and leaving extremist groups. The findings provide valuable insights into the nuanced dynamics of radicalization, emphasizing the need for gender-sensitive approaches in counter-terrorism strategies and deradicalization programs. Importantly, this research has practical implications for counter-narrative policies and early-stage prevention of radicalization. By understanding the narratives used by ex-fighters, policymakers can develop targeted counter-narratives that disrupt recruitment efforts. Additionally, insights into the mechanisms of radicalization can inform early intervention programs, helping to identify and support at-risk individuals before they become entrenched in extremist ideologies. Ultimately, this research enhances our understanding of the individual experiences of ex-ISIS fighters and calls for a reevaluation of the narratives surrounding women’s roles in extremism and recovery.Keywords: Arab women in extremism, counter-narrative policy, ex-ISIS fighters in Iraq, radicalization
Procedia PDF Downloads 231514 The Effect of Psychological Capital and Psychological Empowerment on Employees' Commitment to Change
Authors: Muthmainah Mufidah, Wustari L. H. Mangundjaya
Abstract:
Organizations nowadays have to change and adjust themselves to the changing external environment in order to survive the globalization era. However, not all the organizational change had been succeeded. Commitment to change is one important factor why the change process often failed. Even so, this commitment to change cannot be separated with the individual’s characteristic. The aim of this study is to identify the role of psychological capital and psychological empowerment as the individual’s positive characteristic on commitment to change. This research was conducted on Indonesian employees who have or are currently experiencing a change in their organization. Data was collected using Commitment to Change Inventory, Psychological Empowerment Questionnaire, and Psychological Capital Questionnaire. The results showed that both psychological capital and psychological empowerment have a positive and significant influence on commitment to change.Keywords: commitment to change, psychological capital, psychological empowerment, organizational change
Procedia PDF Downloads 3241513 Effect of Institutional Structure on Project Managers Performance in Construction Projects: A Case Study in Nigeria
Authors: Ebuka Valentine Iroha, Tsunemi Watanabe, Satoshi Tsuchiya
Abstract:
Project management practices play an important role in construction project performance and are one of project managers' essential key performance indicators. Previous studies have explored the poor performance of the construction industry, with project delays and cost overruns identified to contribute largely to numerous abandoned projects. These challenges are attributed to insufficient project management practices and a lack of utilization of project managers. The actual causes of inadequate project management practices and underutilization of project managers have been rarely discussed. This study tends to bridge the gap by identifying and assessing the actual causes of insufficient project management practices and underutilization of project managers. This study differs from past studies investigating the causes of poor performance by using institutional analysis methods to identify and analyze the factors influencing project management practices and proper utilization of project managers. Based on a comprehensive literature review, this study identified some factors embedded in the construction industry that influence the institutional environment and weaken the laws and regulations. These factors were used as the basis for semi-structured interview questions to investigate their impacts on project management practices and project managers. The data collected were coded into a four-level framework for institutional analysis. This method was used to analyze the interrelationships between the identified embedded factors, institutional laws and regulations, and construction organizations to understand how these influences result in the underutilization of project managers. The study found that the underutilization of project managers consists of two subsystems, including underutilization and lowering commitment. The first subsystem, corruption, political influence, religious and tribal discrimination, and organizational culture, were found to affect the institutional structure. These embedded factors weaken the industry’s governance mechanism, forcing project managers to prioritize corrupt practices over project demands. The ineffectiveness of the existing laws and regulations worsens the situation, supporting unfair working conditions and contributing to the underperformance of project managers. This situation leads to the development of the second subsystem, which is characterized by a lack of opportunities for career development and minimal incentives within construction organizations. The findings provide significant potential for addressing systemic challenges in the construction industry, particularly the underutilization of project managers and enhancing organizational support measures to improve project management practices and mitigate the adverse effects of corruption.Keywords: construction industry, project management, poor performance, embedded factors, project managers underutilization
Procedia PDF Downloads 391512 Method for Selecting and Prioritising Smart Services in Manufacturing Companies
Authors: Till Gramberg, Max Kellner, Erwin Gross
Abstract:
This paper presents a comprehensive investigation into the topic of smart services and IIoT-Platforms, focusing on their selection and prioritization in manufacturing organizations. First, a literature review is conducted to provide a basic understanding of the current state of research in the area of smart services. Based on discussed and established definitions, a definition approach for this paper is developed. In addition, value propositions for smart services are identified based on the literature and expert interviews. Furthermore, the general requirements for the provision of smart services are presented. Subsequently, existing approaches for the selection and development of smart services are identified and described. In order to determine the requirements for the selection of smart services, expert opinions from successful companies that have already implemented smart services are collected through semi-structured interviews. Based on the results, criteria for the evaluation of existing methods are derived. The existing methods are then evaluated according to the identified criteria. Furthermore, a novel method for the selection of smart services in manufacturing companies is developed, taking into account the identified criteria and the existing approaches. The developed concept for the method is verified in expert interviews. The method includes a collection of relevant smart services identified in the literature. The actual relevance of the use cases in the industrial environment was validated in an online survey. The required data and sensors are assigned to the smart service use cases. The value proposition of the use cases is evaluated in an expert workshop using different indicators. Based on this, a comparison is made between the identified value proposition and the required data, leading to a prioritization process. The prioritization process follows an established procedure for evaluating technical decision-making processes. In addition to the technical requirements, the prioritization process includes other evaluation criteria such as the economic benefit, the conformity of the new service offering with the company strategy, or the customer retention enabled by the smart service. Finally, the method is applied and validated in an industrial environment. The results of these experiments are critically reflected upon and an outlook on future developments in the area of smart services is given. This research contributes to a deeper understanding of the selection and prioritization process as well as the technical considerations associated with smart service implementation in manufacturing organizations. The proposed method serves as a valuable guide for decision makers, helping them to effectively select the most appropriate smart services for their specific organizational needs.Keywords: smart services, IIoT, industrie 4.0, IIoT-platform, big data
Procedia PDF Downloads 891511 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 871510 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures
Authors: Serkan Yağlı, Selçuk Dal
Abstract:
Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO
Procedia PDF Downloads 2441509 Specialised Centres in TERI Knowledge Resource Centre
Authors: Pallavi Singh
Abstract:
Developing library knowledge centres involves transforming traditional library spaces into dynamic, interactive environments that support collaborative learning, digital literacy, and access to various resources. Knowledge centres, also known as knowledge hubs or centres of excellence, play a crucial role in organizations and communities by serving as repositories of expertise and information. The Energy and Resources Institute (TERI) is a research organisation dedicated to sustainable community solutions. TERI Knowledge Resource Center is also aligned with the objective of the host organization within TERI; there are several specialized knowledge centers dedicated to various aspects of sustainability, energy, climate change, environmental management, green mobility, etc.Keywords: knowledge centres, environmental management, green mobility, energy
Procedia PDF Downloads 61508 The Influence of Work Experience on Conflict Management Styles of Organizational Members
Authors: Faris Alghamdi
Abstract:
Identifying which conflict management styles organizational members prefer, and what variables influence these selections, is an essential component of organizational conflict management as well as human resource management, particularly in training and development strategies. This study aims to examine the relationship between work experience and preferred conflict management styles. Utilizing the Rahim Organizational Conflict Inventory- II Form C, data were collected from 109 full-time employees of various organizations in the Eastern province of Saudi Arabia. The Pearson’s correlation coefficient analysis showed a statistically significant relationship between the integrating conflict management style and the length of work experience. Nevertheless, this relationship was negative, not positive as hypothesized.Keywords: conflict management style, organizational members, work experience
Procedia PDF Downloads 4101507 Baseline Study of Water Quality in Indonesia Using Dynamic Methods and Technologies
Authors: R. L. P. de Lima, F. C. B. Boogaard, D. Setyo Rini, P. Arisandi, R. E. de Graaf-Van Dinther
Abstract:
Water quality in many Asian countries is very poor due to inefficient solid waste management, high population growth and the lack of sewage and purification systems for households and industry. A consortium of Indonesian and Dutch organizations has begun a large-scale international research project to evaluate and propose solutions to face the surface water pollution challenges in Brantas Basin, Indonesia (East Java: Malang / Surabaya). The first phase of the project consisted in a baseline study to assess the current status of surface water bodies and to determine the ambitions and strategies among local stakeholders. This study was conducted with high participatory / collaborative and knowledge sharing objectives. Several methods such as using mobile sensors (attached to boats or underwater drones), test strips and mobile apps, bio-monitoring (sediments), ecology scans using underwater cameras, or continuous / static measurements, were applied in different locations in the regions of the basin, at multiple locations within the water systems (e.g. spring, upstream / downstream of industry and urban areas, mouth of the Surabaya River, groundwater). Results gave an indication of (reference) values of basic water quality parameters such as turbidity, electrical conductivity, dissolved oxygen or nutrients (ammonium / nitrate). An important outcome was that collecting random samples may not be representative of a body of water, given that water quality parameters can vary widely in space (x, y, and depth) and time (day / night and seasonal). Innovative / dynamic monitoring methods (e.g. underwater drones, sensors on boats) can contribute to better understand the quality of the living environment (water, ecology, sediment) and factors that affect it. The field work activities, in particular, underwater drones, revealed potential as awareness actions as they attracted interest from locals and local press. This baseline study involved the cooperation with local managing organizations with Dutch partners, and their willingness to work together is important to ensure participatory actions and social awareness regarding the process of adaptation and strengthening of regulations, or for the construction of facilities such as sewage.Keywords: water quality monitoring, pollution, underwater drones, social awareness
Procedia PDF Downloads 1921506 Big Data Strategy for Telco: Network Transformation
Abstract:
Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating churn and declining revenue per user. Big Data presents new method to reverse the way and improve profitability. The benefits of Big Data and next-generation network, however, are more exorbitant than improved customer relationship management. Next generation of networks are in a prime position to monetize rich supplies of customer information—while being mindful of legal and privacy issues. As data assets are transformed into new revenue streams will become integral to high performance.Keywords: big data, next generation networks, network transformation, strategy
Procedia PDF Downloads 3601505 Measuring Systems Interoperability: A Focal Point for Standardized Assessment of Regional Disaster Resilience
Authors: Joel Thomas, Alexa Squirini
Abstract:
The key argument of this research is that every element of systems interoperability is an enabler of regional disaster resilience, and arguably should become a focal point for standardized measurement of communities’ ability to work together. Few resilience research efforts have focused on the development and application of solutions that measurably improve communities’ ability to work together at a regional level, yet a majority of the most devastating and disruptive disasters are those that have had a regional impact. The key findings of the research include a unique theoretical, mathematical, and operational approach to tangibly and defensibly measure and assess systems interoperability required to support crisis information management activities performed by governments, the private sector, and humanitarian organizations. A most effective way for communities to measurably improve regional disaster resilience is through deliberately executed disaster preparedness activities. Developing interoperable crisis information management capabilities is a crosscutting preparedness activity that greatly affects a community’s readiness and ability to work together in times of crisis. Thus, improving communities’ human and technical posture to work together in advance of a crisis, with the ultimate goal of enabling information sharing to support coordination and the careful management of available resources, is a primary means by which communities may improve regional disaster resilience. This model describes how systems interoperability can be qualitatively and quantitatively assessed when characterized as five forms of capital: governance; standard operating procedures; technology; training and exercises; and usage. The unique measurement framework presented defines the relationships between systems interoperability, information sharing and safeguarding, operational coordination, community preparedness and regional disaster resilience, and offers a means by which to implement real-world solutions and measure progress over the course of a multi-year program. The model is being developed and piloted in partnership with the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) and the North Atlantic Treaty Organization (NATO) Advanced Regional Civil Emergency Coordination Pilot (ARCECP) with twenty-three organizations in Bosnia and Herzegovina, Croatia, Macedonia, and Montenegro. The intended effect of the model implementation is to enable communities to answer two key questions: 'Have we measurably improved crisis information management capabilities as a result of this effort?' and, 'As a result, are we more resilient?'Keywords: disaster, interoperability, measurement, resilience
Procedia PDF Downloads 143