Search results for: legislative policies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2648

Search results for: legislative policies

1778 Ending the Gender Gap in Educational Leadership: A U.S. Goal for a Balanced Administration by 2030

Authors: S. Dodd

Abstract:

This presentation examines the gender gap in leadership positions at colleges and universities within the United States. Despite the fact that women now outnumber men in earning doctorate degrees, women continue to hold far fewer positions of educational leadership, and still, earn less money than men do at every level. Considering the lack of female representation in positions of leadership, there are clearly outside variables preventing women from attaining these positions, despite their educational attainment. Following this study, the American Council on Education (ACE) set a goal to achieve an equal percentage of females holding college presidency positions by the year 2030. This goal is particularly ambitious, especially when considering the gender disparity at all ranks in higher education. Men still hold nearly 70% of all full professorships at degree-granting institutions. Even when women are equally represented in numbers, men typically hold a higher rank and are more likely to be tenured. Across all four-year colleges and universities in the United States, men earn more money than women at every rank and in every discipline. There are over twice as many men than women represented on governing boards, who help formed and uphold campus policies. The fact that the low percentage of female presidents has remained static for many years deepens the challenge for the ACE. Although emphasizing the need to create greater opportunities for women in educational administration is admirable, it is difficult to simplify the social forces that create and uphold the status quo of male leadership. When aiming to ensure 'women' hold 50% of all college presidency positions, it is important to consider how the intersections of race, social class, and other factors also correlate with lower job status. This presentation explores how gendered notions of leadership begin in a child’s early years and are carried into future careers, and how these conceptualizations impact the creation and upholding of educational policies at every academic level. Current research that emphasizes the importance establishing a bottom-up approach to a gender equity infrastructure for children early in their educational careers will be discussed. A top-down approach starting with female college presidents is incomplete and insufficient if the mindsets of the youth who will one day be entering those institutions of higher education are not also taken into consideration. Although ACE has established this lofty goal for female college presidencies by the year 2030, a road map for this will ensue, has not yet been provided. The talent pool of women who are educated and experienced for such positions is vast, but acknowledging the social barriers existing for women in these positions will be crucial to making the changes necessary for these leadership opportunities to be long lasting and successful.

Keywords: equity, higher education, leadership, women

Procedia PDF Downloads 178
1777 Challenges of Effective Management in Tetiary Institutions in Nigeria

Authors: Simon Oga Egboja, Agi Sunday

Abstract:

The government of Nigeria have invested so much in our tertiary education but the desire qualitative goals and objectives are yet to be achieved because management at all level are not efficient and effective in implementing the desired educational policies and programmes due to some management challenges. This paper investigates some of the major challenges to effective management of tertiary institution in Nigeria some variable that are important to effective management includes political stability, adequate funding, establishment of information system, recruitment and appointment of qualified teachers and condition of service.

Keywords: effective management includes political stability, adequate funding, establishment of information system, recruitment and appointment of qualified teachers

Procedia PDF Downloads 306
1776 Exploring the Impacts of Ogoni/African Indigenous Knowledge in Addressing Environmental Issues in Ogoniland, Nigeria

Authors: Lele Dominic Dummene

Abstract:

Environmental issues are predominant in rural areas where indigenous people reside. These environmental issues cover environmental, health, social, economic, and political issues that emanate from poor environmental management and unfair distribution of environmental resources. These issues have greatly affected the lives of the indigenous people and their daily activities. As these environmental issues grow in communities, environmental experts, scientists, and theorists have proposed and developed methods, policies, and strategies to address these environmental-related issues in indigenous communities. Thus, this paper explores how the Ogoni indigenous knowledge and cultural practices could be used to address environmental issues such as oil pollution and other environmental-related issues that have destroyed the Ogoni environment.

Keywords: Ogoniland, indigenous knowledge, environment, environmental education

Procedia PDF Downloads 122
1775 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 165
1774 Aligning Organizational Culture and Compensation Strategies

Authors: Giuseppe Maria Russo, Patrícia Amélia Tomei, Antônio Linhares, André Moreira Santos

Abstract:

Alignment between management strategies, policies and practices with organizational cultures holds great potential to meet the challenges of retaining professionals and maintaining their commitment. In this article, authors consider that when it is aligned with company strategy, compensation acts as an incentive for developing common visions within the organizational culture. This article verified the correlation between types of culture and compensation’s strategic components and provided inputs for the definition of strategies aligned with cultural typologies. We conclude that the impact of compensation variables varies according to the type of organizational culture. This result reinforces the theory that different cultures define different organizational strategies. Thus, compensation strategies may explain types of organizational culture.

Keywords: compensation, Handy’s cultural typology, organizational culture, rewards

Procedia PDF Downloads 661
1773 Employment Problems of Graduands Graduated Form Vocational High Schools

Authors: Refik Uyanöz, Sadife Güngör, Sevilay Konya

Abstract:

The aim of this study is to show the employing ability of vocational students. And also, the employment problems of these students are emphasized in this study.The rapid development in technology and information and increased qualified labor is widely affects labor market. On the other hand, labor market will look for educated, qualified, talented and young people. Because of this reason, qualified staff should be educated at vocational high schools. Vocational high schools are one of the best institutions to educate qualified staff. In this research, the conditions of vocational high schools are studied. The difference between the employment policies and current employment problems are researched.

Keywords: vocational high school, employment, employment problems, vocational students

Procedia PDF Downloads 466
1772 The Gender Perspective Applied to the Analysis of Occupational Accidents

Authors: María Del Carmen Pardo Ferreira, Fernando Rodriguez Cortes, Juan Carlos Rubio Romero

Abstract:

According to the International Labor Organization, every day there is more presence of women in the labor market although inequality between women and men persists in world labor markets. In order to try to reduce this gender inequality in the work environment, the present study is proposed, which aims to analyze the occupational accidents suffered by women and occurred in Spain between 2015 and 2018. For this, the methodology used was based on a statistical analysis of the data provided by the Government of Spain. The results will allow to know in which jobs women suffer accidents, in what type of companies and the severity of the accident. Based on these results, specific intervention policies may be defined according to the needs detected in each sector.

Keywords: Injured women, Gender perspective, Occupational accidents, Occupational health and safety

Procedia PDF Downloads 177
1771 The Effect of Gender and Resources on Entrepreneurial Activity

Authors: Frederick Nyakudya

Abstract:

In this paper, we examine the relationship between human capital, personal wealth and social capital to explain the differential start-up rates between female and male entrepreneurs. Since our dependent variable is dichotomous, we examine the determinants of these using a maximum likelihood logit estimator. We used the Global Entrepreneurship Monitor database covering the period 2006 to 2009 with 421 usable cases drawn from drawn from the Lower Layer Super Output Areas in the East Midlands in the United Kingdom. we found evidence that indicates that a female positively moderate the positive relationships between indicators of human capital, personal wealth and social capital with start-up activity. The findings have implications for programs, policies, and practices to encourage more females to engage in start-up activity.

Keywords: entrepreneurship, star-up, gender, GEM

Procedia PDF Downloads 109
1770 Cooperative Communication of Energy Harvesting Synchronized-OOK IR-UWB Based Tags

Authors: M. A. Mulatu, L. C. Chang, Y. S. Han

Abstract:

Energy harvesting tags with cooperative communication capabilities are emerging as possible infrastructure for internet of things (IoT) applications. This paper studies about the \ cooperative transmission strategy for a network of energy harvesting active networked tags (EnHANTs), that is adapted to the available energy resource and identification request. We consider a network of EnHANT-equipped objects to communicate with the destination either directly or by cooperating with neighboring objects. We formulate the the problem as a Markov decision process (MDP) under synchronised On/Off keying (S-OOK) pulse modulation format. The simulation results are provided to show the the performance of the cooperative transmission policy and compared against the greedy and conservative policies of single-link transmission.

Keywords: cooperative communication, transmission strategy, energy harvesting, Markov decision process, value iteration

Procedia PDF Downloads 492
1769 Sustainable Tourism Management in Taiwan: Using Certification and KPI Indicators to Development Sustainable Tourism Experiences

Authors: Shirley Kuo

Abstract:

The main purpose of this study is to develop sustainable indicators for Taiwan, and using the Delphi method to find that our tourist areas can progress in a sustainable way. We need a lot of infrastructures and policies to develop tourist areas, and with proper KPI indicators can reduce the destruction of the natural and ecological environment. This study will first study the foreign certification experiences, because Taiwan is currently in the development stage, and then the methodology will explain in-depth interviews using the Delphi method, and then there is discussion about which KPI indicators Taiwan currently needs. In this study current progress is a deep understanding of national sustainable tourism certification and KPI indicators.

Keywords: sustainable tourism, certification, KPI indicators, Delphi method

Procedia PDF Downloads 332
1768 Hedging and Corporate Governance: Lessons from the Financial Crisis

Authors: Rodrigo Zeidan

Abstract:

The paper identifies failures of decision making and corporate governance that allow non-financial companies around the world to develop hedging strategies that lead to hefty losses in the aftermath of the financial crisis. The sample is comprised of 346 companies from 10 international markets, of which 49 companies (and a subsample of 13 distressed companies) lose a combined US$18.9 billion. An event study shows that most companies that present losses in derivatives experience negative abnormal returns, including a number of companies in which the effect is persistent after a year. The results of a probit model indicate that the lack of a formal hedging policy, no monitoring to the CFOs, and considerations of hubris and remuneration contribute to the mismanagement of hedging policies.

Keywords: risk management, hedging, derivatives, monitoring, corporate governance structure, event study, hubris

Procedia PDF Downloads 442
1767 Towards Achieving Energy Efficiency in Kazakhstan

Authors: Aigerim Uyzbayeva, Valeriya Tyo, Nurlan Ibrayev

Abstract:

Kazakhstan is currently one of the dynamically developing states in its region. The stable growth in all sectors of the economy leads to a corresponding increase in energy consumption. Thus, country consumes a significant amount of energy due to the high level of industralisation and the presence of energy-intensive manufacturing such as mining and metallurgy which in turn leads to low energy efficiency. With allowance for this the Government has set several priorities to adopt a transition of Republic of Kazakhstan to a “green economy”. This article provides an overview of Kazakhstan’s energy efficiency situation in for the period of 1991-2014. First, the dynamics of production and consumption of conventional energy resources are given. Second, the potential of renewable energy sources is summarised, followed by the description of GHG emissions trends in the country. Third, Kazakhstan’ national initiatives, policies and locally implemented projects in the field of energy efficiency are described.

Keywords: energy efficiency in Kazakhstan, greenhouse gases, renewable energy, sustainable development

Procedia PDF Downloads 583
1766 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 434
1765 Analyzing the Untenable Corruption Intricate Patterns in Africa and Combating Strategies for the Efficiency of Public Sector Supply Chains

Authors: Charles Mazhazhate

Abstract:

This study interrogates and analyses the intricate kin- and- kith network patterns of corruption and mismanagement of resources prevalent in public sector supply chains bedeviling the developing economies of Sub-Saharan Africa with particular reference to Zimbabwe. This is forcing governments to resort to harsh fiscal policies that see their citizens paying high taxes against a backdrop of incomes below the poverty datum line, and this negatively affects their quality of life. The corporate world is also affected by the various tax-regime instituted. Mismanagement of resources and corrupt practices are rampant in state-owned enterprises to the extent that institutional policies, procedures, and practices are often flouted for the benefit of a clique of individuals. This interwoven in kith and kin blood human relations in organizations where appointments to critical positions are based on ascribed status. People no longer place value in their systems to make them work thereby violating corporate governance principles. Greediness and ‘unholy friendship connections’ are instrumental in fueling the employment of people who know each other from their discrete backgrounds. Such employments or socio-metric unions are meant to protect those at the top by giving them intelligent information through spying on what other subordinates are doing inside and outside the organization. This practice has led to the underperforming of organizations as those employees with connections and their upper echelons favorites connive to abuse resources for their own benefit. Even if culprits are known, no draconian measures are employed as a deterrence measure. Public value along public sector supply chains is lost. The study used a descriptive case study research design on fifty organizations in Zimbabwe mainly state-owned enterprises. Both qualitative and quantitative instrumentations were used. Both Snowball and random sampling techniques were used. The study found out that in all the fifty SOEs, there were employees in key positions related to top management, with tentacles feeding into the law enforcement agents, judiciary, security systems, and the executive. Such employees in public seem not to know each other with but would be involved in dirty scams and then share the proceeds with top people behind the scenes. The study also established that the same employees do not have the necessary competencies, qualifications, abilities, and capabilities to be in those positions. This culture is now strong that it is difficult to bust. The study recommends recruitment of all employees through an independent employment bureau to ensure strategic fit.

Keywords: corruption, state owned enterprises, strategic fit, public sector supply chains, efficiency

Procedia PDF Downloads 160
1764 An Examination of Economic Evaluation Approaches in Mental Health Promotion Initiatives Targeted at Black and Asian Minority Ethnic Communities in the UK: A Critical Discourse Analysis

Authors: Phillipa Denise Peart

Abstract:

Black Asian and Minority Ethnic (BAME) people are more at risk of developing mental health disorders because they are more exposed to unfavorable social, economic, and environmental circumstances. These include housing, education, employment, community development, stigma, and discrimination. However, the majority of BAME mental health intervention studies focus on treatment with therapeutically effective drugs and use basic economic methods to evaluate their effectiveness; as a result, little is invested in the economic assessment of psychosocial interventions in BAME mental health. The UK government’s austerity programme and reduced funds for mental health services, has increased the need for the evaluation and assessment of initiatives to focus on value for money. The No Health without Mental Health policy (2011) provides practice guidance to practitioners, but there is little or no mention of the need to provide mental health initiatives targeted at BAME communities that are effective in terms of their impact and the cost-effectiveness. This, therefore, appears to contradict with and is at odds with the wider political discourse, which suggests there should be an increasing focus on health economic evaluation. As a consequence, it could be argued that whilst such policies provide direction to organisations to provide mental health services to the BAME community, by not requesting effective governance, assurance, and evaluation processes, they are merely paying lip service to address these problems and not helping advance knowledge and practice through evidence-based approaches. As a result, BAME communities suffer due to lack of efficient resources that can aid in the recovery process. This research study explores the mental health initiatives targeted at BAME communities, and analyses the techniques used when examining the cost effectiveness of mental health initiatives for BAME mental health communities. Using critical discourse analysis as an approach and method, mental health services will be selected as case studies, and their evaluations will be examined, alongside the political drivers that frame, shape, and direct their work. In doing so, it will analyse what the mental health policies initiatives are, how the initiatives are directed and demonstrate how economic models of evaluation are used in mental health programmes and how the value for money impacts and outcomes are articulated by mental health programme staff. It is anticipated that this study will further our understanding in order to provide adequate mental health resources and will deliver creative, supportive research to ensure evaluation is effective for the government to provide and maintain high quality and efficient mental health initiatives targeted at BAME communities.

Keywords: black, Asian and ethnic minority, economic models, mental health, health policy

Procedia PDF Downloads 111
1763 Compromising Quality of Life in Low-Income Settlements: The Case of Ashrayan Prakalpa, Khulna

Authors: Salma Akter, Md. Kamal Uddin

Abstract:

Quality of life is a vast and comprehensive concept refers overall well-being of society. Current research and efforts of policymakers and planners are concerned to increase the urban quality of life through the sustainable development of city and country. While such efforts effectively improve the quality of life of urban dwellers through improved social, economic and housing infrastructures, very little has been paid to improve low-income settlement users more specifically government provided shelter projects. The top-down shelter policies and its objective indicators (physical design elements and physical environmental elements) indicators on low-income groups merely can ensure grassroots needs, aspiration and well-being refer as subjective qualities obliged to compromise with the quality of life. This research, therefore, aims to measure the quality of life of such government-provided low-income settlements. To do so, a conceptual framework has been developed to measure quality of life with arguing that quality of life depends on both objective and subjective indicators and needs to measure across three scales of living environment refers to macro (community), meso (neighborhood or shelter/built environment), and micro (family). The top-down shelter project, Dakshin Chandani Mahal Ashrayan Prakalpa is a resettlement/housing project of Government of Bangladesh for providing shelters and human resources development activities like education, microcredit, and training programme to landless, homeless and rootless people has been taken as case study. The study area is located at Dighalia Upazila, Khulna Bangladesh. In terms of methodology, this research is primarily exploratory and adopts a case study method and deductive approach for evaluating the quality of life. Data have been obtained from relevant literature review, key informant interview, focus group discussion, necessary drawings, photographs and participant observation across dwelling, neighborhood, and community level. Findings have revealed that Shelter users mostly compromise the quality of life at community level due to insufficient physical design elements and facilities while neighborhood and dwelling level have been manifested similar result like former ones. Thus, the outcome of this study can be beneficial for a global-level understating of the compromising the ‘quality of life’ under top-down shelter policy. Locally, for instance, in the context of Bangladesh, it can help policymakers and concerned authorities to formulate the shelter policies and take initiatives to improve the well-being of marginalized.

Keywords: Ashrayan Prakalpa, compromise, displaced people, quality of life

Procedia PDF Downloads 217
1762 Towards Conservation and Recovery of Species at Risk in Ontario: Progress on Recovery Planning and Implementation and an Overview of Key Research Needs

Authors: Rachel deCatanzaro, Madeline Austen, Ken Tuininga, Kathy St. Laurent, Christina Rohe

Abstract:

In Canada, the federal Species at Risk Act (SARA) provides protection for wildlife species at risk and a national legislative framework for the conservation or recovery of species that are listed as endangered, threatened, or special concern under Schedule 1 of SARA. Key aspects of the federal species at risk program include the development of recovery documents (recovery strategies, action plans, and management plans) outlining threats, objectives, and broad strategies or measures for conservation or recovery of the species; the identification and protection of critical habitat for threatened and endangered species; and working with groups and organizations to implement on-the-ground recovery actions. Environment Canada’s progress on the development of recovery documents and on the identification and protection of critical habitat in Ontario will be presented, along with successes and challenges associated with on-the ground implementation of recovery actions. In Ontario, Environment Canada is currently involved in several recovery and monitoring programs for at-risk bird species such as the Loggerhead Shrike, Piping Plover, Golden-winged Warbler and Cerulean Warbler and has provided funding for a wide variety of recovery actions targeting priority species at risk and geographic areas each year through stewardship programs including the Habitat Stewardship Program, Aboriginal Fund for Species at Risk, and the Interdepartmental Recovery Fund. Key research needs relevant to the recovery of species at risk have been identified, and include: surveys and monitoring of population sizes and threats, population viability analyses, and addressing knowledge gaps identified for individual species (e.g., species biology and habitat needs). The engagement of all levels of government, the local and international conservation communities, and the scientific research community plays an important role in the conservation and recovery of species at risk in Ontario– through surveying and monitoring, filling knowledge gaps, conducting public outreach, and restoring, protecting, or managing habitat – and will be critical to the continued success of the federal species at risk program.

Keywords: conservation biology, habitat protection, species at risk, wildlife recovery

Procedia PDF Downloads 452
1761 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 705
1760 Technical and Legal Definitions in Cyber Terrorism

Authors: Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hamed Ladoni Damghani, Rohimi Bin Shapiee

Abstract:

In recent years the speed of new technology has brought forth so many new issues. Cyberspace is among the new technologies that need novel ways to address the various issues that have arisen. While cyberspace is a technical notion that defies a single definition, this new technology requires the adoption and application of new laws. In order to manage issues arising from the existence of cyberspace, proper policies and definitions must be formulated which satisfy both technical and legal aspects. One difficulty in this regard is due to the unique features of cyberspace architecture. This article proposes to define cyberspace and cyber terrorism. This will allow for a more effective and comprehensive addressing of legal issues as they can then be handled better by introducing a new factor to the otherwise ordinary analysis in whichever field is implicated such as the nature and place of use.

Keywords: cyberspace, cyber terrorism, technical definition, legal definition

Procedia PDF Downloads 590
1759 Accountability Issues in Nigeria

Authors: Victoria Adikpe

Abstract:

The ills of the Nigerian public sector have been identified at various fora to include lack of financial accountability and poor reporting of government performance. With the enthronement of democracy, citizens’ expectations from the government are drifting from the mere provision of public services to efficiency and accountability. One of the major challenges to achieving accountability in Nigeria is the capability of the cash basis of accounting to meet the reporting requirements of policies and programmes of the government. This paper discussed the growing trend in the debate about the adoption of private sector financial management processes in the public sector as part of the public sector reform programmes. The paper does not claim the ultimate superiority of accrual over cash accounting but shows how it will help to further strengthen the quality of government accounting and reporting.

Keywords: cash accounting, accrual accounting, accountability, reporting

Procedia PDF Downloads 345
1758 Load Forecasting in Short-Term Including Meteorological Variables for Balearic Islands Paper

Authors: Carolina Senabre, Sergio Valero, Miguel Lopez, Antonio Gabaldon

Abstract:

This paper presents a comprehensive survey of the short-term load forecasting (STLF). Since the behavior of consumers and producers continue changing as new technologies, it is an ongoing process, and moreover, new policies become available. The results of a research study for the Spanish Transport System Operator (REE) is presented in this paper. It is presented the improvement of the forecasting accuracy in the Balearic Islands considering the introduction of meteorological variables, such as temperature to reduce forecasting error. Variables analyzed for the forecasting in terms of overall accuracy are cloudiness, solar radiation, and wind velocity. It has also been analyzed the type of days to be considered in the research.

Keywords: short-term load forecasting, power demand, neural networks, load forecasting

Procedia PDF Downloads 190
1757 Analysis of Supply Chain Risk Management Strategies: Case Study of Supply Chain Disruptions

Authors: Marcelo Dias Carvalho, Leticia Ishikawa

Abstract:

Supply Chain Risk Management refers to a set of strategies used by companies to avoid supply chain disruption caused by damage at production facilities, natural disasters, capacity issues, inventory problems, incorrect forecasts, and delays. Many companies use the techniques of the Toyota Production System, which in a way goes against a better management of supply chain risks. This paper studies key events in some multinationals to analyze the trade-off between the best supply chain risk management techniques and management policies designed to create lean enterprises. The result of a good balance of these actions is the reduction of losses, increased customer trust in the company and better preparedness to face the general risks of a supply chain.

Keywords: just in time, lean manufacturing, supply chain disruptions, supply chain management

Procedia PDF Downloads 338
1756 Marketization of Higher Education in the UK and Its Impacts on Teaching Practitioners

Authors: Hossein Rezaie

Abstract:

Academic institutions, esp. universities, have been known as cradles of learning and teaching great thinkers while creating the type of knowledge that is supposed to be bereft of utilitarian motives. Nonetheless, it seems that such intellectual centers have entered into a competition with each other for attracting the attention of potential clients. The traditional values of (higher) education such as nurturing criticality and fostering intellectuality in students have been replaced with strategic planning, quality assurance, performance assessment, and academic audits. Not being immune from the whims and wishes of marketization, the system of higher education in the UK has been recalibrated by policy makers to address the demand and supply of student education, academic research and other university activities on the basis of monetary factors. As an immediate example in this vein, the Russell Group in the UK, which is comprised of 24 leading UK research universities, has explicitly expressed it policy on its official website as follows: ‘Russell Group universities are global businesses competing for staff, students and funding with the best in the world’. Furthermore, certain attempts have been made to corporatize the system of HE which have been manifested in remodeling of university governing bodies on corporate lines and developing measurement scales for indicating the performance of teaching practitioners. Nevertheless, it seems that such structural changes in policies toward the system of HE have bearing on the practices of practitioners and educators as well as the identity of students who are the customers of educational services. The effects of marketization have been examined mainly in terms of students’ perceptions and motivation, institutional policies and university management. However, the teaching practitioner side seems to be an under-studied area with regard to any changes in its expectations, satisfaction and perception of professional identity in the aftermath of introducing market-wise values into HE of the UK. As a result, this research aims to investigate the possible outcomes of market-driven values on the practitioner side of HE in the UK and finally seeks to address the following research questions: 1-How is the change in the mission of HE in the UK reflected in institutional documents? 1-A- How is the change of mission represented in job adverts? 1-B- How is the change of mission represented in university prospectuses? 2-How are teaching practitioners represented regarding their roles and obligations in the prospectuses and job ads published by UK HE institutions? In order to address these questions, the researcher will analyze 30 prospectuses and job ads published by Russel Group universities by taking Critical Discourse Analysis as his point of departure and the analytical methods of genre analysis and Systemic Functional Linguistics to probe into the generic features and representation of participants, in this case teaching practitioners, in the selected corpus.

Keywords: higher education, job advertisements, marketization of higher education, prospectuses

Procedia PDF Downloads 247
1755 The Impact of the Application of Blockchain Technology in Accounting and Auditing

Authors: Yusuf Adebayo Oduwole

Abstract:

The evaluation of blockchain technology's potential effects on the accounting and auditing fields is the main objective of this essay. It also adds to the existing body of work by examining how these practices alter technological concerns, including cryptocurrency accounting, regulation, governance, accounting practices, and technical challenges. Examples of this advancement include the growth of the concept of blockchain and its application in accounting. This technology is being considered one of the digital revolutions that could disrupt the world and civilization as it can transfer large volumes of virtual currencies like cryptocurrencies with the help of a third party. The basis for this research is a systematic review of the articles using Vosviewer to display and reflect on the bibliometric information of the articles accessible on the Scopus database. Also, as the practice of using blockchain technology in the field of accounting and auditing is still in its infancy, it may be useful to carry out a more thorough analysis of any implications for accounting and auditing regarding aspects of governance, regulation, and cryptocurrency that have not yet been discussed or addressed to any significant extent. The main findings on the relationship between blockchain and accounting show that the application of smart contracts, such as triple-entry accounting, has increased the quality of accounting records as well as reliance on the information available. This results in fewer cyclical assignments, no need for resolution, and real-time accounting, among others. Thereby, to integrate blockchain through a computer system, one must continuously learn and remain naive when using blockchain-integrated accounting software. This includes learning about how cryptocurrencies are accounted for and regulated. In this study, three original and contributed efforts are presented. To offer a transparent view of the state of previous relevant studies and research works in accounting and auditing that focus on blockchain, it begins by using bibliographic visibility analysis and a Scopus narrative analysis. Second, it highlights legislative, governance, and ethical concerns, such as education, where it tackles the use of blockchain in accounting and auditing. Lastly, it examines the impact of blockchain technologies on the accounting recognition of cryptocurrencies. Users of the technology should, therefore, take their time and learn how it works, as well as keep abreast of the different developments. In addition, the accounting industry must integrate blockchain certification and practice, most likely offline or as part of university education for those intending to become auditors or accountants.

Keywords: blockchain, crypto assets, governance, regulation & smart contracts

Procedia PDF Downloads 27
1754 Analysis of the Savings Behaviour of Rice Farmers in Tiaong, Quezon, Philippines

Authors: Angelika Kris D. Dalangin, Cesar B. Quicoy

Abstract:

Rice farming is a major source of livelihood and employment in the Philippines, but it requires a substantial amount of capital. Capital may come from income (farm, non-farm, and off-farm), savings and credit. However, rice farmers suffer from lack of capital due to high costs of inputs and low productivity. Capital insufficiency, coupled with low productivity, hindered them to meet their basic household and production needs. Hence, they resorted to borrowing money, mostly from informal lenders who charge very high interest rates. As another source of capital, savings can help rice farmers meet their basic needs for both the household and the farm. However, information is inadequate whether the farmers save or not, as well as, why they do not depend on savings to augment their lack of capital. Thus, it is worth analyzing how rice farmers saved. The study revealed, using the actual savings which is the difference between the household income and expenditure, that about three-fourths (72%) of the total number of farmers interviewed are savers. However, when they were asked whether they are savers or not, more than half of them considered themselves as non-savers. This gap shows that there are many farmers who think that they do not have savings at all; hence they continue to borrow money and do not depend on savings to augment their lack of capital. The study also identified the forms of savings, saving motives, and savings utilization among rice farmers. Results revealed that, for the past 12 months, most of the farmers saved cash at home for liquidity purposes while others deposited cash in banks and/or saved their money in the form of livestock. Among the most important reasons of farmers for saving are for daily household expenses, for building a house, for emergency purposes, for retirement, and for their next production. Furthermore, the study assessed the factors affecting the rice farmers’ savings behaviour using logistic regression. Results showed that the factors found to be significant were presence of non-farm income, per capita net farm income, and per capita household expense. The presence of non-farm income and per capita net farm income positively affects the farmers’ savings behaviour. On the other hand, per capita household expenses have negative effect. The effect, however, of per capita net farm income and household expenses is very negligible because of the very small chance that the farmer is a saver. Generally, income and expenditure were proved to be significant factors that affect the savings behaviour of the rice farmers. However, most farmers could not save regularly due to low farm income and high household and farm expenditures. Thus, it is highly recommended that government should develop programs or implement policies that will create more jobs for the farmers and their family members. In addition, programs and policies should be implemented to increase farm productivity and income.

Keywords: agricultural economics, agricultural finance, binary logistic regression, logit, Philippines, Quezon, rice farmers, savings, savings behaviour

Procedia PDF Downloads 228
1753 Understanding Farmers’ Perceptions Towards Agrivoltaics Using Decision Tree Algorithms

Authors: Mayuri Roy Choudhury

Abstract:

In recent times the concept of agrivoltaics has gained popularity due to the dual use of land and the added value provided by photovoltaics in terms of renewable energy and crop production on farms. However, the transition towards agrivoltaics has been slow, and our research tries to investigate the obstacles leading towards the slow progress of agrivoltaics. We applied data science decision tree algorithms to quantify qualitative perceptions of farmers in the United States for agrivoltaics. To date, there has not been much research that mentions farmers' perceptions, as most of the research focuses on the benefits of agrivoltaics. Our study adds value by putting forward the voices of farmers, which play a crucial towards the transition to agrivoltaics in the future. Our results show a mixture of responses in favor of agrivoltaics. Furthermore, it also portrays significant concerns of farmers, which is useful for decision-makers when it comes to formulating policies for agrivoltaics.

Keywords: agrivoltaics, decision-tree algorithms, farmers perception, transition

Procedia PDF Downloads 190
1752 Decomposition-Based Pricing Technique for Solving Large-Scale Mixed IP

Authors: M. Babul Hasan

Abstract:

Management sciences (MS), big group of companies and industries or government policies (GP) is affiliated with a huge number of decision ingredients and complicated restrictions. Every factor in MS, every product in Industries or decision in GP is not always bankable in practice. After formulating these models there arises large-scale mixed integer programming (MIP) problem. In this paper, we developed decomposition-based pricing procedure to filter the unnecessary decision ingredients from MIP where the variables in huge number will be abated and the complicacy of restrictions will be elementary. A real life numerical example has been illustrated to demonstrate the methods. We develop the computer techniques for these methods by using a mathematical programming language (AMPL).

Keywords: Lagrangian relaxation, decomposition, sub-problem, master-problem, pricing, mixed IP, AMPL

Procedia PDF Downloads 505
1751 Analyzing the Programme for International Student Assessment (PISA) Results in Uzbekistan: Insights from Organisation for Economic Co-operation and Development (OECD) Assessments

Authors: Nukarova Marjona Kayimovna

Abstract:

This article examines Uzbekistan's participation in the Programme for International Student Assessment (PISA) 2022, as the country took part in the assessment for the first time. The analysis delves into the initial results and performance metrics reported by the Organisation for Economic Co-operation and Development (OECD). By exploring Uzbekistan's data, the article highlights key findings, trends, and areas of strength and improvement. The aim is to provide a comprehensive understanding of how Uzbekistan's education system compares on the international stage and to offer insights into potential implications for future educational policies and reforms.

Keywords: PISA, OECD, data analysis of Uzbekistan, results, critical thinking.

Procedia PDF Downloads 11
1750 Assessing the Adoption of Health Information Systems in a Resource-Constrained Country: A Case of Uganda

Authors: Lubowa Samuel

Abstract:

Health information systems, often known as HIS, are critical components of the healthcare system to improve health policies and promote global health development. In a broader sense, HIS as a system integrates data collecting, processing, reporting, and making use of various types of data to improve healthcare efficacy and efficiency through better management at all levels of healthcare delivery. The aim of this study is to assess the adoption of health information systems (HIS) in a resource-constrained country drawing from the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model. The results indicate that the user's perception of the technology and the poor information technology infrastructures contribute a lot to the low adoption of HIS in resource-constrained countries.

Keywords: health information systems, resource-constrained countries, health information systems

Procedia PDF Downloads 121
1749 Access Control System for Big Data Application

Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud

Abstract:

Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.

Keywords: access control, security, Big Data, domain

Procedia PDF Downloads 134