Search results for: organizational technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8881

Search results for: organizational technology

7981 Insights on Workplace Bullying in the Nonprofit Sector

Authors: Shariffah Dawood

Abstract:

During the past decade, workplace bullying has attracted increasing attention from researchers internationally as it is reported to be a major social problem and has severe consequences towards the job satisfaction and health of victims and towards the organization. It is characterized by “systematic aggression or violence targeted towards one or more individuals by one individual or by a group, consists of repeated and enduring acts, and the target is or ends up in an inferior position from which it is difficult to defend oneself.” Despite the seriousness of workplace bullying, not all sectors have received the same degree of scholarly attention. Most studies have been undertaken in the public and private sectors, such as, in hospitals, universities, retail industry, local council, and restaurant kitchens. The nonprofit sector has received limited attention despite its significant economic and social role in the society. In order to understand the nature of workplace bullying in non-profit sector, this research explored 29 British nonprofit organizations through surveys and interviews. Despite the nonprofit sector’s emphasis on an egalitarianism ethos, their reputation to be the defenders of the most vulnerable/disadvantaged and the perception that they are protected from such negative behaviors in the workplace, the findings uncovered pertinent factors that make this sector highly vulnerable towards workplace bullying. Overall, the study identifies some organizational factors which need to be addressed in order to curb bullying in this sector: management commitment towards a zero-tolerance bullying policy; management training in areas such as conflict resolution, organizational changes, and maintenance of the commitment of a conscientious workforce. The researcher further recommends that the nonprofit organizations work towards improving relationships with voluntary board members and funding bodies. The researcher will also outline the second phase of the study, which aims to investigate bullying in the nonprofit sector across cultures (the USA, Malaysia and Japan), and implications for the research will be identified.

Keywords: nonprofit sector, workplace bullying, harassment, management, HRM

Procedia PDF Downloads 67
7980 Supply Chain Technology Adoption in Textile and Apparel Industry

Authors: Zulkifli Mohamed Udin, Lee Khai-Loon, Mohamad Ghozali Hassan

Abstract:

In today’s dynamic business environment, the competition is no longer between firms, but between supply chains to gain competitive advantages. The global manufacturing sector, especially the textile and apparel industry are essentially known for its supply chain dependency. The delicate nature of its business leads to emphasis on the smooth movement of upstream and downstream supply chain. The nature of this industry, however, result in huge dynamic flow of physical, information, and financial. The dynamic management of these flows requires adoption of supply chain technologies. Even though technology is widely implemented and studied in many industries by researchers, adoption of supply chain technologies in Malaysian textile and apparel industry is limited. There is relatively a handful academic study conducted on recent developments in Malaysian textile and apparel industry and supply chain technology adoption indicate a major gap in supply chain performance studies. Considering the importance given to Third Industrial Master Plan by the government Malaysia, it is necessary to understand the power of supply chain technology adoptions. This study aims to investigate supply chain technology adoption by textile and apparel companies in Malaysia. The result highlighted the benefits perceived by textile and apparel companies from supply chain technologies. The indifference of small and medium enterprises to operation management acts as a major inhibitor to the adoption of supply chain technologies, since they have resource limitations. This study could be used as a precursor for further detailed studies on this issue.

Keywords: supply chain technology adoption, supply chain performance, textile, apparel industry

Procedia PDF Downloads 492
7979 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 58
7978 Modeling Jordan University of Science and Technology Parking Using Arena Program

Authors: T. Qasim, M. Alqawasmi, M. Hawash, M. Betar, W. Qasim

Abstract:

Over the last decade, the over population that has happened in urban areas has been reflecting on the services that various local institutions provide to car users in the form of car parks, which is becoming a daily necessity in our lives. This study focuses on car parks at Jordan University of Science and Technology, in Irbid, Jordan, to understand the university parking needs. Data regarding arrival and departure times of cars and the parking utilization were collected, to find various options that the university can implement to solve and develop an efficient car parking system. Arena software was used to simulate a parking model. This model allows measuring the different solutions that solve the parking problem at Jordan University of Science and Technology.

Keywords: car park, simulation, modeling, service time

Procedia PDF Downloads 184
7977 Succeeding through Disruption: Exploring the Factors Influencing the Adoption of Disruptive Technologies in the Mobile Telecommunications Industry in Zimbabwe

Authors: Africa Makasi

Abstract:

The research explored factors influencing the adoption of disruptive technologies in the mobile telecommunications industry in Zimbabwe. Data was gathered from the second biggest competitor in the industry with over 3 million subscribers as the main case of study. The survey was conducted by purposively selecting 70 respondents from a population of 3,000,000 (three million) active subscribers from the company’s database. A skip interval of 42,857 was used to randomly select the sample. Customer representatives were selected from the company’s five regional offices using a two-stage cluster sampling technique. Employee participants were purposively selected from the company’s head office. Self-administered questionnaires were used in the research. A pilot test was conducted and the assessment of the reliability of the research instruments used in the research performed. Results of the pilot study were analyzed to test for reliability using SPSS. The results confirmed that the style of leadership and its thrust may help speed up or reduce the adoption of disruptive technologies. This was reflected by a p–value of 0.01 which is less than 0.05. The null hypothesis was thus rejected and the strong relationship between leadership and adoption of disruptive technology is confirmed. Similar results were also obtained with respect to staff competence, availability of funding and the type of infrastructure available Future research should look at organizational ambidexterity as well as exploitation and exploration paradigms in organizations in the telecommunications industry and their impact on the adoption of disruptive technologies.

Keywords: disruptive innovation, adoption, mobile telecommunication industry, exploration and exploitation

Procedia PDF Downloads 369
7976 Identifying Teachers’ Perception of Integrity in School-Based Assessment Practice: A Case Study

Authors: Abd Aziz Bin Abd Shukor, Eftah Binti Moh Hj Abdullah

Abstract:

This case study aims to identify teachers’ perception as regards integrity in School-Ba sed Assessment (PBS) practice. This descriptive study involved 9 teachers from 4 secondary schools in 3 districts in the state of Perak. The respondents had undergone an integrity in PBS Practice interview using a focused group discussion method. The overall findings showed that the teachers believed that integrity in PBS practice could be achieved by adjusting the teaching methods align with learning objectives and the students’ characteristics. Many teachers, parents and student did not understand the best practice of PBS. This would affect the integrity in PBS practice. Teachers did not emphasis the principles and ethics. Their integrity as an innovative public servant may also be affected with the frequently changing assessment system, lack of training and no prior action research. The analysis of findings showed that the teachers viewed that organizational integrity involving the integrity of PBS was difficult to be implemented based on the expectations determined by Malaysia Ministry of Education (KPM). A few elements which assisted in the achievement of PBS integrity were the training, students’ understanding, the parents’ understanding of PBS, environment (involving human resources such as support and appreciation and non-human resources such as technology infrastructure readiness and media). The implications of this study show that teachers, as the PBS implementers, have a strong influence on the integrity of PBS. However, the transformation of behavior involving PBS integrity among teachers requires the stabilisation of support and infrastructure in order to enable the teachers to implement PBS in an ethical manner.

Keywords: assessment integrity, integrity, perception, school-based assessment

Procedia PDF Downloads 349
7975 A Development of Practice Guidelines for Surgical Safety Management to Reduce Undesirable Incidents from Surgical Services in the Operating Room of Songkhla Hospital, Thailand

Authors: Thitima Plejai

Abstract:

The practice in the operating room has been continually performed according to standards of services; however, undesirable incidents from surgical services are found such as surgical complications in the operating room. This participation action research aimed to develop practice guidelines for surgical safety management to reduce undesirable incidents from surgical services in the operating room of Songkhla Hospital. The target population was all 84 members of the multidisciplinary team who were involved in surgical services in the operating room consisting of 28 surgeons from five branches of surgery, 27 anesthetists and nurse anesthetists, and 29 surgical nurses. The data were collected through in-depth interviews, and non-participatory observations. The research instrument was tested by three experts, and the steps of the development consisted of four cycles, each consisting of assessment, planning, practice, practice reflection, and improvement until every step is practicable. The data were validated through triangulation research method, analyzed through content analysis and statistical analysis with number and percentage. The results of the development of practice guidelines surgical safety management to reduce undesirable incidents from surgical services could be concluded as follows. 1) The multidisciplinary team in surgery participated in the needs assessment for development of practice guidelines for surgical patient safety, and agreed on adapting the WHO Surgical Safety Checklists for use. 2) The WHO Surgical Safety Checklists was implemented, and meetings were held for the multidisciplinary team in surgery and the organizational risk committee to improve the practice guidelines to make them more practicable. 3) The multidisciplinary team consisting of surgeons from five branches of surgery, anesthetists, nurse anesthetists, surgical nurses, and the organizational risk committee announced policy on safety for surgical patients; the organizational risk committee designated the Surgical Safety Checklist as an instrument for surgical patient safety. The results of the safety management found that the surgical team members who could follow 100 percent of the guidelines were: professional nurses who checked patient identity and information before taking the patient to the operating room and kept complete records of data on the patients; surgical nurses who checked readiness of the patient before surgery; nurse anesthetists who assessed readiness before administering anesthetic drugs, and confirmed correctness of the patient; and circulating perioperative nurses who gave confirmation to the surgical team after completion of the surgery. The rates of undesirable incidents (surgical complications rates) before and after the implementation of the surgical safety management were 1.60 percent and 0.66 percent, respectively. The satisfaction of the surgery-related teams towards the use of the guidelines was 89 percent. The practice guidelines for surgical safety management to reduce undesirable incidents were taken as guidelines for surgical safety that the multidisciplinary team involved in the surgical process implemented correctly and in the same direction and clearly reduced undesirable incidents in surgical patients.

Keywords: practice guidelines, surgical safety management, reduce undesirable incidents, operating Room

Procedia PDF Downloads 297
7974 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 37
7973 The New Economy: A Pedagogy for Vocational and Technical Education Programmes in Nigeria

Authors: Sunny Nwakanma

Abstract:

The emergence of the new economy has created a new world order for skill acquisition, economic activities and employment. It has dramatically changed the way we live, learn, work and even think about work. It has also created new opportunities as well as challenges and uncertainty. This paper will not only demystify the new economy and present its instrumentality in the acceleration of skill acquisition in technical education, but will also highlight industrial and occupational changes brought about by the synergy between information and communication technology revolution and the global economic system. It advocates among other things, the use of information and communication technology mediated instruction in technical education as it provides the flexibility to meet diverse learners’ need anytime and anywhere and facilitate skill acquisition.

Keywords: new economy, technical education, skill acquisition, information and communication technology

Procedia PDF Downloads 131
7972 Intelligent Recognition Tools for Industrial Automation

Authors: Amin Nazerzadeh, Afsaneh Nouri Houshyar , Azadeh Noori Hoshyar

Abstract:

With the rapid growing of information technology, the industry and manufacturing systems are becoming more automated. Therefore, achieving the highly accurate automatic systems with reliable security is becoming more critical. Biometrics that refers to identifying individual based on physiological or behavioral traits are unique identifiers provide high reliability and security in different industrial systems. As biometric cannot easily be transferred between individuals or copied, it has been receiving extensive attention. Due to the importance of security applications, this paper provides an overview on biometrics and discuss about background, types and applications of biometric as an effective tool for the industrial applications.

Keywords: Industial and manufacturing applications, intelligence and security, information technology, recognition; security technology; biometrics

Procedia PDF Downloads 155
7971 Conceptualization and Strategies of Biogas Technology for Rural Development in Nigeria

Authors: Okorowo Cyril Agochi

Abstract:

The main challenge of present world is to harness the energy source which is environment friendly and ecologically balanced. This need has forced to search for other alternate source of energy. But unfortunately the new alternative energy sources like the solar, hydro, wind etc. require huge economical value and technical power to operate, which seem to be very difficult for the developing countries like Nigeria. In the present moment biogas energy can be one and only reliable, easily available and economically feasible source of alternative and renewable source which can be managed by locally available sources and simple technology for secondary schools, tertiary institution and rural villages. This paper is aimed at boosting the energy generation for developing of rural Nigeria, through Biogas.

Keywords: bio-gas, energy, environment, nigeria, technology

Procedia PDF Downloads 479
7970 Role of Psychological Capital in Organizational and Personal Outcomes: An Exploratory Study of Medical Professionals in Pakistan

Authors: Shazia Almas, Jaffar Iqbal, Nazia Almas

Abstract:

In most of the South Asian countries like Pakistan medical profession is one the most valued and respectful professions yet being a medical professional requires an enormous amount of responsibilities and work overload at the same time which possibly can be in contrast with family role of a doctor. Job and family are two primary spheres of a person's life no matter whatever the profession one adopts and the type of family one is running. There is a bi-directional relationship between job and family. The type and nature of work, time schedules, working shifts in medical profession are very demanding in the countries like Pakistan where number of patients is far more higher than the number of doctors available. The work life also have significant impact on family life and vice versa. Because of the sensitivity and interdependency of these relations, today’s overarching and competing demands remain dissatisfactory. The main objective of the current research is to investigate how interpersonal relationships affect work and work affects interpersonal relationships of medical professionals. In line with identifying these facts, the current study aimed to examine the predictive role of psychological capital (self-efficacy, hope, optimism, and resilience), in organizational outcome (job satisfaction) and personal outcome (family satisfaction) amongst male and medical professionals. A total of 350 participants from public and private sector hospitals of Pakistan were recruited through simple random and stratified sampling techniques, with age ranges from 26-50 years. The questionnaire including established and certified self-report measures of Psychological Capital Questionnaire, Job Satisfaction, and Family Satisfaction were adopted to collect the data. The reliability and validity of mentioned instruments were established through Cronbach’s alpha and factor analyses (exploratory and confirmatory) respectively using Structural Equation Modeling (SEM) by AMOS. The proposed hypotheses were tested using Pearson’s Correlation and Regression analyses for predicting effect whereas, t-Test was deployed to verify the difference between male and female health professionals. The results revealed that self-efficacy and optimism predicted job satisfaction while, self-efficacy, hope, and resilience predicted family satisfaction. Moreover, the results depicted significant gender differences in job satisfaction where females were higher on job satisfaction as compared to male medical professionals but no significant differences were observed in levels of family satisfaction between both genders. The study has implications for social, organizational and work policy designers. The study also paves for more researches with positive psychological approach to promote work-family harmony.

Keywords: family satisfaction, job satisfaction, medical professionals, psychological capital

Procedia PDF Downloads 250
7969 An Observation of the Information Technology Research and Development Based on Article Data Mining: A Survey Study on Science Direct

Authors: Muhammet Dursun Kaya, Hasan Asil

Abstract:

One of the most important factors of research and development is the deep insight into the evolutions of scientific development. The state-of-the-art tools and instruments can considerably assist the researchers, and many of the world organizations have become aware of the advantages of data mining for the acquisition of the knowledge required for the unstructured data. This paper was an attempt to review the articles on the information technology published in the past five years with the aid of data mining. A clustering approach was used to study these articles, and the research results revealed that three topics, namely health, innovation, and information systems, have captured the special attention of the researchers.

Keywords: information technology, data mining, scientific development, clustering

Procedia PDF Downloads 278
7968 Robotic Logging Technology: The Future of Oil Well Logging

Authors: Nitin Lahkar, Rishiraj Goswami

Abstract:

“Oil Well Logging” or the practice of making a detailed record (a well log) of the geologic formations penetrated by a borehole is an important practice in the Oil and Gas industry. Although a lot of research has been undertaken in this field, some basic limitations still exist. One of the main arenas or venues where plethora of problems arises is in logistically challenged areas. Accessibility and availability of efficient manpower, resources and technology is very time consuming, restricted and often costly in these areas. So, in this regard, the main challenge is to decrease the Non Productive Time (NPT) involved in the conventional logging process. The thought for the solution to this problem has given rise to a revolutionary concept called the “Robotic Logging Technology”. Robotic logging technology promises the advent of successful logging in all kinds of wells and trajectories. It consists of a wireless logging tool controlled from the surface. This eliminates the need for the logging truck to be summoned which in turn saves precious rig time. The robotic logging tool here, is designed such that it can move inside the well by different proposed mechanisms and models listed in the full paper as TYPE A, TYPE B and TYPE C. These types are classified on the basis of their operational technology, movement and conditions/wells in which the tool is to be used. Thus, depending on subsurface conditions, energy sources available and convenience the TYPE of Robotic model will be selected. Advantages over Conventional Logging Techniques: Reduction in Non-Productive time, lesser energy requirements, very fast action as compared to all other forms of logging, can perform well in all kinds of well trajectories (vertical/horizontal/inclined).

Keywords: robotic logging technology, innovation, geology, geophysics

Procedia PDF Downloads 307
7967 Optimize Data Evaluation Metrics for Fraud Detection Using Machine Learning

Authors: Jennifer Leach, Umashanger Thayasivam

Abstract:

The use of technology has benefited society in more ways than one ever thought possible. Unfortunately, though, as society’s knowledge of technology has advanced, so has its knowledge of ways to use technology to manipulate people. This has led to a simultaneous advancement in the world of fraud. Machine learning techniques can offer a possible solution to help decrease this advancement. This research explores how the use of various machine learning techniques can aid in detecting fraudulent activity across two different types of fraudulent data, and the accuracy, precision, recall, and F1 were recorded for each method. Each machine learning model was also tested across five different training and testing splits in order to discover which testing split and technique would lead to the most optimal results.

Keywords: data science, fraud detection, machine learning, supervised learning

Procedia PDF Downloads 196
7966 On the Resilience of Operational Technology Devices in Penetration Tests

Authors: Marko Schuba, Florian Kessels, Niklas Reitz

Abstract:

Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.

Keywords: penetration testing, OT, ICS, OT security

Procedia PDF Downloads 18
7965 Sustainable Project Management Necessarily Implemented in the Chinese Wine Market Due to Climate Variation

Authors: Ruixin Zhang, Joel Carboni, Songchenchen Gong

Abstract:

Since the Sustainable Development Goals (SDGs) officially became the 17 development goals set by the United Nations in 2015, it has become an inevitable trend in project management development globally. Since Sustainability and glob-alization are the main focus and trends in the 21st century, project management contains system-based optimization, and or-ganizational humanities, environmental protection, and economic development. As a populous country globally, with the advanced development of economy and technology, China becomes one of the biggest markets in the wine industry. However, the develop-ment of society also brings specific environmental issues. Climate changes have already brought severe impacts on the Chinese wine market, including consumer behavior, wine production activities, and organizational humanities. Therefore, the implementation of sustainable project management in Chinese wine market is essential. Surveys based analysis is the primary method to interpret how the climate variation effect the Chinese wine market and the importance of sustainable project management implementation for green market growth in China. This paper proposes the CWW Conceptual model that can be used in the wine industry, the new 7 Drivers Model, and SPM Framework to interpret the main drivers that impact project management implementation in the wine industry and to offer the directions to wine companies in China which would help them to achieve the green growth.

Keywords: project management, sustainability, green growth, climate changes, Chinese wine market

Procedia PDF Downloads 127
7964 Knowledge Management Barriers: A Statistical Study of Hardware Development Engineering Teams within Restricted Environments

Authors: Nicholas S. Norbert Jr., John E. Bischoff, Christopher J. Willy

Abstract:

Knowledge Management (KM) is globally recognized as a crucial element in securing competitive advantage through building and maintaining organizational memory, codifying and protecting intellectual capital and business intelligence, and providing mechanisms for collaboration and innovation. KM frameworks and approaches have been developed and defined identifying critical success factors for conducting KM within numerous industries ranging from scientific to business, and for ranges of organization scales from small groups to large enterprises. However, engineering and technical teams operating within restricted environments are subject to unique barriers and KM challenges which cannot be directly treated using the approaches and tools prescribed for other industries. This research identifies barriers in conducting KM within Hardware Development Engineering (HDE) teams and statistically compares significance to barriers upholding the four KM pillars of organization, technology, leadership, and learning for HDE teams. HDE teams suffer from restrictions in knowledge sharing (KS) due to classification of information (national security risks), customer proprietary restrictions (non-disclosure agreement execution for designs), types of knowledge, complexity of knowledge to be shared, and knowledge seeker expertise. As KM evolved leveraging information technology (IT) and web-based tools and approaches from Web 1.0 to Enterprise 2.0, KM may also seek to leverage emergent tools and analytics including expert locators and hybrid recommender systems to enable KS across barriers of the technical teams. The research will test hypothesis statistically evaluating if KM barriers for HDE teams affect the general set of expected benefits of a KM System identified through previous research. If correlations may be identified, then generalizations of success factors and approaches may also be garnered for HDE teams. Expert elicitation will be conducted using a questionnaire hosted on the internet and delivered to a panel of experts including engineering managers, principal and lead engineers, senior systems engineers, and knowledge management experts. The feedback to the questionnaire will be processed using analysis of variance (ANOVA) to identify and rank statistically significant barriers of HDE teams within the four KM pillars. Subsequently, KM approaches will be recommended for upholding the KM pillars within restricted environments of HDE teams.

Keywords: engineering management, knowledge barriers, knowledge management, knowledge sharing

Procedia PDF Downloads 280
7963 Challenges in Self-Managing Vitality: A Qualitative Study about Staying Vital at Work among Dutch Office Workers

Authors: Violet Petit-Steeghs, Jochem J. R. Van Roon, Jacqueline E. W. Broerse

Abstract:

Last decennia the retirement age in Europe is gradually increasing. As a result, people have to continue working for a longer period of time. Health problems due to increased sedentary behavior and mental conditions like burn-out, pose a threat in fulfilling employees’ working life. In order to stimulate the ability and willingness to work in the present and future, it is important to stay vital. Vitality is regarded in literature as a sense of energy, motivation and resilience. It is assumed that by increasing their vitality, employees will stay healthier and be more satisfied with their job, leading to a more sustainable employment and less absenteeism in the future. The aim of this project is to obtain insights into the experiences and barriers of employees, and specifically office workers, with regard to their vitality. These insights are essential in order to develop appropriate measures in the future. To get more insights in the experiences of office workers on their vitality, 8 focus group discussions were organized with 6-10 office workers from 4 different employers (an university, a national construction company and a large juridical and care service organization) in the Netherlands. The discussions were transcribed and analyzed via open coding. This project is part of a larger consortium project Provita2, and conducted in collaboration with University of Technology Eindhoven. Results showed that a range of interdependent factors form a complex network that influences office workers’ vitality. These factors can be divided in three overarching groups: (1) personal (2) organizational and (3) environmental factors. Personal intrinsic factors, relating to the office worker, comprise someone’s physical health, coping style, life style, needs, and private life. Organizational factors, relating to the employer, are the workload, management style and the structure, vision and culture of the organization. Lastly, environmental factors consist of the air, light, temperature at the workplace and whether the workplace is inspiring and workable. Office workers experienced barriers to improve their own vitality due to a lack of autonomy. On the one hand, because most factors were not only intrinsic but extrinsic, like work atmosphere or the temperature in the room. On the other hand, office workers were restricted in adapting both intrinsic as well as extrinsic factors. Restrictions to for instance the flexibility of working times and the workload, can set limitations for improving vitality through personal factors like physical activity and mental relaxation. In conclusion, a large range of interdependent factors influence the vitality of office workers. Office workers are often regarded to have a responsibility to improve their vitality, but are limitedly autonomous in adapting these factors. Measures to improve vitality should therefore not only focus on increasing awareness among office workers, but also on empowering them to fulfill this responsibility. A holistic approach that takes the complex mutual dependencies between the different factors and actors (like managers, employees and HR personnel) into account is highly recommended.

Keywords: occupational health, perspectives office workers, sustainable employment, vitality at work, work & wellbeing

Procedia PDF Downloads 138
7962 Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet

Authors: Gurkirat Kaur, Manoj Kumar, Manju Bala

Abstract:

Ethernet is the most influential and widely used technology in the world. With the growing demand of low latency and high throughput technologies like InfiniBand and RoCE, unique features viz. RDMA (Remote Direct Memory Access) have evolved. RDMA is an effective technology which is used for reducing system load and improving performance. InfiniBand is a well known technology which provides high-bandwidth and low-latency and makes optimal use of in-built features like RDMA. With the rapid evolution of InfiniBand technology and Ethernet lacking the RDMA and zero copy protocol, the Ethernet community has came out with a new enhancements that bridges the gap between InfiniBand and Ethernet. By adding the RDMA and zero copy protocol to the Ethernet a new networking technology is evolved, called RDMA over Converged Ethernet (RoCE). RoCE is a standard released by the IBTA standardization body to define RDMA protocol over Ethernet. With the emergence of lossless Ethernet, RoCE uses InfiniBand’s efficient transport to provide the platform for deploying RDMA technology in mainstream data centres over 10GigE, 40GigE and beyond. RoCE provide all of the InfiniBand benefits transport benefits and well established RDMA ecosystem combined with converged Ethernet. In this paper, we evaluate the heterogeneous Linux cluster, having multi nodes with fast interconnects i.e. gigabit Ethernet and Soft RoCE. This paper presents the heterogeneous Linux cluster configuration and evaluates its performance using Intel’s MPI Benchmarks. Our result shows that Soft RoCE is performing better than Ethernet in various performance metrics like bandwidth, latency and throughput.

Keywords: ethernet, InfiniBand, RoCE, RDMA, MPI, Soft RoCE

Procedia PDF Downloads 464
7961 Dismantling the School-to-Prison Pipeline through Technology: A Literature Review

Authors: Yusra A. Ibrahim

Abstract:

Educational efforts to address the school-to-prison pipeline (STPP) and retain students in school require equipping teachers with evidence-based approaches to handle social-emotional behavior (SEB) needs. One aspect of these efforts involves training teachers to utilize effective and current technologies, thereby reducing SEB challenges faced by students with disabilities in their classrooms. This literature review examines eight studies conducted within the past 10 years (from 2013 to 2023) that focus on enhancing SEB needs of students with disabilities using technology. The review reveals that autism spectrum disorder (ASD), emotional behavioral disorder (EBD), and attention deficit and hyperactivity disorder (ADHD) are the predominant disabilities studied through technology interventions. Additionally, it highlights that these studies focused on examining the effectiveness of technologies in reducing disruptive behaviors, increasing on-task behaviors, reducing anxiety, and promoting social skills.

Keywords: school-to-prison pipeline, technology, evidence-based practices, EBD

Procedia PDF Downloads 68
7960 Overcoming Open Innovation Challenges with Technology Intelligence: Case of Medium-Sized Enterprises

Authors: Akhatjon Nasullaev, Raffaella Manzini, Vincent Frigant

Abstract:

The prior research largely discussed open innovation practices both in large and small and medium-sized enterprises (SMEs). Open Innovation compels firms to observe and analyze the external environment in order to tap new opportunities for inbound and/or outbound flows of knowledge, ideas, work in progress innovations. As SMEs are different from their larger counterparts, they face several limitations in utilizing open innovation activities, such as resource scarcity, unstructured innovation processes and underdeveloped innovation capabilities. Technology intelligence – the process of systematic acquisition, assessment and communication of information about technological trends, opportunities and threats can mitigate this limitation by enabling SMEs to identify technological and market opportunities in timely manner and undertake sound decisions, as well as to realize a ‘first mover advantage’. Several studies highlighted firm-level barriers to successful implementation of open innovation practices in SMEs, namely challenges in partner selection, intellectual property rights and trust, absorptive capacity. This paper aims to investigate the question how technology intelligence can be useful for SMEs to overcome the barriers to effective open innovation. For this, we conduct a case study in four Estonian life-sciences SMEs. Our findings revealed that technology intelligence can support SMEs not only in inbound open innovation (taking into account inclination of most firms toward technology exploration aspects of open innovation) but also outbound open innovation. Furthermore, the results of this study state that, although SMEs conduct technology intelligence in unsystematic and uncoordinated manner, it helped them to increase their innovative performance.

Keywords: technology intelligence, open innovation, SMEs, life sciences

Procedia PDF Downloads 167
7959 Future Metro Station: Remodeling Underground Environment Based on Experience Scenarios and IoT Technology

Authors: Joo Min Kim, Dongyoun Shin

Abstract:

The project Future Station (FS) seek for a deeper understanding of metro station. The main idea of the project is enhancing the underground environment by combining new architectural design with IoT technology. This research shows the understanding of the metro environment giving references regarding traditional design approaches and IoT combined space design. Based on the analysis, this research presents design alternatives in two metro stations those are chosen for a testbed. It also presents how the FS platform giving a response to travelers and deliver the benefit to metro operators. In conclusion, the project describes methods to build future metro service and platform that understand traveler’s intentions and giving appropriate services back for enhancing travel experience. It basically used contemporary technology such as smart sensing grid, big data analysis, smart building, and machine learning technology.

Keywords: future station, digital lifestyle experience, sustainable metro, smart metro, smart city

Procedia PDF Downloads 299
7958 Management Control Systems in Post-Incubation: An Investigation of Closed Down High-Technology Start-Ups

Authors: Jochen Edmund Kerschenbauer, Roman Salinger, Daniel Strametz

Abstract:

Insufficient informal communication systems can lead to the first crisis (‘Crisis of Leadership’) for start-ups. Management Control Systems (MCS) are one way for high-technology start-ups to successfully overcome these problems. So far the literature has investigated the incubation of a start-up, but focused less on the post-incubation stage. This paper focuses on the use of MCS in post-incubation and, if failed start-ups agree, on how MCS are used. We conducted 14 semi-structured interviews for this purpose, to obtain our results. The overall conclusion is that the majority of the companies were closed down due to a combination of strategic, operative and financial reasons.

Keywords: closed down, high-technology, incubation, levers of control, management control systems, post-incubation, start-ups

Procedia PDF Downloads 1093
7957 A Strength Weaknesses Opportunities and Threats Analysis of Socialisation Externalisation Combination and Internalisation Modes in Knowledge Management Practice: A Systematic Review of Literature

Authors: Aderonke Olaitan Adesina

Abstract:

Background: The paradigm shift to knowledge, as the key to organizational innovation and competitive advantage, has made the management of knowledge resources in organizations a mandate. A key component of the knowledge management (KM) cycle is knowledge creation, which is researched to be the result of the interaction between explicit and tacit knowledge. An effective knowledge creation process requires the use of the right model. The SECI (Socialisation, Externalisation, Combination, and Internalisation) model, proposed in 1995, is attested to be a preferred model of choice for knowledge creation activities. The model has, however, been criticized by researchers, who raise their concern, especially about its sequential nature. Therefore, this paper reviews extant literature on the practical application of each mode of the SECI model, from 1995 to date, with a view to ascertaining the relevance in modern-day KM practice. The study will establish the trends of use, with regards to the location and industry of use, and the interconnectedness of the modes. The main research question is, for organizational knowledge creation activities, is the SECI model indeed linear and sequential? In other words, does the model need to be reviewed in today’s KM practice? The review will generate a compendium of the usage of the SECI modes and propose a framework of use, based on the strength weaknesses opportunities and threats (SWOT) findings of the study. Method: This study will employ the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to investigate the usage and SWOT of the modes, in order to ascertain the success, or otherwise, of the sequential application of the modes in practice from 1995 to 2019. To achieve the purpose, four databases will be explored to search for open access, peer-reviewed articles from 1995 to 2019. The year 1995 is chosen as the baseline because it was the year the first paper on the SECI model was published. The study will appraise relevant peer-reviewed articles under the search terms: SECI (or its synonym, knowledge creation theory), socialization, externalization, combination, and internalization in the title, abstract, or keywords list. This review will include only empirical studies of knowledge management initiatives in which the SECI model and its modes were used. Findings: It is expected that the study will highlight the practical relevance of each mode of the SECI model, the linearity or not of the model, the SWOT in each mode. Concluding Statement: Organisations can, from the analysis, determine the modes of emphasis for their knowledge creation activities. It is expected that the study will support decision making in the choice of the SECI model as a strategy for the management of organizational knowledge resources, and in appropriating the SECI model, or its remodeled version, as a theoretical framework in future KM research.

Keywords: combination, externalisation, internalisation, knowledge management, SECI model, socialisation

Procedia PDF Downloads 355
7956 Ensuring Quality in DevOps Culture

Authors: Sagar Jitendra Mahendrakar

Abstract:

Integrating quality assurance (QA) practices into DevOps culture has become increasingly important in modern software development environments. Collaboration, automation and continuous feedback characterize the seamless integration of DevOps development and operations teams to achieve rapid and reliable software delivery. In this context, quality assurance plays a key role in ensuring that software products meet the highest quality, performance and reliability standards throughout the development life cycle. This brief explores key principles, challenges, and best practices related to quality assurance in a DevOps culture. This emphasizes the importance of quality transfer in the development process, as quality control processes are integrated in every step of the DevOps process. Automation is the cornerstone of DevOps quality assurance, enabling continuous testing, integration and deployment and providing rapid feedback for early problem identification and resolution. In addition, the summary addresses the cultural and organizational challenges of implementing quality assurance in DevOps, emphasizing the need to foster collaboration, break down silos, and promote a culture of continuous improvement. It also discusses the importance of toolchain integration and capability development to support effective QA practices in DevOps environments. Moreover, the abstract discusses the cultural and organizational challenges in implementing QA within DevOps, emphasizing the need for fostering collaboration, breaking down silos, and nurturing a culture of continuous improvement. It also addresses the importance of toolchain integration and skills development to support effective QA practices within DevOps environments. Overall, this collection works at the intersection of QA and DevOps culture, providing insights into how organizations can use DevOps principles to improve software quality, accelerate delivery, and meet the changing demands of today's dynamic software. landscape.

Keywords: quality engineer, devops, automation, tool

Procedia PDF Downloads 58
7955 Large Panel Technology Apartments of Yesterday and Today: Quality Aspects

Authors: Barbara Gronostajska

Abstract:

Currently, housing conditions of buildings executed in large panel technology are deteriorating. The article presents modernization solutions implemented throughout the variety of architectural activities (adding of balconies and staircases, connecting apartments) which guarantee very intriguing results that meet the needs and expectations of the modern society.

Keywords: housing estate, apartments, flats, modernization, plate blocks

Procedia PDF Downloads 480
7954 Planning for a Smart Sustainable Cities: A Case Study

Authors: Ajaykumar Kambekar, Nikita Kalantri

Abstract:

Due to faster urbanization; developing nations will have to look forward towards establishing new planned cities those are environmentally friendly. Due to growth in Information and Communication Technology (ICT), it is evident that the rise of smart cities is witnessed as a promising trend for future growth; however, technology alone cannot make a city as a smart city. Cities must use smart systems to enhance the quality of life of its citizens and to achieve sustainable growth. Recent trends in technology may offer some indication towards harnessing our cities potential as the new engines of sustainable growth. To overcome the problems of mega-urbanization, new concept of smart cities has been introduced. The current research aims to reduce the knowledge gap in urban planning by exploring the concept of smart cities considering sustainability as a major focus. The aim of this paper is to plan for an entire smart city. The paper analyses sustainable development and identifies the key factors for the creation of future smart cities. The study also emphasizes the use of advanced planning and scheduling software such as Microsoft Project (MSP).

Keywords: urbanization, planned cities, information and communication technology, sustainable growth

Procedia PDF Downloads 309
7953 Exploring a Net-Metering Policy Towards Solar Energy Technology Adoption and Sustainability

Authors: Jane Osei, Kerry Brown, Mehran Nejati

Abstract:

Numerous studies have established that solar energy is the second most prevalent form of alternative renewable energy globally, particularly in regions with abundant sunlight. The adoption and ongoing sustainability of solar technology are pivotal for the transition to renewable energy sources. However, the literature indicates that some countries, especially in the developing world, may impede this transition. Despite various policy initiatives aimed at supporting the adoption of solar technology, the long-term effectiveness of these policies remains uncertain. This study investigates the current policy drivers influencing the success or failure of solar energy technology adoption and sustainability. It employs a qualitative review approach to compare strategies for implementing the net-metering policy incentive in both developing and developed countries, identifying successful and unsuccessful strategies and drawing conclusions on the lessons learned. The study's findings reveal that the effective implementation of net metering depends on regional variations in solar radiation and differing levels of electricity demand across regions. Further, the study found that the implementation of net metering has faced challenges in some countries due to regulatory barriers and bottlenecks that hinder private sector involvement and business sustainability. Economic stability also significantly impacts net metering implementation. This study concludes that governments should strive to balance benefit-sharing to attract more private-sector investment in solar technology while ensuring the viability of government energy regulatory bodies.

Keywords: solar energy technology, adoption, sustainability, net-metering

Procedia PDF Downloads 34
7952 The Evolution of the Human Brain from the Hind Brain to the Fore Brain: Dialectics from the African Perspective in Understanding Stunted Development in Science and Technology

Authors: Philemon Wokoma Iyagba, Obey Onenee Christie

Abstract:

From the hindbrain, which is responsible for motor activities, to the forebrain, responsible for processing information related to complex cognitive activities, the human brain has continued to evolve over the years. This evolution- has been progressive, leading to advancements in science and technology. However, the development of science and technology in Africa, where ancient civilization arguably began, has been retrogressive. Dialectics was done by dissecting different opinions on the reason behind the stunted development of science and technology in Africa. The researchers proposed that the inability to sustain the technological advancements made by early Africans is due to poor or lack of replicability of the African knowledge-based system, almost no or poor documentation of adopted procedures and the approval-seeking mentality that cheaply paved the way for westernization which also led to the adulteration of the African way of life and education without making room for incorporating her identity and proper alignment of her rich cultural heritage in education and her enormous achievements before and during the middle age. This article discussed conceptual issues, with its positions based on established facts, the discussion was based on relevant literature and recommendations were made accordingly.

Keywords: forebrain, hindbrain, dialectics from African perspective, development in science and technology

Procedia PDF Downloads 77