Search results for: information service
12619 A Study of Customer Aggression towards Frontline Employees in Some Hotels in Imo State, Nigeria
Authors: Polycarp A. Igbojekwe, Chizoba Amajuoyi, Peterson Nwokorie
Abstract:
The main purpose of this study was to carry out a survey of customer’s aggression towards hotel workers and make contributions on the prevalence and rationale behind customer’s aggression. Data for the study were gathered with a four-point Likert type rating scale. Samples were drawn from frontline hotel employees, managers and customers of twelve (12) hotels selected from three zones of Imo State. Data analyses were conducted using simple percentage, descriptive statistics; and Z-test statistical technique was used to test hypotheses. Among other factors, service failure and verbal abuse by service providers and poor quality product compared to price were identified by customers as the three major factors that can lead to customer aggression. Frontline employees indentified verbal abuse as the most common mode of aggression and that customer aggression causes emotional disturbance in them. The study also revealed that customer aggression is more prevalent in the 1&2 star hotels than it is in 3-5 star hotels. Most of the hotels have not institutionalized systematic approaches needed to effectively face the challenges of customer aggression, thus, customer aggression has become a common feature in the industry. Frontline jobs demand high emotional input. Therefore, we recommend that frontline employees should be given emotional support by their managers and also trained on how to cope with emotional disturbance.Keywords: customer aggression, emotional disturbance, employee well-being, service failure, verbal abuse
Procedia PDF Downloads 27612618 Analysis of Global Social Responsibilities of Social Studies Pre-Service Teachers Based on Several Variables
Authors: Zafer Cakmak, Birol Bulut, Cengiz Taskiran
Abstract:
Technological advances, the world becoming smaller and increasing world population increase our interdependence with individuals that we maybe never meet face to face. It is impossible for the modern individuals to escape global developments and their impact. Furthermore, it is very unlikely for the global societies to turn back from the path they are in. These effects of globalization in fact encumber the humankind at a certain extend. We succumb to these responsibilities for we desire a better future, a habitable world and a more peaceful life. In the present study, global responsibility levels of the participants were measured and the significance of global reactions that individuals have to develop on global issues was reinterpreted under the light of the existing literature. The study was conducted with general survey model, one of the survey methodologies General survey models are surveys conducted on the whole universe or a group, sample or sampling taken from the universe to arrive at a conclusion about the universe, which includes a high number of elements. The study was conducted with data obtained from 350 pre-service teachers attending 2016 spring semester to determine 'Global Social Responsibility' levels of social studies pre-service teachers based on several variables. Collected data were analyzed using SPSS 21.0 software. T-test and ANOVA were utilized in the data analysis.Keywords: social studies, globalization, global social responsibility, education
Procedia PDF Downloads 39012617 Visual Analytics of Higher Order Information for Trajectory Datasets
Authors: Ye Wang, Ickjai Lee
Abstract:
Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data
Procedia PDF Downloads 40212616 Value Relevance of Accounting Information: Empirical Evidence from China
Authors: Ying Guo, Miaochan Li, David Yang, Xiao-Yan Li
Abstract:
This paper examines the relevance of accounting information to stock prices at different periods using manufacturing companies listed in China’s Growth Enterprise Market (GEM). We find that both the average stock price at fiscal year-end and the average stock price one month after fiscal year-end are more relevant to the accounting information than the closing stock price four months after fiscal year-end. This implies that Chinese stock markets react before the public disclosure of accounting information, which may be due to information leak before official announcements. Our findings confirm that accounting information is relevant to stock prices for Chinese listed manufacturing companies, which is a critical question to answer for investors who have interest in Chinese companies.Keywords: accounting information, response time, value relevance, stock price
Procedia PDF Downloads 9612615 Building a Model for Information Literacy Education in School Settings
Authors: Tibor Koltay
Abstract:
Among varied new literacies, information literacy is not only the best-known one but displays numerous models and frameworks. Nonetheless, there is still a lack of its complex theoretical model that could be applied to information literacy education in public (K12) education, which often makes use of constructivist approaches. This paper aims to present the main features of such a model. To develop a complex model, the literature and practice of phenomenographic and sociocultural theories, as well as discourse analytical approaches to information literacy, have been reviewed. Besides these constructivist and expressive based educational approaches, the new model is intended to include the innovation of coupling them with a cognitive model that takes developing informational and operational knowledge into account. The convergences between different literacies (information literacy, media literacy, media and information literacy, and data literacy) were taken into account, as well. The model will also make use of a three-country survey that examined secondary school teachers’ attitudes to information literacy. The results of this survey show that only a part of the respondents feel properly prepared to teach information literacy courses, and think that they can teach information literacy skills by themselves, while they see a librarian as an expert in educating information literacy. The use of the resulting model is not restricted to enhancing theory. It is meant to raise the level of awareness about information literacy and related literacies, and the next phase of the model’s development will be a pilot study that verifies the usefulness of the methodology for practical information literacy education in selected Hungarian secondary schools.Keywords: communication, data literacy, discourse analysis, information literacy education, media and information literacy media literacy, phenomenography, public education, sociocultural theory
Procedia PDF Downloads 14712614 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego
Procedia PDF Downloads 8112613 Adaptability of Steel-Framed Industrialized Building System In Post-Service Life
Authors: Alireza Taghdiri, Sara Ghanbarzade Ghomi
Abstract:
Existing buildings are permanently subjected to change, continuously renovated and repaired in their long service life. Old buildings are destroyed and their material and components are recycled or reused for constructing new ones. In this process, the importance of sustainability principles for building construction is obviously known and great significance must be attached to the consumption of resources, resulting effects on the environment and economic costs. Utilization strategies for extending buildings service life and delay in destroying have a positive effect on environment protection. In addition, simpler alterability or expandability of buildings’ structures and reducing energy and natural resources consumption have benefits for users, producers and the environment. To solve these problems, by applying theories of open building, structural components of some conventional building systems have been analyzed and then, a new geometry adaptive building system is developed which can transform and support different imposed loads. In order to achieve this goal, various research methods and tools such as professional and scientific literatures review, comparative analysis, case study and computer simulation were applied and data interpretation was implemented using descriptive statistics and logical arguments. Therefore, hypothesis and proposed strategies were evaluated and an adaptable and reusable 2-dimensional building system was presented which can respond appropriately to dwellers and end-users needs and provide reusability of structural components of building system in new construction or function. Investigations showed that this incremental building system can be successfully applied in achieving the architectural design objectives and by small modifications on components and joints, it is easy to obtain different and adaptable load-optimized component alternatives for flexible spaces.Keywords: adaptability, durability, open building, service life, structural building system
Procedia PDF Downloads 43412612 The Anti-Cyber and Information Technology Crimes Law on Information Access and Dissemination by Egyptian Journalists
Authors: Miral Sabry AlAshry
Abstract:
The main objective of the study is to investigate the effectiveness of Egyptian Journalists through the Anti-Cyber and Information Technology Crimes Law, as well as its implications for journalistic practice and the implications for press freedom in Egypt. Questionnaires were undertaken with 192 journalists representing four official newspapers, and in-depth interviews were held with 15 journalists. The study used an Authoritarian theory as a theoretical framework. The study revealed that the government placed restrictions on journalists by using the law to oppress them.Keywords: anti-cyber and information technology crimes law, media legislation, personal information, Egyptian constitution
Procedia PDF Downloads 37312611 ASEAN Air Transport Liberalization and Its Impact to Indonesian Air Service
Authors: Oentoeng Wahjoe
Abstract:
Liberalisation of air transportation practically is known as open sky policy. In the practice, the liberalisation of air transportation is divided into two group of services, i.e.: air transportation services, for passengers and goods (air service) which is categorized as hard rights and supporting services of the air transportation services (ancillary services) which is categorized as soft rights. The research in this paper focused in air transportation services for passengers and goods, consists of nine freedom of the air. The impact of the policy such as the Agreement regarding ASEAN open sky policy, is the readiness of Indonesian air transportation companies to compete with foreign air transportation companies. The goverment of Indonesia has to regulate the implementation of ASEAN Open Sky Policy to be projected in order to comply with national development, i.e. the function of air law in national development. The policy has been implemented by enact or amend the existing law as air law that regulate flight lines, the following provisions: To regulate flight line for foreign airlines to open flight lines in Indonesia region which may not or have not land and sea transportation. The regulation is intended to supprot mobility of humans, goods and services that may fulfil the needs of the people of Indonesia, which materially and spiritually and the development of the region. The regulation of flight lines of foreign air transportation for region of tourism, industrial and trade centre. The regulation is intended to support the national economic development of Indonesia.Keywords: transport, liberalization, impact, Indonesian air service
Procedia PDF Downloads 33212610 Information Exchange Process Analysis between Authoring Design Tools and Lighting Simulation Tools
Authors: Rudan Xue, Annika Moscati, Rehel Zeleke Kebede, Peter Johansson
Abstract:
Successful buildings’ simulation and analysis inevitably require information exchange between multiple building information modeling (BIM) software. The BIM infor-mation exchange based on IFC is widely used. However, Industry Foundation Classifi-cation (IFC) files are not always reliable and information can get lost when using dif-ferent software for modeling and simulations. In this research, interviews with lighting simulation experts and a case study provided by a company producing lighting devices have been the research methods used to identify the necessary steps and data for suc-cessful information exchange between lighting simulation tools and authoring design tools. Model creation, information exchange, and model simulation have been identi-fied as key aspects for the success of information exchange. The paper concludes with recommendations for improved information exchange and more reliable simulations that take all the needed parameters into consideration.Keywords: BIM, data exchange, interoperability issues, lighting simulations
Procedia PDF Downloads 23912609 Impact of Financial and Non-Financial Motivation on Motivating Employees
Authors: Al-Yaqdhan Al-Rawahi, Kaneez Fatima Sadriwala
Abstract:
The purpose of this paper is to discover the readiness of Civil Service Employee Pension Fund (CSEPF), a governmental organization, in motivating its staff. Exploratory survey has been conducted in order to extract needed information. For this purpose we proposed a questionnaire to understand staff viewpoint of motivation. Data was analyzed by using SPSS 15.0 for Windowsand Excel. Major results prove that good working conditions is the most important factor of staff and sympathetic help with personal problem is the least important one. Also the relationship between financial motivation and employee motivation is very weak, whereas with non-financial motivation and employee motivation is moderate. Future research may focus on studying all departments of CSEPF.Keywords: financial motivation, non-financial motivation, employee motivation
Procedia PDF Downloads 38612608 Multi-Level Meta-Modeling for Enabling Dynamic Subtyping for Industrial Automation
Authors: Zoltan Theisz, Gergely Mezei
Abstract:
Modern industrial automation relies on service oriented concepts of Internet of Things (IoT) device modeling in order to provide a flexible and extendable environment for service meta-repository. However, state-of-the-art meta-modeling techniques prefer design-time modeling, which results in a heavy usage of class sometimes unnecessary static subtyping. Although this approach benefits from clear-cut object-oriented design principles, it also seals the model repository for further dynamic extensions. In this paper, a dynamic multi-level modeling approach is introduced that enables dynamic subtyping through a more relaxed partial instantiation mechanism. The approach is demonstrated on a simple sensor network example.Keywords: meta-modeling, dynamic subtyping, DMLA, industrial automation, arrowhead
Procedia PDF Downloads 36012607 Structural Engineering Forensic Evaluation of Misdiagnosed Concrete Masonry Wall Cracking
Authors: W. C. Bracken
Abstract:
Given that concrete masonry walls are expected to experience shrinkage combined with thermal expansion and contraction, and in some cases even carbonation, throughout their service life, cracking is to be expected. However, after concrete masonry walls have been placed into service, originally anticipated and accounted for cracking is often misdiagnosed as a structural defect. Such misdiagnoses often result in or are used to support litigation. This paper begins by discussing the causes and types of anticipated cracking within concrete masonry walls followed by a discussion on the processes and analyses that exists for properly evaluating them and their significance. From here, the paper then presents a case of misdiagnosed concrete masonry cracking and the flawed logic employed to support litigation.Keywords: concrete masonry, masonry wall cracking, structural defect, structural damage, construction defect, forensic investigation
Procedia PDF Downloads 24812606 Information Technology and Communications in Management of the Imperial Citadel of Thang Long-A World Heritage Site
Authors: Ngo the Bach
Abstract:
Information technology and communications are growing strongly and penetrated almost the entire Vietnamese economy and society. The article presents an overview of information technology and application communications in the management the Central Sector of the Imperial Citadel of Thang Long (Hanoi, Vietnam) - A World Heritage Site. The author also points out the opportunities and challenges of the information technology and communications in the sectors of culture and heritage; the use of information technology as an effective tool to develop mass and interactive communications. The article emphasizes on the advantage of information technology and communications in supporting effectively the management reform with respect to the Imperial Citadel of Thang Long in particular and the management of world heritage sites in Vietnam in general.Keywords: information technology, communications, management, culture, heritage
Procedia PDF Downloads 33012605 Visualizing the Future of New York’s Southern Tier: Engaging Students to Help Create Sustainable Communities
Authors: William C. Dean
Abstract:
In the pedagogical sequence of the four- and five-year architectural programs at Alfred State, the fourth-year Urban Design Studio constitutes the first course where students directly explore design issues in the urban context. It is the first large-scale, community-based service learning project for most of the participating students. The students learn key lessons that include the benefits of working both individually and in groups of different sizes toward a common goal, accepting - and responding creatively too - criticism from stakeholders at different points in the project, and recognizing the role that local politics and activism can play in planning for community development. Above all, students are exposed to the importance of good planning in relation to preservation and community revitalization. The purpose of this paper is to discuss the use of community-based service-learning projects in undergraduate architectural education to promote student civic engagement as a means of helping communities visualize potential solutions for revitalizing their neighborhoods and business districts. A series of case studies will be presented in terms of challenges that were encountered, opportunities for student engagement and leadership, and the feasibility of sustainable community development resulting from those projects. The reader will be encouraged to consider how they can recognize needs within their own communities that could benefit from the assistance of architecture students and faculty.Keywords: urban design, service-learning, civic engagement, community revitalization
Procedia PDF Downloads 9512604 Effect of Three Instructional Strategies on Pre-service Teachers’ Learning Outcomes in Practical Chemistry in Niger State, Nigeria
Authors: Akpokiere Ugbede Roseline
Abstract:
Chemistry is an activity oriented subject in which many students achievement over the years are not encouraging. Among the reasons found to be responsible for student’s poor performance in chemistry are ineffective teaching strategies. This study, therefore, sought to determine the effect of guided inquiry, guided inquiry with demonstration, and demonstration with conventional approach on pre-service teachers’ cognitive attainment and practical skills acquisition on stoichiometry and chemical reactions in practical chemistry, Two research questions and hypotheses were each answered and tested respectively. The study was a quasi-experimental research involving 50 students in each of the experimental groups and 50 students in the control group. Out of the five instruments used for the study, three were on stimulus and two on response (Test of Cognitive Attainment and Test of Practical Skills in Chemistry) instruments administered, and dataobtained were analyzed with t-test and Analysis of Variance. Findings revealed, among others, that there was a significant effect of treatments on students' cognitive attainment and on practical skills acquisition. Students exposed to guided inquiry (with/without demonstration) strategies achieved better than those exposed to demonstration with conventional strategy. It is therefore recommended, among others, that Lecturers in Colleges of Education should utilize the guided inquiry strategy for teaching concepts in chemistry.Keywords: instructional strategy, practical chemistry, learning outcomes, pre-service teachers
Procedia PDF Downloads 10312603 Satisfaction Evaluation on the Fundamental Public Services for a Large-Scale Indemnificatory Residential Community: A Case Study of Nanjing
Authors: Dezhi Li, Peng Cui, Bo Zhang, Tengyuan Chang
Abstract:
In order to solve the housing problem for the low-income families, the construction of affordable housing is booming in China. However, due to various reasons, the service facilities and systems in the indemnificatory residential community meet many problems. This article established a Satisfaction Evaluation System of the Fundamental Public Services for Large-scale Indemnificatory Residential Community based on the national standards and local criteria and developed evaluation methods and processes. At last, in the case of Huagang project in Nanjing, the satisfaction of basic public service is calculated according to a survey of local residents.Keywords: indemnificatory residential community, public services, satisfaction evaluation, structural equation modeling
Procedia PDF Downloads 36212602 A Bicycle Based Model of Prehospital Care Implanted in Northeast of the Brazil: Initial Experience
Authors: Odaleia de O. Farias, Suzelene C. Marinho, Ecleidson B. Fragoso, Daniel S. Lima, Francisco R. S. Lira, Lara S. Araújo, Gabriel dos S. D. Soares
Abstract:
In populous cities, prehospital care services that use vehicles alternative to ambulances are needed in order to reduce costs and improve response time to occurrences in areas with large concentration of people, such as leisure and tourism spaces. In this context, it was implanted a program called BIKE VIDA, that is innovative quick access and assistance program. The aim of this study is to describe the implantation and initial profile of occurrences performed by an urgency/emergency pre-hospital care service through paramedics on bicycles. It is a cross-sectional, descriptive study carried out in the city of Fortaleza, Ceara, Brazil. The data included service records from July to August 2017. Ethical aspects were respected. The service covers a perimeter of 4.5 km, divided into three areas with perimeter of 1.5 km for each paramedic, attending from 5 am to 9 pm. Materials transported by bicycles include External Automated Defibrillator - DEA, portable oxygen, oximeter, cervical collar, stethoscope, sphygmomanometer, dressing and immobilization materials and personal protective equipment. Occurrences are requested directly by calling the emergency number 192 or through direct approach to the professional. In the first month of the program, there were 93 emergencies/urgencies, mainly in the daytime period (71,0%), in males (59,7%), in the age range of 26 to 45 years (46,2%). The main nature was traumatic incidents (53.3%). Most of the cases (88,2%) did not require ambulance transport to the hospital, and there were two deaths. Pre-hospital service through bicycles is an innovative strategy in Brazil and has shown to be promising in terms of reducing costs and improving the quality of the services offered.Keywords: emergency, response time, prehospital care, urgency
Procedia PDF Downloads 19712601 The Investigation of Relationship between Accounting Information and the Value of Companies
Authors: Golamhassan Ghahramani Aghdam, Pedram Bavili Tabrizi
Abstract:
The aim of this research is to investigate the relationship between accounting information and the value of the companies accepted in Tehran Exchange Market. The dependent variable in this research is the value of a company that is measured by price coefficients, and the independent variables are balance sheet information, profit and loss information, cash flow state information, and profit quality characteristics. The profit quality characteristic index is to be related and to be on-time. This research is an application research, and the research population includes all companies that are active in Tehran exchange market. The number of 194 companies was selected by the systematic method as the statistics sample in the period of 2018-2019. The multi-variable linear regression model was used for the hypotheses test. The results show that there is no relationship between accounting information and companies’ value (stock value) that can be due to the lack of efficiency of the investment market and the inability to use the accounting information by investment market activists.Keywords: accounting information, company value, profit quality characteristics, price coefficient
Procedia PDF Downloads 13912600 Voice over IP Quality of Service Evaluation for Mobile Ad Hoc Network in an Indoor Environment for Different Voice Codecs
Authors: Lina Abou Haibeh, Nadir Hakem, Ousama Abu Safia
Abstract:
In this paper, the performance and quality of Voice over IP (VoIP) calls carried over a Mobile Ad Hoc Network (MANET) which has a number of SIP nodes registered on a SIP Proxy are analyzed. The testing campaigns are carried out in an indoor corridor structure having a well-defined channel’s characteristics and model for the different voice codecs, G.711, G.727 and G.723.1. These voice codecs are commonly used in VoIP technology. The calls’ quality are evaluated using four Quality of Service (QoS) metrics, namely, mean opinion score (MOS), jitter, delay, and packet loss. The relationship between the wireless channel’s parameters and the optimum codec is well-established. According to the experimental results, the voice codec G.711 has the best performance for the proposed MANET topologyKeywords: wireless channel modelling, Voip, MANET, session initiation protocol (SIP), QoS
Procedia PDF Downloads 22712599 Airbnb, Hotel Industry and Optimum Strategies: Evidence from European Cities, Barcelona, London and Paris
Authors: Juan Pedro Aznar Alarcon, Josep Maria Sayeras Maspera
Abstract:
Airbnb and other similar platforms are offering a near substitute to the traditional accommodation service supplied by the hotel sector. In this context, hotels can try to compete by offering higher quality and additional services, which imply the need for new investments or try to compete by reducing prices. The theoretical model presented in this paper analyzes the best response using a sequential game theory model. The main conclusion is that due to the financial constraints that small and medium hotels have these hotels have reduced prices whereas hotels that belong to international groups or have an easy access to financial resources have increased their investment to increase the quality of the service provided. To check the validity of the theoretical model financial data from Barcelona, London and Paris hotels have been used analyzing profitability, quality of the service provided, the investment propensity and the evolution of the gross profit. The model and the empirical data provide the base for some industrial policy in the hospitality industry. To address the extra cost that small hotels in Europe have to face compared by bigger firms would help to improve the level of quality provided and to some extent have positive externalities in terms of job creation and an increasing added value for the industry.Keywords: Airbnb, profitability, hospitality industry, game theory
Procedia PDF Downloads 34812598 Fill Rate Window as a Criterion for Spares Allocation
Authors: Michael Dreyfuss, Yahel Giat
Abstract:
Limited battery range and long recharging times are the greatest obstacles to the successful adoption of electric cars. One of the suggestions to overcome these problems is that carmakers retain ownership of batteries and provide battery swapping service so that customers exchange their depleted batteries for recharged batteries. Motivated by this example, we consider the problem of optimal spares allocation in an exchangeable-item, multi-location repair system. We generalize the standard service measures of fill rate and average waiting time to reflect the fact that customers penalize the service provider only if they have to wait more than a ‘tolerable’ time window. These measures are denoted as the window fill rate and the truncated waiting time, respectively. We find that the truncated waiting time is convex and therefore a greedy algorithm solves the spares allocation problem efficiently. We show that the window fill rate is generally S-shaped and describe an efficient algorithm to find a near-optimal solution and detail a priori and a posteriori upper bounds to the distance from optimum. The theory is complemented with a large scale numerical example demonstrating the spare battery allocation in battery swapping stations.Keywords: convex-concave optimization, exchangeable item, M/G/infinity, multiple location, repair system, spares allocation, window fill rate
Procedia PDF Downloads 49312597 How COVID-19 Pandemic Contingency Measures Impacted on Environmental Practices in Food Service in Portugal
Authors: Ada Rocha, Beatriz Almeida, Cláudia Viegas
Abstract:
Considering the growing trend of food consumption outside the home, Food Service units (FSU) achieved importance and responsibility in feeding the population. FSU have a strong environmental impact since the large-scale production of meals implies a high use of resources and produce high amounts of waste with economic and environmental consequences. At the end of 2019, with the emergence of the Covid-19 pandemic, this effort towards sustainability was affected by the contingency measures imposed to stop the spread of the virus. Preventive measures in FSU, include the provision of cutlery and paper napkins in individual bags, the use of disposable paper towels, the supply of individual portions of bread and spices, as well as bottled water. These measures are, in many cases, a setback and an obstacle to the implementation of more sustainable practices and imply greater consumption of natural resources and materials. The present study aimed to assess the impact of the implementation of the contingency measures for the Covid-19 pandemic on the environmental practices of FSU in Portugal. A questionnaire was developed to characterize the FSU and the impact of the implementation of contingency measures for the Covid-19 pandemic. A great impact of the implementation of the contingency measures in the sustainability of FSU was observed, highlighting concerns about the need to keep these measures, some of them adopted due to fear of the unknown and its consequences on an ongoing successful process. Policymakers should keep only the ones that may prove to be efficient and positive and abandon or relieve the unnecessary ones.Keywords: COVID-19, environment, food service, sustainability, SGD
Procedia PDF Downloads 6812596 Alignment of Information System Strategy and Green Information System Strategy: Comprehension and A Review of the Literature
Authors: Wartika Memed Purawinata, Kridanto Surendro, Husni Sastramiharja, Iping Supriana S.
Abstract:
The information system is one of the contributors to environmental degradation and pollution are known to be released, such as the increasing of use of IT equipment and energy consumption , life cycles of IT equipment are getting shorter, IT equipment waste disposal and so on, therefore the information system should have a role in related environmental issues. Organization need to develop the ability of green to minimize negative impacts on the environment. Although the green information system is an important topic, many organizations fail to manage the environment in a way that is adequate because they ignore aspect of strategy. Alignment strategy is very important to ensure that all people do the activities of the organization headed in the same direction. Alignment strategy helps organization, determine which is more important for organization, and then make road mad to achieve the organization goal. Therefore, this paper discusses the review of the alignment, information systems strategy, and IS green strategy. With this discussion is expected there is an understanding about the alignment of information systems strategy and strategy of green IS, and its relationship with the achievement of business goals that have commitment to reduce the negative impact of information systems on the environment.Keywords: alignment, strategy, information system, green
Procedia PDF Downloads 45612595 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services
Authors: Rachna Jain, Sushila Madan, Bindu Garg
Abstract:
Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service
Procedia PDF Downloads 33412594 Routing Medical Images with Tabu Search and Simulated Annealing: A Study on Quality of Service
Authors: Mejía M. Paula, Ramírez L. Leonardo, Puerta A. Gabriel
Abstract:
In telemedicine, the image repository service is important to increase the accuracy of diagnostic support of medical personnel. This study makes comparison between two routing algorithms regarding the quality of service (QoS), to be able to analyze the optimal performance at the time of loading and/or downloading of medical images. This study focused on comparing the performance of Tabu Search with other heuristic and metaheuristic algorithms that improve QoS in telemedicine services in Colombia. For this, Tabu Search and Simulated Annealing heuristic algorithms are chosen for their high usability in this type of applications; the QoS is measured taking into account the following metrics: Delay, Throughput, Jitter and Latency. In addition, routing tests were carried out on ten images in digital image and communication in medicine (DICOM) format of 40 MB. These tests were carried out for ten minutes with different traffic conditions, reaching a total of 25 tests, from a server of Universidad Militar Nueva Granada (UMNG) in Bogotá-Colombia to a remote user in Universidad de Santiago de Chile (USACH) - Chile. The results show that Tabu search presents a better QoS performance compared to Simulated Annealing, managing to optimize the routing of medical images, a basic requirement to offer diagnostic images services in telemedicine.Keywords: medical image, QoS, simulated annealing, Tabu search, telemedicine
Procedia PDF Downloads 21912593 Using Technology to Enhance the Student Assessment Experience
Authors: Asim Qayyum, David Smith
Abstract:
The use of information tools is a common activity for students of any educational stage when they encounter online learning activities. Finding the relevant information for particular learning tasks is the topic of this paper as it investigates the use of information tools for a group of student participants. The paper describes and discusses the results with particular implications for use in higher education, and the findings suggest that improvement in assessment design and subsequent student learning may be achieved by structuring the purposefulness of information tools usage and online reading behaviors of university students.Keywords: information tools, assessment, online learning, student assessment experience
Procedia PDF Downloads 56012592 Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems
Authors: M. Mutemwa
Abstract:
A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC.Keywords: cybersecurity operation centre, incident response, priority matrix, procedures and policies
Procedia PDF Downloads 15312591 Working at the Interface of Health and Criminal Justice: An Interpretative Phenomenological Analysis Exploration of the Experiences of Liaison and Diversion Nurses – Emerging Findings
Authors: Sithandazile Masuku
Abstract:
Introduction: Public health approaches to offender mental health are driven by international policies and frameworks in response to the disproportionately large representation of people with mental health problems within the offender pathway compared to the general population. Public health service innovations include mental health courts in the US, restorative models in Singapore and, liaison and diversion services in Australia, the UK, and some other European countries. Mental health nurses are at the forefront of offender health service innovations. In the U.K. context, police custody has been identified as an early point within the offender pathway where nurses can improve outcomes by offering assessments and share information with criminal justice partners. This scope of nursing practice has introduced challenges related to skills and support required for nurses working at the interface of health and the criminal justice system. Parallel literature exploring experiences of nurses working in forensic settings suggests the presence of compassion fatigue, burnout and vicarious trauma that may impede risk harm to the nurses in these settings. Published research explores mainly service-level outcomes including monitoring of figures indicative of a reduction in offending behavior. There is minimal research exploring the experiences of liaison and diversion nurses who are situated away from a supportive clinical environment and engaged in complex autonomous decision-making. Aim: This paper will share qualitative findings (in progress) from a PhD study that aims to explore the experiences of liaison and diversion nurses in one service in the U.K. Methodology: This is a qualitative interview study conducted using an Interpretative Phenomenological Analysis to gain an in-depth analysis of lived experiences. Methods: A purposive sampling technique was used to recruit n=8 mental health nurses registered with the UK professional body, Nursing and Midwifery Council, from one UK Liaison and Diversion service. All participants were interviewed online via video call using semi-structured interview topic guide. Data were recorded and transcribed verbatim. Data were analysed using the seven steps of the Interpretative Phenomenological Analysis data analysis method. Emerging Findings Analysis to date has identified pertinent themes: • Difficulties of meaning-making for nurses because of the complexity of their boundary spanning role. • Emotional burden experienced in a highly emotive and fast-changing environment. • Stress and difficulties with role identity impacting on individual nurses’ ability to be resilient. • Challenges to wellbeing related to a sense of isolation when making complex decisions. Conclusion Emerging findings have highlighted the lived experiences of nurses working in liaison and diversion as challenging. The nature of the custody environment has an impact on role identity and decision making. Nurses left feeling isolated and unsupported are less resilient and may go on to experience compassion fatigue. The findings from this study thus far point to a need to connect nurses working in these boundary spanning roles with a supportive infrastructure where the complexity of their role is acknowledged, and they can be connected with a health agenda. In doing this, the nurses would be protected from harm and the likelihood of sustained positive outcomes for service users is optimised.Keywords: liaison and diversion, nurse experiences, offender health, staff wellbeing
Procedia PDF Downloads 13512590 Research on Malware Application Patterns of Using Permission Monitoring System
Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim
Abstract:
This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.Keywords: malware patterns, application permission, application analysis, security
Procedia PDF Downloads 523