Search results for: sport organizations
1665 The Contemporary Issues of Quality Management: Relationship between Total Quality Management and Knowledge Management
Authors: Mehrnoosh Askarizadeh
Abstract:
To meet the challenges of the new global environment, companies have started paying great attention towards quality management as an integral part of their strategic business plans. The purpose of this article is to investigate the relationship between total quality management (TQM) and knowledge management (KM). Successful total quality management implementation throughout the organizations requires major changes in the main four aspects of knowledge management, namely: Creating, storage, sharing and application. Skill, knowledge and productivity are important factors in organization’s success and have important role. Therefore, TQM management system pays special attention to it. However, knowledge as the source is essential for organization’s survival. Our study points out how the quality management and knowledge management have been incorporated into each other for the development of the quality culture within the organization.Keywords: knowledge management (KM), total quality management (TQM), organizational performance (OP), deming cycle
Procedia PDF Downloads 4791664 Preceptor Program: A Way to Reduce Absconding Rate and Increase Patient Satisfaction
Authors: Akanksha Dicholkar, Celin Jacob, Omkar More
Abstract:
Work force instability, as demonstrated by high rates of staff turnover and lingering vacancy rates, continues to be a major challenge faced by health care organizations. The impact is manifested in workflow inefficiencies, delays in delivering patient care, and dissatisfaction among patients and staff, all of which can have significant negative effects on quality of care and patient safety. In addition, the staggering administrative costs created by a transient work force threaten health care organizations financial viability. One nurse retention strategy is to have newly hired nurses partake in Preceptorship. Precepting is a way to enculturate new employees into their role. Also good professional, collegial relationship between an experienced nurse and a newly hired nurse relations was evidenced. This study demonstrates impact of preceptor program on absconding rate, employee satisfaction & Patient satisfaction. Purpose of study: To decrease absconding rate. Objective: 1. To reduce the high absconding rate among nurses in Aster Medcity (AMC). 2. To facilitate the acclimatization of the newly hired nurse into their role, focusing on professional growth, inter-professional relationships and clinical skills required for the job. Methodology: Descriptive study by Convenience sampling method and collect data by direct observation, questionnaire, interviews. Sample size as per Sample size statistical table at 95 % CI. We conducted a pre and post intervention analysis to assess the impact of Preceptorship at AMC, with a daily occupancy of approx. 300 patients. Result: Preceptor program has had a significant improvement positive impact on all measured parameters. Absconding rate came down from 20% to 0% (P= 0.001). Patient satisfaction scores rose from 85% to 95%. Employee satisfaction rose form 65% to 85%. Conclusion: The project proved that Preceptor Development Programme and the steps taken in hand holding of the new joinees were effective in reducing the absconding rate among nurses and improved the overall satisfaction of new nurses. Preceptee satisfaction with the preceptorship experience was correlated with favorable evaluation of the relationship between the preceptee and preceptor. These findings indicate that when preceptors and preceptees have the benefit of formal preceptorship programs that are well supported, and when the preceptors’ efforts are rewarded, satisfaction is enhanced for both participants, preceptor commitment to the role is reinforced.Keywords: absconding rate, preceptor, employee satisfaction index, satisfaction index
Procedia PDF Downloads 3051663 Talking to Ex-Islamic State Fighters inside Iraqi Prisons: An Arab Woman’s Perspective on Radicalization and Deradicalization
Authors: Suha Hassen
Abstract:
This research aims to untangle the complexity of conducting face-to-face interviews with 80 ex-Islamic State fighters, encompassing three groups: local Iraqis, Arabs from the Middle East, and international fighters from around the globe. Each interview lasted approximately two hours and was conducted in both Arabic and English, focusing on the motivations behind joining the Islamic State and the pathways and mechanisms facilitating their involvement. The phenomenon of individuals joining violent Islamist extremist and jihadist organizations is multifaceted, drawing substantial attention within terrorism and security studies. Organizations such as the Islamic State, Hezbollah, Hamas, and Al-Qaeda pose formidable threats to international peace and stability, employing various terrorist tactics for radicalization and recruitment. However, significant gaps remain in current studies, including a lack of firsthand accounts, an inadequate understanding of original narratives (religious and linguistic) due to abstraction and misinterpretation of motivations, and a lack of Arab women's perspectives from the region. This study addresses these gaps by exploring the cultural, religious, and historical complexities that shape the narratives of ex-ISIS fighters. The paper will showcase three distinct cases: one French prisoner, one Moroccan fighter, and a local Iraqi, illustrating the diverse motivations and experiences that contribute to joining and leaving extremist groups. The findings provide valuable insights into the nuanced dynamics of radicalization, emphasizing the need for gender-sensitive approaches in counter-terrorism strategies and deradicalization programs. Importantly, this research has practical implications for counter-narrative policies and early-stage prevention of radicalization. By understanding the narratives used by ex-fighters, policymakers can develop targeted counter-narratives that disrupt recruitment efforts. Additionally, insights into the mechanisms of radicalization can inform early intervention programs, helping to identify and support at-risk individuals before they become entrenched in extremist ideologies. Ultimately, this research enhances our understanding of the individual experiences of ex-ISIS fighters and calls for a reevaluation of the narratives surrounding women’s roles in extremism and recovery.Keywords: Arab women in extremism, counter-narrative policy, ex-ISIS fighters in Iraq, radicalization
Procedia PDF Downloads 211662 The Effect of Psychological Capital and Psychological Empowerment on Employees' Commitment to Change
Authors: Muthmainah Mufidah, Wustari L. H. Mangundjaya
Abstract:
Organizations nowadays have to change and adjust themselves to the changing external environment in order to survive the globalization era. However, not all the organizational change had been succeeded. Commitment to change is one important factor why the change process often failed. Even so, this commitment to change cannot be separated with the individual’s characteristic. The aim of this study is to identify the role of psychological capital and psychological empowerment as the individual’s positive characteristic on commitment to change. This research was conducted on Indonesian employees who have or are currently experiencing a change in their organization. Data was collected using Commitment to Change Inventory, Psychological Empowerment Questionnaire, and Psychological Capital Questionnaire. The results showed that both psychological capital and psychological empowerment have a positive and significant influence on commitment to change.Keywords: commitment to change, psychological capital, psychological empowerment, organizational change
Procedia PDF Downloads 3231661 Effect of Institutional Structure on Project Managers Performance in Construction Projects: A Case Study in Nigeria
Authors: Ebuka Valentine Iroha, Tsunemi Watanabe, Satoshi Tsuchiya
Abstract:
Project management practices play an important role in construction project performance and are one of project managers' essential key performance indicators. Previous studies have explored the poor performance of the construction industry, with project delays and cost overruns identified to contribute largely to numerous abandoned projects. These challenges are attributed to insufficient project management practices and a lack of utilization of project managers. The actual causes of inadequate project management practices and underutilization of project managers have been rarely discussed. This study tends to bridge the gap by identifying and assessing the actual causes of insufficient project management practices and underutilization of project managers. This study differs from past studies investigating the causes of poor performance by using institutional analysis methods to identify and analyze the factors influencing project management practices and proper utilization of project managers. Based on a comprehensive literature review, this study identified some factors embedded in the construction industry that influence the institutional environment and weaken the laws and regulations. These factors were used as the basis for semi-structured interview questions to investigate their impacts on project management practices and project managers. The data collected were coded into a four-level framework for institutional analysis. This method was used to analyze the interrelationships between the identified embedded factors, institutional laws and regulations, and construction organizations to understand how these influences result in the underutilization of project managers. The study found that the underutilization of project managers consists of two subsystems, including underutilization and lowering commitment. The first subsystem, corruption, political influence, religious and tribal discrimination, and organizational culture, were found to affect the institutional structure. These embedded factors weaken the industry’s governance mechanism, forcing project managers to prioritize corrupt practices over project demands. The ineffectiveness of the existing laws and regulations worsens the situation, supporting unfair working conditions and contributing to the underperformance of project managers. This situation leads to the development of the second subsystem, which is characterized by a lack of opportunities for career development and minimal incentives within construction organizations. The findings provide significant potential for addressing systemic challenges in the construction industry, particularly the underutilization of project managers and enhancing organizational support measures to improve project management practices and mitigate the adverse effects of corruption.Keywords: construction industry, project management, poor performance, embedded factors, project managers underutilization
Procedia PDF Downloads 351660 Method for Selecting and Prioritising Smart Services in Manufacturing Companies
Authors: Till Gramberg, Max Kellner, Erwin Gross
Abstract:
This paper presents a comprehensive investigation into the topic of smart services and IIoT-Platforms, focusing on their selection and prioritization in manufacturing organizations. First, a literature review is conducted to provide a basic understanding of the current state of research in the area of smart services. Based on discussed and established definitions, a definition approach for this paper is developed. In addition, value propositions for smart services are identified based on the literature and expert interviews. Furthermore, the general requirements for the provision of smart services are presented. Subsequently, existing approaches for the selection and development of smart services are identified and described. In order to determine the requirements for the selection of smart services, expert opinions from successful companies that have already implemented smart services are collected through semi-structured interviews. Based on the results, criteria for the evaluation of existing methods are derived. The existing methods are then evaluated according to the identified criteria. Furthermore, a novel method for the selection of smart services in manufacturing companies is developed, taking into account the identified criteria and the existing approaches. The developed concept for the method is verified in expert interviews. The method includes a collection of relevant smart services identified in the literature. The actual relevance of the use cases in the industrial environment was validated in an online survey. The required data and sensors are assigned to the smart service use cases. The value proposition of the use cases is evaluated in an expert workshop using different indicators. Based on this, a comparison is made between the identified value proposition and the required data, leading to a prioritization process. The prioritization process follows an established procedure for evaluating technical decision-making processes. In addition to the technical requirements, the prioritization process includes other evaluation criteria such as the economic benefit, the conformity of the new service offering with the company strategy, or the customer retention enabled by the smart service. Finally, the method is applied and validated in an industrial environment. The results of these experiments are critically reflected upon and an outlook on future developments in the area of smart services is given. This research contributes to a deeper understanding of the selection and prioritization process as well as the technical considerations associated with smart service implementation in manufacturing organizations. The proposed method serves as a valuable guide for decision makers, helping them to effectively select the most appropriate smart services for their specific organizational needs.Keywords: smart services, IIoT, industrie 4.0, IIoT-platform, big data
Procedia PDF Downloads 861659 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 851658 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures
Authors: Serkan Yağlı, Selçuk Dal
Abstract:
Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO
Procedia PDF Downloads 2421657 Specialised Centres in TERI Knowledge Resource Centre
Authors: Pallavi Singh
Abstract:
Developing library knowledge centres involves transforming traditional library spaces into dynamic, interactive environments that support collaborative learning, digital literacy, and access to various resources. Knowledge centres, also known as knowledge hubs or centres of excellence, play a crucial role in organizations and communities by serving as repositories of expertise and information. The Energy and Resources Institute (TERI) is a research organisation dedicated to sustainable community solutions. TERI Knowledge Resource Center is also aligned with the objective of the host organization within TERI; there are several specialized knowledge centers dedicated to various aspects of sustainability, energy, climate change, environmental management, green mobility, etc.Keywords: knowledge centres, environmental management, green mobility, energy
Procedia PDF Downloads 51656 Profit and Nonprofit Sports Clubs, Financial and Organizational Comparison in Poland
Authors: Igor Perechuda, Wojciech Cieśliński
Abstract:
The paper identifies the features of Polish sports clubs in the particular organizational forms: profit and nonprofit. Identification and description of these features is carried out in terms of financial efficiency of the given organizational form. Under the terms of the efficiency the research allows you to specify the advantages of particular organizational sports club form and the following limitations. Paper considers features of sports clubs in range of Polish conditions as legal regulations. The sources of the functioning efficiency of sports clubs may lie in the organizational forms in which they operate. Each of the available forms can be considered either a for-profit or nonprofit enterprise. Depending on this classification there are different capabilities of increasing organizational and financial efficiency of a given sports club. Authors start with general classification and difference between for-profit and non-profit sport clubs. Next identifies specific financial and organizational conditions of both organizational form and then show examples of mixed activity forms and their efficiency effect.Keywords: financial efficiency, for-profit, non-profit, sports club
Procedia PDF Downloads 5461655 The Influence of Work Experience on Conflict Management Styles of Organizational Members
Authors: Faris Alghamdi
Abstract:
Identifying which conflict management styles organizational members prefer, and what variables influence these selections, is an essential component of organizational conflict management as well as human resource management, particularly in training and development strategies. This study aims to examine the relationship between work experience and preferred conflict management styles. Utilizing the Rahim Organizational Conflict Inventory- II Form C, data were collected from 109 full-time employees of various organizations in the Eastern province of Saudi Arabia. The Pearson’s correlation coefficient analysis showed a statistically significant relationship between the integrating conflict management style and the length of work experience. Nevertheless, this relationship was negative, not positive as hypothesized.Keywords: conflict management style, organizational members, work experience
Procedia PDF Downloads 4071654 Baseline Study of Water Quality in Indonesia Using Dynamic Methods and Technologies
Authors: R. L. P. de Lima, F. C. B. Boogaard, D. Setyo Rini, P. Arisandi, R. E. de Graaf-Van Dinther
Abstract:
Water quality in many Asian countries is very poor due to inefficient solid waste management, high population growth and the lack of sewage and purification systems for households and industry. A consortium of Indonesian and Dutch organizations has begun a large-scale international research project to evaluate and propose solutions to face the surface water pollution challenges in Brantas Basin, Indonesia (East Java: Malang / Surabaya). The first phase of the project consisted in a baseline study to assess the current status of surface water bodies and to determine the ambitions and strategies among local stakeholders. This study was conducted with high participatory / collaborative and knowledge sharing objectives. Several methods such as using mobile sensors (attached to boats or underwater drones), test strips and mobile apps, bio-monitoring (sediments), ecology scans using underwater cameras, or continuous / static measurements, were applied in different locations in the regions of the basin, at multiple locations within the water systems (e.g. spring, upstream / downstream of industry and urban areas, mouth of the Surabaya River, groundwater). Results gave an indication of (reference) values of basic water quality parameters such as turbidity, electrical conductivity, dissolved oxygen or nutrients (ammonium / nitrate). An important outcome was that collecting random samples may not be representative of a body of water, given that water quality parameters can vary widely in space (x, y, and depth) and time (day / night and seasonal). Innovative / dynamic monitoring methods (e.g. underwater drones, sensors on boats) can contribute to better understand the quality of the living environment (water, ecology, sediment) and factors that affect it. The field work activities, in particular, underwater drones, revealed potential as awareness actions as they attracted interest from locals and local press. This baseline study involved the cooperation with local managing organizations with Dutch partners, and their willingness to work together is important to ensure participatory actions and social awareness regarding the process of adaptation and strengthening of regulations, or for the construction of facilities such as sewage.Keywords: water quality monitoring, pollution, underwater drones, social awareness
Procedia PDF Downloads 1911653 Big Data Strategy for Telco: Network Transformation
Abstract:
Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating churn and declining revenue per user. Big Data presents new method to reverse the way and improve profitability. The benefits of Big Data and next-generation network, however, are more exorbitant than improved customer relationship management. Next generation of networks are in a prime position to monetize rich supplies of customer information—while being mindful of legal and privacy issues. As data assets are transformed into new revenue streams will become integral to high performance.Keywords: big data, next generation networks, network transformation, strategy
Procedia PDF Downloads 3591652 Measuring Systems Interoperability: A Focal Point for Standardized Assessment of Regional Disaster Resilience
Authors: Joel Thomas, Alexa Squirini
Abstract:
The key argument of this research is that every element of systems interoperability is an enabler of regional disaster resilience, and arguably should become a focal point for standardized measurement of communities’ ability to work together. Few resilience research efforts have focused on the development and application of solutions that measurably improve communities’ ability to work together at a regional level, yet a majority of the most devastating and disruptive disasters are those that have had a regional impact. The key findings of the research include a unique theoretical, mathematical, and operational approach to tangibly and defensibly measure and assess systems interoperability required to support crisis information management activities performed by governments, the private sector, and humanitarian organizations. A most effective way for communities to measurably improve regional disaster resilience is through deliberately executed disaster preparedness activities. Developing interoperable crisis information management capabilities is a crosscutting preparedness activity that greatly affects a community’s readiness and ability to work together in times of crisis. Thus, improving communities’ human and technical posture to work together in advance of a crisis, with the ultimate goal of enabling information sharing to support coordination and the careful management of available resources, is a primary means by which communities may improve regional disaster resilience. This model describes how systems interoperability can be qualitatively and quantitatively assessed when characterized as five forms of capital: governance; standard operating procedures; technology; training and exercises; and usage. The unique measurement framework presented defines the relationships between systems interoperability, information sharing and safeguarding, operational coordination, community preparedness and regional disaster resilience, and offers a means by which to implement real-world solutions and measure progress over the course of a multi-year program. The model is being developed and piloted in partnership with the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) and the North Atlantic Treaty Organization (NATO) Advanced Regional Civil Emergency Coordination Pilot (ARCECP) with twenty-three organizations in Bosnia and Herzegovina, Croatia, Macedonia, and Montenegro. The intended effect of the model implementation is to enable communities to answer two key questions: 'Have we measurably improved crisis information management capabilities as a result of this effort?' and, 'As a result, are we more resilient?'Keywords: disaster, interoperability, measurement, resilience
Procedia PDF Downloads 1421651 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 281650 Rohingya Problem and the Impending Crisis: Outcome of Deliberate Denial of Citizenship Status and Prejudiced Refugee Laws in South East Asia
Authors: Priyal Sepaha
Abstract:
A refugee crisis is manifested by challenges, both for the refugees and the asylum giving state. The situation turns into a mega-crisis when the situation is prejudicially handled by the home state, inappropriate refugee laws, exploding refugee population, and above all, no hope of any foreseeable solution or remedy. This paper studies the impact on the capability of stateless Rohingyas to migrate and seek refuge due to the enforcement of rigid criteria of movement imposed both by Myanmar as well as the adjoining countries in the name of national security. This theoretical study identifies the issues and the key factors and players which have precipitated the crisis. It further discusses the possible ramifications in the home, asylum giving, and the adjoining countries for not discharging their roles aptly. Additionally, an attempt has been made to understand the scarce response given to the impending crisis by the regional organizations like SAARC, ASEAN and CHOGAM as well as international organizations like United Nations Human Rights Council, Security Council, Office of High Commissioner for Refugees and so on, in the name of inadequacy of monetary funds and physical resources. Based on the refugee laws and practices pertaining to the case of Rohingyas, this paper analyses that the Rohingya Crisis is in dire need of an effective action plan to curb and resolve the biggest humanitarian crisis situation of the century. This mounting human tragedy can be mitigated permanently, by strengthening existing and creating new interdependencies among all stakeholders, as further ignorance can drive the countries of the Indian Sub-continent, in particular, and South East Asia, by and large into a violent civil war for seizing long-awaited civil rights by the marginalized Rohingyas. To curb this mass crisis, it will require the application of coercive pressure and diplomatic pursuance on the home country to acknowledge the rights of its fleeing citizens. This further necessitates mustering adequate monetary funds and physical resources for the asylum providing state. Additional challenges such as devising mechanisms for the refugee’s safe return, comprehensive planning for their holistic economic development and rehabilitation plan are needed. These, however, can only come into effect with a conscious strive by the regional and international community to fulfil their assigned role.Keywords: asylum, citizenship, crisis, humanitarian, human rights, refugee, rohingya
Procedia PDF Downloads 1311649 Critical Success Factors of Information Technology Projects
Authors: Athar Imtiaz, Abduljalil S. Al-Mudhary, Taha Mirhashemi, Roslina Ibrahim
Abstract:
Information Technology (IT) is being used by almost all organizations throughout the world. However, its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study, previous literature that has looked into these success promoting factors have been critically reviewed and analyzed. Fifteen critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.Keywords: critical success factors, CSF, IT projects, IS projects, software development projects
Procedia PDF Downloads 3971648 Ethnic and National Determinants in the Process of Building Peace in Afghanistan After the Withdrawal of Western Forces in 2021
Authors: Małgorzata Cichy
Abstract:
Afghanistan is a source of conflicts that affect security on a global scale. The role of ethnic and national determinants in the peacebuilding process in this country remains an extremely important factor in this respect. Research methods include literature and data analysis (scientific literature, documents of governmental and non-governmental organizations, statistical data and media reports), institutional and legal analysis, as well as decision-making method. The main objective of the research is a comprehensive answer to the question of how ethnic and national factors affect the process of building peace in Afghanistan after 2021 and what impact it has on international security.Keywords: Afghanistan, pashtuns, peace, taliban
Procedia PDF Downloads 941647 Promoting Innovation Pedagogy in a Capacity Building Project in Indonesia
Authors: Juha Kettunen
Abstract:
This study presents a project that tests and adjusts active European learning and teaching methods in Indonesian universities to increase their external impact on enterprises and other organizations; it also assesses the implementation of the Erasmus+ projects funded by the European Union. The project is based on the approach of innovation pedagogy that responds to regional development needs and integrates applied research and development projects into education to create capabilities for students to participate in development work after graduation. The assessment of the Erasmus+ project resulted in many improvements that can be made to achieve higher quality and innovativeness. The results of this study are useful for those who want to improve the applied research and development projects of higher education institutions.Keywords: higher education, innovations, social network, project management
Procedia PDF Downloads 2851646 Measurement and Evaluation Patterns Practiced by Physical Education Teachers in North Badia in Jordan
Authors: Aman Kasawneh, Wasfi Khazalah, Abedalbasit Abedalhafiz
Abstract:
This study aimed to identify the patterns of measurement and evaluation practiced by physical education in the schools of North Badia in Jordan, as well as identifying the statistical differences according to gender, educational qualification, and the experience. The sample consisted of 118 physical education teachers 58 males and 60 females chosen randomly from the schools of North Badia in Jordan. The completed a questionnaire developed by the researchers after verifying its validity and reliability. The results indicated a clear weakness in the practice of measurement and evaluation patterns by physical education teachers. Also no significant differences were found between male and female teachers, however, significant differences were found between bachelor degree holders and their counter parts and between teachers with less than eight years of experience. The researchers recommended the necessity of preparing the P.E teachers regarding the patterns of measurement and evaluation within the sport field as one of the essentials for improving and developing physical education at schools.Keywords: evaluation, measurement, evaluation, physical education teacher, Jordanian
Procedia PDF Downloads 4571645 Insider Theft Detection in Organizations Using Keylogger and Machine Learning
Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.
Abstract:
About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.Keywords: cyber security, machine learning, cyclic process, email notification
Procedia PDF Downloads 561644 The Impact of Electronic Commerce on Organisational Efectiveness: A Study of Zenith Bank Plc
Authors: Olusola Abiodun Arinde
Abstract:
This research work was prompted by the very important role e-commerce plays in every organization, be it private or public. The underlying objective of this study is to have a critical appraisal of the extent to which e-commerce impacts on organizational effectiveness. This research was carried out using Zenith Bank Plc as a case study. Relevant data were collected through structured questionnaire, oral interview, journals, newspapers, and textbooks. The data collected were analyzed and hypotheses were tested. Based on the result of the hypotheses, it was observed that e-commerce is significant to every organization. Through e-commerce, fast services delivery would be guaranteed to customers, this would lead to higher productivity and profit for organizations. E-commerce should be managed in such a way that it does not alienate customers; it should also prevent enormous risks that are associated with e-commerce.Keywords: e-commerce, fast service, productivity, profit
Procedia PDF Downloads 2441643 Development of Enhanced Data Encryption Standard
Authors: Benjamin Okike
Abstract:
There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.Keywords: encryption, enhanced data encryption, encryption techniques, information security
Procedia PDF Downloads 1481642 Validation of a Questionnaire to Measure Fluid Experience in Practical Shooting and Its Relationship with Sports Performance
Authors: Nelson Lay, Felipe Vallejo
Abstract:
The objective of this study is to determine the psychometric properties of a questionnaire to measure Fluid Experience in the practical sport shooting. Also, associate this variable with the performance levels of a group of athletes who are competitors in the discipline. The study included the participation of 18 shooters belonging to sports shooting clubs. Initially semi-structured interviews were conducted to observe the manifestation of the dimensions of the Fluid Experience. Based on these interviews, a self-report sheet was elaborated (feedback sheet). Then, through a correlational design, the association between the elaborated Fluid Experience Psychometric Questionnaire, the score assigned to the responses of the feedback sheet and the scores of the round of shots made by the participants was evaluated. The data were collected, on two different occasions, which implied a variation in the score of the Fluid Experience Questionnaire for each subject in both executions. The results showed a positive association between variations in sports performance and those of the Fluid Experience level.Keywords: flow psychology, sports psychology, states of conscience, sports performance
Procedia PDF Downloads 2531641 Application of Balance Score Card (BSc) in Education: Case of the International University
Authors: Hieu Nguyen
Abstract:
Performance management is the concern of any organizations in the context of increasing demand and fierce competition between education institution. This paper draws together the performance management concepts and focuses specifically to Balance Scorecard in the context of education. The study employs semi-structured in-depth interview to explore the measurement items for each of the sub-objectives in the four perspectives. Each of the perspectives’ explored measurement items will then be discussed the role and influence of them towards the perspective and how to improve the measurements to have improved performance management. Finally, the measurements will be put together as a suggested balanced scorecard framework in the case of International University.Keywords: performance management, education institution, balance scorecard, measurement items, four perspectives, international univeristy
Procedia PDF Downloads 4101640 Prototyping Exercise for the Construction of an Ancestral Violentometer in Buenaventura, Valle Del Cauca
Authors: Mariana Calderón, Paola Montenegro, Diana Moreno
Abstract:
Through this study, it was possible to identify the different levels and types of violence, both individual and collective, experienced by women, girls, and the sexually diverse population of Buenaventura translated from the different tensions and threats against ancestrality and accounting for a social and political context of violence related to race and geopolitical location. These threats are related to: the stigma and oblivion imposed on practices and knowledge; the imposition of the hegemonic culture; the imposition of external customs as a way of erasing ancestrality; the singling out and persecution of those who practice it; the violence that the health system has exercised against ancestral knowledge and practices, especially in the case of midwives; the persecution of the Catholic religion against this knowledge and practices; the difficulties in maintaining the practices in the displacement from rural to urban areas; the use and control of ancestral knowledge and practices by the armed actors; the rejection and stigma exercised by the public forces; and finally, the murder of the wise women at the hands of the armed actors. This research made it possible to understand the importance of using tools such as the violence meter to support processes of resistance to violence against women, girls, and sexually diverse people; however, it is essential that these tools be adapted to the specific contexts of the people. In the analysis of violence, it was possible to identify that these not only affect women, girls, and sexually diverse people individually but also have collective effects that threaten the territory and the ancestral culture to which they belong. Ancestrality has been the object of violence, but at the same time, it has been the place from which resistance has been organized. The identification of the violence suffered by women, girls, and sexually diverse people is also an opportunity to make visible the forms of resistance of women and communities in the face of this violence. This study examines how women, girls, and sexually diverse people in Buenaventura have been exposed to sexism and racism, which historically have been translated into specific forms of violence, in addition to the other forms of violence already identified by the traditional models of the violentometer. A qualitative approach was used in the study. The study included the participation of more than 40 people and two women's organizations from Buenaventura. The participants came from both urban and rural areas of the municipality of Buenaventura and were over 15 years of age. The participation of such a diverse group allowed for the exchange of knowledge and experiences, particularly between younger and older people. The instrument used for the exercise was previously defined with the leaders of the organizations and consisted of four moments that referred to i) ancestry, ii) threats to ancestry, iii) identification of resistance and iv) construction of the ancestral violentometer.Keywords: violence against women, intersectionality, sexual and reproductive rights, black communities
Procedia PDF Downloads 801639 Release Management with Continuous Delivery: A Case Study
Authors: A. Maruf Aytekin
Abstract:
We present our approach on using continuous delivery pattern for release management. One of the key practices of agile and lean teams is the continuous delivery of new features to stakeholders. The main benefits of this approach lie in the ability to release new applications rapidly which has real strategic impact on the competitive advantage of an organization. Organizations that successfully implement Continuous Delivery have the ability to evolve rapidly to support innovation, provide stable and reliable software in more efficient ways, decrease the amount of resources need for maintenance, and lower the software delivery time and costs. One of the objectives of this paper is to elaborate a case study where IT division of Central Securities Depository Institution (MKK) of Turkey apply Continuous Delivery pattern to improve release management process.Keywords: automation, continuous delivery, deployment, release management
Procedia PDF Downloads 2551638 The Interaction and Relations Between Civil and Military Logistics
Authors: Cumhur Cansever, Selcuk Er
Abstract:
There is an increasing cooperation and interaction between the military logistic systems and civil organizations operating in today's market. While the scope and functions of civilian logistics have different characteristics, military logistics tries to import some applications that are conducted by private sectors successfully. Also, at this point, the determination of the optimal point of integration and interaction between civilian and military logistics has emerged as a key issue. In this study, the mutual effects between military and civilian logistics and their most common integration areas, (Supply Chain Management (SCM), Integrated Logistics Support (ILS) and Outsourcing) will be examined with risk analysis and determination of basic skills evaluation methods for determining the optimum point in the integration.Keywords: core competency, integrated logistics support, outsourcing, supply chain management
Procedia PDF Downloads 5251637 Digitalized Public Sector Practices: Opportunities for Open Innovation in Rwanda
Authors: Reem Abou Refaie, Christoph Meinel
Abstract:
The paper explores the impact of the COVID-19 crisis on the internal as well as external digitalized work practices of public service providers as part of a Public-Private Partnership Model. It focuses on the effect of uncertainty on generating Open Innovation practices. Our inquiry relies on semi-structured interviews (n=14) from a case study of Rwanda’s Public Service Delivery System in the context of research cooperation with IremboGov, the country’s One-Stop-Shop Platform for public services. It presents four propositions on harnessing opportunities for OI in the context of the public sector beyond the pandemic response. Practitioners can find characterizations of OI opportunities and gain insights on fostering OI in Public Sector Organizations.Keywords: open innovation, digital transformation, public sector, Rwanda
Procedia PDF Downloads 1271636 The Role of Education (Tarbiyyah) in the Religio-Political Organization
Authors: Muhaimin Bin Sulam, Abdul Mutalib Embong, Azelin Mohamed Noor
Abstract:
This paper presents the reinvention of the role of education (tarbiyyah) in the social influence of organizations focusing on the sustainability of a specific religio-political organization. The objective of the paper is to describe how the position secured by education could transform the organization while maintaining its objective and vision. The study employed the qualitative approach that involves data from conducted interviews. An analysis on the role political leaders play in educating the organization in the context of ideological struggle is also analyzed. The process description also evaluates how education could intellectualize its followers and members which inspires them to submit to their leaders and the organization. This extensive cultivation of religio-political doctrine could offer a new interpretation on politics.Keywords: religiopolitical organization, Malaysia, education (Tarbiyyah), followers, political movement
Procedia PDF Downloads 481