Search results for: public relations activities
11214 Reconceptualizing “Best Practices” in Public Sector
Authors: Eftychia Kessopoulou, Styliani Xanthopoulou, Ypatia Theodorakioglou, George Tsiotras, Katerina Gotzamani
Abstract:
Public sector managers frequently herald that implementing best practices as a set of standards, may lead to superior organizational performance. However, recent research questions the objectification of best practices, highlighting: a) the inability of public sector organizations to develop innovative administrative practices, as well as b) the adoption of stereotypical renowned practices inculcated in the public sector by international governance bodies. The process through which organizations construe what a best practice is, still remains a black box that is yet to be investigated, given the trend of continuous changes in public sector performance, as well as the burgeoning interest of sharing popular administrative practices put forward by international bodies. This study aims to describe and understand how organizational best practices are constructed by public sector performance management teams, like benchmarkers, during the benchmarking-mediated performance improvement process and what mechanisms enable this construction. A critical realist action research methodology is employed, starting from a description of various approaches on best practice nature when a benchmarking-mediated performance improvement initiative, such as the Common Assessment Framework, is applied. Firstly, we observed the benchmarker’s management process of best practices in a public organization, so as to map their theories-in-use. As a second step we contextualized best administrative practices by reflecting the different perspectives emerged from the previous stage on the design and implementation of an interview protocol. We used this protocol to conduct 30 semi-structured interviews with “best practice” process owners, in order to examine their experiences and performance needs. Previous research on best practices has shown that needs and intentions of benchmarkers cannot be detached from the causal mechanisms of the various contexts in which they work. Such causal mechanisms can be found in: a) process owner capabilities, b) the structural context of the organization, and c) state regulations. Therefore, we developed an interview protocol theoretically informed in the first part to spot causal mechanisms suggested by previous research studies and supplemented it with questions regarding the provision of best practice support from the government. Findings of this work include: a) a causal account of the nature of best administrative practices in the Greek public sector that shed light on explaining their management, b) a description of the various contexts affecting best practice conceptualization, and c) a description of how their interplay changed the organization’s best practice management.Keywords: benchmarking, action research, critical realism, best practices, public sector
Procedia PDF Downloads 12711213 The Attitudes towards English Relative to Other Languages in Indonesia: Discrepancies between Policy and Usage
Authors: Rani Silvia
Abstract:
English has surpassed other languages to become the most widely taught and studied foreign language in Indonesia. This reflects the tendency of the Indonesian public to participate in global mainstream culture, which is longstanding but has been greatly facilitated by the widespread availability of television, the traditional media, and more recently the Internet and social media. However, despite increasing exposure and a history of teaching and study, mastery of English remains low, even as interest and perceived importance continue to increase. This along with Indonesia’s extremely complex linguistic environment has increased the status and value associated with the use of English and is changing the dynamic of language use nationwide. This study investigates the use of English in public settings in Indonesia as well as the attitudes of Indonesian speakers towards English. A case study was developed to explicate this phenomenon in a major Indonesian city. Fifty individuals, including both professionals and lay people, were interviewed about their language preferences as well as their perceptions about English as compared to other languages, such as the local language, Indonesian as the national language, and other foreign languages. Observations on the use of language in the public environment in advertising, signs, and other forms of public expression were analyzed to identify language preferences at this level and their relationship to current language policy. This study has three major findings. First, Indonesian speakers have more positive attitudes towards English than other languages; second, English has encroached on domains in which Indonesian should be used; and third, perceived awareness of the importance of Indonesian as an introduced national language seems to be declining to suggest a failure of policy. The study includes several recommendations for the future development of language planning in determining and directing language use in a public context in Indonesia.Keywords: English, Indonesia, language attitudes, language policy
Procedia PDF Downloads 11311212 Medium Composition for the Laboratory Production of Enzyme Fructosyltransferase (FTase)
Authors: O. R. Raimi, A. Lateef
Abstract:
Inoculum developments of A. niger were used for inoculation of medium for submerged fermentation and solid state fermentation. The filtrate obtained were used as sources of the extra-cellular enzymes. The FTase activities and the course of pH in submerged fermentation ranged from 7.53-24.42µ/ml and 4.4-4.8 respectively. The maximum FTase activity was obtained at 48 hours fermentation. In solid state fermentation, FTase activities ranged from 2.41-27.77µ/ml. Using ripe plantain peel and kola nut pod respectively. Both substrates supported the growth of the fungus, producing profuse growth during fermentation. In the control experiment (using kolanut pod) that lack supplementation, appreciable FTase activity of 16.92µ/ml was obtained. The optimum temperature range was 600C. it was also active at broad pH range of 1-9 with optimum obtain at pH of 5.0. FTase was stable within the range of investigated pH showing more than 60% activities. FTase can be used in the production of fructooligosaccharide, a functional food.Keywords: Aspergillus niger, solid state fermentation, kola nut pods, Fructosyltransferase (FTase)
Procedia PDF Downloads 45611211 Antioxidant Potential and Inhibition of Key Enzymes Linked to Alzheimer's Diseases and Diabetes Mellitus by Monoterpene-Rich Essential Oil from Sideritis Galatica Bornm. Endemic to Turkey
Authors: Gokhan Zengin, Cengiz Sarikurkcu, Abdurrahman Aktumsek, Ramazan Ceylan
Abstract:
The present study was designated to characterize the essential oil from S. galatica (SGEOs) and evaluate its antioxidant and enzyme inhibitory activities. Antioxidant capacity were tested different methods including free radical scavenging (DPPH, ABTS and NO), reducing power (FRAP and CUPRAC), metal chelating and phosphomolybdenum. Inhibitory activities were analyzed on acetylcholiesterase, butrylcholinesterase, α-amylase and α-glucosidase. SGEOs were chemically analyzed and identified by gas chromatography (GC) and gas chromatography/mass spectrophotometry (GC/MS). 23 components, representing 98.1% of SGEOs were identified. Monoterpene hydrocarbons (74.1%), especially α- (23.0%) and β-pinene (32.2%), were the main constituents in SGEOs. The main sesquiterpene hydrocarbons were β-caryophyllene (16.9%), Germacrene-D (1.2%) and Caryophyllene oxide (1.2%), respectively. Generally, SGEOs has shown moderate free radical, reducing power, metal chelating and enzyme inhibitory activities. These activities related to chemical profile in SGEOs. Our findings supported that the possible utility of SGEOs is a source of natural agents for food, cosmetics or pharmaceutical industries.Keywords: sideritis galatica, antioxidant, monoterpenes, cholinesterase, anti-diabetic
Procedia PDF Downloads 43811210 Personality Based Tailored Learning Paths Using Cluster Analysis Methods: Increasing Students' Satisfaction in Online Courses
Authors: Orit Baruth, Anat Cohen
Abstract:
Online courses have become common in many learning programs and various learning environments, particularly in higher education. Social distancing forced in response to the COVID-19 pandemic has increased the demand for these courses. Yet, despite the frequency of use, online learning is not free of limitations and may not suit all learners. Hence, the growth of online learning alongside with learners' diversity raises the question: is online learning, as it currently offered, meets the needs of each learner? Fortunately, today's technology allows to produce tailored learning platforms, namely, personalization. Personality influences learner's satisfaction and therefore has a significant impact on learning effectiveness. A better understanding of personality can lead to a greater appreciation of learning needs, as well to assists educators ensure that an optimal learning environment is provided. In the context of online learning and personality, the research on learning design according to personality traits is lacking. This study explores the relations between personality traits (using the 'Big-five' model) and students' satisfaction with five techno-pedagogical learning solutions (TPLS): discussion groups, digital books, online assignments, surveys/polls, and media, in order to provide an online learning process to students' satisfaction. Satisfaction level and personality identification of 108 students who participated in a fully online learning course at a large, accredited university were measured. Cluster analysis methods (k-mean) were applied to identify learners’ clusters according to their personality traits. Correlation analysis was performed to examine the relations between the obtained clusters and satisfaction with the offered TPLS. Findings suggest that learners associated with the 'Neurotic' cluster showed low satisfaction with all TPLS compared to learners associated with the 'Non-neurotics' cluster. learners associated with the 'Consciences' cluster were satisfied with all TPLS except discussion groups, and those in the 'Open-Extroverts' cluster were satisfied with assignments and media. All clusters except 'Neurotic' were highly satisfied with the online course in general. According to the findings, dividing learners into four clusters based on personality traits may help define tailor learning paths for them, combining various TPLS to increase their satisfaction. As personality has a set of traits, several TPLS may be offered in each learning path. For the neurotics, however, an extended selection may suit more, or alternatively offering them the TPLS they less dislike. Study findings clearly indicate that personality plays a significant role in a learner's satisfaction level. Consequently, personality traits should be considered when designing personalized learning activities. The current research seeks to bridge the theoretical gap in this specific research area. Establishing the assumption that different personalities need different learning solutions may contribute towards a better design of online courses, leaving no learner behind, whether he\ she likes online learning or not, since different personalities need different learning solutions.Keywords: online learning, personality traits, personalization, techno-pedagogical learning solutions
Procedia PDF Downloads 10311209 'Explainable Artificial Intelligence' and Reasons for Judicial Decisions: Why Justifications and Not Just Explanations May Be Required
Authors: Jacquelyn Burkell, Jane Bailey
Abstract:
Artificial intelligence (AI) solutions deployed within the justice system face the critical task of providing acceptable explanations for decisions or actions. These explanations must satisfy the joint criteria of public and professional accountability, taking into account the perspectives and requirements of multiple stakeholders, including judges, lawyers, parties, witnesses, and the general public. This research project analyzes and integrates two existing literature on explanations in order to propose guidelines for explainable AI in the justice system. Specifically, we review three bodies of literature: (i) explanations of the purpose and function of 'explainable AI'; (ii) the relevant case law, judicial commentary and legal literature focused on the form and function of reasons for judicial decisions; and (iii) the literature focused on the psychological and sociological functions of these reasons for judicial decisions from the perspective of the public. Our research suggests that while judicial ‘reasons’ (arguably accurate descriptions of the decision-making process and factors) do serve similar explanatory functions as those identified in the literature on 'explainable AI', they also serve an important ‘justification’ function (post hoc constructions that justify the decision that was reached). Further, members of the public are also looking for both justification and explanation in reasons for judicial decisions, and that the absence of either feature is likely to contribute to diminished public confidence in the legal system. Therefore, artificially automated judicial decision-making systems that simply attempt to document the process of decision-making are unlikely in many cases to be useful to and accepted within the justice system. Instead, these systems should focus on the post-hoc articulation of principles and precedents that support the decision or action, especially in cases where legal subjects’ fundamental rights and liberties are at stake.Keywords: explainable AI, judicial reasons, public accountability, explanation, justification
Procedia PDF Downloads 12611208 The Impact of Funders on the Media Industry in the Kurdistan Region Iraqi
Authors: Abdulsamad Qadir Hussien
Abstract:
This paper examines the impact of funders on the media industry in the Kurdistan Region Iraqi (henceforth KRI). The key objectives of the study are also looking at: how the media industry funder influences the media organization and journalists’ practices in the Kurdish community; how the media organizations attempt to utilize the available capabilities to serve the goals of the funded entities, whether they are parties, NGOs, governments, commercial companies or have individual ownership of media institutes. Further, the research project seeks to discover the influence and role of the funder on the media content and determine the prioritizing that will broadcast on the media. Furthermore, the project tries to understand to what extent the media organizations have a commitment to achieve the public interest and public affairs by following the key ethical principles. The study also attempts to explain the situation of the public service media. These variables are measured through a survey questionnaire distributed among a sample of 108 journalists and media practitioners. This research project, therefore, explores a new topic for study in the Kurdish community regarding the media industry, funding, and financial support. This article adopted surveys (n=108) as data collection tools by using a statistical method (SPSS 21). The data of the study have been tabulated, coded, and presented in a descriptive form.Keywords: funding, journalists’ practices, Kurdish media industry, public services media
Procedia PDF Downloads 14411207 Binge Eating among Women Who Suffer from Psychological Abuse in Their Relationship: The Moderating Role of Defense Mechanisms
Authors: Orly Yona Drori, Shirley Ben Shlomo
Abstract:
Objectives: The participants will be able to recognize the predictors of binge eating addiction among women who suffer from psychological abuse in their relationships and will recognize the role of woman's defense mechanisms in moderating the association between psychological abuse and binge eating addiction. Methods: A convenience sample of 380 Israeli women in relationships were located via the Internet, and after consenting to participate in the study, they completed a series of structured questionnaires (The Yale Food Addiction Scale; The Defense Style Questionnaire; psychological maltreatment of women by their male partners; level of differentiation of self; sociodemographic questionnaire). Results: The higher the level of differentiation and mature defense mechanisms, the less addictive a woman is. However, the level of addiction among women who experience psychological abuse within their intimate relations is higher than women who do not experience psychological abuse in their relationship. Among women who experienced psychological abuse in their relations, the defense mechanisms moderate the association between psychological abuse within intimate relations and the extent of the addiction to binge eating. Conclusions: The study contributes to the therapy of women with binge eating addictions, as it raises awareness of therapeutic-related content that could strengthen women and help them to cope with situations in their lives without the need to binge. One of the significant variables for therapeutic work is the level of differentiation of the self. In addition, identifying the types of defense mechanisms might help to match treatment to the woman's emotional needs. The current study found also that it is important to identify the environmental systems by which the addict is surrounded, such as whether woman is in an abusive relationship. Finally the study leads to the recognition that binge eating, which is usually treated with an emphasis on nutritional behavior change, is an addiction, and as such, it requires a combination of mental, nutritional and behavioral therapy. In view of this approach, it is recommended that treating a woman who is addicted to binge eating should involve a multi-disciplinary team comprised of physicians, clinical dietitians, and clinical psychotherapists.Keywords: binge eating, defence mechanism, food addiction, psychological abuse
Procedia PDF Downloads 16911206 A Study of the Costs and Benefits of Smart City Projects Including the Scenario of Public-Private Partnerships
Authors: Patrick T. I. Lam, Wenjing Yang
Abstract:
A smart city project embraces benefits and costs which can be classified under direct and indirect categories. Externalities come into the picture, but they are often difficult to quantify. Despite this barrier, policy makers need to carry out cost-benefit analysis to justify the huge investments needed to make a city smart. The recent trend is towards the engagement of the private sector to utilize their resources and expertise, especially in the Information and Communication Technology (ICT) areas, where innovations blossom. This study focuses on the identification of costs (on a life cycle basis) and benefits associated with smart city project developments based on a comprehensive literature review and case studies, where public-private partnerships would warrant consideration, the related costs and benefits are highlighted. The findings will be useful for policy makers of cities.Keywords: smart city projects, costs and benefits, identification, public-private partnerships
Procedia PDF Downloads 33711205 The Impact of the Fitness Center Ownership Structure on the Service Quality Perception in the Fitness in Serbia
Authors: Dragan Zivotic, Mirjana Ilic, Aleksandra Perovic, Predrag Gavrilovic
Abstract:
As with the provision of other services, the service quality perception is one of the key factors that the modern manager must pay attention to. Countries in which the state regulation is in transition also have specific features in providing fitness services. Identification of the dimensions in which the most significant different service quality perception between different types of fitness centers, enables managers to profile the offer according to the wishes and expectations of users. The aim of the paper was the comparison of the quality of services perception in the field of fitness in Serbia between three categories of fitness centers: the privately owned centers, the publicly owned centers, and the Public-private partnership centers. For this research 350 respondents of both genders (174 men and 176 women) were interviewed, aged between 18 and 68 years, being beneficiaries of fitness services for at least 1 year. Administered questionnaire with 100 items provided information about the 15 basic areas in which they expressed the service quality perception in the gym. The core sample was composed of 212 service users in private fitness centers, 69 service users in public fitness centers and 69 service users in the public-private partnership. Sub-samples were equal in representation of women and men, as well as by age and length of use of fitness services. The obtained results were subject of univariate analysis with the Kruskal-Wallis non-parametric analysis of variance. Significant differences between the analyzed sub-samples were not found solely in the areas of rapid response and quality outcomes. In the multivariate model, the results were processed by backward stepwise discriminant analysis that extracted 3 areas that maximize the differences between sub-samples: material and technical basis, secondary facilities and coaches. By applying the classification function 93.87% of private centers services users, 62.32% of public centers services users and 85.51% of the public-private partnership centers users of services were correctly classified (total 86.00%). These results allow optimizing the allocation of the necessary resources in profiling offers of a fitness center in order to optimally adjust it to the user’s needs and expectations.Keywords: fitness, quality perception, management, public ownership, private ownership, public-private partnership, discriminative analysis
Procedia PDF Downloads 29311204 Analyzing the Characteristics and Shifting Patterns of Creative Hubs in Bandung
Authors: Fajar Ajie Setiawan, Ratu Azima Mayangsari, Bunga Aprilia
Abstract:
The emergence of creative hubs around the world, including in Bandung, was primarily driven by the needs of collaborative-innovative spaces for creative industry activities such as the Maker Movement and the Coworking Movement. These activities pose challenges for identification and formulation of sets of indicators for modeling creative hubs in Bandung to help stakeholders in formulating strategies. This study intends to identify their characteristics. This research was conducted using a qualitative approach comparing three concepts of creative hub categorization and integrating them into a single instrument to analyze 12 selected creative hubs. Our results showed three new functions of creative hubs in Bandung: (1) cultural, (2) retail business, and (3) community network. Results also suggest that creative hubs in Bandung are commonly established for networking and community activities. Another result shows that there was a shifting pattern of creative hubs before the 2000s and after the 2000s, which also creates a hybrid group of creative hubs.Keywords: creative industry, creative hubs, Ngariung, Bandung
Procedia PDF Downloads 17711203 Analysis of Farmer's Involvement in Public and Private Extension Services in Southwestern Nigeria
Authors: S. O. Ayansina, R. A. Oyeyinka, K. K. Bolarinwa
Abstract:
There is an increasing demand for a functional extension delivery services in Nigeria with a view to meet up with the food and fiber needs of the ever growing population of human and animal respectively. This study was designed to examine farmers’ involvement in public and private extension services in southwestern Nigeria, specifically to explore the farmers’ participation in the two types of organizations involved. It also evaluates the performances of personnel in the organizations. A multi-stage random sampling technique was used to select 30 respondents from each of the three selected organizations in Ogun, Osun and Oyo states in Southwestern Nigeria. Data was collected with interview schedule and analyzed both at descriptive and inferential levels. Kruskal Wallis one-way Analysis of variance was used to test the differences between the participation of beneficiaries who are farmers under the public and private extension services and the level of benefit accrued to them from the various extension organizations involved in the study. Results revealed that private extension organizations were performing better and were more preferred by the beneficiaries. Results of the tested hypotheses as shown by Kruskal Wallis test of difference (x2 = 0.709) S no significant difference between farmers’ participation in the extension services of public and private organizations but however showed significant difference (X2 =12.074) in the benefits achieved by respondents in the two organizations. These include: increased quantity of crop produced, farm income, skill acquisition, and improved education in private extension organizations. Based on this result, it could be inferred that beneficiaries generally preferred private extension organizations because of their effectiveness and vibrancy in programme administration. Public extension is therefore recommended for general overhauling and possibly privatization in order to cater for teeming population of farmers demanding for efficient and functional extension services to better their lots in production, processing and marketing of agricultural produce.Keywords: public and private involvement, extension services, farmers' participation
Procedia PDF Downloads 40411202 Stochastic Prioritization of Dependent Actuarial Risks: Preferences among Prospects
Authors: Ezgi Nevruz, Kasirga Yildirak, Ashis SenGupta
Abstract:
Comparing or ranking risks is the main motivating factor behind the human trait of making choices. Cumulative prospect theory (CPT) is a preference theory approach that evaluates perception and bias in decision making under risk and uncertainty. We aim to investigate the aggregate claims of different risk classes in terms of their comparability and amenability to ordering when the impact of risk perception is considered. For this aim, we prioritize the aggregate claims taken as actuarial risks by using various stochastic ordering relations. In order to prioritize actuarial risks, we use stochastic relations such as stochastic dominance and stop-loss dominance that are proposed in the frame of partial order theory. We take into account the dependency of the individual claims exposed to similar environmental risks. At first, we modify the zero-utility premium principle in order to obtain a solution for the stop-loss premium under CPT. Then, we propose a stochastic stop-loss dominance of the aggregate claims and find a relation between the stop-loss dominance and the first-order stochastic dominance under the dependence assumption by using properties of the familiar as well as some emerging multivariate claim distributions.Keywords: cumulative prospect theory, partial order theory, risk perception, stochastic dominance, stop-loss dominance
Procedia PDF Downloads 32111201 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect
Authors: Debasish Nandy
Abstract:
India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.Keywords: bilateral, diplomacy, infiltration, terrorism
Procedia PDF Downloads 53811200 Impact of Construction Risk Factors into Actual Construction Price in PPP Projects
Authors: Saleh Alzahrani, Halim Boussabaine
Abstract:
The majority of Public Private Partnership (PPP) are developed based on the rationale that the design, construction, operation, and financing of a public project is to be awarded to a private party within a single contractual framework. PPP project risks normally include the development and construction of a new asset as well as its operation for decades. Undoubtedly the most serious consequences of risks during the construction period are price and time overruns. These events are amongst the most broadly used scenarios in value for money analysis risks. The sources of risk change over the life cycle of a PPP project. In traditional procurement, the public sector normally has to cover all price distress from these risks. At least there is plenty evidence to suggest that price distress is a norm in some of the projects that are delivered under traditional procurement. This paper will find the impact of construction risk factors into actual construction price into PPP projects. The paper will present a brief literature review on PPP risk pricing strategies, and then using system dynamics (SD) to analyses of the risks associated with the estimated project price. Based on the finding from these analyses a risk pricing association model is presented and discussed. The paper concludes with thoughts for future research.Keywords: Public Private Partnership (PPP), Risk, Risk Pricing, System Dynamics (SD), construction price
Procedia PDF Downloads 56511199 The Rise in Popularity of Online Islamic Fashion In Indonesia: An Economic, Political, and Socio-Anthropological Perspective
Authors: Cazadira Fediva Tamzil, Agung Sulthonaulia Utama
Abstract:
The rise in popularity of Indonesian Islamic fashion displayed and sold through social networking sites, especially Instagram, might seem at first glance like a commonplace and localized phenomenon. However, when analyzed critically, it actually reveals the relations between the global and local Indonesian economy, as well as a deep socio-anthropological dimension relating to religion, culture, class, work, identity. Conducted using a qualitative methodology, data collection technique of literature review, and observation of various social networking sites, this research finds four things that lead to the aforementioned conclusion. First, the rise of online Islamic fashion retailers was triggered by the shift in the structure of global and national Indonesian economy as well as the free access of information made possible by democratization in Indonesia and worldwide advances in terms of technology. All of those factors combined together gave birth to a large amount of middle-class Indonesians with high consumer culture and entrepreneurial flair. Second, online Islamic fashion retailers are the new cultural trendsetters in society. All these show how Indonesians are becoming increasingly pious, no longer only adhere to Western conception of luxury and that many are increasingly exploiting Islam commercial and status-acquiring purposes. Third, the online Islamic fashion retailers actually reveal a shift in the conception of ‘work’ – social media has made work no longer only confined to the toiling activities inside factories, but instead something that can be done from any location only through posting online words or pictures that can increase a fashion product’s capital value. Without realizing it, many celebrities and online retailers who promote Islamic fashion through social media on a daily basis are now also ‘semi-free immaterial labors’ – a slight reconceptualization to Tiziana Terranova’s concept of ‘free labor’ and Maurizio Lazzarato’s ‘immaterial labor’, which basically refer to people who create economic value and thus help out capitals from producing immaterial things with only little compensation in return. Fourth, this research also shows that the diversity of Islamic fashion styles being sold on Instagram reflects the polarized identity of Islam in Indonesia. In stark contrast with the theory which states that globalization always leads to the strengthening and unification of identity, this research shows how polarized the Islamic identity in Indonesia really is – even in the face of globalization.Keywords: global economy, Indonesian online Islamic fashion, political relations, socio-anthropology
Procedia PDF Downloads 34511198 A Literature Review and a Proposed Conceptual Framework for Learning Activities in Business Process Management
Authors: Carin Lindskog
Abstract:
Introduction: Long-term success requires an organizational balance between continuity (exploitation) and change (exploration). The problem of balancing exploitation and exploration is a common issue in studies of organizational learning. In order to better face the tough competition in the face of changes, organizations need to exploit their current business and explore new business fields by developing new capabilities. The purpose of this work in progress is to develop a conceptual framework to shed light on the relevance of 'learning activities', i.e., exploitation and exploration, on different levels. The research questions that will be addressed are as follows: What sort of learning activities are found in the Business Process Management (BPM) field? How can these activities be linked to the individual level, group, level, and organizational level? In the work, a literature review will first be conducted. This review will explore the status of learning activities in the BPM field. An outcome from the literature review will be a conceptual framework of learning activities based on the included publications. The learning activities will be categorized to focus on the categories exploitation, exploration or both and into the levels of individual, group, and organization. The proposed conceptual framework will be a valuable tool for analyzing the research field as well as identification of future research directions. Related Work: BPM has increased in popularity as a way of working to strengthen the quality of the work and meet the demands of efficiency. Due to the increase in BPM popularity, more and more organizations reporting on BPM failure. One reason for this is the lack of knowledge about the extended scope of BPM to other business contexts that include, for example, more creative business fields. Yet another reason for the failures are the fact of the employees’ are resistant to changes. The learning process in an organization is an ongoing cycle of reflection and action and is a process that can be initiated, developed and practiced. Furthermore, organizational learning is multilevel; therefore the theory of organizational learning needs to consider the individual, the group, and the organization level. Learning happens over time and across levels, but it also creates a tension between incorporating new learning (feed-forward) and exploiting or using what has already been learned (feedback). Through feed-forward processes, new ideas and actions move from the individual to the group to the organization level. At the same time, what has already been learned feeds back from the organization to a group to an individual and has an impact on how people act and think.Keywords: business process management, exploitation, exploration, learning activities
Procedia PDF Downloads 12411197 Consequences of Corruption on Tunisian Small and Medium Enterprises' Exports
Authors: Moujib Bahri, Ouafa Sakka, Kallel Rahim
Abstract:
This study builds on the literature about the effects of corruption on economic growth at the firm level, which analyzes how the payment of bribes affect organizational performance. Traditionally, the literature distinguishes two points of view regarding the impact of corruption: grease view and sand view. The grease view is based on the idea that corruption can compensate for the negative effect of red tape on firms’ activities such as innovation and exports. Therefore, some firms will be motivated to pay some additional money to officials in order to reduce the delay related to bureaucratic procedures. On the contrary, the second point of view considers that corruption sands the wheels of the economy and distorts resource allocation because it increases agency and transaction costs and reduces the returns on the investment. We have tested the effect of corruption on innovation and export activities on a sample of 537 Tunisian manufacturing small and medium enterprises (SMEs) using structural equation modeling and path analysis. Tunisia has undergone a revolution in 2010 and since then, the country is experiencing a political instability and economic hardships. Our results do not support the greasing hypothesis suggesting that corruption can reduce the negative effect of bureaucratic delays and the hard access of companies to public services related to exports. Instead, our results support the sanding hypothesis according to which corruption hinders SMEs’ exports through its negative influence on innovation. Furthermore, our results show that the interaction between excessive bureaucratic red tape and corruption has a negative effect on exports. However, the interaction between political instability and corruption increases exports.Keywords: corruption, exports, SMEs, economic conditions
Procedia PDF Downloads 17611196 Big Data Analytics and Public Policy: A Study in Rural India
Authors: Vasantha Gouri Prathapagiri
Abstract:
Innovations in ICT sector facilitate qualitative life style for citizens across the globe. Countries that facilitate usage of new techniques in ICT, i.e., big data analytics find it easier to fulfil the needs of their citizens. Big data is characterised by its volume, variety, and speed. Analytics involves its processing in a cost effective way in order to draw conclusion for their useful application. Big data also involves into the field of machine learning, artificial intelligence all leading to accuracy in data presentation useful for public policy making. Hence using data analytics in public policy making is a proper way to march towards all round development of any country. The data driven insights can help the government to take important strategic decisions with regard to socio-economic development of her country. Developed nations like UK and USA are already far ahead on the path of digitization with the support of Big Data analytics. India is a huge country and is currently on the path of massive digitization being realised through Digital India Mission. Internet connection per household is on the rise every year. This transforms into a massive data set that has the potential to improvise the public services delivery system into an effective service mechanism for Indian citizens. In fact, when compared to developed nations, this capacity is being underutilized in India. This is particularly true for administrative system in rural areas. The present paper focuses on the need for big data analytics adaptation in Indian rural administration and its contribution towards development of the country on a faster pace. Results of the research focussed on the need for increasing awareness and serious capacity building of the government personnel working for rural development with regard to big data analytics and its utility for development of the country. Multiple public policies are framed and implemented for rural development yet the results are not as effective as they should be. Big data has a major role to play in this context as can assist in improving both policy making and implementation aiming at all round development of the country.Keywords: Digital India Mission, public service delivery system, public policy, Indian administration
Procedia PDF Downloads 15911195 Converting Scheduling Time into Calendar Date Considering Non-Interruptible Construction Tasks
Authors: Salman Ali Nisar, Suzuki Koji
Abstract:
In this paper we developed a new algorithm to convert the project scheduling time into calendar date in order to handle non-interruptible activities not to be split by non-working days (such as weekend and holidays). In a construction project some activities might require not to be interrupted even on non-working days, or to be finished on the end day of business days. For example, concrete placing work might be required to be completed by the end day of weekdays i.e. Friday, and curing in the weekend. This research provides an algorithm that imposes time constraint for start and finish times of non-interruptible activities. The algorithm converts working days, which is obtained by Critical Path Method (CPM), to calendar date with consideration of the start date of a project. After determining the interruption by non-working days, the start time of a certain activity should be postponed, if there is enough total float value. Otherwise, the duration is shortened by hiring additional resources capacity or/and using overtime work execution. Then, time constraints are imposed to start time and finish time of the activity. The algorithm is developed in Excel Spreadsheet for microcomputer and therefore we can easily get a feasible, calendared construction schedule for such a construction project with some non-interruptible activities.Keywords: project management, scheduling, critical path method, time constraint, non-interruptible tasks
Procedia PDF Downloads 50211194 Social Media, Society, and Criminal Victimization: A Qualitative Study on University Students of Bangladesh
Authors: Md. Tawohidul Haque
Abstract:
The main objective of this study is to explore the nature, types and, causes of the involvement of criminal activities of the university students using social media namely Social Networking Sites (SNS). The evidence shows that the students have greater chance to involve such criminal activities during sharing their personal messages, photos, and even sharing their academic works. Used qualitative case studies with six students from two universities, this study provides a detail information about the processes how this media provokes the students to commit to the criminal activities such as unethical pose, naked picture, post against persona’s prestige and dignity as well as social position, phone call at midnight, personal threats, sexual offer, kidnapping attitude, and so on. This finding would be an important guideline for the media persons, policy makers, restorative justice, and human rights workers.Keywords: social media, criminal victimization, human gathering scheme, social code of ethics
Procedia PDF Downloads 15611193 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS
Authors: Ali Riza Perçin, Eser Bingül
Abstract:
Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.Keywords: social media, "generation Y", terrorist organization, islamic state IS
Procedia PDF Downloads 42611192 Modelling Insider Attacks in Public Cloud
Authors: Roman Kulikov, Svetlana Kolesnikova
Abstract:
Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.Keywords: insider attack, public cloud, cloud computing, hypervisor
Procedia PDF Downloads 36111191 Corporate Social Responsibility in an Experimental Market
Authors: Nikolaos Georgantzis, Efi Vasileiou
Abstract:
We present results from experimental price-setting oligopolies in which green firms undertake different levels of energy-saving investments motivated by public subsidies and demand-side advantages. We find that consumers reveal higher willingness to pay for greener sellers’ products. This observation in conjunction to the fact that greener sellers set higher prices is compatible with the use and interpretation of energy-saving behaviour as a differentiation strategy. However, sellers do not exploit the resulting advantage through sufficiently high price-cost margins, because they seem trapped into “run to stay still” competition. Regarding the use of public subsidies to energy-saving sellers we uncover an undesirable crowding-out effect of consumers’ intrinsic tendency to support green manufacturers. Namely, consumers may be less willing to support a green seller whose energy-saving strategy entails a direct financial benefit. Finally, we disentangle two alternative motivations for consumer’s attractions to pro-social firms; first, the self-interested recognition of the firm’s contribution to the public and private welfare and, second, the need to compensate a firm for the cost entailed in each pro-social action. Our results show the prevalence of the former over the latter.Keywords: corporate social responsibility, energy savings, public good, experiments, vertical differentiation, altruism
Procedia PDF Downloads 25711190 Automated Video Surveillance System for Detection of Suspicious Activities during Academic Offline Examination
Authors: G. Sandhya Devi, G. Suvarna Kumar, S. Chandini
Abstract:
This research work aims to develop a system that will analyze and identify students who indulge in malpractices/suspicious activities during the course of an academic offline examination. Automated Video Surveillance provides an optimal solution which helps in monitoring the students and identifying the malpractice event immediately. This work is organized into three modules. The first module deals with performing an impersonation check using a PCA-based face recognition method which is done by cross checking his profile with the database. The presence or absence of the student is even determined in this module by implementing an image registration technique wherein a grid is formed by considering all the images registered using the frontal camera at the determined positions. Second, detecting such facial malpractices in which a student gets involved in conversation with another, trying to obtain unauthorized information etc., based on the threshold range evaluated by considering his/her mouth state whether open or closed. The third module deals with identification of unauthorized material or gadgets used in the examination hall by training the positive samples of the object through various stages. Here, a top view camera feed is analyzed to detect the suspicious activities. The system automatically alerts the administration when any suspicious activities are identified, thereby reducing the error rate caused due to manual monitoring. This work is an improvement over our previous work published in identifying suspicious activities done by examinees in an offline examination.Keywords: impersonation, image registration, incrimination, object detection, threshold evaluation
Procedia PDF Downloads 23011189 Introducing the Accounting Reform of Public Finance in the Czech Republic
Authors: M. Otrusinova, E. Pastuszkova
Abstract:
The article is addressing the currently ongoing reform processes of transforming the public finance accounting based on cash flow principle to accrual principle. The presented analysis concerns the issues associated with the introduction of the state accounting from the perspective of municipal employees in compiling the opinions of financial experts in conditions of the Czech Republic. The aim of this paper is to present outcomes of analysis focused on currently discussed topics which are related to introducing the accrual principle into accounting of selected entities, especially municipalities and municipality-funded institutions. The output of the paper consists of comparing the application of the accrual principle in the financial reporting of municipalities in the Czech Republic and Slovakia. In conclusion and based on the survey, respondents from Slovak municipalities that have already adopted the accrual accounting principle show better opinion than Czech municipalities.Keywords: accrual principle, accounting, accounting reform, Czech Republic, municipalities, public finance
Procedia PDF Downloads 26211188 Prospects for an Integrated Public Transport System (IPTS) in Harare: An Institutional and Policy Analysis
Authors: Abdon O. Makore
Abstract:
The study analyses policy and institutional implications with regard to the successful implementation of IPTS in Harare. IPTS has widely been recommended as a rich solution to chaotic public transport operations, yet studies to determine the suitability or applicability of this concept have not been done in light of the existing transport institutions and policy framework in Harare. A predominantly qualitative research approach was employed backed by a deep scrutiny of the NTP and other subsidiary legislations and plans in place so as to ascertain the views and perceptions of various stakeholders regarding the proposed concept. As such, key informant interviews, unstructured interviews, and questionnaires were vital tools in gathering data and these were effectively buttressed by observations, photography, and documentary analysis. The study revealed from a policy perspective that there are high prospects for the implementation of IPTS in Harare as the existing NTP, subsidiary legislations and plans do have provisions for the concept backed by keen interest of all responsible urban public transport authorities. However, there is lack of coherent and systematic approach among other responsible institutions, as such recommendations formulated advocated for institutional integration and strong political will for the ultimate success of the concept.Keywords: integrated public transport system, policy, legislation, institutions
Procedia PDF Downloads 38811187 Measuring Corruption from Public Justifications: Insights from the Brazilian Anti-Corruption Agency
Authors: Ana Luiza Aranha
Abstract:
This paper contributes to the discussions that consider corruption as a challenge to the establishment of more democratically inclusive societies in Latin America. The paper advocates an intrinsic connection between democratic principles and corruption control – it is only possible to achieve just forms of democratic life if accountability institutions are able to control corruption, and therefore control the political exclusions that it brings. Departing from a non-trivial approach to corruption, and recognizing a gap in democratic theory when thinking about this phenomenon, corruption is understood as the breakdown of the democratic inclusive rule, whereby political decisions are made (and actions were taken) in spite of those potentially affected by them. Based on this idea, this paper proposes a new way of measuring corruption, moving away from usual aggregate measures – such as the Corruption Perception Index – and case studies of corruption scandals. The main argument sustains that corruption is intrinsically connected with the ability to be accountable and to provide public justification for the political conduct. The point advocated is that corruption involves a dimension of political exclusion. It generates a private benefit which is, from a democratic point of view, illegitimate, since it benefits some at the expense of the decisions made by the political community. Corruption is then a form of exclusion based on deception and opacity - for corruption, there is no plausible justification. Empirically, the paper uses the audit reports produced by the Brazilian anti-corruption agency (the CGU - Office of the Comptroller General) in its Inspections From Public Lotteries Program to exemplify how we can use this definition to separate corruption cases from mismanagement irregularities. On one side, there is poor management and inefficiencies, and, on the other, corruption, defined by the implausibility of public justifications – because the public officials would have to publicize illegitimate privileges and undue advantages. CGU reports provide the justifications given by the public officials for the irregularities found and also the acceptance or not by the control agency of these justifications. The analysis of this dialogue – between public officials and control agents – makes it possible to divide the irregularities on those that can be publicly justified versus those that cannot. In order to hold public officials accountable for their actions, making them responsible for the exclusions that they may cause (such as corruption), the accountability institutions fulfil an important role in reinforcing and empowering democracy and its basic inclusive condition.Keywords: accountability, brazil, corruption, democracy
Procedia PDF Downloads 25911186 Marketing and Commercial Activities Offered on Websites of European Union Banks
Authors: Mario Spremić, Natalija Kokolek, Božidar Jaković, Jurica Šimurina
Abstract:
This paper deals with various questions related to functionality and providing banking services in the European union on the Internet. Due to the fact that we live in the information technologies era, the Internet become a new space for doing economic and business activities in all areas, and especially important in banking. Accepting the busy tempo of life, in the past several years electronic banking has become necessity and a must for most users of banking services. On a sample of 300 web sites of the banks operating in European union (EU) we conduct the research on the functionality of e-banking services offered through banks web sites with the key objective to reveal to what extent the information technologies are used in their business operations. Characteristics of EU banks websites will be examined and compared to the basic groups of business activities on the web. Also some recommendations for the successful bank web sites will be provided.Keywords: electronic banking, electronic business, European union banks, internet
Procedia PDF Downloads 47411185 Framework for Government ICT Projects
Authors: Manal Rayes
Abstract:
In its efforts to utilize the information and communication technology to enhance the quality of public service delivery, national and local governments around the world are competing to introduce more ICT applications as tools to automate processes related to law enforcement or policy execution, increase citizen orientation, trust, and satisfaction, and create one-stop-shops for public services. In its implementation, e-Government ICTs need to maintain transparency, participation, and collaboration. Due to this diverse of mixed goals and requirements, e-Government systems need to be designed based on special design considerations in order to eliminate the risks of failure to compliance to government regulations, citizen dissatisfaction, or market repulsion. In this article we suggest a framework with guidelines for designing government information systems that takes into consideration the special requirements of the public sector. Then we introduce two case studies and show how applying those guidelines would result in a more solid system design.Keywords: e-government, framework, guidelines, system design
Procedia PDF Downloads 366