Search results for: terrorist organization
2515 Cognitive Based Approach to Organizational Development
Authors: Tatiana V. Korsakova
Abstract:
The cognitive methodology in management is considered: Cognitive structuring - the formation of ideas about the functioning of a developing organization; Cognitive modeling - heuristic construction of existing actions (zone of successful actions); and Cognitive construct - the formation of filters for converting external information into specific events of managerial reality. The major findings of the study are the identification of areas of successful actions in the organization, harmonization of criteria for evaluating the effectiveness of company management, and the frame-description that indicates the connection of environmental elements with the elements of the organization. It is stated the development of specific events of managerial reality in the direction of the further development of the organization depends on the personal cognitive construct of the development-subjects when it is used in the zone of successful actions.Keywords: cognitive construct, focus of applicability, knowledge corporate culture, zones of successful actions
Procedia PDF Downloads 2962514 The Effect of Contextual Factors on Degree of Trust in Kuwaiti Business Organization
Authors: Ali Muhammad
Abstract:
The study investigates the effect of a number of contextual on the degree of trust within Kuwaiti business organizations. The model used in this study suggests that degree of trust within the organization is determined by four contextual variables, namely, centralization, formalization, role ambiguity, and procedural justice. Organizational trust refers to employee’ positive assumptions in regard to the goal and behaviors of other members in the organization according to organizational duties, relationships, experiences, and interrelatedness. According to the norm of reciprocity, individuals with high perceived organizational justice will be compelled to react positively to the organization in the form of higher degree of trust. The duty to exchange kindness for kindness. Based on the exchange theory, this research proposes that procedural justice, role clarity, and voice in the organization will lead to the perception of an organization’s discretionary positive treatment of employees and, in return enhances their trust in the organization. Survey data were collected from a sample of 206 employees working in Kuwaiti business organizations. Results of multiple regression analysis revealed that both organizational justice and formalization have positive effects on organizational trust. Furthermore, results indicate that lower degree of role ambiguity leads to higher degree of organizational trust. On the other hand, centralization was not found to have a significant effect on organizational trust. Implications of the findings and directions for future research are discussed.Keywords: centralization, formalization, organizational justice, organizational trust, role ambiguity
Procedia PDF Downloads 1892513 Effect of Social Network Ties on Virtual Organization Success: Mediate Role of Knowledge Sharing Behaviors: An Empirical Study in Tourism Sector Firms in Jordan
Authors: Raed Hanandeh
Abstract:
This empirical study examines how knowledge sharing behaviors mediate the effect Technology-driven strategy on virtual organization success in Jordanian tourism sector firms. The results reveal that Social network ties are positively related to web knowledge seeking, web knowledge contributing and interactive system, but negatively related to accidental knowledge leakage. Furthermore, all types of knowledge sharing behavior are positively related to virtual organization success. Data collected from 23 firms. The total number of questionnaires mailed, 250 questionnaires were delivered. 214 were considered valid out of 241 Responses were received. The findings provide evidence that knowledge sharing behavior play a mediating role between Social network ties and virtual organization success and show that, web knowledge seeking, web knowledge contributing and interactive system playing an important impact on virtual organization success through knowledge sharing behaviors.Keywords: social network ties, virtual organization success, knowledge sharing behaviors, web knowledge
Procedia PDF Downloads 2732512 Proposing an Optimal Pattern for Evaluating the Performance of the Staff Management of the Water and Sewage Organization in Western Azerbaijan Province, Iran
Authors: Tohid Eskandarzadeh, Nader Bahlouli, Turaj Behnam, Azra Jafarzadeh
Abstract:
The purpose of the study reported in this paper was to propose an optimal pattern to evaluate the staff management performance of the water and sewage organization. The performance prism-model was used to evaluate the following significant dimensions of performance: organizational strategies, organizational processes, organization capabilities, stakeholders’ partnership and satisfaction. In the present study, a standard, valid and reliable questionnaire was used to obtain data about the five dimensions of the performance prism model. 169 sample respondents were used for responding the questionnaire who were selected from the staff of water and waste-water organization in western Azerbaijan, Iran. Also, Alpha coefficient was used to check the reliability of the data-collection instrument which was measured to be beyond 0.7. The obtained data were statistically analyzed by means of SPSS version 18. The results obtained from the data analysis indicated that the performance of the staff management of the water and waste-water organization in western Azerbaijan was acceptable in terms of organizational strategies, organizational process, stakeholders’ partnership and satisfaction. Nevertheless, it was found that the performance of the staff management with respect to organizational abilities was average. Indeed, the researchers drew the conclusion that the current performance of the staff management in this organization in western Azerbaijan was less than ideal performance.Keywords: performance evaluation, performance prism model, water, waste-water organization
Procedia PDF Downloads 3282511 Alignment of Information System Strategy and Green Information System Strategy: Comprehension and A Review of the Literature
Authors: Wartika Memed Purawinata, Kridanto Surendro, Husni Sastramiharja, Iping Supriana S.
Abstract:
The information system is one of the contributors to environmental degradation and pollution are known to be released, such as the increasing of use of IT equipment and energy consumption , life cycles of IT equipment are getting shorter, IT equipment waste disposal and so on, therefore the information system should have a role in related environmental issues. Organization need to develop the ability of green to minimize negative impacts on the environment. Although the green information system is an important topic, many organizations fail to manage the environment in a way that is adequate because they ignore aspect of strategy. Alignment strategy is very important to ensure that all people do the activities of the organization headed in the same direction. Alignment strategy helps organization, determine which is more important for organization, and then make road mad to achieve the organization goal. Therefore, this paper discusses the review of the alignment, information systems strategy, and IS green strategy. With this discussion is expected there is an understanding about the alignment of information systems strategy and strategy of green IS, and its relationship with the achievement of business goals that have commitment to reduce the negative impact of information systems on the environment.Keywords: alignment, strategy, information system, green
Procedia PDF Downloads 4562510 Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan
Authors: Ishna Indika Jusi, Rifana Meika
Abstract:
Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds.Keywords: Fintech, illegal, Indonesia, technology, terrorism financing
Procedia PDF Downloads 1702509 Ties of China and the United States Regarding to the Shanghai Cooperation Organization on the Basis of Soft Power Theory
Authors: Shabnam Dadparvar, Laijin Shen
Abstract:
After a period of conflict between Russia and the West, new signs of confrontation between the United States and China are observed. China, as the most populous country in the world with a high rate of economic growth, neither stands the hegemonic power of the United States nor has the intention of direct confrontation with it. By raising the costs of the United States’ leadership at the international level, China seeks to find a better status without direct confrontation with the US. Meanwhile, the Shanghai Cooperation Organization (SCO), as a soft balancing strategy against the hegemony of the United States is used as a tool to reach this goal. The authors by using a descriptive-analytical method try to explain the policies of China and the United States on Shanghai Cooperation Organization as well as confrontation between these two countries within the framework of 'balance of soft power theory'.Keywords: balance of soft power, Central Asia, Shanghai cooperation organization, terrorism
Procedia PDF Downloads 3712508 Comparing Performance Indicators among Mechanistic, Organic, and Bureaucratic Organizations
Authors: Benchamat Laksaniyanon, Padcharee Phasuk, Rungtawan Boonphanakan
Abstract:
With globalization, organizations had to adjust to an unstable environment in order to survive in a competitive arena. Typically within the field of management, different types of organizations include mechanistic, bureaucratic and organic ones. In fact, bureaucratic and mechanistic organizations have some characteristics in common. Bureaucracy is one type of Thailand organization which adapted from mechanistic concept to develop an organization that is suitable for the characteristic and culture of Thailand. The objective of this study is to compare the adjustment strategies of both organizations in order to find key performance indicators (KPI) suitable for improving organization in Thailand. The methodology employed is binary logistic regression. The results of this study will be valuable for developing future management strategies for both bureaucratic and mechanistic organizations.Keywords: mechanistic, bureaucratic and organic organization, binary logistic regression, key performance indicators (KPI)
Procedia PDF Downloads 3592507 Models of State Organization and Influence over Collective Identity and Nationalism in Spain
Authors: Muñoz-Sanchez, Victor Manuel, Perez-Flores, Antonio Manuel
Abstract:
The main objective of this paper is to establish the relationship between models of state organization and the various types of collective identity expressed by the Spanish. The question of nationalism and identity ascription in Spain has always been a topic of special importance due to the presence in that country of territories where the population emits very different opinions of nationalist sentiment than the rest of Spain. The current situation of sovereignty challenge of Catalonia to the central government exemplifies the importance of the subject matter. In order to analyze this process of interrelation, we use a secondary data mining by applying the multiple correspondence analysis technique (MCA). As a main result a typology of four types of expression of collective identity based on models of State organization are shown, which are connected with the party position on this issue.Keywords: models of organization of the state, nationalism, collective identity, Spain, political parties
Procedia PDF Downloads 4432506 Modelling Spatial Dynamics of Terrorism
Authors: André Python
Abstract:
To this day, terrorism persists as a worldwide threat, exemplified by the recent deadly attacks in January 2015 in Paris and the ongoing massacres perpetrated by ISIS in Iraq and Syria. In response to this threat, states deploy various counterterrorism measures, the cost of which could be reduced through effective preventive measures. In order to increase the efficiency of preventive measures, policy-makers may benefit from accurate predictive models that are able to capture the complex spatial dynamics of terrorism occurring at a local scale. Despite empirical research carried out at country-level that has confirmed theories explaining the diffusion processes of terrorism across space and time, scholars have failed to assess diffusion’s theories on a local scale. Moreover, since scholars have not made the most of recent statistical modelling approaches, they have been unable to build up predictive models accurate in both space and time. In an effort to address these shortcomings, this research suggests a novel approach to systematically assess the theories of terrorism’s diffusion on a local scale and provide a predictive model of the local spatial dynamics of terrorism worldwide. With a focus on the lethal terrorist events that occurred after 9/11, this paper addresses the following question: why and how does lethal terrorism diffuse in space and time? Based on geolocalised data on worldwide terrorist attacks and covariates gathered from 2002 to 2013, a binomial spatio-temporal point process is used to model the probability of terrorist attacks on a sphere (the world), the surface of which is discretised in the form of Delaunay triangles and refined in areas of specific interest. Within a Bayesian framework, the model is fitted through an integrated nested Laplace approximation - a recent fitting approach that computes fast and accurate estimates of posterior marginals. Hence, for each location in the world, the model provides a probability of encountering a lethal terrorist attack and measures of volatility, which inform on the model’s predictability. Diffusion processes are visualised through interactive maps that highlight space-time variations in the probability and volatility of encountering a lethal attack from 2002 to 2013. Based on the previous twelve years of observation, the location and lethality of terrorist events in 2014 are statistically accurately predicted. Throughout the global scope of this research, local diffusion processes such as escalation and relocation are systematically examined: the former process describes an expansion from high concentration areas of lethal terrorist events (hotspots) to neighbouring areas, while the latter is characterised by changes in the location of hotspots. By controlling for the effect of geographical, economical and demographic variables, the results of the model suggest that the diffusion processes of lethal terrorism are jointly driven by contagious and non-contagious factors that operate on a local scale – as predicted by theories of diffusion. Moreover, by providing a quantitative measure of predictability, the model prevents policy-makers from making decisions based on highly uncertain predictions. Ultimately, this research may provide important complementary tools to enhance the efficiency of policies that aim to prevent and combat terrorism.Keywords: diffusion process, terrorism, spatial dynamics, spatio-temporal modeling
Procedia PDF Downloads 3502505 Numerical Study of Steel Structures Responses to External Explosions
Authors: Mohammad Abdallah
Abstract:
Due to the constant increase in terrorist attacks, the research and engineering communities have given significant attention to building performance under explosions. This paper presents a methodology for studying and simulating the dynamic responses of steel structures during external detonations, particularly for accurately investigating the impact of incrementing charge weight on the members total behavior, resistance and failure. Prediction damage method was introduced to evaluate the damage level of the steel members based on five scenarios of explosions. Johnson–Cook strength and failure model have been used as well as ABAQUS finite element code to simulate the explicit dynamic analysis, and antecedent field tests were used to verify the acceptance and accuracy of the proposed material strength and failure model. Based on the structural response, evaluation criteria such as deflection, vertical displacement, drift index, and damage level; the obtained results show the vulnerability of steel columns and un-braced steel frames which are designed and optimized to carry dead and live load to resist and endure blast loading.Keywords: steel structure, blast load, terrorist attacks, charge weight, damage level
Procedia PDF Downloads 3642504 Clustering of Association Rules of ISIS & Al-Qaeda Based on Similarity Measures
Authors: Tamanna Goyal, Divya Bansal, Sanjeev Sofat
Abstract:
In world-threatening terrorist attacks, where early detection, distinction, and prediction are effective diagnosis techniques and for functionally accurate and precise analysis of terrorism data, there are so many data mining & statistical approaches to assure accuracy. The computational extraction of derived patterns is a non-trivial task which comprises specific domain discovery by means of sophisticated algorithm design and analysis. This paper proposes an approach for similarity extraction by obtaining the useful attributes from the available datasets of terrorist attacks and then applying feature selection technique based on the statistical impurity measures followed by clustering techniques on the basis of similarity measures. On the basis of degree of participation of attributes in the rules, the associative dependencies between the attacks are analyzed. Consequently, to compute the similarity among the discovered rules, we applied a weighted similarity measure. Finally, the rules are grouped by applying using hierarchical clustering. We have applied it to an open source dataset to determine the usability and efficiency of our technique, and a literature search is also accomplished to support the efficiency and accuracy of our results.Keywords: association rules, clustering, similarity measure, statistical approaches
Procedia PDF Downloads 3202503 Impact of Knowledge Management on Learning Organizations
Authors: Gunmala Suri
Abstract:
The purpose of this study was to investigate the relationship between various dimensions of Knowledge Management and Learning Organizations. On the basis of the dimensions of Learning Organization, Hypothesis were formulated. Knowledge Management (KM) is taken as the independent variable and Learning Organization (LO) as a dependent variable. KM had 5 dimensions and LO had 7. For this study, a total of 92 participants took part and answered the questionnaire. The respondents were selected using Judgemental and Snowball sampling. The respondents were from SMEs in and around Chandigarh. SPSS was used to for the data analysis purposes. The results showed that the dimensions of KM had a positive influence on the dimensions of LO. The hypothesis were accepted.Keywords: knowledge management leadership, knowledge management, learning organization, knowledge management culture
Procedia PDF Downloads 4182502 Impact of Human Resources Accounting on Employees' Performance in Organization
Authors: Hamid Saremi, Shida Hanafi
Abstract:
In an age of technology and economics, human capital has important and axial role in the organization and human resource accounting has a wide perception to key resources of organization i.e. human resources. Human resources accounting is new branch of accounting that has Short-lived and generally deals to a range of policies and measures that are related to various aspects of human resources and It gives importance to an organization's most important asset is its human resources and human resource management is the key to success in an organization and to achieve this important matter must review and evaluation of human resources data be with knowledge of accounting based on empirical studies and methods of measurement and reporting of human resources accounting information. Undoubtedly human resource management without information cannot be done and take decision and human resources accounting is practical way to inform the decision makers who are committed to harnessing human resources,, human resources accounting with applying accounting principles in the organization and is with conducting basic research on the extent of the of human resources accounting information" effect of employees' personal performance. In human resource accounting analysis and criteria and valuation of cost and manpower valuating is as the main resource in each Institute. Protection of human resources is a process that according to human resources accounting is for organization profitability. In fact, this type of accounting can be called as a major source in measurement and trends of costs and human resources valuation in each institution. What is the economic value of such assets? What is the amount of expenditures for education and training of professional individuals to value in asset account? What amount of funds spent should be considered as lost opportunity cost? In this paper, according to the literature of human resource accounting we have studied the human resources matter and its objectives and topic of the importance of human resource valuation on employee performance review and method of reporting of human resources according to different models.Keywords: human resources, human resources, accounting, human capital, human resource management, valuation and cost of human resources, employees, performance, organization
Procedia PDF Downloads 5482501 Maintenance Objective-Based Asset Maintenance Maturity Model
Authors: James M. Wakiru, Liliane Pintelon, Peter Muchiri, Peter Chemweno
Abstract:
The fast-changing business and operational environment are forcing organizations to adopt asset performance management strategies, not only to reduce costs but also maintain operational and production policies while addressing demand. To attain optimal asset performance management, a framework that ensures a continuous and systematic approach to analyzing an organization’s current maturity level and expected improvement regarding asset maintenance processes, strategies, technologies, capabilities, and systems is essential. Moreover, this framework while addressing maintenance-intensive organizations should consider the diverse business, operational and technical context (often dynamic) an organization is in and realistically prescribe or relate to the appropriate tools and systems the organization can potentially employ in the respective level, to improve and attain their maturity goals. This paper proposes an asset maintenance maturity model to assess the current capabilities, strength and weaknesses of maintenance processes an organization is using and analyze gaps for improvement via structuring set levels of achievement. At the epicentre of the proposed framework is the utilization of maintenance objective selected by an organization for various maintenance optimization programs. The framework adapts the Capability Maturity Model of assessing the maintenance process maturity levels in the organization.Keywords: asset maintenance, maturity models, maintenance objectives, optimization
Procedia PDF Downloads 2262500 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country
Authors: Meszár Tárik
Abstract:
The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.Keywords: Middle East, Iraq, Islamic State, minorities
Procedia PDF Downloads 852499 Restorative Justice to the Victims of Terrorism in the Criminal Justice System of India
Authors: Sumanta Meher, Gaurav Shukla
Abstract:
The torments of the victims of terrorism have not only confined to loss of life and limp but also includes the physiological trauma to the innocent victims. The physical wounds may heal, but the trauma remains in the mind and heart of the victims and their loved ones; however, one should not deny that these terrorist activities affect to a major extent to their livelihood. To protect their human rights and restore the shattered lives of the victims of terrorism all the Nations beyond their differences have to show solidarity and frame a comprehensive restorative policy with an effective implementing mechanism. The General Assembly of United Nations, through its several resolutions, has appealed Nations to show solidarity and also committed to helping the Members State to frame the law and policy to support the victims of terrorism. To achieve the objectives of the resolutions adopted by the United Nations, the Indian legislators in 2008 amended the Code of Criminal Procedure, 1973 and incorporated Section 357A to provide financial assistance to the victims of terrorism. In India, the contemporary developments in the victims’ oriented studies have increased the dimension of the traditional criminal justice systems to protect the rights of the victims. In this regard, the paper has ascertained the Indian legal framework in respect to the restorative justice to the victims of terrorism and also addressed the question as to whether the statutory provisions and enforcement mechanisms are efficient enough to protect the human rights of the victims of terrorism. For that purpose, the paper has analyzed the International instruments and the reports with regard to the compensation to the victims of terrorist attacks, with that, the article also evaluates the initiatives of United Nations to help Members State to frame the law and policies to support the victims of terrorism. The study also made an attempt to critically analyze the legal provisions of compensation and rehabilitation of the victims of terrorist attacks in India and whether they are in alignment with the International standards. While concluding, the paper has made an endeavor for a robust legal framework towards the restorative justice for the victims of terrorism in India.Keywords: victims of terrorism, restorative justice, human rights, criminal justice system of India
Procedia PDF Downloads 1592498 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4042497 Linguistic Devices Reflecting Violence in Border–Provinces of Southern Thailand on the Front Page of Local and National Newspapers
Authors: Chanokporn Angsuviriya
Abstract:
The objective of the study is to analyse linguistic devices reflecting the violence in the south border provinces; namely Pattani, Yala, Narathiwat and Songkla on 1,344 front pages of three local newspapers; namely ChaoTai, Focus PhakTai and Samila Time and of two national newspapers, including ThaiRath and Matichon, between 2004 and 2005, and 2011 and 2012. The study shows that there are two important linguistic devices: 1) lexical choices consisting of the use of verbs describing violence, the use of quantitative words and the use of words naming someone who committed violent acts, and 2) metaphors consisting of “a violent problem is heat”, “a victim is a leaf”, and “a terrorist is a dog”. Comparing linguistic devices between two types of newspapers, national newspapers choose to use words more violently than local newspapers do. Moreover, they create more negative images of the south of Thailand by using stative verbs. In addition, in term of metaphors “a terrorist is a fox.” is only found in national newspapers. As regards naming terrorists “southern insurgents”, this noun phrase which is collectively called by national newspapers has strongly negative meaning. Moreover, “southern insurgents” have been perceived by the Thais in the whole country while “insurgents” that are not modified have been only used by local newspapers.Keywords: linguistic devices, local newspapers, national newspapers, violence
Procedia PDF Downloads 2412496 Knowledge Management Factors Affecting the Level of Commitment
Authors: Abbas Keramati, Abtin Boostani, Mohammad Jamal Sadeghi
Abstract:
This paper examines the influence of knowledge management factors on organizational commitment for employees in the oil and gas drilling industry of Iran. We determine what knowledge factors have the greatest impact on the personnel loyalty and commitment to the organization using collected data from a survey of over 300 full-time personnel working in three large companies active in oil and gas drilling industry of Iran. To specify the effect of knowledge factors in the organizational commitment of the personnel in the studied organizations, the Principal Component Analysis (PCA) is used. Findings of our study show that the factors such as knowledge and expertise, in-service training, the knowledge value and the application of individuals’ knowledge in the organization as the factor “learning and perception of personnel from the value of knowledge within the organization” has the greatest impact on the organizational commitment. After this factor, “existence of knowledge and knowledge sharing environment in the organization”; “existence of potential knowledge exchanging in the organization”; and “organizational knowledge level” factors have the most impact on the organizational commitment of personnel, respectively.Keywords: drilling industry, knowledge management, organizational commitment, loyalty, principle component analysis
Procedia PDF Downloads 3512495 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia
Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana
Abstract:
Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization
Procedia PDF Downloads 2372494 Content Analysis of Depictions of Terrorism in U.S. Major Motion Pictures: A Social Constructionist Perspective
Authors: Raleigh Blasdell, Amanda M. Sharp Parker, Lauren Waldrop, Brigid Toney
Abstract:
It has been demonstrated that fictional media sources have persuasive effects on public beliefs; this study contributes to the social constructionist literature by conducting a content analysis of U.S. major motion pictures involving terrorism. Using the Unified Film Population Sampling Methodology, the top-grossing films were identified to examine the frequency and context of several constructs of terrorism, including terrorist demographics, type of terrorism, country of origin, organizational affiliation, crime typology, and victim demographics. Comparisons of these constructs, as depicted in the films, were then made with the extant academic literature on terrorism. The data provide notable information regarding the representation of terrorism by the film industry, as well the discrepancies between the scholarly literature and depictions in popular films. The results indicate vast differences between fiction and reality, emphasizing a 'Middle Eastern Islamic male' terrorist stereotype. Using the theoretical foundation of social constructionism, the findings provide insight into how inaccurate depictions in film can influence society’s beliefs about terrorism and terrorists, which subsequently can translate into public support for legislation and policies that are often fueled by misinformation.Keywords: film, media, social constructionism, terrorism
Procedia PDF Downloads 1692493 Familiarity with Engineering Project Management And Their Duties In Projects
Authors: Mokhtar Nikgoo
Abstract:
Today's industrial world has undergone tremendous changes in certain periods. These changes are called environmental changes. And they have a direct impact on organizations and bodies. Therefore, the importance of knowing these changes is clear. This importance has caused the manufacturing organizations to move towards multiple products and constantly change and expand their system. This research tries to show how the organization moves in this category by defining the basic steps of implementing a project. One of the most important features of a hard-to-order production organization is the definition of different production projects from different customers. Therefore, the lack of sufficient understanding of the type of work causes the project to be defined for the organization in question, and the managers of the organization (in every organizational level) are constantly involved with different projects. In the implementation of the production project of the aforementioned organizations, directing the facilities and people of the organization towards the implementation of the project is of particular importance. Therefore, it is felt necessary to define the project manager and his basic duties. Considering the importance of this topic, the project chapter deals with project management and its importance and examines all the different issues in that category from the perspective of implementation. A project includes certain activities of the organization that require the use of different resources and all the activities of the organization in order to implement the project with defined facilities and at the designated times. Project management is planning, organizing and controlling the organization's resources for a short-term goal that has been created for short-term and medium-term goals and objectives. Project management has the important task of centering and integrating (coordinating) task and line managers. In other words, project management requires having a strong and appropriate relationship with the internal people of the system to carry out the assigned activities and must have a general and technical knowledge related to various activities in the project environment. It seems that everything with project management in It is communication. One of the characteristics of production organizations under the order is the relationship between the customer (customers) and the organization until the completion of the defined project. Due to the nature of the work, it is necessary for a person to establish this relationship between the client and the organization's people and to establish this relationship in such a way that it does not cause a lack of coordination in the organization's activities. Therefore, project management has a very important role at this stage, because the relationship between the client and his organization will be any problems and problems and points of view that the client has, he must inform the management so that he can implement the cases with its analysis and special processes. To be transferred to other departments and line managers.Keywords: project management, crisis management, project delays bill, project duration
Procedia PDF Downloads 562492 Effects of Blast Load on Historic Stone Masonry Buildings in Canada: A Review and Analytical Study
Authors: Abass Braimah, Maha Hussein Abdallah
Abstract:
The global ascendancy of terrorist attacks on building infrastructure with economic and heritage significance has increased awareness of the possibility of terrorism in Canada. Many structures in Canada that are at risk of terrorist attacks include government buildings, built many years ago of historic stone masonry construction. Although many researchers are investigating ways to retrofit masonry stone buildings to mitigate the effect of blast loadings, lack of knowledge on the dynamic behavior of historic stone masonry structures under blast loads makes it difficult to ascertain the effectiveness of the retrofitting techniques. This paper presents a review of open-source literature for the experimental and numerical stone masonry structures under blast loads. This review yielded very little information of the response of the historic stone masonry structures under blast loads. Thus, a comprehensive study is needed to understand the blast load effects on historic stone masonry buildings. The out-of-plane response of historic masonry structures to blast loads is investigated by using single-degree-of-freedom analysis. This approach presents equations that can be used effectively in the analysis of historic masonry walls to out-of-plane blast loading.Keywords: blast loads, historical buildings, masonry structure, single-degree-of-freedom analysis
Procedia PDF Downloads 1842491 Management of Organizational Behavior Utilizing Human Resources
Authors: Habab Ahmed Hassan Abuzeid
Abstract:
Organizations are social systems. If one wishes to work in them or to manage them, it is necessary to understand how they operate. Organizations combine science and people–technology and humanity. Unless we have qualified people to design and implement, techniques alone will not produce desirable results. Human behavior in organizations is rather unpredictable. It is unpredictable because it arises from people’s deep-seated needs and value systems. However, it can be partially understood in terms of the framework of behavioral science, management and other disciplines. There is no idealistic solution to organizational problems. All that can be done is to increase our understanding and skills so that human relations at work can be enhanced. In this paper, we consider management of organization behavior utilizing human resources. Study the elements of organization behavior, the effectiveness of mechanism to enhance staff relationships. Many approaches could be applied for healthy organizational environment, it’s highlighted more details in this paper. Organization behavior can raise the employees’ engagement, loyalty and commitment; to accomplish the goal.Keywords: environment, engagement, human resources, organization behavior
Procedia PDF Downloads 3642490 Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems
Authors: M. Mutemwa
Abstract:
A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC.Keywords: cybersecurity operation centre, incident response, priority matrix, procedures and policies
Procedia PDF Downloads 1532489 Framework for Developing Change Team to Maximize Change Initiative Success
Authors: Mohammad Z. Ansari, Lisa Brodie, Marilyn Goh
Abstract:
Change facilitators are individuals who utilize change philosophy to make a positive change to organizations. The application of change facilitators can be seen in various change models; Lewin, Lippitt, etc. The facilitators within numerous change models are considered as internal/external consultants. Whilst most of the scholarly paper considers change facilitation as a consensus attempt to improve organization, there is a lack of a framework that develops both the organization and the change facilitator creating a self-sustaining change environment. This research paper introduces the development of the framework for change Leaders, Planners, and Executers (LPE), aiming at various organizational levels (Process, Departmental, and Organisational). The LPE framework is derived by exploring interrelated characteristics between facilitator(s) and the organization through qualitative research for understanding change management techniques and facilitator(s) behavioral aspect from existing Change Management models and Organisation behavior works of literature. The introduced framework assists in highlighting and identify the most appropriate change team to successfully deliver the change initiative within any organization (s).Keywords: change initiative, LPE framework, change facilitator(s), sustainable change
Procedia PDF Downloads 1962488 Knowledge Management Strategies within a Corporate Environment of Papers
Authors: Daniel J. Glauber
Abstract:
Knowledge transfer between personnel could benefit an organization’s improved competitive advantage in the marketplace from a strategic approach to knowledge management. The lack of information sharing between personnel could create knowledge transfer gaps while restricting the decision-making processes. Knowledge transfer between personnel can potentially improve information sharing based on an implemented knowledge management strategy. An organization’s capacity to gain more knowledge is aligned with the organization’s prior or existing captured knowledge. This case study attempted to understand the overall influence of a KMS within the corporate environment and knowledge exchange between personnel. The significance of this study was to help understand how organizations can improve the Return on Investment (ROI) of a knowledge management strategy within a knowledge-centric organization. A qualitative descriptive case study was the research design selected for this study. The lack of information sharing between personnel may create knowledge transfer gaps while restricting the decision-making processes. Developing a knowledge management strategy acceptable at all levels of the organization requires cooperation in support of a common organizational goal. Working with management and executive members to develop a protocol where knowledge transfer becomes a standard practice in multiple tiers of the organization. The knowledge transfer process could be measurable when focusing on specific elements of the organizational process, including personnel transition to help reduce time required understanding the job. The organization studied in this research acknowledged the need for improved knowledge management activities within the organization to help organize, retain, and distribute information throughout the workforce. Data produced from the study indicate three main themes including information management, organizational culture, and knowledge sharing within the workforce by the participants. These themes indicate a possible connection between an organizations KMS, the organizations culture, knowledge sharing, and knowledge transfer.Keywords: knowledge transfer, management, knowledge management strategies, organizational learning, codification
Procedia PDF Downloads 4422487 Strengthening Deradicalizing Islamist Extremism in Indonesia: A Victim-Centred Approach
Authors: Milda Istiqomah
Abstract:
Deradicalization program has long been the subject of investigation. There is a steadily growing interest in examining the results on how Islamist terrorists agree to abandon violence and leave radicalism; however, it is argued that de-radicalization program on terrorism in many countries is still questionable for its effectiveness. This article aims to provide an overview of the deradicalization program specifically related to the victim-centred approach conducted by the Indonesian government and investigates critical issues surrounding the analysis of their effectiveness and outcomes. This research employs several case studies of a victim-centred approach conducted by the Indonesian Witness and Victim Protection Agency as well as the Indonesian Counter-terrorism Agency. This paper argues that the victim-centred approach to de-radicalize former terrorist prisoners faces several implemental challenges; however, the initiative may offer promise for future successful de-radicalization program. Furthermore, until more data surrounding the efficacy of this initiative available, the victim-centred approach may also constitute a significant and essential component of disengagement, de-radicalisation, and reintegration of terrorist prisoners. In conclusion, this paper suggests that further empirical research concerning prevention policies and disengagement interventions related to victim-centred approach need to be explored to give more inputs to the Indonesian government to achieve the effectiveness of de-radicalization program.Keywords: terrorism, victim-centred approach, de-radicalization, Islamist extremism
Procedia PDF Downloads 3082486 Improving the Employee Transfer Experience within an Organization
Authors: Drew Fockler
Abstract:
This research examines how to improve an employee’s experience when transferring between departments within an organization. This research includes a historical review of a Canadian retail organization. Based on this historical review, gaps are identified between current and future visions to show where problems with existing training and development practices need to be resolved to reduce front-line employee turnover within an organization. The strategies within this paper support leaders through the LEAD: Listen, Explore, Act and Develop, Change Management Model. The LEAD Change Management Model supports the change process. This research proposes three possible solutions to improve an employee who is transferring between departments. The best solution to resolve the problem of improving an employee moving between departments experience is creating a Training Manager position within the retail store. A Training Manager position could support both employees and leadership with training and development of staff who are moving between departments. Within this research, an implementation plan using the TransX Model was created. The TransX Model is a hybrid of Leader-Member Exchange Theory and Transformational Leadership Theory to facilitate this organizational change within an organization by creating a common vision. Finally, this research provides the next steps as well as future considerations to enhance the training manager role within an organization.Keywords: employee transfers, employee engagement, human resources, employee induction, TransX model, lead change management model
Procedia PDF Downloads 77