Search results for: security management
10583 The Role of Risk Management Practices in the Relationship between Risks Factors and Construction Project Performance
Authors: Ali Abdullah Albezaghi
Abstract:
This article aims to introduce a conceptual framework that can facilitate investigations concerning the role of risk management practices in the relationship between construction risks and the construction project's performance. This article is structured based on the extant literature; it reviews theoretical perspectives, highlights the gaps, and illustrates the significance of developing a framework of suggested relationships. Despite growing interest in the role of risks in construction project performance, previous studies have paid little attention to investigating the moderating role of risk management practices on the risk-performance link. This has left researchers and construction project managers with minimal information to explain the conditions under which risk management practices can reduce the impact of project-related risks and improve performance. In this context, this article suggests a viable research model with propositions that assess risk-performance relationships and discusses the potential moderating effects on the domain relationship. This paper adds to the risk management literature by focusing on risk variables that directly impact performance. Further, it also considers the moderating role of risk management practices in such relationships.Keywords: risk management practices, external risks, internal risks, project risks, project performance
Procedia PDF Downloads 13410582 The Artificial Intelligence (AI) Impact on Project Management: A Destructive or Transformative Agent
Authors: Kwame Amoah
Abstract:
Artificial intelligence (AI) has the prospect of transforming project management, significantly improving efficiency and accuracy. By automating specific tasks with defined guidelines, AI can assist project managers in making better decisions and allocating resources efficiently, with possible risk mitigation. This study explores how AI is already impacting project management and likely future AI's impact on the field. The AI's reaction has been a divided opinion; while others picture it as a destroyer of jobs, some welcome it as an innovation advocate. Both sides agree that AI will be disruptive and revolutionize PM's functions. If current research is to go by, AI or some form will replace one-third of all learning graduate PM jobs by as early as 2030. A recent survey indicates AI spending will reach $97.9 billion by the end of 2023. Considering such a profound impact, the project management profession will also see a paradigm shift driven by AI. The study examines what the project management profession will look like in the next 5-10 years after this technological disruption. The research methods incorporate existing literature, develop trend analysis, and conduct structured interviews with project management stakeholders from North America to gauge the trend. PM professionals can harness the power of AI, ensuring a smooth transition and positive outcomes. AI adoption will maximize benefits, minimize adverse consequences, and uphold ethical standards, leading to improved project performance.Keywords: project management, disruptive teacnologies, project management function, AL applications, artificial intelligence
Procedia PDF Downloads 8210581 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 16210580 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 13810579 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks
Authors: C. N. Vanitha, M. Usha
Abstract:
In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.Keywords: neural networks, pattern learning, security, wireless sensor networks
Procedia PDF Downloads 40410578 Implementation of Lean Management in Non-Governmental Organizations: A Case Study on WrocłAw Food Bank
Authors: Maciej Pieńkowski
Abstract:
Lean Management is nowadays one of the most dominating management concepts within industrial and service environment, providing compelling business benefits to many companies. At the same time, its application in the non-governmental organizations has not been extensively researched yet. Filling this gap will address clear necessity of efficient management system in NGO environment and significantly improve operational performance of many organizations. The goal of the research is to verify effectiveness of Lean Management implementation in the non-governmental organizations, based on Wrocław Food Bank case study. The case study describes a Lean Management implementation project within analyzed organization. During the project, Wrocław Food Bank went through full 5-step Lean Thinking processes, which consist of value identification, value stream mapping, creation of flow, establishing pull and seeking perfection. The research contains a detailed summary of each of those steps and provides with information regarding results of their implementation. The major findings of the study indicate, that application of Lean Management in NGO environment is possible, however physical implementation of its guidelines can be strongly impeded by multiple constraints, which non-governmental organizations are facing. Due to challenges like limited resources, project based activities and lack of traditional supplier-customer relationship, many NGOs may fail in their efforts to implement Lean Management. Successful Lean application requires therefore strong leadership commitment, which would drive transformation to remove barriers and obstacles.Keywords: lean management, non-governmental organizations, continuous improvement, lean thinking
Procedia PDF Downloads 30210577 A History of Knowledge Management: A Chronological Account from the 1970s to 2017
Authors: Alexslis N. Maindze
Abstract:
Knowledge management (KM) has become an imperative to modern business growth, competitive edge, and sustainability. Though there has been extensive research in the field, this literature overview showcases massive gaps that exist on the coverage of the field’s rich and fascinating history. Particularly, accounts of the history of KM are inconsistent and fragmentary in breadth and depth. This paper presents new insights into the history of KM from the early 70s when the actual coinage ‘knowledge management’ entered the literature. It reveals how knowledge over the years was shrouded in secrecy and subsumed by technology. It makes a clear distinction between the histories of the debate around knowledge and that of KM. The paper also finds a history of KM filled with skepticisms and engulfed by an ‘intellectual paradox’.Keywords: knowledge management history, secrecy, skepticism, intellectual paradox
Procedia PDF Downloads 21910576 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables
Authors: Vicx Farm
Abstract:
This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.Keywords: energy, agriculture, sustainability, power
Procedia PDF Downloads 7110575 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process
Authors: Itai Kohavi, Wojciech Nowiak
Abstract:
This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation
Procedia PDF Downloads 30210574 Development of Energy Management System Based on Internet of Things Technique
Authors: Wen-Jye Shyr, Chia-Ming Lin, Hung-Yun Feng
Abstract:
The purpose of this study was to develop an energy management system for university campuses based on the Internet of Things (IoT) technique. The proposed IoT technique based on WebAccess is used via network browser Internet Explore and applies TCP/IP protocol. The case study of IoT for lighting energy usage management system was proposed. Structure of proposed IoT technique included perception layer, equipment layer, control layer, application layer and network layer.Keywords: energy management, IoT technique, sensor, WebAccess
Procedia PDF Downloads 33310573 Create a Dynamic Model in Project Control and Management
Authors: Hamed Saremi, Shahla Saremi
Abstract:
In this study, control and management of construction projects is evaluated through developing a dynamic model in which some means are used in order to evaluating planning assumptions and reviewing the effectiveness of some project control policies based on previous researches about time, cost, project schedule pressure management, source management, project control, adding elements and sub-systems from cost management such as estimating consumption budget from budget due to costs, budget shortage effects and etc. using sensitivity analysis, researcher has evaluated introduced model that during model simulation by VENSIM software and assuming optimistic times and adding information about doing job and changes rate and project is forecasted with 373 days (2 days sooner than forecasted) and final profit $ 1,960,670 (23% amount of contract) assuming 15% inflation rate in year and costs rate accordance with planned amounts and other input information and final profit.Keywords: dynamic planning, cost, time, performance, project management
Procedia PDF Downloads 47710572 Prevalence and Hypertension Management among the Nomadic Migratory Community of Marsabit County, Kenya: Lessons Learned and Wayforward
Authors: Wesley Too, Christine Chesiror
Abstract:
Hypertension is a public health challenge that globally, with the World Health Organization estimating that by 2025, more than 1.5 billion people would have been diagnosed with it. Kenya’s prevalence of hypertension is estimated at 24.6 percent; however, 55% of the affected have uncontrolled blood pressure, which is worst in some parts of the country with different lifestyle: nomads and migratory communities. Kenyan pastoralists comprise 20% of the nation's population and are constantly on the move for search of water, pasture for their herd, and desertification have driven nomadic populations to the brink, given their unique and dynamic challenges. Nomads face myriad of challenges and barriers towards the management of their health care problems. Nomadic area is predominantly rural, with a low population density and a nomadic population. Health care access and quality are further hampered by poor telecommunications, infrastructure, and security. In Kenya, nomadic communities experience the worst health outcomes, disproportionate health disparities, and inequalities due to unresponsive, culturally sensitive health care system to nomad’s lifestyle and their health care needs. Marsabit covering a surface area of 66,923.1 km2, is the second largest county in Kenya, constituting about 2.3 million people of North-Eastern region, with only 2.3 percent and 1.9 percent of Kenya's total number of doctors and nurses in the country. In Kenya, there are scanty research on hypertension managementin this region and, at best, non-existent study on hypertension among nomads-migratory communities of Northern Kenya. Therefore, the purpose seeks to determine the prevalence of hypertension among nomads and document nomads' practices regarding early detections, management, and levels of control of hypertension in one of the Counties in Kenya with high- hypertensive case load per year. Methods: A cross-sectional study design was used to collect data from multiple sites and health facilities. A total of 260 participants were enrolled into the study. The study is currently ongoing. It is anticipated that by September, we will have initial findings & recommendations to share for conferenceKeywords: pastoralists, hypertension, health, kenya
Procedia PDF Downloads 10910571 Social Capital and Adoption of Sustainable Management Practices of Non Timber Forest Product in Cameroon
Authors: Eke Bala Sophie Michelle
Abstract:
The renewable resource character of NTFPs is an opportunity to its sustainability, this study analyzed the role of social capital in the adoption of sustainable management practices of NTFPs by households in the community forest (CF) Morikouali-ye. The analysis shows that 67% of households surveyed perceive the level of degradation of NTFPs in their CF as time passes and are close to 74% for adoption of sustainable management practices of NTFPs that are domestication, sustainable management of the CF, the logging ban trees and uprooting plants, etc. 26% refused to adopt these practices estimate that, at 39% it is better to promote logging in the CF. The estimated probit model shows that social capital through trust, solidarity and social inclusion significantly influences the probability of households to adopt sustainable NTFP management practices. In addition, age, education level and income from the sale of NTFPs have a significant impact on the probability of adoption. The probability of adoption increases with the level of education and confidence among households. So should they be animated by a spirit of solidarity and trust and not let a game of competition for sustainable management of NTFPs in their CF.Keywords: community forest, social capital, NTFP, trust, solidarity, social inclusion, sustainable management
Procedia PDF Downloads 36810570 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 24810569 Enhancing Quality Management Systems through Automated Controls and Neural Networks
Authors: Shara Toibayeva, Irbulat Utepbergenov, Lyazzat Issabekova, Aidana Bodesova
Abstract:
The article discusses the importance of quality assessment as a strategic tool in business and emphasizes the significance of the effectiveness of quality management systems (QMS) for enterprises. The evaluation of these systems takes into account the specificity of quality indicators, the multilevel nature of the system, and the need for optimal selection of the number of indicators and evaluation of the system state, which is critical for making rational management decisions. Methods and models of automated enterprise quality management are proposed, including an intelligent automated quality management system integrated with the Management Information and Control System. These systems make it possible to automate the implementation and support of QMS, increasing the validity, efficiency, and effectiveness of management decisions by automating the functions performed by decision makers and personnel. The paper also emphasizes the use of recurrent neural networks to improve automated quality management. Recurrent neural networks (RNNs) are used to analyze and process sequences of data, which is particularly useful in the context of document quality assessment and non-conformance detection in quality management systems. These networks are able to account for temporal dependencies and complex relationships between different data elements, which improves the accuracy and efficiency of automated decisions. The project was supported by a grant from the Ministry of Education and Science of the Republic of Kazakhstan under the Zhas Galym project No. AR 13268939, dedicated to research and development of digital technologies to ensure consistency of QMS regulatory documents.Keywords: automated control system, quality management, document structure, formal language
Procedia PDF Downloads 3810568 Analysis of Factors Used by Farmers to Manage Risk: A Case Study on Italian Farms
Authors: A. Pontrandolfi, G. Enjolras, F. Capitanio
Abstract:
The study analyses the strategies Italian farmers use to cope with the risks that face their production. We specifically explore the potential and the limitations of the economic tools for climatic risk management in agriculture of the Common Agricultural Policy 2014-2020, that foresees contributions for economic tools for risk management, in relation to farms’ needs, exposure and vulnerability of agricultural areas to climatic risk. We consider at the farm level approaches to hedge risks in terms of the use of technical tools (agricultural practices, pesticides, fertilizers, irrigation) and economic/financial instruments (insurances, etc.). We develop cross-sectional and longitudinal analyses as well as analyses of correlation that underline the main differences between the way farms adapt their structure and management towards risk. The results show a preference for technical tools, despite the presence of important public aids on economic tools such as insurances. Therefore, there is a strong need for a more effective and integrated risk management policy scheme. Synergies between economic tools and risk reduction actions of a more technical, structural and management nature (production diversification, irrigation infrastructures, technological and management innovations and formation-information-consultancy, etc.) are emphasized.Keywords: agriculture and climate change, climatic risk management, insurance schemes, farmers' approaches to risk management
Procedia PDF Downloads 34310567 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 32410566 Self-Inflicted Major Trauma: Inpatient Mental Health Management and Patient Outcomes
Authors: M. Walmsley, S. Elmatarri, S. Mannion
Abstract:
Introduction: Self-inflicted injury is a recognised cause of major trauma in adults and is an independent indicator of a reduced functional outcome compared to non-intentional major trauma. There is little literature available on the inpatient mental health (MH) management of this vulnerable group. A retrospective review was conducted of inpatient MH management of major trauma patients admitted to a UK regional Major Trauma Centre (MTC). Their outcomes were compared to all major trauma patients. This group of patients required multiple MH interventions whilst on the Major Trauma Ward (MTW) and a had worse functional outcome compared to non-intentional trauma. Method: The national TARN (Trauma Audit and Research Network) database was used to identify patients admitted to a regional MTC over a 2-year period from June 2018 to July 2020. Patients with an ISS (Injury Severity Score) of greater than 15 with a mechanism of either self-harm or high-risk behavior were included for further analysis. Inpatient medical notes were reviewed for MH interventions on the MTW. Further outcomes, including mortality, length of stay (LOS) and Glasgow Outcome Score (GOS) were compared with all major trauma patients for the same time period. Results: A total of 60 patients were identified in the time period and of those, 27 spent time on the MTW. A total of 23 (85%) had a prior MH diagnosis, with 11 (41%) under the care of secondary MH services. Adequate inpatient records for review were available for 24 patients. During their inpatient stay, 8 (33%) were reviewed on the ward by the inpatient MH team. There were 10 interventions required for 6 (25%) patients on the MTW including, sections under the Mental Health Act, transfer to specialist MH facility, pharmacological sedation and security being called to the MTW. When compared to all major trauma patients, those admitted due to self-harm or high-risk behavior had a statistically significantly higher ISS (31.43 vs 24.22, p=0.0001) and LOS (23.51d vs 16.06d, p=0.002). Functional outcomes using the GOS were reduced in this group of patients, GOS 5 (low disability) (51.66% vs. 61.01%) and they additionally had a higher level of mortality, GOS 1 (15.00% vs 11.67%). Discussion: Intentional self-harm is a recognised cause of major trauma in adults and this patient group sustains more severe injuries, requiring a longer hospital stay with worse outcomes compared to all major trauma patients. Inpatient MH interventions are required for a significant proportion of these patients and therefore, there needs to be a close relationship with MH services. There is limited available evidence for how this patient group is best managed as an inpatient to aid their recovery and further work is needed on how outcomes in this vulnerable group can be improved.Keywords: adult major trauma, attempted suicide, self-inflicted major trauma, inpatient management
Procedia PDF Downloads 18110565 Management Opposition, Strikes, and Union Threats
Authors: Patrick Nüß
Abstract:
I estimate management opposition against unions in terms of hiring discrimination by a large scale field experiment in the German labor market. The results show that callback rates for union members decrease significantly in the presence of high sectoral union density and large firm size. I further explore how this effect varies with regional and sectoral labor dispute intensity and find that management opposition is stronger when a sector is exposed to an intense labor dispute. There is evidence that the observed management opposition can be explained by sectoral union threat effects. Sectors with lower hiring discrimination have lower coverage of collective agreements, and in the absence of a collective agreement, they are less likely to follow the collective agreement wage setting.Keywords: trade unions, Industrial relations, management opposition, union threat, labor disputes, field experiments
Procedia PDF Downloads 18310564 Application of Blockchain Technology in Geological Field
Authors: Mengdi Zhang, Zhenji Gao, Ning Kang, Rongmei Liu
Abstract:
Management and application of geological big data is an important part of China's national big data strategy. With the implementation of a national big data strategy, geological big data management becomes more and more critical. At present, there are still a lot of technology barriers as well as cognition chaos in many aspects of geological big data management and application, such as data sharing, intellectual property protection, and application technology. Therefore, it’s a key task to make better use of new technologies for deeper delving and wider application of geological big data. In this paper, we briefly introduce the basic principle of blockchain technology at the beginning and then make an analysis of the application dilemma of geological data. Based on the current analysis, we bring forward some feasible patterns and scenarios for the blockchain application in geological big data and put forward serval suggestions for future work in geological big data management.Keywords: blockchain, intellectual property protection, geological data, big data management
Procedia PDF Downloads 8710563 Liquidity and Cash Management Practices of Owner-Managed Firms-A Case of South East, Nigeria
Authors: Ugbor Raphael Oluchukwu
Abstract:
The survey research design was adopted to examine whether liquidity and cash management practices of owner-managed firms in South East Nigeria influence their profitability, growth and survival. Four independent variables (accounting systems, working capital management, budgetary control, and managerial planning) were used in the evaluation which was restricted to eight small firms. Results indicate that one variable, working capital management alone dominate the liquidity perception of owner managers. As a result, owner managers find it difficult to meet maturing business obligations as growth sets in. The study also reveals that the four independent variables have significant impact on the profitability, growth and survival of owner managed firms. Owner managers are therefore advised to undertake regular entrepreneurship training in order to upgrade their liquidity and cash management knowledge and practices to enhance their overall performance.Keywords: liquidity management, owner-managed firm, profitability, survival
Procedia PDF Downloads 42910562 Introducing a Proper Total Quality Management Model for Libraries
Authors: Alireza Shahraki, Kaveh Keshmiry Zadeh
Abstract:
Total quality management in libraries is of particular importance because high-quality libraries can facilitate the sustained development process in countries. This study has been conducted to examine the feasibility of implementation of total quality management in libraries of Sistan and Baluchestan and to provide an appropriate model for this concern. All of the officials and employees of Sistan and Baluchestan libraries (23 individuals) constitute the population of the study. Data gathering tool is a questionnaire that is designated based on ISO9000. The data extracted from questionnaires were analyzed using SPSS software. Results indicate that the highest degree of conformance to the 8 principles of ISO9000 is attributed to the principle of 'users' (69.9%) and the lowest degree is associated with 'decision making based on facts' (39.1%). Moreover, a significant relationship was observed among the items (1 and 3), (2 and 5), (2 and 7), (3 and 5), (4 and 5), (4 and 7), (4 and 8), (5 and 7), and (7 and 8). According to the research findings, it can generally be said that it is not eligible now to utilize TQM in libraries of Sistan and Baluchestan.Keywords: quality management, total quality, university libraries, libraries management
Procedia PDF Downloads 33910561 Adoption of Noise and Vibration Management Tools for Major Infrastructure Projects in Sydney, Australia
Authors: Adrian Morris, Rodney Phillips, Mattia Tabacchi
Abstract:
Minimizing construction noise and vibration impacts is a key challenge for major infrastructure projects in urban environments. Before commencing construction works, Construction Noise and Vibration Management Plan (CNVMP) and Construction Noise and Vibration Impact Statements (CNVIS) are required to be prepared and submitted to the relevant government authorities for review and approval. However, the assessment of potential impacts from work activities at pre-approval stage may be inaccurate as works methodology and scheduling are yet to be determined. In response, noise and vibration management tools have been developed to refine and supplement the CNVIS as works progress. These tools have been successfully implemented in major infrastructure projects allowing contractors to plan and assess construction works in a cost effective and timely manner. As a result, noise and vibration management tools have been incorporated into management plans and are increasingly required by regulators.Keywords: noise management, environmental noise, infrastructure projects, construction, vibration, cost effective
Procedia PDF Downloads 12910560 Greening of Supply Chains: Benefits and Challenges Faced
Authors: Anurag Reddy Ramireddy, Abrar Ahmed, G. Sourya Sri Harsha, Pushkala Muralidharan
Abstract:
Supply chains have been developing over time since the inception of commercial trade and barter. The Green Supply Chain Management (GSCM) is a powerful way to differentiate a company from its competitors and it can greatly influence the plan success. With increased awareness to corporate responsibility and the requirement to meet the terms with environmental policy, GSCM is becoming increasingly important for companies. This paper explains the concept of green supply chain management, the difference between conventional supply chain management and green supply management and how GSCM benefits organizations while at the same time supporting a sustainable environment system. An effort has also been made to analyse research already done in this field while exploring the challenges and barriers that organizations face in implementing GSCM practices in their existing systems.Keywords: corporate social responsibility, green supply chain management, sustainability
Procedia PDF Downloads 38210559 An Investigation of Customer Relationship Management of Tourism
Authors: Wanida Suwunniponth
Abstract:
This research paper aimed to developing a causal relationship model of success factors of customer relationship management of tourism in Thailand and to investigating relationships among the potential factors that facilitate the success of customer relationship management (CRM). The research was conducted in both quantitative and qualitative methods, by utilizing both questionnaire and in-depth interview. The questionnaire was used in collecting the data from 250 management staff in the hotels located within Bangkok area. Sampling techniques used in this research included cluster sampling according to the service quality and simple random sampling. The data input was analyzed by use of descriptive analysis and System Equation Model (SEM). The research findings demonstrated important factors accentuated by most respondents towards the success of CRM, which were organization, people, information technology and the process of CRM. Moreover, the customer relationship management of tourism business in Thailand was found to be successful at a very significant level. The hypothesis testing showed that the hypothesis was accepted, as the factors concerning with organization, people and information technology played an influence on the process and the success of customer relationship management, whereas the process of customer relationship management factor manipulated its success. The findings suggested that tourism business in Thailand with the implementation of customer relationship management should opt in improvement approach in terms of managerial structure, corporate culture building with customer- centralized approach accentuated, and investment of information technology and customer analysis, in order to capacitate higher efficiency of customer relationship management process that would result in customer satisfaction and retention of service.Keywords: customer relationship management, casual relationship model, tourism, Thailand
Procedia PDF Downloads 33010558 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius
Abstract:
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal
Procedia PDF Downloads 48510557 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 14410556 Factors Affecting Citizens’ Behavioural Intention to Use E-voter Registration and Verification System Towards the Electoral Process in Nigeria
Authors: Aishatu Shuaibu
Abstract:
It is expected that electronic voter registration and verification in Nigeria will enhance the integrity of elections, which is vital for democratic development; it is also expected to enhance efficiency, transparency, and security. However, the reasons for citizens' intentions with respect to behavioral use of such platforms have not been studied in the literature much. This paper, therefore, intends to look into significant characteristics affecting the acceptance and use of e-voter technology among Nigerian residents. Data will be collected using a structured questionnaire from several local government areas (LGAs) around Nigeria to evaluate the influence of demographic characteristics, technology usability, security perceptions, and governmental education on the intention to implement e-voter systems. The results will offer vital insights into the barriers and drivers of voter technology acceptance, aiding in policy suggestions to enhance voter registration and verification processes within Nigeria's electoral framework. This study is designed to aid electoral stakeholders in devising successful strategies for encouraging the broad deployment of e-voter systems in Nigeria.Keywords: e-governance, e-voting, e-democracy, INEC, Nigeria
Procedia PDF Downloads 1810555 Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption
Authors: Koyangbo Guere Monguia Michel Alex Emmanuel
Abstract:
In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files.Keywords: cloud computing network, identity management systems, public key encryption, access control and authorization
Procedia PDF Downloads 35710554 Return to Work after a Mental Health Problem: Analysis of Two Different Management Models
Authors: Lucie Cote, Sonia McFadden
Abstract:
Mental health problems in the workplace are currently one of the main causes of absences. Research work has highlighted the importance of a collaborative process involving the stakeholders in the return-to-work process and has established the best management practices to ensure a successful return-to-work. However, very few studies have specifically explored the combination of various management models and determined whether they could satisfy the needs of the stakeholders. The objective of this study is to analyze two models for managing the return to work: the ‘medical-administrative’ and the ‘support of the worker’ in order to understand the actions and actors involved in these models. The study also aims to explore whether these models meet the needs of the actors involved in the management of the return to work. A qualitative case study was conducted in a Canadian federal organization. An abundant internal documentation and semi-directed interviews with six managers, six workers and four human resources professionals involved in the management of records of employees returning to work after a mental health problem resulted in a complete picture of the return to work management practices used in this organization. The triangulation of this data facilitated the examination of the benefits and limitations of each approach. The results suggest that the actions of management for employee return to work from both models of management ‘support of the worker’ and ‘medical-administrative’ are compatible and can meet the needs of the actors involved in the return to work. More research is needed to develop a structured model integrating best practices of the two approaches to ensure the success of the return to work.Keywords: return to work, mental health, management models, organizations
Procedia PDF Downloads 211