Search results for: information required
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14482

Search results for: information required

14362 Convergence with IFRS: Evidence from Financial Statements

Authors: M. S. Turan, Dimple

Abstract:

Due to implementation of IFRS by several developed and developing countries, India has no option other than to converge their accounting standards with IFRS. There are over 10,000 listed companies required to implement IFRS in India. IFRS based financial information presented by a company is different from the same information provided by Indian GAAPs. In this study, we have brought out and analyzed the effect of IFRS reporting on the financial statements of selected companies. The results reveal that convergence with IFRS brought prominent positive variations in the values of quick ratio, debt/equity ratio, proprietary ratio and net profit ratio, while negative variation is brought in the values of current ratio, debt to total assets ratio, operating profit ratio, return on capital employed and return on shareholders’ equity ratios. It also presents significant changes in the values of items of balance sheet, profit and loss account and cash flow statement.

Keywords: IFRS, reporting standards, convergence process, results

Procedia PDF Downloads 316
14361 A Secure System for Handling Information from Heterogeous Sources

Authors: Shoohira Aftab, Hammad Afzal

Abstract:

Information integration is a well known procedure to provide consolidated view on sets of heterogeneous information sources. It not only provides better statistical analysis of information but also facilitates users to query without any knowledge on the underlying heterogeneous information sources The problem of providing a consolidated view of information can be handled using Semantic data (information stored in such a way that is understandable by machines and integrate-able without manual human intervention). However, integrating information using semantic web technology without any access management enforced, will results in increase of privacy and confidentiality concerns. In this research we have designed and developed a framework that would allow information from heterogeneous formats to be consolidated, thus resolving the issue of interoperability. We have also devised an access control system for defining explicit privacy constraints. We designed and applied our framework on both semantic and non-semantic data from heterogeneous resources. Our approach is validated using scenario based testing.

Keywords: information integration, semantic data, interoperability, security, access control system

Procedia PDF Downloads 340
14360 ICT in Education – A Quest for Quality Learning in the 21st Century

Authors: Adam Johnbull

Abstract:

The paper discusses ICT in Education as a quest for quality learning in the 21st century. Education is the key that unlock the door to development, without adequate education of the citizenry, the development of a nation becomes a sham. Information Communication Technologies (ICTs) has revolutionized the way people work today and are now transforming education systems. As a result, if schools train children in yesterday’s skills and technologies they may not be effective and fit in tomorrow’s world. This is a sufficient reason for ICT’s to win global recognition and attention and thus ensure desire quality in our school system. Thus, the purpose of the paper is to discuss amongst others, what is ICT. The roles of ICT’s in education, limitation and key challenges of integrating ICT to education in the enhancement of student learning and experiences in other to encourage policy makers, school administrators and teachers pay the required attention to integrate this technology in the education system. The paper concludes that regardless of all the limitation characterizing it. ICT benefit education system to provide quality education in the 21st century.

Keywords: ICTs, quest, information, global, sham, century

Procedia PDF Downloads 414
14359 An Expert System for Assessment of Learning Outcomes for ABET Accreditation

Authors: M. H. Imam, Imran A. Tasadduq, Abdul-Rahim Ahmad, Fahd M. Aldosari

Abstract:

Learning outcomes of a course (CLOs) and the abilities at the time of graduation referred to as Student Outcomes (SOs) are required to be assessed for ABET accreditation. A question in an assessment must target a CLO as well as an SO and must represent a required level of competence. This paper presents the idea of an Expert System (ES) to select a proper question to satisfy ABET accreditation requirements. For ES implementation, seven attributes of a question are considered including the learning outcomes and Bloom’s Taxonomy level. A database contains all the data about a course including course content topics, course learning outcomes and the CLO-SO relationship matrix. The knowledge base of the presented ES contains a pool of questions each with tags of the specified attributes. Questions and the attributes represent expert opinions. With implicit rule base the inference engine finds the best possible question satisfying the required attributes. It is shown that the novel idea of such an ES can be implemented and applied to a course with success. An application example is presented to demonstrate the working of the proposed ES.

Keywords: expert system, student outcomes, course learning outcomes, question attributes

Procedia PDF Downloads 241
14358 The Phosphatidate Phosphatase Pah1 and Its Regulator Nem1/spo7 Protein Phosphatase Required for Nucleophagy

Authors: Muhammad Arifur Rahman, Talukdar M. Waliullah, Takashi Ushimaru

Abstract:

Nucleophagy selectively degrades nuclear materials, especially nucleolus after nutrient starvation or inactivation of TORC1 kinase in budding yeast. Budding yeast phosphatidate (PA) phosphatase Pah1 that converts PA to diacylglycerol is essential for partitioning of lipid precursors between membrane and storage that is crucial for many aspects of cell growth and development. Pah1 is required for nuclear/ER membrane biogenesis and vacuole function, but whether Pah1 and its activator Nem1/Spo7 protein phosphatase complex are involved in autophagy is largely unknown. Loss of Pah1 causes expansion of the nucleus and fragmentation of the vacuole. Here we show that Pah1 is required for bulk autophagy and nucleophagy after TORC1 inactivation. Loss of Pah1 impaired nucleophagy severely and bulk autophagy to a lesser extent. Loss of the Pah1 activator Nem1-Spo7 protein phosphatase exhibited similar features.

Keywords: autophagy, Nem1/Spo7 phosphatase, Pah1, nucleophagy, TORC1

Procedia PDF Downloads 207
14357 Label Survey in Romania: A Study on How Consumers Use Food Labeling

Authors: Gabriela Iordachescu, Mariana Cretu Stuparu, Mirela Praisler, Camelia Busila, Doina Voinescu, Camelia Vizireanu

Abstract:

The aim of the study was to evaluate the consumers’ degree of confidence in food labeling, how they use and understand the label and respectively food labeling elements. The label is a bridge between producers, suppliers, and consumers. It has to offer enough information in terms of public health and food safety, statement of ingredients, nutritional information, warnings and advisory statements, producing date and shelf-life, instructions for storage and preparation (if required). The survey was conducted on 500 consumers group in Romania, aged 15+, males and females, from urban and rural areas and with different graduation levels. The questionnaire was distributed face to face and online. It had single or multiple choices questions and label images for the efficiency and best understanding of the question. The law 1169/2011 applied to food products from 13 of December 2016 improved and adapted the requirements for labeling in a clear manner. The questions were divided on following topics: interest and general trust in labeling, use and understanding of label elements, understanding of the ingredient list and safety information, nutrition information, advisory statements, serving sizes, best before/use by meanings, intelligent labeling, and demographic data. Three choice selection exercises were also included. In this case, the consumers had to choose between two similar products and evaluate which label element is most important in product choice. The data were analysed using MINITAB 17 and PCA analysis. Most of the respondents trust the food label, taking into account some elements especially when they buy the first time the product. They usually check the sugar content and type of sugar, saturated fat and use the mandatory label elements and nutrition information panel. Also, the consumers pay attention to advisory statements, especially if one of the items is relevant to them or the family. Intelligent labeling is a challenging option. In addition, the paper underlines that the consumer is more careful and selective with the food consumption and the label is the main helper for these.

Keywords: consumers, food safety information, labeling, labeling nutritional information

Procedia PDF Downloads 200
14356 The Voluntary Audit of Semi-Annual Consolidated Financial Statements Decision and Accounting Conservatism

Authors: Shuofen Hsu, Ya-Yi Chao, Chao-Wei Li

Abstract:

This paper investigates the relationship between voluntary audit (hereafter, VA) of semi-annual consolidated financial statements decision and accounting conservatism. In general, there are four kinds of auditors' assurance services, which include audit, review, agreed-upon procedure and compliance engagements base on degree of assurance. The VA work by auditors may not only have the higher audit quality but an important signal of more reliable information than the review work. In Taiwan, The listed companies must prepare the semi-annual consolidated financial statements and with auditors' review before 2012, but some of the listed companies choose the assurance work from review to audit voluntarily. Due to the adoption of International Financial Reporting Standards, the listed companies were required to prepare the second quarterly consolidated financial statements which should be reviewed by auditors since 2013. This rule will change some of the assurance work from audit to review by auditors, and the information asymmetry maybe increased. To control the selection bias, we use two-stage model to test the relationship between VA decision and accounting conservatism. Our empirical results indicate that the VA decision and accounting conservatism have a significant positive relationship in firms with family-controlled. That is, firms with family-controlled are more likely to do VA and to prepare more conservative consolidated financial statements to reduce the information asymmetry, meaning that there is a complementary effect between VA and accounting conservatism for firms with more information asymmetry. But on the contrary, we find that the VA decision and accounting conservatism have a significant negative relationship in firms with professional managers-controlled, meaning that there is a substitution effect between VA and accounting conservatism for firms with less information asymmetry. Finally, the accounting conservatism of consolidated financial statements decrease after the adoption of IFRSs (International Financial Reporting Standards) in Taiwan. It means that the disclosure and transparency of consolidated financial statements had be improved.

Keywords: voluntary audit, accounting conservatism, audit quality, information asymmetry

Procedia PDF Downloads 215
14355 The Role of Online Videos in Undergraduate Casual-Leisure Information Behaviors

Authors: Nei-Ching Yeh

Abstract:

This study describes undergraduate casual-leisure information behaviors relevant to online videos. Diaries and in-depth interviews were used to collect data. Twenty-four undergraduates participated in this study (9 men, 15 women; all were aged 18–22 years). This study presents a model of casual-leisure information behaviors and contributes new insights into user experience in casual-leisure settings, such as online video programs, with implications for other information domains.

Keywords: casual-leisure information behaviors, information behavior, online videos, role

Procedia PDF Downloads 296
14354 Interoperable Design Coordination Method for Sharing Communication Information Using Building Information Model Collaboration Format

Authors: Jin Gang Lee, Hyun-Soo Lee, Moonseo Park

Abstract:

The utilization of BIM and IFC allows project participants to collaborate across different areas by consistently sharing interoperable product information represented in a model. Comments or markups generated during the coordination process can be categorized as communication information, which can be shared in less standardized manner. It can be difficult to manage and reuse such information compared to the product information in a model. The present study proposes an interoperable coordination method using BCF (the BIM Collaboration Format) for managing and sharing the communication information during BIM based coordination process. A management function for coordination in the BIM collaboration system is developed to assess its ability to share the communication information in BIM collaboration projects. This approach systematically links communication information during the coordination process to the building model and serves as a type of storage system for retrieving knowledge created during BIM collaboration projects.

Keywords: design coordination, building information model, BIM collaboration format, industry foundation classes

Procedia PDF Downloads 411
14353 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 309
14352 The Effect of Information Technologies on Business Performance: An Application on Small Hotels

Authors: Abdullah Karaman, Kursad Sayin

Abstract:

In this research, which information technologies are used in small hotel businesses, and the information technologies-performance perception of the managers are pointed out. During the research, the questionnaire was prepared and the small scale hotel managers were interviewed face to face and they filled out the questionnaire and the answers acquired were evaluated. As the result of the research, it was obtained that the managers do not care much about the information technologies usage in practice even though they accepted that the information technologies are important in terms of performance.

Keywords: information technologies, managers, performance, small hotels

Procedia PDF Downloads 473
14351 Tsunami Wave Height and Flow Velocity Calculations Based on Density Measurements of Boulders: Case Studies from Anegada and Pakarang Cape

Authors: Zakiul Fuady, Michaela Spiske

Abstract:

Inundation events, such as storms and tsunamis can leave onshore sedimentary evidence like sand deposits or large boulders. These deposits store indirect information on the related inundation parameters (e.g., flow velocity, flow depth, wave height). One tool to reveal these parameters are inverse models that use the physical characteristics of the deposits to refer to the magnitude of inundation. This study used boulders of the 2004 Indian Ocean Tsunami from Thailand (Pakarang Cape) and form a historical tsunami event that inundated the outer British Virgin Islands (Anegada). For the largest boulder found in Pakarang Cape with a volume of 26.48 m³ the required tsunami wave height is 0.44 m and storm wave height are 1.75 m (for a bulk density of 1.74 g/cm³. In Pakarang Cape the highest tsunami wave height is 0.45 m and storm wave height are 1.8 m for transporting a 20.07 m³ boulder. On Anegada, the largest boulder with a diameter of 2.7 m is the asingle coral head (species Diploria sp.) with a bulk density of 1.61 g/cm³, and requires a minimum tsunami wave height of 0.31 m and storm wave height of 1.25 m. The highest required tsunami wave height on Anegada is 2.12 m for a boulder with a bulk density of 2.46 g/cm³ (volume 0.0819 m³) and the highest storm wave height is 5.48 m (volume 0.216 m³) from the same bulk density and the coral type is limestone. Generally, the higher the bulk density, volume, and weight of the boulders, the higher the minimum tsunami and storm wave heights required to initiate transport. It requires 4.05 m/s flow velocity by Nott’s equation (2003) and 3.57 m/s by Nandasena et al. (2011) to transport the largest boulder in Pakarang Cape, whereas on Anegada, it requires 3.41 m/s to transport a boulder with diameter 2.7 m for both equations. Thus, boulder equations need to be handled with caution because they make many assumptions and simplifications. Second, the physical boulder parameters, such as density and volume need to be determined carefully to minimize any errors.

Keywords: tsunami wave height, storm wave height, flow velocity, boulders, Anegada, Pakarang Cape

Procedia PDF Downloads 225
14350 Steps towards the Development of National Health Data Standards in Developing Countries

Authors: Abdullah I. Alkraiji, Thomas W. Jackson, Ian Murray

Abstract:

The proliferation of health data standards today is somewhat overlapping and conflicting, resulting in market confusion and leading to increasing proprietary interests. The government role and support in standardization for health data are thought to be crucial in order to establish credible standards for the next decade, to maximize interoperability across the health sector, and to decrease the risks associated with the implementation of non-standard systems. The normative literature missed out the exploration of the different steps required to be undertaken by the government towards the development of national health data standards. Based on the lessons learned from a qualitative study investigating the different issues to the adoption of health data standards in the major tertiary hospitals in Saudi Arabia and the opinions and feedback from different experts in the areas of data exchange and standards and medical informatics in Saudi Arabia and UK, a list of steps required towards the development of national health data standards was constructed. Main steps are the existence of: a national formal reference for health data standards, an agreed national strategic direction for medical data exchange, a national medical information management plan and a national accreditation body, and more important is the change management at the national and organizational level. The outcome of this study can be used by academics and practitioners to develop the planning of health data standards, and in particular those in developing countries.

Keywords: interoperabilty, medical data exchange, health data standards, case study, Saudi Arabia

Procedia PDF Downloads 327
14349 Analysis Model for the Relationship of Users, Products, and Stores on Online Marketplace Based on Distributed Representation

Authors: Ke He, Wumaier Parezhati, Haruka Yamashita

Abstract:

Recently, online marketplaces in the e-commerce industry, such as Rakuten and Alibaba, have become some of the most popular online marketplaces in Asia. In these shopping websites, consumers can select purchase products from a large number of stores. Additionally, consumers of the e-commerce site have to register their name, age, gender, and other information in advance, to access their registered account. Therefore, establishing a method for analyzing consumer preferences from both the store and the product side is required. This study uses the Doc2Vec method, which has been studied in the field of natural language processing. Doc2Vec has been used in many cases to analyze the extraction of semantic relationships between documents (represented as consumers) and words (represented as products) in the field of document classification. This concept is applicable to represent the relationship between users and items; however, the problem is that one more factor (i.e., shops) needs to be considered in Doc2Vec. More precisely, a method for analyzing the relationship between consumers, stores, and products is required. The purpose of our study is to combine the analysis of the Doc2vec model for users and shops, and for users and items in the same feature space. This method enables the calculation of similar shops and items for each user. In this study, we derive the real data analysis accumulated in the online marketplace and demonstrate the efficiency of the proposal.

Keywords: Doc2Vec, online marketplace, marketing, recommendation systems

Procedia PDF Downloads 103
14348 Design and Implementation of an Effective Machine Learning Approach to Crime Prediction and Prevention

Authors: Ashish Kumar, Kaptan Singh, Amit Saxena

Abstract:

Today, it is believed that crimes have the greatest impact on a person's ability to progress financially and personally. Identifying places where individuals shouldn't go is crucial for preventing crimes and is one of the key considerations. As society and technologies have advanced significantly, so have crimes and the harm they wreak. When there is a concentration of people in one place and changes happen quickly, it is even harder to prevent. Because of this, many crime prevention strategies have been embraced as a component of the development of smart cities in numerous cities. However, crimes can occur anywhere; all that is required is to identify the pattern of their occurrences, which will help to lower the crime rate. In this paper, an analysis related to crime has been done; information related to crimes is collected from all over India that can be accessed from anywhere. The purpose of this paper is to investigate the relationship between several factors and India's crime rate. The review has covered information related to every state of India and their associated regions of the period going in between 2001- 2014. However various classes of violations have a marginally unique scope over the years.

Keywords: K-nearest neighbor, random forest, decision tree, pre-processing

Procedia PDF Downloads 76
14347 Prevalence of Gestational Diabetes Mellitus in Western Australia from 2015 until 2020

Authors: Kumaressan Ragunathan, Arisudhan Anantharachagan

Abstract:

Gestational diabetes mellitus (GDM) is the subtype of diabetes that has been rapidly increasing in numbers in Australia. The annual percentage of GDM has increased more than 50 percent in the last decade. According to Diabetes Australia, more than five hundred thousand women in Australia will be diagnosed with GDM. Globally, the prevalence of GDM ranges from single-digit to more than 45%. The prevalence of GDM has increased significantly last five years after the introduction of new diagnostic criteria. Hence, we have decided to investigate the trend in GDM prevalence in a tertiary maternity unit at Western Australia and compare it to national prevalence. Data is derived from STORK Perinatal Database which has been used by Maternity services in Western Australia to populate information on pregnancy and labour. We have selected data from 2015 until 2020, which includes 17508 women. Among 17508 women, 3850 women were diagnosed with GDM. In 2015, we had a total of 2213 deliveries with 345 of them were complicated by GDM. GDM prevalence was 15.6% compared to the Australian national prevalence of 12%. In 2016, total deliveries increased to 2759 with 590 of were with GDM. GDM prevalence was 21.4% compared to the Australian national prevalence of 12%. In 2017, total deliveries further increased to 3049 with 675 with GDM. GDM prevalence was 22.1%, with an Australian national prevalence of 13%. In 2018, total deliveries continued to increase, with numbers reaching 3231 with 749 with GDM. GDM prevalence was 23.2%, with an Australian National prevalence of 14%. In 2019, total deliveries were 3110, with 712 complicated by GDM. GDM prevalence was 22.9%, with Australian national prevalence 14%. In 2020, total deliveries 3146 with 819 complicated by GDM. GDM prevalence increased to 26% and we were unable to compare this to national standard as national prevalence has not been released. Among 3890 women with GDM, 2482 (64%) of them required insulin. Apart from that, a total 1642(42%) from the GDM group were delivered via the Caesarean section. 2121 (55%) women with GDM required induction of labour. Overall, we demonstrated an increase in the prevalence of GDM in our unit from 2015 until 2020. Our prevalence is also higher compared to national prevalence. This could be contributed by the increasing number of obesity and in addition, our unit accepts referrals of women with a body mass index (BMI) of more than 40. Hence, further studies are required to look at other risk factors like ethnicity, socio-economic status, health literacy and age, which could contribute to this high prevalence.

Keywords: gestational diabetes mellitus, prevalence, Western Australia, Australia

Procedia PDF Downloads 149
14346 Exploiting JPEG2000 into Reversible Information

Authors: Te-Jen Chang, I-Hui Pan, Kuang-Hsiung Tan, Shan-Jen Cheng, Chien-Wu Lan, Chih-Chan Hu

Abstract:

With the event of multimedia age in order to protect data not to be tampered, damaged, and faked, information hiding technologies are proposed. Information hiding means important secret information is hidden into cover multimedia and then camouflaged media is produced. This camouflaged media has the characteristic of natural protection. Under the undoubted situation, important secret information is transmitted out.Reversible information hiding technologies for high capacity is proposed in this paper. The gray images are as cover media in this technology. We compress gray images and compare with the original image to produce the estimated differences. By using the estimated differences, expression information hiding is used, and higher information capacity can be achieved. According to experimental results, the proposed technology can be approved. For these experiments, the whole capacity of information payload and image quality can be satisfied.

Keywords: cover media, camouflaged media, reversible information hiding, gray image

Procedia PDF Downloads 316
14345 Capnography in Hypoxic Pseudo-Pea May Correlate to the Amount of Required Intervention for Resuscitation

Authors: Yiyuan David Hu, Alex Lindqwister, Samuel B. Klein, Karen Moodie, Norman A. Paradis

Abstract:

Introduction: Pseudo-Pulseless Electrical Activity (p-PEA) is a lifeless form of profound cardiac shock characterized by measurable cardiac mechanical activity without clinically detectable pulses. Patients in pseudo-PEA carry different prognoses than those in true PEA and may require different therapies. End-tidal carbon dioxide (ET-CO2) has been studied in ventricular fibrillation and true PEA but in p-PEA. We utilized an hypoxic porcine model to characterize the performance of ET-CO2 in resuscitation from p-PEA. Hypothesis: Capnography correlates to the number of required interventions for resuscitation from p-PEA. Methods: Female swine (N = 14) under intravenous anesthesia were instrumented with aortic and right atrial micromanometer pressure. ECG and ET-CO2 were measured continuously. p-PEA was induced by ventilation with 6% oxygen in 94% nitrogen and was defined as a systolic aortic (Ao) pressure less than 40 mmHg. Pigs were grouped based on the interventions required to achieve ROSC: 100%O2, 100%O2 + CPR, 100%O2 + CPR + epinephrine. Results: End tidal CO2 reliably predicted O2 therapy vs CPR-based interventions needed for resuscitation (Figure 1). Pigs who would recover with 100%O2 only had a mean ET-CO2 slope of 0.039 ± 0.013 [ R2 = 0.68], those requiring oxygen + CPR had a slope of -0.15 ± 0.016 [R2 = 0.95], and those requiring oxygen + CPR + epinephrine had a slope of -0.12 ± 0.031 [R2 = 0.79]. Conclusions: In a porcine model of hypoxic p-PEA, measured ET-CO2 appears to be strongly correlated with the required interventions needed for ROSC. If confirmed clinically, these results indicate that ET-CO2 may be useful in guiding therapy in patients suffering p-PEA cardiac arrest.

Keywords: pseudo-PEA, resuscitation, capnography, hypoxic pseudo-PEA

Procedia PDF Downloads 177
14344 Managing Information Technology: An Overview of Information Technology Governance

Authors: Mehdi Asgarkhani

Abstract:

Today, investment on Information Technology (IT) solutions in most organizations is the largest component of capital expenditure. As capital investment on IT continues to grow, IT managers and strategists are expected to develop and put in practice effective decision making models (frameworks) that improve decision-making processes for the use of IT in organizations and optimize the investment on IT solutions. To be exact, there is an expectation that organizations not only maximize the benefits of adopting IT solutions but also avoid the many pitfalls that are associated with rapid introduction of technological change. Different organizations depending on size, complexity of solutions required and processes used for financial management and budgeting may use different techniques for managing strategic investment on IT solutions. Decision making processes for strategic use of IT within organizations are often referred to as IT Governance (or Corporate IT Governance). This paper examines IT governance - as a tool for best practice in decision making about IT strategies. Discussions in this paper represent phase I of a project which was initiated to investigate trends in strategic decision making on IT strategies. Phase I is concerned mainly with review of literature and a number of case studies, establishing that the practice of IT governance, depending on the complexity of IT solutions, organization's size and organization's stage of maturity, varies significantly – from informal approaches to sophisticated formal frameworks.

Keywords: IT governance, corporate governance, IT governance frameworks, IT governance components, aligning IT with business strategies

Procedia PDF Downloads 393
14343 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 538
14342 The Quality of Accounting Information of Private Companies in the Czech Republic

Authors: Kateřina Struhařová

Abstract:

The paper gives the evidence of quality of accounting information of Czech private companies. In general the private companies in the Czech Republic do not see the benefits of providing accounting information of high quality. Based on the research of financial statements of entrepreneurs and companies in Zlin region it was confirmed that the quality of accounting information differs among the private entities and that the major impact on the accounting information quality has the fact if the financial statements are audited as well as the size of the entity. Also the foreign shareholders and lenders have some impact on the accounting information quality.

Keywords: accounting information quality, financial statements, Czech Republic, private companies

Procedia PDF Downloads 290
14341 Knowledge Management Strategies within a Corporate Environment of Papers

Authors: Daniel J. Glauber

Abstract:

Knowledge transfer between personnel could benefit an organization’s improved competitive advantage in the marketplace from a strategic approach to knowledge management. The lack of information sharing between personnel could create knowledge transfer gaps while restricting the decision-making processes. Knowledge transfer between personnel can potentially improve information sharing based on an implemented knowledge management strategy. An organization’s capacity to gain more knowledge is aligned with the organization’s prior or existing captured knowledge. This case study attempted to understand the overall influence of a KMS within the corporate environment and knowledge exchange between personnel. The significance of this study was to help understand how organizations can improve the Return on Investment (ROI) of a knowledge management strategy within a knowledge-centric organization. A qualitative descriptive case study was the research design selected for this study. The lack of information sharing between personnel may create knowledge transfer gaps while restricting the decision-making processes. Developing a knowledge management strategy acceptable at all levels of the organization requires cooperation in support of a common organizational goal. Working with management and executive members to develop a protocol where knowledge transfer becomes a standard practice in multiple tiers of the organization. The knowledge transfer process could be measurable when focusing on specific elements of the organizational process, including personnel transition to help reduce time required understanding the job. The organization studied in this research acknowledged the need for improved knowledge management activities within the organization to help organize, retain, and distribute information throughout the workforce. Data produced from the study indicate three main themes including information management, organizational culture, and knowledge sharing within the workforce by the participants. These themes indicate a possible connection between an organizations KMS, the organizations culture, knowledge sharing, and knowledge transfer.

Keywords: knowledge transfer, management, knowledge management strategies, organizational learning, codification

Procedia PDF Downloads 432
14340 Development of an IoT System for Smart Crop Production

Authors: Oyenike M. Olanrewaju, Faith O. Echobu, Aderemi G. Adesoji, Emmy Danny Ajik, Joseph Nda Ndabula, Stephen Lucas

Abstract:

Nutrients are required for any soil with which plants thrive to improve efficient growth and productivity. Amongst these nutrients required for proper plant productivity are nitrogen, phosphorus and potassium (NPK). Due to factors like leaching, nutrients uptake by plants, soil erosion and evaporation, these elements tend to be in low quantity and the need to replenish them arises. But these replenishment of soil nutrients cannot be done without a timely soil test to enable farmers to know the amount of each element in short quantity and evaluate the amount required to be added. Though wet soil analysis is good but it comes with a lot of challenges ranging from soil test gargets availability to the technical knowledge of how to conduct such soil test by the common farmer. Internet of things test kit was developed to fill in the gaps created by wet soil analysis, as it can test for N, P, K, soil temperature and soil moisture in a given soil at the time of test. In this implementation, sample test was carried out within 0.2 hectares of land divided into smaller plots. The kits perform adequately well as the range of values obtained across the segments were within a very close range.

Keywords: Internet of Things, soil nutrients, test kit, soil temperature

Procedia PDF Downloads 61
14339 Operation Strategy of Multi-Energy Storage System Considering Power System Reliability

Authors: Wook-Won Kim, Je-Seok Shin, Jin-O Kim

Abstract:

As the penetration of Energy Storage System (ESS) increases in the power system due to higher performance and lower cost than ever, ESS is expanding its role to the ancillary service as well as the storage of extra energy from the intermittent renewable energy resources. For multi-ESS with different capacity and SOC level each other, it is required to make the optimal schedule of SOC level use the multi-ESS effectively. This paper proposes the energy allocation method for the multiple battery ESS with reliability constraint, in order to make the ESS discharge the required energy as long as possible. A simple but effective method is proposed in this paper, to satisfy the power for the spinning reserve requirement while improving the system reliability. Modelling of ESS is also proposed, and reliability is evaluated by using the combined reliability model which includes the proposed ESS model and conventional generation one. In the case study, it can be observed that the required power is distributed to each ESS adequately and accordingly, the SOC is scheduled to improve the reliability indices such as Loss of Load Probability (LOLP) and Loss of Load Expectation (LOLE).

Keywords: multiple energy storage system (MESS), energy allocation method, SOC schedule, reliability constraints

Procedia PDF Downloads 353
14338 The Impact of Information and Communication Technology on the Performance of Office Technology Managers

Authors: Sunusi Tijjani

Abstract:

Information and communication technology is an indispensable tool in the performance of office technology managers. Today's offices are automated and equipped with modern office machines that enhances and improve the work of office managers. However, today's office technology managers can process, evaluate, manage and communicate all forms of information using technological devices. Information and Communication Technology is viewed as the process of processing, storing ad dissemination information while office technology managers are trained professional who can effectively operate modern office machines, perform administrative duties and attend meetings to take dawn minute of meetings. This paper examines the importance of information and communication technology toward enhancing the work of office managers. It also stresses the importance of information and communication technology toward proper and accurate record management.

Keywords: communication, information, technology, managers

Procedia PDF Downloads 469
14337 A Study on How to Link BIM Services to Cloud Computing Architecture

Authors: Kim Young-Jin, Kim Byung-Kon

Abstract:

Although more efforts to expand the application of BIM (Building Information Modeling) technologies have be pursued in recent years than ever, it’s true that there have been various challenges in doing so, including a lack or absence of relevant institutions, lots of costs required to build BIM-related infrastructure, incompatible processes, etc. This, in turn, has led to a more prolonged delay in the expansion of their application than expected at an early stage. Especially, attempts to save costs for building BIM-related infrastructure and provide various BIM services compatible with domestic processes include studies to link between BIM and cloud computing technologies. Also in this study, the author attempted to develop a cloud BIM service operation model through analyzing the level of BIM applications for the construction sector and deriving relevant service areas, and find how to link BIM services to the cloud operation model, as through archiving BIM data and creating a revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources.

Keywords: construction IT, BIM (building information modeling), cloud computing, BIM service based cloud computing

Procedia PDF Downloads 478
14336 Role of Academic Library in/for Information Literacy

Authors: Veena Rani

Abstract:

This paper presents the role of academic library in information literacy in the present time. Information is the very important aspect for the growth of any country. In this context information literacy is an essential tool in the development of various fields. Academic library is an essential part of university as well as of an institution. In Academic library we can include university library, college library as well as school library. Academic libraries are playing an important role for information literacy. Academic libraries provide excellent services for the benefit of students, teachers, researchers, and all those who are interested in education. All over the world many of the schemes, policies and services provide for information literacy.

Keywords: information literacy, academic library, tool literacy, higher education

Procedia PDF Downloads 353
14335 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 531
14334 Exploring the Food Environments and Their Influence on Food Choices of Working Adults

Authors: Deepa Shokeen, Bani Tamber Aeri

Abstract:

Food environments are believed to play a significant role in the obesity epidemic and robust research methods are required to establish which factors or aspects of the food environment are relevant to food choice and to adiposity. The relationship between the food environment and obesity is complex. While there is little research linking food access with obesity as an outcome measure in any age group, with the help of this article we will try to understand the relationship between what we eat and the environmental context in which these food choices are made. Methods: A literature search of studies published between January 2000 and December 2013 was undertaken on computerized medical, social science, health, nutrition and education databases including Google, PubMed etc. Reports of organisations such as World Health Organisation (WHO), Centre for Chronic Disease Control (CCDC) were studied to project the data. Results: Studies show that food environments play a significant role in the obesity epidemic and robust research methods are required to establish which factors or aspects of the food environment are relevant to food choice and to adiposity. Evidence indicates that the food environment may help explain the obesity and cardio-metabolic risk factors among young adults. Conclusion: Cardiovascular disease is the ever growing chronic disease, the incidence of which will increase markedly in the coming decades. Therefore, it is the need of the hour to assess the prevalence of various risk factors that contribute to the incidence of cardiovascular diseases especially in the work environment. Research is required to establish how different environments affect different individuals as individuals interact with the environment on a number of levels. We need to ascertain the impact of selected food and nutrition environments (Information, organization, community, consumer) on food choice and dietary intake of the working adults as it is important to learn how these food environments influence the eating perceptions and health behaviour of the adults.

Keywords: food environment, prevalence, cardiovascular disease, India, worksite, risk factors

Procedia PDF Downloads 391
14333 An Explanatory Study into the Information-Seeking Behaviour of Egyptian Beggars

Authors: Essam Mansour

Abstract:

The key purpose of this study is to provide first-hand information about beggars in Egypt, especially from the perspective of their information seeking behaviour including their information needs. The researcher tries to investigate the information-seeking behaviour of Egyptian beggars with regard to their thoughts, perceptions, motivations, attitudes, habits, preferences as well as challenges that may impede their use of information. The research methods used were an adapted form of snowball sampling of a heterogeneous demographic group of participants in the beggary activity in Egypt. This sampling was used to select focus groups to explore a range of relevant issues. Data on the demographic characteristics of the Egyptian beggars showed that they tend to be men, mostly with no formal education, with an average age around 30s, labeled as low-income persons, mostly single and mostly Muslims. A large number of Egyptian beggars were seeking for information to meet their basic needs as well as their daily needs, although some of them were not able to identify their information needs clearly. The information-seeking behaviour profile of a very large number of Egyptian beggars indicated a preference for informal sources of information over formal ones to solve different problems and meet the challenges they face during their beggary activity depending on assistive devices, such as mobile phones. The high degree of illiteracy and the lack of awareness about the basic rights of information as well as information needs were the most important problems Egyptian beggars face during accessing information. The study recommended further research to be conducted about the role of the library in the education of beggars. It also recommended that beggars’ awareness about their information rights should be promoted through educational programs that help them value the role of information in their life.

Keywords: user studies, information-seeking behaviour, information needs, information sources, beggars, Egypt

Procedia PDF Downloads 304