Search results for: terrorist organizations
2291 Autopoietic Socio-technical Systems: A New Lens for Understanding Anticipation
Authors: Gregory Vigneaux
Abstract:
The capacity to anticipate future events across varying time scales is integral to the effective operation of both emergency management and emergency services organizations. This paper provides fresh insight into anticipation by first offering a novel conceptualization of organizations in both fields by twisting together socio-technical systems and autopoietic theory. The result of this intertwining of theory is a view of emergency management and emergency services organizations as self-reproducing systems driven by socio-technical processes contingent upon both inflows and outflows across a boundary produced by the system’s own activity. Flowing from this perspective is an approach to anticipation that extends from a system’s intent of continuing to reproduce its identity over a dynamic landscape. This discussion takes a pragmatic turn through Maturana and Verden-Zöller’s domains of structural change, classifying anticipated events and connecting them with types of responses involving inflows, outflows, and socio-technical processes.Keywords: risk, anticipation, organizations, planning, transformation, identity
Procedia PDF Downloads 1202290 Upward Millennium: Enterprise Resource Planning (ERP) Development and Implementation in Pakistani Organizations
Authors: Sara Aziz, Madiha Arooj, Hira Rizwani, Wasim Irshad
Abstract:
Enterprise Resource Planning (ER) as component of Information Resource System has turned up as one of the most demanding software in market for the new millennium. ERP system automates the core activities of any organization such as finance, manufacturing and supply chain management, human resource etc. to generate an access to the information in real time environment. Despite this fact many of the organizations globally particularly in developing country Pakistan are unaware and avoid adopting it. The development and implementation of ERP system is a complex and challenging process. This research was aimed to explore the benefits and coping strategies (with reference to end user reaction) of organizations those have implemented ERP. The problems addressed in this study focused the challenges and key success factors regarding implementing ERP Pakistani Organizations. Secondly, it has explored the stumbling blocks and business integration of those organizations that are not implementing ERP. The public and corporate sector organizations in Pakistan were selected to collect the data. The research finding shows that the organizational culture, openness towards adoption and learning, deployment and development, top management commitment and change systems, business processes and compatibility and user acceptance and reaction are contributing factors for successful implementation and development of ERP system. This research is thus an addition to enhance knowledge and understanding of implementation of ERP system in Pakistan.Keywords: ERP system, user acceptance and involvement, change management, organizational culture
Procedia PDF Downloads 2812289 Restorative Justice to the Victims of Terrorism in the Criminal Justice System of India
Authors: Sumanta Meher, Gaurav Shukla
Abstract:
The torments of the victims of terrorism have not only confined to loss of life and limp but also includes the physiological trauma to the innocent victims. The physical wounds may heal, but the trauma remains in the mind and heart of the victims and their loved ones; however, one should not deny that these terrorist activities affect to a major extent to their livelihood. To protect their human rights and restore the shattered lives of the victims of terrorism all the Nations beyond their differences have to show solidarity and frame a comprehensive restorative policy with an effective implementing mechanism. The General Assembly of United Nations, through its several resolutions, has appealed Nations to show solidarity and also committed to helping the Members State to frame the law and policy to support the victims of terrorism. To achieve the objectives of the resolutions adopted by the United Nations, the Indian legislators in 2008 amended the Code of Criminal Procedure, 1973 and incorporated Section 357A to provide financial assistance to the victims of terrorism. In India, the contemporary developments in the victims’ oriented studies have increased the dimension of the traditional criminal justice systems to protect the rights of the victims. In this regard, the paper has ascertained the Indian legal framework in respect to the restorative justice to the victims of terrorism and also addressed the question as to whether the statutory provisions and enforcement mechanisms are efficient enough to protect the human rights of the victims of terrorism. For that purpose, the paper has analyzed the International instruments and the reports with regard to the compensation to the victims of terrorist attacks, with that, the article also evaluates the initiatives of United Nations to help Members State to frame the law and policies to support the victims of terrorism. The study also made an attempt to critically analyze the legal provisions of compensation and rehabilitation of the victims of terrorist attacks in India and whether they are in alignment with the International standards. While concluding, the paper has made an endeavor for a robust legal framework towards the restorative justice for the victims of terrorism in India.Keywords: victims of terrorism, restorative justice, human rights, criminal justice system of India
Procedia PDF Downloads 1592288 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4042287 Linguistic Devices Reflecting Violence in Border–Provinces of Southern Thailand on the Front Page of Local and National Newspapers
Authors: Chanokporn Angsuviriya
Abstract:
The objective of the study is to analyse linguistic devices reflecting the violence in the south border provinces; namely Pattani, Yala, Narathiwat and Songkla on 1,344 front pages of three local newspapers; namely ChaoTai, Focus PhakTai and Samila Time and of two national newspapers, including ThaiRath and Matichon, between 2004 and 2005, and 2011 and 2012. The study shows that there are two important linguistic devices: 1) lexical choices consisting of the use of verbs describing violence, the use of quantitative words and the use of words naming someone who committed violent acts, and 2) metaphors consisting of “a violent problem is heat”, “a victim is a leaf”, and “a terrorist is a dog”. Comparing linguistic devices between two types of newspapers, national newspapers choose to use words more violently than local newspapers do. Moreover, they create more negative images of the south of Thailand by using stative verbs. In addition, in term of metaphors “a terrorist is a fox.” is only found in national newspapers. As regards naming terrorists “southern insurgents”, this noun phrase which is collectively called by national newspapers has strongly negative meaning. Moreover, “southern insurgents” have been perceived by the Thais in the whole country while “insurgents” that are not modified have been only used by local newspapers.Keywords: linguistic devices, local newspapers, national newspapers, violence
Procedia PDF Downloads 2412286 Exploring the Impact of Transformational Collegial Leadership in Organizations
Authors: Prakash Singh
Abstract:
Far-reaching organizational and structural changes are required to address the severe imbalances in the provision and strong bureaucratic controls in many organizations at all levels. Transformational collegial leadership (TCL) is a collective action generated by transforming leadership which empowers all individuals who participate in this process, whether it is in business or education, or in any other organization. Recent research is strongly supportive of collegiality as a key factor in transforming traditional bureaucratic management practices (TBMPs) in organizations. The primary objective of this study was therefore to gauge the extent to which organizations have affected a shift from TBMPs towards TCL and how this can affect the development of human resources. This qualitative study investigated the impact of TCL on developing human resources in two organizations which were purposively selected to participate in this study. The findings of this study affirm that human resource development and TCL embrace the values of collaboration, confrontation, authenticity, trust, support and openness. In order to overcome TBMPs, a clear sense of direction must be communicated by collegial leaders throughout their organizations so that lower-level employees can initiate actions without the same degree of vulnerability. The TCL approach must respond to needs amongst followers and must look for motives, extrinsic and intrinsic, to satisfy those needs by enhancing opportunities, empowering people and giving more freedom, performance evaluation and the full support of the leader. Evidently, the collegial model emphasizes the valuing of individuals where there is a breadth of leadership and an absence of hierarchy.Keywords: bureaucratic management model, human resource development, transformational collegial leadership model, transforming leader
Procedia PDF Downloads 4312285 Cross Country Comparison: Business Process Management Maturity, Social Business Process Management and Organizational Culture
Authors: Dalia Suša Vugec
Abstract:
In recent few decades, business process management (BPM) has been in focus of a great number of researchers and organizations. There are many benefits derived from the implementation of BPM in organizations. However, there has been also noticed that lately traditional BPM faces some difficulties in terms of the divide between models and their execution, lost innovations, lack of information fusioning and so on. As a result, there has been a new discipline, called social BPM, which incorporates principles of social software into the BPM. On the other hand, many researchers indicate organizational culture as a vital part of the BPM success and maturity. Therefore, the goal of this study is to investigate the current state of BPM maturity and the usage of social BPM among the organizations from Croatia, Slovenia and Austria, with the regards to the organizational culture as well. The paper presents the results of a survey conducted as part of the PROSPER project (IP-2014-09-3729), financed by Croatian Science Foundation. The results indicate differences in the level of BPM maturity, the usage of social BPM and the dominant organizational culture in the observed organizations from different countries. These differences are further discussed in the paper.Keywords: business process management, BPM maturity, organizational culture, social BPM
Procedia PDF Downloads 1762284 Content Analysis of Depictions of Terrorism in U.S. Major Motion Pictures: A Social Constructionist Perspective
Authors: Raleigh Blasdell, Amanda M. Sharp Parker, Lauren Waldrop, Brigid Toney
Abstract:
It has been demonstrated that fictional media sources have persuasive effects on public beliefs; this study contributes to the social constructionist literature by conducting a content analysis of U.S. major motion pictures involving terrorism. Using the Unified Film Population Sampling Methodology, the top-grossing films were identified to examine the frequency and context of several constructs of terrorism, including terrorist demographics, type of terrorism, country of origin, organizational affiliation, crime typology, and victim demographics. Comparisons of these constructs, as depicted in the films, were then made with the extant academic literature on terrorism. The data provide notable information regarding the representation of terrorism by the film industry, as well the discrepancies between the scholarly literature and depictions in popular films. The results indicate vast differences between fiction and reality, emphasizing a 'Middle Eastern Islamic male' terrorist stereotype. Using the theoretical foundation of social constructionism, the findings provide insight into how inaccurate depictions in film can influence society’s beliefs about terrorism and terrorists, which subsequently can translate into public support for legislation and policies that are often fueled by misinformation.Keywords: film, media, social constructionism, terrorism
Procedia PDF Downloads 1692283 Effects of Blast Load on Historic Stone Masonry Buildings in Canada: A Review and Analytical Study
Authors: Abass Braimah, Maha Hussein Abdallah
Abstract:
The global ascendancy of terrorist attacks on building infrastructure with economic and heritage significance has increased awareness of the possibility of terrorism in Canada. Many structures in Canada that are at risk of terrorist attacks include government buildings, built many years ago of historic stone masonry construction. Although many researchers are investigating ways to retrofit masonry stone buildings to mitigate the effect of blast loadings, lack of knowledge on the dynamic behavior of historic stone masonry structures under blast loads makes it difficult to ascertain the effectiveness of the retrofitting techniques. This paper presents a review of open-source literature for the experimental and numerical stone masonry structures under blast loads. This review yielded very little information of the response of the historic stone masonry structures under blast loads. Thus, a comprehensive study is needed to understand the blast load effects on historic stone masonry buildings. The out-of-plane response of historic masonry structures to blast loads is investigated by using single-degree-of-freedom analysis. This approach presents equations that can be used effectively in the analysis of historic masonry walls to out-of-plane blast loading.Keywords: blast loads, historical buildings, masonry structure, single-degree-of-freedom analysis
Procedia PDF Downloads 1842282 Enablers of Total Quality Management for Social Enterprises: A Study of UAE Social Organizations
Authors: Farhat Sultana
Abstract:
Originality: TQM principles are considered the tools to enhance organizational performance for most organizations. The paper contributes to the literature on the social enterprise because social organizations are still far behind in implementing TQM as compared to other private, public, and nonprofit organizations. Study design: The study is based on the data and information provided by two case studies and one focus group of social enterprises. Purpose: The purpose of the study is to get a deep understating of TQM implementation and to recognize the enablers of TQM in social enterprises that enhance the organizational performance of social enterprises located in UAE. Findings: As per the findings of the study, key enablers of Total Quality management in the case enterprises are leadership support, strategic approach for quality, continuous improvement, process improvement, employee empowerment and customer focus practices, though some inhibitors for TQM implementation such as managerial structure for quality assurance and performance appraisal mechanism are also pointed out by the study. Research limitations: The study findings are only based on two case studies and one focus group, which is not enough to generalize the findings to all social organizations. Practical Implications: Identified TQM enablers can help management to implement TQM successfully in social enterprises. Social implications: The study provides enabling path for Social enterprises to implement TQM to seek quality output to build a better society.Keywords: TQM, social enterprise, enablers of TQM, UAE
Procedia PDF Downloads 1102281 Distinguishing Substance from Spectacle in Violent Extremist Propaganda through Frame Analysis
Authors: John Hardy
Abstract:
Over the last decade, the world has witnessed an unprecedented rise in the quality and availability of violent extremist propaganda. This phenomenon has been fueled primarily by three interrelated trends: rapid adoption of online content mediums by creators of violent extremist propaganda, increasing sophistication of violent extremist content production, and greater coordination of content and action across violent extremist organizations. In particular, the self-styled ‘Islamic State’ attracted widespread attention from its supporters and detractors alike by mixing shocking video and imagery content in with substantive ideological and political content. Although this practice was widely condemned for its brutality, it proved to be effective at engaging with a variety of international audiences and encouraging potential supporters to seek further information. The reasons for the noteworthy success of this kind of shock-value propaganda content remain unclear, despite many governments’ attempts to produce counterpropaganda. This study examines violent extremist propaganda distributed by five terrorist organizations between 2010 and 2016, using material released by the Al Hayat Media Center of the Islamic State, Boko Haram, Al Qaeda, Al Qaeda in the Arabian Peninsula, and Al Qaeda in the Islamic Maghreb. The time period covers all issues of the infamous publications Inspire and Dabiq, as well as the most shocking video content released by the Islamic State and its affiliates. The study uses frame analysis to distinguish thematic from symbolic content in violent extremist propaganda by contrasting the ways that substantive ideology issues were framed against the use of symbols and violence to garner attention and to stylize propaganda. The results demonstrate that thematic content focuses significantly on diagnostic frames, which explain violent extremist groups’ causes, and prognostic frames, which propose solutions to addressing or rectifying the cause shared by groups and their sympathizers. Conversely, symbolic violence is primarily stylistic and rarely linked to thematic issues or motivational framing. Frame analysis provides a useful preliminary tool in disentangling substantive ideological and political content from stylistic brutality in violent extremist propaganda. This provides governments and researchers a method for better understanding the framing and content used to design narratives and propaganda materials used to promote violent extremism around the world. Increased capacity to process and understand violent extremist narratives will further enable governments and non-governmental organizations to develop effective counternarratives which promote non-violent solutions to extremists’ grievances.Keywords: countering violent extremism, counternarratives, frame analysis, propaganda, terrorism, violent extremism
Procedia PDF Downloads 1732280 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak
Authors: Andrei Bogdan Stanescu, Laura Diaconescu
Abstract:
With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.Keywords: identity and access management, passwordless authentication, privacy, zero-trust security
Procedia PDF Downloads 912279 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.Keywords: awareness and training, cybersecurity policy, risk management, security risks
Procedia PDF Downloads 3452278 Artificial Intelligence in Enterprise Information Systems: A Review
Authors: Danah S. Alabdulmohsin
Abstract:
Due to the fast growth of organizational data as well as the emergence of new technologies such as artificial intelligence (AI), organizations tend to utilize these new technologies in their enterprise information systems (EIS) either to overcome the issues they struggle with or to enhance their functions. The aim of this paper is to review the potential role of AI technologies in EIS, namely: enterprise resource planning systems (ERP), customer relation management systems (CRM), supply chain management systems (SCM), knowledge systems (KM), and human resources management systems (HRM). The paper provided the definitions of these systems as well as the definitions of AI technologies that have been used in EIS. In addition, the paper discussed the challenges that organizations might face while integrating AI with their information systems and explained why some organizations fail in achieving successful implementations of the integration.Keywords: artificial intelligence, AI, enterprise information system, EIS, integration
Procedia PDF Downloads 972277 Effective Leadership in the Engineering, Technology, and Construction Industry
Authors: David W. Farler, Perry Haan
Abstract:
This paper explores what effective leadership is being employed in the engineering, technology, and construction (ETC) industry. Organizations need to understand what character traits are being used and what leadership styles work to promote sustainability and improve the triple bottom line. This paper looks at multiple publications on leadership and character traits effective for managers and leaders in the ETC industry. The ETC industry is a trillion-dollar industry, and understanding ways to improve leadership is vital for organizations' successful outcomes. With improvements to the managerial and leadership, there could be ways for organizations to profit more and cut down on cost costs. Finding ways to improve motivation can help organizations improve safety, improve culture, and increase employee motivation. From the research, this paper has found that situational leadership, transformational, and transactional are the most effective leadership styles that individuals can use in the ETC industry for leadership. Character traits that are the most effective have been identified in this research paper. This research has contributed to the ways individuals who start in the engineering and technology industry can improve upon their leadership skills as they are promoted into managerial and leadership roles. The need for managerial positions in the ETC industry, such as project and construction managers, to improve is vital for successful outcomes and creating a high-level performance. The study helps provide a gap in the limited research available to improve ETC leadership for all organizations' present and future.Keywords: construction, effective leadership, engineering, technology
Procedia PDF Downloads 1402276 The Use of Learning Management Systems during Emerging the Tacit Knowledge
Authors: Ercan Eker, Muhammer Karaman, Akif Aslan, Hakan Tanrikuluoglu
Abstract:
Deficiency of institutional memory and knowledge management can result in information security breaches, loss of prestige and trustworthiness and the worst the loss of know-how and institutional knowledge. Traditional learning management within organizations is generally handled by personal efforts. That kind of struggle mostly depends on personal desire, motivation and institutional belonging. Even if an organization has highly motivated employees at a certain time, the institutional knowledge and memory life cycle will generally remain limited to these employees’ spending time in this organization. Having a learning management system in an organization can sustain the institutional memory, knowledge and know-how in the organization. Learning management systems are much more needed especially in public organizations where the job rotation is frequently seen and managers are appointed periodically. However, a learning management system should not be seen as an organizations’ website. It is a more comprehensive, interactive and user-friendly knowledge management tool for organizations. In this study, the importance of using learning management systems in the process of emerging tacit knowledge is underlined.Keywords: knowledge management, learning management systems, tacit knowledge, institutional memory
Procedia PDF Downloads 3802275 Strengthening Civil Society Organizations (CSOs) in ASEAN Community: The Case of Nahdlatul Ulama
Authors: Andi Triswoyo
Abstract:
The establishment of ASEAN Community 2015 was proposed to integrate concretely, in terms of regional cooperation. All of the members of the ASEAN itself compete to prepare themselves in the actual place. Regarding to the Bali Concord III, subsequently ASEAN Community was categorized by three elements, such as (1) ASEAN Political-security Community (APC), (2) ASEAN Economic Community (AEC), and (3) ASEAN Socio-cultural Community (ASC). Preparing on three components above, civil society organizations must be prioritized as the main body, which ensure grassroots society itself obtain maximum benefits or advantage of these declarations. NU, as the representative of mass-based organizations, was choose, due to the highly influences toward Moslem rural-traditionalist, which has the largest followers in Indonesia. This paper was aimed to explain the contribution of NU in developing and empowering society. Furthermore, it will use historical perspective, by looking for related data, which contain basic- knowledge and explanatory facts in literary desk. It would elaborate in NU’s urgency for promoting civil societies roles in ASEAN Community. In the ends, this paper was proposed to measure to what extend NU’s roles in promoting the Civil Society in Indonesia and its potential capability to get involved at the upcoming regional communities. Hopefully, the attempt to strengthen Civil Society Organizations (CSOs), like NU can push faster in creating good governance and democracy, toward social configurations amongst state, market and civil society.Keywords: ASEAN community, Nahdlatul Ulama, civil society organizations(CSO), civil society
Procedia PDF Downloads 2802274 A Systematic Snapshot of Software Outsourcing Challenges
Authors: Issam Jebreen, Eman Al-Qbelat
Abstract:
Outsourcing software development projects can be challenging, and there are several common challenges that organizations face. A study was conducted with a sample of 46 papers on outsourcing challenges, and the results show that there are several common challenges faced by organizations when outsourcing software development projects. Poor outsourcing relationship was identified as the most significant challenge, with 35% of the papers referencing it. Lack of quality was the second most significant challenge, with 33% of the papers referencing it. Language and cultural differences were the third most significant challenge, with 24% of the papers referencing it. Non-competitive price was another challenge faced by organizations, with 21% of the papers referencing it. Poor coordination and communication were also identified as a challenge, with 21% of the papers referencing it. Opportunistic behavior, lack of contract negotiation, inadequate user involvement, and constraints due to time zone were also challenges faced by organizations. Other challenges faced by organizations included poor project management, lack of technical capabilities, vendor employee high turnover, poor requirement specification, IPR issues, poor management of budget, schedule, and delay, geopolitical and country instability, the difference in development methodologies, failure to manage end-user expectations, and poor monitoring and control. In conclusion, outsourcing software development projects can be challenging, but organizations can mitigate these challenges by selecting the right outsourcing partner, having a well-defined contract and clear communication, having a clear understanding of the requirements, and implementing effective project management practices.Keywords: software outsourcing, vendor, outsourcing challenges, quality model, continent, country, global outsourcing, IT workforce outsourcing.
Procedia PDF Downloads 892273 Strengthening Deradicalizing Islamist Extremism in Indonesia: A Victim-Centred Approach
Authors: Milda Istiqomah
Abstract:
Deradicalization program has long been the subject of investigation. There is a steadily growing interest in examining the results on how Islamist terrorists agree to abandon violence and leave radicalism; however, it is argued that de-radicalization program on terrorism in many countries is still questionable for its effectiveness. This article aims to provide an overview of the deradicalization program specifically related to the victim-centred approach conducted by the Indonesian government and investigates critical issues surrounding the analysis of their effectiveness and outcomes. This research employs several case studies of a victim-centred approach conducted by the Indonesian Witness and Victim Protection Agency as well as the Indonesian Counter-terrorism Agency. This paper argues that the victim-centred approach to de-radicalize former terrorist prisoners faces several implemental challenges; however, the initiative may offer promise for future successful de-radicalization program. Furthermore, until more data surrounding the efficacy of this initiative available, the victim-centred approach may also constitute a significant and essential component of disengagement, de-radicalisation, and reintegration of terrorist prisoners. In conclusion, this paper suggests that further empirical research concerning prevention policies and disengagement interventions related to victim-centred approach need to be explored to give more inputs to the Indonesian government to achieve the effectiveness of de-radicalization program.Keywords: terrorism, victim-centred approach, de-radicalization, Islamist extremism
Procedia PDF Downloads 3082272 An Analysis of Humanitarian Data Management of Polish Non-Governmental Organizations in Ukraine Since February 2022 and Its Relevance for Ukrainian Humanitarian Data Ecosystem
Authors: Renata Kurpiewska-Korbut
Abstract:
Making an assumption that the use and sharing of data generated in humanitarian action constitute a core function of humanitarian organizations, the paper analyzes the position of the largest Polish humanitarian non-governmental organizations in the humanitarian data ecosystem in Ukraine and their approach to non-personal and personal data management since February of 2022. Both expert interviews and document analysis of non-profit organizations providing a direct response in the Ukrainian crisis context, i.e., the Polish Humanitarian Action, Caritas, Polish Medical Mission, Polish Red Cross, and the Polish Center for International Aid and the applicability of theoretical perspective of contingency theory – with its central point that the context or specific set of conditions determining the way of behavior and the choice of methods of action – help to examine the significance of data complexity and adaptive approach to data management by relief organizations in the humanitarian supply chain network. The purpose of this study is to determine how the existence of well-established and accurate internal procedures and good practices of using and sharing data (including safeguards for sensitive data) by the surveyed organizations with comparable human and technological capabilities are implemented and adjusted to Ukrainian humanitarian settings and data infrastructure. The study also poses a fundamental question of whether this crisis experience will have a determining effect on their future performance. The obtained finding indicate that Polish humanitarian organizations in Ukraine, which have their own unique code of conduct and effective managerial data practices determined by contingencies, have limited influence on improving the situational awareness of other assistance providers in the data ecosystem despite their attempts to undertake interagency work in the area of data sharing.Keywords: humanitarian data ecosystem, humanitarian data management, polish NGOs, Ukraine
Procedia PDF Downloads 922271 Impacts of Social Support on Perceived Level of Stress and Self-Esteem among Students of Private Universities of Karachi-Pakistan
Authors: Sheeba Farhan
Abstract:
This study is conducted to explore the predictive relationship of perceived stress and self-esteem with social support of students and to explore the factors, which contribute to develop or enhance the level of stress in students of private universities in Karachi-Pakistan. After literature review following hypotheses were formulated; 1)social support would predict perceived stress of students of business administration of private organizations of Higher education, 2) social support would predict the self-esteem of students of private organizations of Higher education, 3) there will be a relationship of perceived stress and self-esteem of students of private organizations of Higher education, 4) there will be a relationship of self esteem and social support of students of private organizations of Higher education. Sample of the study is comprise of 100 students of private organizations of Higher education in Karachi- Pakistan (i.e. males= 50 & females= 50). The age range of participants is 18-26 years. The measures, used in the study are: Demographic information form, a semi structured interview form, Rosenberg self esteem scale (Rosenberg, 1965) and perceived stress scale (Cohen, Kamarck, and Mermelstein, 1983) and multidimensional scale of perceived social support (Zimet, 1988) Descriptive statistics is used for getting a better statistical view of characteristics of sample. Regression analysis is used to explore the predictive relationship of study related stress and self esteem with academic achievement of students of private organizations of Higher education. Percentages and ratios were calculated to explore the level of perceived stress with respect to Socio-demographic characteristics in students of private organizations of Higher education. Finding shows that social support is significantly associated with the higher level of self-esteem among students of graduation but insignificantly associated with stress that has been experienced by them. These results are correlated with a wide variety of studies in which social support has proposed to be a predictor of well being for the students.Keywords: private universities of Karachi-Pakistan, Self-esteem, social support, stress
Procedia PDF Downloads 2932270 Managing Information Technology: An Overview of Information Technology Governance
Authors: Mehdi Asgarkhani
Abstract:
Today, investment on Information Technology (IT) solutions in most organizations is the largest component of capital expenditure. As capital investment on IT continues to grow, IT managers and strategists are expected to develop and put in practice effective decision making models (frameworks) that improve decision-making processes for the use of IT in organizations and optimize the investment on IT solutions. To be exact, there is an expectation that organizations not only maximize the benefits of adopting IT solutions but also avoid the many pitfalls that are associated with rapid introduction of technological change. Different organizations depending on size, complexity of solutions required and processes used for financial management and budgeting may use different techniques for managing strategic investment on IT solutions. Decision making processes for strategic use of IT within organizations are often referred to as IT Governance (or Corporate IT Governance). This paper examines IT governance - as a tool for best practice in decision making about IT strategies. Discussions in this paper represent phase I of a project which was initiated to investigate trends in strategic decision making on IT strategies. Phase I is concerned mainly with review of literature and a number of case studies, establishing that the practice of IT governance, depending on the complexity of IT solutions, organization's size and organization's stage of maturity, varies significantly – from informal approaches to sophisticated formal frameworks.Keywords: IT governance, corporate governance, IT governance frameworks, IT governance components, aligning IT with business strategies
Procedia PDF Downloads 4062269 Relationship between Employee Welfare Practices and Performance of Non-Governmental Organizations in Kenya
Authors: Protus A. Lumiti, Susan O. Wekesa, Mary Omondi
Abstract:
Performance is a key pillar to the accomplishment of the goals of all organizations, whether private, public or non- profit. Employees are the intellectual assets of the organization and they are an avenue to the achievement of competitive advantage. An employee welfare service in an organization is vital in fostering employee motivation and improving their productivity. In view of this, the main goal of this research was to determine the relationship between employee welfare practices and the performance of non-governmental organizations in Kenya. The study was guided by four objectives, namely: to establish, determine, evaluate and assess the relationship between employee welfare practices and the performance of non-governmental organizations in Kenya. The study utilized a survey design using both qualitative and quantitative approaches. In this study, a purposive, stratified and simple random sampling technique was used to arrive at a sample of 355 respondents who comprised senior managers, middle level managers and operational employees out of the targeted population of 14,283 employees of non-governmental organizations working in Nairobi County. The primary data collection tools were questionnaires supplemented by an interview schedule, while secondary data was obtained from reviewed journals, published books and articles. Data analysis was done using Statistical Packages for Social Sciences Software version 23. The study utilized multiple linear regression and a structural equation model. The findings of the study were that: employee welfare practices had a positive and significant relationship with the performance of Non-governmental organizations in Kenya. In addition, there was also a linear relationship between the independent variables and the dependent variable and the study concluded that there was a relationship between the predictor variable and the dependent variable of the study. The study recommended that management of No-governmental organization boards in Kenya should come up with a comprehensive policy document on employee welfare practices in order to enhance the performance of non-governmental organizations in Kenya.Keywords: employee, economic, performance, welfare
Procedia PDF Downloads 1802268 Assets Misappropriation in the Malaysian Public and Private Sectors
Authors: I. K. Norziaton, M. D. Ridhuan, A. N. Nur Adura
Abstract:
Assets misappropriation is becoming a major concern in organizations. Over the years, the Malaysian Auditor General has reported high occurrences of assets misappropriation at the federal, state and even local governments. It is surprising that assets misappropriation is not the only major concern in the public sector but it has also indicates a common sight in private sector. The current situation is rather disconcerting because employees are accountable to perform their jobs at the interest of the organizations. Various researches in the past has found that the incidence of assets misappropriation occurs when employees used the official vehicles, internet connection, computers, stationery and facilities for personal and family benefits. The issue of assets misappropriation has continue to be a major concern for organizations and its impact on the reputation and financial health can be enormous. Even though the issue seems to be trivial, yet, if it is left untreated, the symptoms will become an incurable disease that it will cause major leakages to the organizations. Hence, this paper highlights the common practices of assets misappropriation in public and private sectors. It also discusses why the acts of assets misappropriation occurs. Using the data through questionnaire survey, a total of 250 questionnaires were distributed to the private and public sectors employees. However 173 (69.2%) were returned and usable. This paper concludes that it is vital to promote awareness to the public and private sectors employees on issues of assets misappropriation. Assets misappropriation could have been avoided provided that the officers in charge are more vigilant, competent and practice high level of integrity in discharging their responsibilities towards the organizations.Keywords: assets misappropriation, fraud, public sector, private sector
Procedia PDF Downloads 1972267 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms
Authors: Saint C. Nguedjip
Abstract:
This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women
Procedia PDF Downloads 1042266 Strategic Management Methods in Non-Profit Making Organization
Authors: P. Řehoř, D. Holátová, V. Doležalová
Abstract:
Paper deals with analysis of strategic management methods in non-profit making organization in the Czech Republic. Strategic management represents an aggregate of methods and approaches that can be applied for managing organizations - in this article the organizations which associate owners and keepers of non-state forest properties. Authors use these methods of strategic management: analysis of stakeholders, SWOT analysis and questionnaire inquiries. The questionnaire was distributed electronically via e-mail. In October 2013 we obtained data from a total of 84 questionnaires. Based on the results the authors recommend the using of confrontation strategy which improves the competitiveness of non-profit making organizations.Keywords: strategic management, non-profit making organization, strategy analysis, SWOT analysis, strategy, competitiveness
Procedia PDF Downloads 4832265 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements
Authors: John Hardy
Abstract:
The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism
Procedia PDF Downloads 1742264 Improving Customer Service through Empathy
Authors: Abiola Olukemi Ogunyemi
Abstract:
Many organizations would like to gain customer loyalty, and to achieve this they invest in customer management systems which help them to learn and anticipate the customers’ needs, get feedback from them and serve them. One of the most elementary ways to achieve customer loyalty is for employees to be able to empathize with their customers, and to be able to feel what they feel when the company betrays their trust, which usually otherwise shown in patronage and loyalty. Unfortunately, the staff and management of organizations do not always realize the negative impact of treating customers badly, because they do not stop to think how these customers feel. If they did, they would be more careful and more respectful of these people who are human beings just like they are. They would be wiser, since this would ultimately make them more profitable businesses. This paper looks at thirteen descriptions of situations in which customers felt treated badly by organizations they trusted, and focuses on the feelings of these customers. If the organization (made of people) could empathize with the customer, then customer service would be surely enhanced. It is expected that these stories, real experiences narrated by young professionals working in Nigeria, can awaken greater empathy for consumers within organizations. Thus, they may help the organization to learn empathy and to incorporate it into their foundational principles for ethical behavior. The paper’s contents contribute to a heightened appreciation of empathy as an organizing mechanism by showing how putting one in the consumer’s shoes can help managers to understand how he or she feels. This will lead organizations to be even more innovative in finding ways to meet their customers’ needs and to deserve and win their loyalty. It addresses an issue that cuts across cultures, and therefore can be quite thought-provoking for every business owner or for team leads within organizations. By trying to stimulate empathy across the seller-buyer divide, it necessarily contributes to a deeper understanding of empathy as a building block for a sustainable society.Keywords: customer service, empathy, ethical behavior, respectfulness
Procedia PDF Downloads 2592263 The Role of Social Civil Competencies in Organizational Performance
Authors: I. Martins, A. Martins
Abstract:
The European Union supports social and civil competencies as being a core element to develop sustainability of organizations, people and regions. These competencies are fundamental for the well-being of the community because they include interpersonal, intrapersonal as well as their civil, active and democratic participation in organizations. The combination of these competencies reveals the organizational socio-emotional maturity and allows relevant levels of performance. It also allows the development of various capitals, namely, human, structural, relational and social, with direct influence on performance. But along this path, the emotional aspect has not been valued as a capital, given that contemporary society is based on knowledge capital and is flooded with information viewed as a capital. The present study, based on the importance of these socio-emotional capitals, aims to show that the competencies of cooperation, interpersonal understanding, empathy, kindness, ability to listen, and tolerance, to mention a few, are strategic in consolidating knowledge within organizations. This implies that the humanizing processes, both inside and outside the organizations, are revitalized. The question is how to go about doing this and its implementation; as well as, where to begin and which guidelines to take on. These are the foci that guide the present study, bearing in mind the directions of the knowledge economy.Keywords: civil competencies, humanizing, performance, social competencies
Procedia PDF Downloads 1442262 Money Laundering and Terror Financing in the Islamic Banking Sector in Bangladesh
Authors: Md. Abdul Kader
Abstract:
Several reports released by Global Financial Integrity (GFI) in recent times have identified Bangladesh as being among the worst affected countries to the scourge of money laundering (ML) and terrorist financing (TF). The money laundering (ML) and terrorist financing (TF) risks associated with conventional finance are generally well identified and understood by the relevant national authorities. There is, however, no common understanding of ML/TF risks associated with Islamic Banking. This paper attempts to examine the issues of money laundering (ML) and terrorist financing (TF) in Islamic Banks of Bangladesh. This study also investigates the risk factors associated with Islamic Banking system of Bangladesh that are favorable for ML and TF and which prevent the government to control such issues in the Islamic Banks of Bangladesh. Qualitative research methods were employed by studying various reports from journals, newspapers, bank reports and periodicals. In addition, five ex-bankers who were in the policy making bodies of three Islamic Banks were also interviewed. Findings suggest that government policies regarding Islamic Banking system in Bangladesh are not well defined and clear. Shariah law, that is the guiding principle of Islamic Banking, is not well recognized by the government policy makers, and thus they left the responsibility to the governing bodies of the banks. Other challenges that were found in the study are: the complexity of some Islamic banking products, the different forms of relationship between the banks and their clients, the inadequate ability and skill in the supervision of Islamic finance, particularly in jurisdictions, to evaluate their activities. All these risk factors paved the ground for ML and TF in the Islamic Banks of Bangladesh. However, due to unconventional nature of Banking and lack of investigative reporting on Islamic Banking, this study could not cover the whole picture of the ML/TF of Islamic Banks of Bangladesh. However, both qualitative documents and interviewees confirmed that Islamic Banking in Bangladesh could be branded as risky when it comes to money laundering and terror financing. This study recommends that the central bank authorities who supervise Islamic finance and the government policy makers should obtain a greater understanding of the specific ML/TF risks that may arise in Islamic Banks and develop a proper response. The study findings are expected to considerably impact Islamic banking management and policymakers to develop strong and appropriate policy to enhance transparency, accountability, and efficiency in banking sector. The regulatory bodies can consider the findings to disseminate anti money laundering and terror financing related rules and regulations.Keywords: money laundering, terror financing, islamic banking, bangladesh
Procedia PDF Downloads 94