Search results for: enterprise information system
25476 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 32325475 The Nuclear Power Plant Environment Monitoring System through Mobile Units
Authors: P. Tanuska, A. Elias, P. Vazan, B. Zahradnikova
Abstract:
This article describes the information system for measuring and evaluating the dose rate in the environment of nuclear power plants Mochovce and Bohunice in Slovakia. The article presents the results achieved in the implementation of the EU project–Research of monitoring and evaluation of non-standard conditions in the area of nuclear power plants. The objectives included improving the system of acquisition, measuring and evaluating data with mobile and autonomous units applying new knowledge from research. The article provides basic and specific features of the system and compared to the previous version of the system, also new functions.Keywords: information system, dose rate, mobile devices, nuclear power plant
Procedia PDF Downloads 37625474 Health Assessment of Power Transformer Using Fuzzy Logic
Authors: Yog Raj Sood, Rajnish Shrivastava, Anchal Wadhwa
Abstract:
Power transformer is one of the electrical equipment that has a central and critical role in the power system. In order to avoid power transformer failure, information system that provides the transformer condition is needed. This paper presents an information system to know the exact situations prevailing within the transformer by declaring its health index. Health index of a transformer is decided by considering several diagnostic tools. The current work deals with UV-Vis, IFT, FP, BDV and Water Content. UV/VIS results have been pre-accessed using separate FL controller for concluding with the Furan contents. It is broadly accepted that the life of a power transformer is the life of the oil/ paper insulating system. The method relies on the use of furan analysis (insulation paper), and other oil analysis results as a means to declare health index. Fuzzy logic system is used to develop the information system. The testing is done on 5 samples of oil of transformers of rating 132/66 KV to obtain the results and results are analyzed using fuzzy logic model.Keywords: interfacial tension analyzer (ift), flash point (fp), furfuraldehyde (fal), health index
Procedia PDF Downloads 63425473 Electronic Payment Recording with Payment History Retrieval Module: A System Software
Authors: Adrian Forca, Simeon Cainday III
Abstract:
The Electronic Payment Recording with Payment History Retrieval Module is developed intendedly for the College of Science and Technology. This system software innovates the manual process of recording the payments done in the department through the development of electronic payment recording system software shifting from the slow and time-consuming procedure to quick yet reliable and accurate way of recording payments because it immediately generates receipts for every transaction. As an added feature to its software process, generation of recorded payment report is integrated eliminating the manual reporting to a more easy and consolidated report. As an added feature to the system, all recorded payments of the students can be retrieved immediately making the system transparent and reliable payment recording software. Viewing the whole process, the system software will shift from the manual process to an organized software technology because the information will be stored in a logically correct and normalized database. Further, the software will be developed using the modern programming language and implement strict programming methods to validate all users accessing the system, evaluate all data passed into the system and information retrieved to ensure data accuracy and reliability. In addition, the system will identify the user and limit its access privilege to establish boundaries of the specific access to information allowed for the store, modify, and update making the information secure against unauthorized data manipulation. As a result, the System software will eliminate the manual procedure and replace with an innovative modern information technology resulting to the improvement of the whole process of payment recording fast, secure, accurate and reliable software innovations.Keywords: collection, information system, manual procedure, payment
Procedia PDF Downloads 16425472 Distributed Multi-Agent Based Approach on Intelligent Transportation Network
Authors: Xiao Yihong, Yu Kexin, Burra Venkata Durga Kumar
Abstract:
With the accelerating process of urbanization, the problem of urban road congestion is becoming more and more serious. Intelligent transportation system combining distributed and artificial intelligence has become a research hotspot. As the core development direction of the intelligent transportation system, Cooperative Intelligent Transportation System (C-ITS) integrates advanced information technology and communication methods and realizes the integration of humans, vehicle, roadside infrastructure, and other elements through the multi-agent distributed system. By analyzing the system architecture and technical characteristics of C-ITS, the report proposes a distributed multi-agent C-ITS. The system consists of Roadside Sub-system, Vehicle Sub-system, and Personal Sub-system. At the same time, we explore the scalability of the C-ITS and put forward incorporating local rewards in the centralized training decentralized execution paradigm, hoping to add a scalable value decomposition method. In addition, we also suggest introducing blockchain to improve the safety of the traffic information transmission process. The system is expected to improve vehicle capacity and traffic safety.Keywords: distributed system, artificial intelligence, multi-agent, cooperative intelligent transportation system
Procedia PDF Downloads 21425471 Blueprinting of a Normalized Supply Chain Processes: Results in Implementing Normalized Software Systems
Authors: Bassam Istanbouli
Abstract:
With the technology evolving every day and with the increase in global competition, industries are always under the pressure to be the best. They need to provide good quality products at competitive prices, when and how the customer wants them. In order to achieve this level of service, products and their respective supply chain processes need to be flexible and evolvable; otherwise changes will be extremely expensive, slow and with many combinatorial effects. Those combinatorial effects impact the whole organizational structure, from a management, financial, documentation, logistics and specially the information system Enterprise Requirement Planning (ERP) perspective. By applying the normalized system concept/theory to segments of the supply chain, we believe minimal effects, especially at the time of launching an organization global software project. The purpose of this paper is to point out that if an organization wants to develop a software from scratch or implement an existing ERP software for their business needs and if their business processes are normalized and modular then most probably this will yield to a normalized and modular software system that can be easily modified when the business evolves. Another important goal of this paper is to increase the awareness regarding the design of the business processes in a software implementation project. If the blueprints created are normalized then the software developers and configurators will use those modular blueprints to map them into modular software. This paper only prepares the ground for further studies; the above concept will be supported by going through the steps of developing, configuring and/or implementing a software system for an organization by using two methods: The Software Development Lifecycle method (SDLC) and the Accelerated SAP implementation method (ASAP). Both methods start with the customer requirements, then blue printing of its business processes and finally mapping those processes into a software system. Since those requirements and processes are the starting point of the implementation process, then normalizing those processes will end up in a normalizing software.Keywords: blueprint, ERP, modular, normalized
Procedia PDF Downloads 13925470 The Implementation of Human Resource Information System in the Public Sector: An Exploratory Study of Perceived Benefits and Challenges
Authors: Aneeqa Suhail, Shabana Naveed
Abstract:
The public sector (in both developed and developing countries) has gone through various waves of radical reforms in recent decades. In Pakistan, under the influence of New Public Management(NPM) Reforms; best practices of private sector are introduced in the public sector to modernize public organizations. Human Resource Information System (HRIS) has been popular in the private sector and proven to be a successful system, therefore it is being adopted in the public sector too. However, implementation of private business practices in public organizations us very challenging due to differences in context. This implementation gets further critical in Pakistan due to a centralizing tendency and lack of autonomy in public organizations. Adoption of HRIS by public organizations in Pakistan raises several questions: What challenges are faced by public organizations in implementation of HRIS? Are benefits of HRIS such as efficiency, process integration and cost reduction achieved? How is the previous system improved with this change and what are the impacts? Yet, it is an under-researched topic, especially in public enterprises. This study contributes to the existing body of knowledge by empirically exploring benefits and challenges of implementation of HRIS in public organizations. The research adopts a case study approach and uses qualitative data based on in-depth interviews conducted at various levels in the hierarchy including top management, departmental heads and employees. The unit of analysis is LESCO, the Lahore Electric Supply Company, a state-owned entity that generates, transmits and distributes electricity to 4 big cities in Punjab, Pakistan. The findings of the study show that LESCO has not achieved the benefits of HRIS as established in literature. The implementation process remained quite slow and costly. Various functions of HR are still in isolation and integration is a big challenge for the organization. Although the data is automated, the previous system of manually record maintenance and paperwork is still in work, resulting in the presence of parallel practices. The findings also identified resistance to change from top management and labor workforce, lack of commitment and technical knowledge, and costly vendors as major barriers that affect the effective implementation of HRIS. The paper suggests some potential actions to overcome these barriers and to enhance effective implementation of HR-technology. The findings are explained in light of an institutional logics perspective. HRIS’ new logic of automated and integrated HR system is in sharp contrast with the prevailing logic of process-oriented manual data maintenance, leading to resistance to change and deadlock.Keywords: human resource information system, technological changes, state-owned enterprise, implementation challenges
Procedia PDF Downloads 14425469 Defining and Measuring the Success of the Hospitality-Based Social Enterprise Ringelblum Café
Authors: Nitzan Winograd, Nada Kakabadse
Abstract:
This study examines whether the hospitality-based social enterprise Ringelblum Café is achieving its stated social goals of developing a sense of self-efficacy among at-risk youth who work in this enterprise and raising levels of recruitment to the Israel Defence Forces (IDF) and National Service (NS) among these young adults. Ringelblum Café was founded in 2009 in Be'er-Sheva in order to provide employment solutions for at-risk youth in the southern district of Israel. Each year, 10 at-risk young adults aged 16–18 are referred to the programme by various welfare agencies. The training programme is approximately a year in duration and includes professional training in the art of cooking. Each young adult is also supported by a social worker. This study is based on the participation of 31 youths who graduated from the Ringelblum Café’s training programme. A convenience sampling model was used with the assistance of the programme's social worker. This study is quantitative in its approach. Data was collected by means of three separate self-reported questionnaires: a personal information questionnaire collected general demographics data; a self-efficacy questionnaire consisted of two parts: general self-efficacy and social self-efficacy; and an IDS/NS recruitment questionnaire. The study uses the theory of change in order to find out whether at-risk youth in the Ringelblum Café programme are taught a profession with future prospects, as well as whether they develop a sense of self-efficacy and raise their chances of recruitment into the IDF/NS. The study found that the sense of self-efficacy of the graduates is relatively high. In addition, there was a significant difference between the importance of recruitment to the IDF/NS among these youth prior to the beginning of the programme and after its completion, indicating that the training programme had a positive effect on motivation for recruitment to the IDF/NS. The study also found that the percentage of recruits to the IDF/NS among youth who graduated from the training programme were not significantly higher than the general recruitment figures in Israel. In conclusion, Ringelblum Café is making sound progress towards achieving its social goals regarding recruitment to the IDF/NS. Moreover, the sense of self-efficacy among the graduates is relatively high, and it can be assumed that the training programme has a positive effect on these young adults, although there is no clear connection between the two. This study is among a few that have been conducted in the field of hospitality-based social enterprises in Israel and can serve as a basis for further research. Moreover, the study results may help improve the perception of at-risk youth and their contribution to society and could increase awareness of the growing trend of social enterprises promoting social goals.Keywords: at-risk youth, Israel Defence Forces (IDF), national service, recruitment, self-efficacy, social enterprise
Procedia PDF Downloads 21525468 Managing HR Knowledge in a Large Privately Owned Enterprise: An Empirical Case Analysis
Authors: Cindy Wang-Cowham, Judy Ningyu Tang
Abstract:
The paper contributes towards the development of scarce literature on HR knowledge management. Drawing literature from knowledge management, the authors define the meaning of HR knowledge and propose that there are social mechanisms in organizations that facilitate the management and sharing of HR knowledge. Instead of investigating the subject in large multinational corporations, the present paper examines it in a large Chinese privately owned enterprise, which has an international standing. The main finding of the case analysis is that communication and feedback plays a pivotal role when managing HR knowledge. Social mechanisms can stimulate the communication and feedback between employees, thus facilitate knowledge exchange.Keywords: HR knowledge, knowledge management, large privately owned enterprises, China
Procedia PDF Downloads 53025467 The Effect of Artificial Intelligence on Banking Development and Progress
Authors: Mina Malak Hanna Saad
Abstract:
New strategies for supplying banking services to the customer have been brought, which include online banking. Banks have begun to recall electronic banking (e-banking) as a manner to replace some conventional department features by means of the usage of the internet as a brand-new distribution channel. A few clients have at least one account at multiple banks and get admission to those debts through online banking. To test their present-day internet worth, customers need to log into each of their debts, get particular statistics, and paint closer to consolidation. Not only is it time-ingesting; however, but it is also a repeatable activity with a certain frequency. To solve this problem, the idea of account aggregation was delivered as a solution. Account consolidation in e-banking as a form of digital banking appears to build stronger dating with clients. An account linking service is usually known as a service that permits customers to manipulate their bank accounts held at exceptional institutions through a common online banking platform that places a high priority on safety and statistics protection. The object affords an outline of the account aggregation approach in e-banking as a distinct carrier in the area of e-banking. The advanced facts generation is becoming a vital thing in the improvement of financial services enterprise, specifically the banking enterprise. It has brought different ways of delivering banking to the purchaser, which includes net Banking. Banks began to study electronic banking (e-banking) as a means to update some of their traditional branch functions and the use of the net as a distribution channel. Some clients have at least multiple accounts throughout banks and get the right of entry to that money owed through the usage of e-banking offerings. To examine the contemporary internet's well-worth position, customers have to log in to each of their money owed, get the information and work on consolidation. This no longer takes sufficient time; however, it is a repetitive interest at a specified frequency. To address this point, an account aggregation idea is brought as an answer. E-banking account aggregation, as one of the e-banking kinds, appeared to construct a more potent dating with clients. Account Aggregation carrier usually refers to a service that allows clients to control their bank bills maintained in one-of-a-kind institutions via a common Internet banking working platform, with an excessive subject to protection and privateness. This paper offers an overview of an e-banking account aggregation technique as a new provider in the e-banking field.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise developmente-banking, enterprise development
Procedia PDF Downloads 3525466 Threats to the Business Value: The Case of Mechanical Engineering Companies in the Czech Republic
Authors: Maria Reznakova, Michala Strnadova, Lukas Reznak
Abstract:
Successful achievement of strategic goals requires an effective performance management system, i.e. determining the appropriate indicators measuring the rate of goal achievement. Assuming that the goal of the owners is to grow the assets they invested in, it is vital to identify the key performance indicators, which contribute to value creation. These indicators are known as value drivers. Based on the undertaken literature search, a value driver is defined as any factor that affects the value of an enterprise. The important factors are then monitored by both financial and non-financial indicators. Financial performance indicators are most useful in strategic management, since they indicate whether a company's strategy implementation and execution are contributing to bottom line improvement. Non-financial indicators are mainly used for short-term decisions. The identification of value drivers, however, is problematic for companies which are not publicly traded. Therefore financial ratios continue to be used to measure the performance of companies, despite their considerable criticism. The main drawback of such indicators is the fact that they are calculated based on accounting data, while accounting rules may differ considerably across different environments. For successful enterprise performance management it is vital to avoid factors that may reduce (or even destroy) its value. Among the known factors reducing the enterprise value are the lack of capital, lack of strategic management system and poor quality of production. In order to gain further insight into the topic, the paper presents results of the research identifying factors that adversely affect the performance of mechanical engineering enterprises in the Czech Republic. The research methodology focuses on both the qualitative and the quantitative aspect of the topic. The qualitative data were obtained from a questionnaire survey of the enterprises senior management, while the quantitative financial data were obtained from the Analysis Major Database for European Sources (AMADEUS). The questionnaire prompted managers to list factors which negatively affect business performance of their enterprises. The range of potential factors was based on a secondary research – analysis of previously undertaken questionnaire surveys and research of studies published in the scientific literature. The results of the survey were evaluated both in general, by average scores, and by detailed sub-analyses of additional criteria. These include the company specific characteristics, such as its size and ownership structure. The evaluation also included a comparison of the managers’ opinions and the performance of their enterprises – measured by return on equity and return on assets ratios. The comparisons were tested by a series of non-parametric tests of statistical significance. The results of the analyses show that the factors most detrimental to the enterprise performance include the incompetence of responsible employees and the disregard to the customers‘ requirements.Keywords: business value, financial ratios, performance measurement, value drivers
Procedia PDF Downloads 22225465 Adding Business Value in Enterprise Applications through Quality Matrices Using Agile
Authors: Afshan Saad, Muhammad Saad, Shah Muhammad Emaduddin
Abstract:
Nowadays the business condition is so quick paced that enhancing ourselves consistently has turned into a huge factor for the presence of an undertaking. We can check this for structural building and significantly more so in the quick-paced universe of data innovation and programming designing. The lithe philosophies, similar to Scrum, have a devoted advance in the process that objectives the enhancement of the improvement procedure and programming items. Pivotal to process enhancement is to pick up data that grants you to assess the condition of the procedure and its items. From the status data, you can design activities for the upgrade and furthermore assess the accomplishment of those activities. This investigation builds a model that measures the product nature of the improvement procedure. The product quality is dependent on the useful and auxiliary nature of the product items, besides the nature of the advancement procedure is likewise vital to enhance programming quality. Utilitarian quality covers the adherence to client prerequisites, while the auxiliary quality tends to the structure of the product item's source code with reference to its practicality. The procedure quality is identified with the consistency and expectedness of the improvement procedure. The product quality model is connected in a business setting by social occasion the information for the product measurements in the model. To assess the product quality model, we investigate the information and present it to the general population engaged with the light-footed programming improvement process. The outcomes from the application and the client input recommend that the model empowers a reasonable evaluation of the product quality and that it very well may be utilized to help the persistent enhancement of the advancement procedure and programming items.Keywords: Agile SDLC Tools, Agile Software development, business value, enterprise applications, IBM, IBM Rational Team Concert, RTC, software quality, software metrics
Procedia PDF Downloads 17425464 Information Technology Application for Knowledge Management in Medium-Size Businesses
Authors: S. Thongchai
Abstract:
Result of the study on knowledge management systems in businesses was shown that the most of these businesses provide internet accessibility for their employees in order to study new knowledge via internet, corporate website, electronic mail, and electronic learning system. These business organizations use information technology application for knowledge management because of convenience, time saving, ease of use, accuracy of information and knowledge usefulness. The result indicated prominent improvements for corporate knowledge management systems as the following; 1) administrations must support corporate knowledge management system 2) the goal of corporate knowledge management must be clear 3) corporate culture should facilitate the exchange and sharing of knowledge within the organization 4) cooperation of personnel of all levels must be obtained 5) information technology infrastructure must be provided 6) they must develop the system regularly and constantly.Keywords: business organizations, information technology application, knowledge management systems, prominent improvements
Procedia PDF Downloads 38725463 A General Framework for Measuring the Internal Fraud Risk of an Enterprise Resource Planning System
Authors: Imran Dayan, Ashiqul Khan
Abstract:
Internal corporate fraud, which is fraud carried out by internal stakeholders of a company, affects the well-being of the organisation just like its external counterpart. Even if such an act is carried out for the short-term benefit of a corporation, the act is ultimately harmful to the entity in the long run. Internal fraud is often carried out by relying upon aberrations from usual business processes. Business processes are the lifeblood of a company in modern managerial context. Such processes are developed and fine-tuned over time as a corporation grows through its life stages. Modern corporations have embraced technological innovations into their business processes, and Enterprise Resource Planning (ERP) systems being at the heart of such business processes is a testimony to that. Since ERP systems record a huge amount of data in their event logs, the logs are a treasure trove for anyone trying to detect any sort of fraudulent activities hidden within the day-to-day business operations and processes. This research utilises the ERP systems in place within corporations to assess the likelihood of prospective internal fraud through developing a framework for measuring the risks of fraud through Process Mining techniques and hence finds risky designs and loose ends within these business processes. This framework helps not only in identifying existing cases of fraud in the records of the event log, but also signals the overall riskiness of certain business processes, and hence draws attention for carrying out a redesign of such processes to reduce the chance of future internal fraud while improving internal control within the organisation. The research adds value by applying the concepts of Process Mining into the analysis of data from modern day applications of business process records, which is the ERP event logs, and develops a framework that should be useful to internal stakeholders for strengthening internal control as well as provide external auditors with a tool of use in case of suspicion. The research proves its usefulness through a few case studies conducted with respect to big corporations with complex business processes and an ERP in place.Keywords: enterprise resource planning, fraud risk framework, internal corporate fraud, process mining
Procedia PDF Downloads 33325462 Efficient GIS Based Public Health System for Disease Prevention
Authors: K. M. G. T. R. Waidyarathna, S. M. Vidanagamachchi
Abstract:
Public Health System exists in Sri Lanka has a satisfactory complete information flow when compared to other systems in developing countries. The availability of a good health information system contributed immensely to achieve health indices that are in line with the developed countries like US and UK. The health information flow at the moment is completely paper based. In Sri Lanka, the fields like banking, accounting and engineering have incorporated information and communication technology to the same extent that can be observed in any other country. The field of medicine has behind those fields throughout the world mainly due to its complexity, issues like privacy, confidentially and lack of people with knowledge in both fields of Information Technology (IT) and Medicine. Sri Lanka’s situation is much worse and the gap is rapidly increasing with huge IT initiatives by private-public partnerships in all other countries. The major goal of the framework is to support minimizing the spreading diseases. To achieve that a web based framework should be implemented for this application domain with web mapping. The aim of this GIS based public health system is a secure, flexible, easy to maintain environment for creating and maintaining public health records and easy to interact with relevant parties.Keywords: DHIS2, GIS, public health, Sri Lanka
Procedia PDF Downloads 56325461 Program Accreditation as a Change Enterprise in Oman
Authors: Mahmoud Mohamed Emam, Yasser Fathy Hendawy Al-Mahdy
Abstract:
Higher education institutions (HEIs) in Arab countries have witnessed large scope transformations as a result of embracing globalised practices. The introduction of program academic accreditation in HEIs in the Arab context has been regarded as a change enterprise that has proponents and opponents. In essence, introducing new systems or practices trigger changes that may shatter employees at a given organization. Therefore, it is argued that the interaction between organizational, contextual, and individual-related variables are likely to determine how the organization succeeds in facing resistance to change. This study investigated a mediated-effects model of organizational support and citizenship behavior. The model proposes organizational support as an antecedent of citizenship behavior and commitment to change as a mediator in the organizational support–citizenship behavior relationship. Survey data were collected and analyzed from university faculty (n=221) using structural equation modeling. Findings showed that organizational support significantly contributes to increasedcitizenshipbehaviour and the commitment of university faculty to program accreditation as a change enterprise, which has a significant and direct impact on their citizenship behaviour. We conclude that university-level organizational support shapes faculty’s commitment to change both directly and indirectly. The findings have significant practical implications for HEIs in Arab countries when they introduce new practices that aim at improving institutional effectiveness.Keywords: organizational support, accreditation, commitment, citizenship behaviour
Procedia PDF Downloads 9625460 The Complementary Explanations of Institutional and Feminist Perspectives for Female Social Enterprise in Pakistan
Authors: Mohammad Sohail Yunis, Hina Hashim, Alistair R. Anderson
Abstract:
Entrepreneurship is gendered with masculine qualities, yet social enterprise epitomizes caring a feminine quality. However enterprising practices may have little to do with gender. Consequently, the purpose of this paper is to examine practices using two very different explanatory theories, feminist and institutional theory, to establish the role played by gender. This study is situated in KP, the poor but traditional north of Pakistan. Utilising on an interpretive qualitative research approach, this research collected data through in-depth interviews with ten women social entrepreneurs of KP, Pakistan and analyzed using thematic analysis. Empirically, this paper identifies and describes on a number of interesting themes that relate to the women entrepreneurship such as 'women empowerment, patriarchal culture, role of culture and societal norms, religious extremism and terrorism, forced entrepreneurs, change creators, institutional corruption, and security issues'. In addition, female social enterprise in KP is set in a patriarchal, masculine culture, but the practices negotiate institutional obstacles to bring benefits to the disenfranchised. Finally, this research claims to present an original insight into female social entrepreneurship in a developing country context and provide fresh theoretical and empirical perspectives to advance knowledge and scholarship.Keywords: female social entrepreneurship, institutional theory, feminist theory, developing countries
Procedia PDF Downloads 21925459 Organisational Change: The Impact on Employees and Organisational Development
Authors: Maureen Royce, Joshi Jariwala, Sally Kah
Abstract:
Change is inevitable, but the change process is progressive. Organisational change is the process in which an organisation changes strategies, operational methods, systems, culture, and structure to affect something different in the organisation. This process can be continuous or developed over a period and driven by internal and external factors. Organisational change is essential if organisations are to survive in dynamic and uncertain environments. However, evidence from research shows that many change initiatives fail, leading to severe consequences for organisations and their resources. The complex models of third sector organisations, i.e., social enterprise, compounds the levels of change in these organisations. Interestingly, innovation is associated with a change in social enterprises due to the hybridity of product and service development. Furthermore, the creation of social intervention has offered a new process and outcomes to the lifecycle of change. Therefore, different forms of organisational innovation are developed, i.e., total, evolutionary, expansionary, and developmental, which affect the interventions of social enterprises. This raises both theoretical and business concerns on how the competing hybrid nature of social enterprises change, how change is managed, and the impact on these organisations. These perspectives present critical questions for further investigation. In this study, we investigate the impact of organisational change on employees and organisational development at DaDaFest –a disability arts organisation with a social focus based in Liverpool. The three main objectives are to explore the drivers of change and the implementation process; to examine the impact of organisational change on employees and; to identify barriers to organisation change and development. To address the preceding research objectives, qualitative research design is adopted using semi-structured interviews. Data is analysed using a six-step thematic analysis framework, which enables the study to develop themes depicting the impact of change on employees and organisational development. This study presents theoretical and practical contributions for academics and practitioners. The knowledge contributions encapsulate the evolution of change and the change cycle in a social enterprise. However, practical implications provide critical insights into the change management process and the impact of change on employees and organisational development.Keywords: organisational change, change management, organisational change system, social enterprise
Procedia PDF Downloads 12625458 Design of the Ubiquitous Cloud Learning Management System
Authors: Panita Wannapiroon, Noppadon Phumeechanya, Sitthichai Laisema
Abstract:
This study is the research and development which is intended to: 1) design the ubiquitous cloud learning management system and: 2) assess the suitability of the design of the ubiquitous cloud learning management system. Its methods are divided into 2 phases. Phase 1 is the design of the ubiquitous cloud learning management system, phase 2 is the assessment of the suitability of the design the samples used in this study are work done by 25 professionals in the field of Ubiquitous cloud learning management systems and information and communication technology in education selected using the purposive sampling method. Data analyzed by arithmetic mean and standard deviation. The results showed that the ubiquitous cloud learning management system consists of 2 main components which are: 1) the ubiquitous cloud learning management system server (u-Cloud LMS Server) including: cloud repository, cloud information resources, social cloud network, cloud context awareness, cloud communication, cloud collaborative tools, and: 2) the mobile client. The result of the system suitability assessment from the professionals is in the highest range.Keywords: learning management system, cloud computing, ubiquitous learning, ubiquitous learning management system
Procedia PDF Downloads 52025457 Understanding the Construction of Social Enterprises in India: Through Identity and Context of Social Entrepreneurs
Authors: K. Bose
Abstract:
India is one of the largest democracies in the global south, which demonstrates the highest social enterprise activities in the subcontinent. Although there has been a meteoric rise in social enterprise activities, it is not a new phenomenon, as it dates back to Vinoba Bhave's Land Gift movement in 1950. India also has a rich history of a welfare mix where non-governmental organisations played a significant role in the public welfare provision. Lately, the government’s impetus on entrepreneurship has contributed to a burgeoning social enterprise sector in the country; however, there is a lack in understanding of how social enterprises are constructed in India. Social entrepreneurship as practice has been conceptualised as a multi-dimensional concept, which is predominantly explained through the characteristics of a social entrepreneur. Social enterprise organisation, which is a component of social entrepreneurship practice are also classified through the role of the social entrepreneur; thus making social entrepreneur a vital unit shaping organisation and practice. Hence, individual identity of the social entrepreneur acts as a steering agent for defining organisation and practice. Individual identity does not operate in a vacuum and different isomorphic pressures (resource-rich actors/institutions) leads to negotiation in these identities. Dey and Teasdale's work investigated this identity work of non-profit practitioners within the practice of social enterprises in England. Furthermore, the construction of social enterprises is predominantly understood through two approaches i.e. an institutional logic perspective emerging from Europe and process and outcome perspective derived from the United States. These two approaches explain social enterprise as an inevitable institutional outcome in a linear and simplistic manner. Such linear institutional transition is inferred from structural policy reforms and austerity measures adopted by the government, which led to heightened competition for funds in the non-profit sector. These political and economic challenges were specific to the global north, which is different from transitions experienced in the global south, thus further investigation would help understand social enterprise activities as a contextual phenomenon. There is a growing interest in understanding the role of the context within the entrepreneurship literature, additionally, there is growing recognition in entrepreneurship research that economic behaviour is realised far better within its historical, temporal, institutional, spatial and social context, as these contexts provide boundaries to individuals in terms of opportunities and actions. Social enterprise phenomenon too is realised as contextual phenomenon though it differs from traditional entrepreneurship in terms of its dual mission (social and economic), however, the understanding of the role of context in social entrepreneurship has been limited. Hence, this work in progress study integrates identity work of social entrepreneur and the role of context. It investigates the identities of social entrepreneur and its negotiation within its context. Further, how this negotiated identity transcends into organisational practice in turn shaping how social enterprises are constructed in a specific region. The study employs a qualitative inquiry of semi-structured interviews and ethnographic institutionalism. Interviews were analysed using critical discourse analysis and the preliminary outcomes are currently a work in progress.Keywords: context, Dey and Teasdale, identity, social entrepreneurs, social enterprise, social entrepreneurship
Procedia PDF Downloads 18025456 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 38425455 Iot-Based Interactive Patient Identification and Safety Management System
Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro
Abstract:
We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band
Procedia PDF Downloads 31125454 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime
Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya
Abstract:
Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident
Procedia PDF Downloads 15225453 Similarity Based Membership of Elements to Uncertain Concept in Information System
Authors: M. Kamel El-Sayed
Abstract:
The process of determining the degree of membership for an element to an uncertain concept has been found in many ways, using equivalence and symmetry relations in information systems. In the case of similarity, these methods did not take into account the degree of symmetry between elements. In this paper, we use a new definition for finding the membership based on the degree of symmetry. We provide an example to clarify the suggested methods and compare it with previous methods. This method opens the door to more accurate decisions in information systems.Keywords: information system, uncertain concept, membership function, similarity relation, degree of similarity
Procedia PDF Downloads 22325452 Designing a Pregnancy Interactive Information Design for a Mobile Application
Authors: Thomas Adi Purnomo Sidhi
Abstract:
The importance of designing a pregnancy interactive information design for a mobile application is felt in order to assist pregnant women to get an easy access of highly credible pregnancy-related information on which often fail to be fulfilled, while it has been a very critical one. Thus, an observation of needs assessment for designing a pregnancy interactive information system design for a mobile application at iOS becomes current objective study. A comparative study of the top five pregnancy interactive information design available at the Apple Store conducted in order to fulfill it. Whilst, an observation of user experiences included for deeper analyzes. Moreover, a literature study conducted to support the arguments that being provided in the current study. The findings, surprisingly, also reveal the advantages of local wisdom in pregnancy that never been attached to those top five applications before.Keywords: information system design, interactive design, local wisdom, pregnancy
Procedia PDF Downloads 18725451 The Guideline of Overall Competitive Advantage Promotion with Key Success Paths
Authors: M. F. Wu, F. T. Cheng, C. S. Wu, M. C. Tan
Abstract:
It is a critical time to upgrade technology and increase value added with manufacturing skills developing and management strategies that will highly satisfy the customers need in the precision machinery global market. In recent years, the supply side, each precision machinery manufacturers in each country are facing the pressures of price reducing from the demand side voices that pushes the high-end precision machinery manufacturers adopts low-cost and high-quality strategy to retrieve the market. Because of the trend of the global market, the manufacturers must take price reducing strategies and upgrade technology of low-end machinery for differentiations to consolidate the market. By using six key success factors (KSFs), customer perceived value, customer satisfaction, customer service, product design, product effectiveness and machine structure quality are causal conditions to explore the impact of competitive advantage of the enterprise, such as overall profitability and product pricing power. This research uses key success paths (KSPs) approach and f/s QCA software to explore various combinations of causal relationships, so as to fully understand the performance level of KSFs and business objectives in order to achieve competitive advantage. In this study, the combination of a causal relationships, are called Key Success Paths (KSPs). The key success paths guide the enterprise to achieve the specific outcomes of business. The findings of this study indicate that there are thirteen KSPs to achieve the overall profitability, sixteen KSPs to achieve the product pricing power and seventeen KSPs to achieve both overall profitability and pricing power of the enterprise. The KSPs provide the directions of resources integration and allocation, improve utilization efficiency of limited resources to realize the continuous vision of the enterprise.Keywords: precision machinery industry, key success factors (KSFs), key success paths (KSPs), overall profitability, product pricing power, competitive advantages
Procedia PDF Downloads 26725450 Study on Network-Based Technology for Detecting Potentially Malicious Websites
Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park
Abstract:
Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits
Procedia PDF Downloads 36625449 iCCS: Development of a Mobile Web-Based Student Integrated Information System using Hill Climbing Algorithm
Authors: Maria Cecilia G. Cantos, Lorena W. Rabago, Bartolome T. Tanguilig III
Abstract:
This paper describes a conducive and structured information exchange environment for the students of the College of Computer Studies in Manuel S. Enverga University Foundation in. The system was developed to help the students to check their academic result, manage profile, make self-enlistment and assist the students to manage their academic status that can be viewed also in mobile phones. Developing class schedules in a traditional way is a long process that involves making many numbers of choices. With Hill Climbing Algorithm, however, the process of class scheduling, particularly with regards to courses to be taken by the student aligned with the curriculum, can perform these processes and end up with an optimum solution. The proponent used Rapid Application Development (RAD) for the system development method. The proponent also used the PHP as the programming language and MySQL as the database.Keywords: hill climbing algorithm, integrated system, mobile web-based, student information system
Procedia PDF Downloads 38425448 DBN-Based Face Recognition System Using Light Field
Authors: Bing Gu
Abstract:
Abstract—Most of Conventional facial recognition systems are based on image features, such as LBP, SIFT. Recently some DBN-based 2D facial recognition systems have been proposed. However, we find there are few DBN-based 3D facial recognition system and relative researches. 3D facial images include all the individual biometric information. We can use these information to build more accurate features, So we present our DBN-based face recognition system using Light Field. We can see Light Field as another presentation of 3D image, and Light Field Camera show us a way to receive a Light Field. We use the commercially available Light Field Camera to act as the collector of our face recognition system, and the system receive a state-of-art performance as convenient as conventional 2D face recognition system.Keywords: DBN, face recognition, light field, Lytro
Procedia PDF Downloads 46425447 Elaboration Development Strategy and the Analysis of Trends Shaping the Information Economy in Azerbaijan on the Basis of the Experience of Foreign Countries
Authors: Rasim M. Alguliyev, Alovsat G. Aliyev
Abstract:
In the paper information on economic development trends in developed countries are analyzed. The current status of information society and economy of the country is reviewed and some recommendations are given for future development. The problems of Information Society and establishment of its innovative economy are studied. In this turn, development trends information economy in developed countries are analyzed.Keywords: information economy, ICT sector, ICT infrastructure, innovation, innovation system hi-tech products, antimonopoly policy
Procedia PDF Downloads 338