Search results for: business entities
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3463

Search results for: business entities

823 Critical Review of Clean Energy Mix as Means of Boosting Power Generation in Nigeria

Authors: B. Adebayo, A. A. Adebayo

Abstract:

Adequate power generation and supply are enormous challenges confronting Nigeria state today. This is a powerful mechanism that drives industrial development and socio-economy of any nation. The present level of power generation and supply have become national embarrassment to both government and the citizens of Nigeria, where over 60% of the population have no access to electricity. This paper is set to review the abundant clean energy alternative sources available in abundance that are capable of boosting power generation. The clean energy sources waiting to be exploited include: nuclear, solar and wind energy. The environmental benefits of these sources of power generation are identified. Nuclear energy is a powerful clean energy source. However, Africa accounted for 20% of known recoverable reserve and uranium produces heat of 500,000 MJ/kg. Moreover, Nigeria receives average daily solar radiation of over 5.249 kWh/m2/day. Researchers have shown that wind speed and power flux densities varied from 1.5 – 4.1 m/s and 5.7 – 22.5 W/m2 respectively. It is a fact that the cost of doing business in Nigeria is very high, leading to winding up of the multi-national companies and then led to increase unemployment level. More importantly, readily available vast quantity of energy will reduce cost of running industries. Hence, more industries will come on board, goods, services, and more job creation will be achieved. This clean source of power generation is devoid of production of green house gases, elimination of environmental pollution, and reduced waste disposal. Then Nigerians will live in harmony with the environment.

Keywords: power, generation, energy, mix, clean, industrial

Procedia PDF Downloads 310
822 Cloud Enterprise Application Provider Selection Model for the Small and Medium Enterprise: A Pilot Study

Authors: Rowland R. Ogunrinde, Yusmadi Y. Jusoh, Noraini Che Pa, Wan Nurhayati W. Rahman, Azizol B. Abdullah

Abstract:

Enterprise Applications (EAs) aid the organizations achieve operational excellence and competitive advantage. Over time, most Small and Medium Enterprises (SMEs), which are known to be the major drivers of most thriving global economies, use the costly on-premise versions of these applications thereby making business difficult to competitively thrive in the same market environment with their large enterprise counterparts. The advent of cloud computing presents the SMEs an affordable offer and great opportunities as such EAs can be cloud-hosted and rented on a pay-per-use basis which does not require huge initial capital. However, as there are numerous Cloud Service Providers (CSPs) offering EAs as Software-as-a-Service (SaaS), there is a challenge of choosing a suitable provider with Quality of Service (QoS) that meet the organizations’ customized requirements. The proposed model takes care of that and goes a step further to select the most affordable among a selected few of the CSPs. In the earlier stage, before developing the instrument and conducting the pilot test, the researchers conducted a structured interview with three experts to validate the proposed model. In conclusion, the validity and reliability of the instrument were tested through experts, typical respondents, and analyzed with SPSS 22. Results confirmed the validity of the proposed model and the validity and reliability of the instrument.

Keywords: cloud service provider, enterprise application, quality of service, selection criteria, small and medium enterprise

Procedia PDF Downloads 179
821 Determinants of Extra Charges for Container Shipments: A Case Study of Nexus Zone Logistics

Authors: Zety Shakila Binti Mohd Yusof, Muhammad Adib Bin Ishak, Hajah Fatimah Binti Hussein

Abstract:

The international shipping business is related to numerous controls or regulations of export and import shipments. It is costly and time consuming, and when something goes wrong or when the buyer or seller fails to comply with the regulations, it can result in penalties, delays, and unexpected costs etc. For the focus of this study, the researchers have selected a local forwarder that provides forwarding and clearance services, Nexus Zone Logistics. It was identified that this company currently has many extra costs to be paid including local and detention charges, which negatively impacts the flow of income and reduces overall stability. Two variables have been identified as factors of extra charges; loaded containers entering the port by exceeded closing time and late delivery of empty containers to the container yard. This study is a qualitative in nature and the secondary data collected was analyzed using self-administered observation. The findings of this study were covered by one selected case for each export and import shipment between July and December 2014. The data were analyzed using frequency analysis based on tables and graphs. The researcher recommends Nexus Zone Logistics impose a 1% deposit payment per container for each shipment (export and import) to its customers.

Keywords: international shipping, export and import, detention charges, container shipment

Procedia PDF Downloads 383
820 Changing the Way South Africa Think about Parking Provision at Tertiary Institutions

Authors: M. C. Venter, G. Hitge, S. C. Krygsman, J. Thiart

Abstract:

For decades, South Africa has been planning transportation systems from a supply, rather than a demand side, perspective. In terms of parking, this relates to requiring the minimum parking provision that is enforced by city officials. Newer insight is starting to indicate that South Africa needs to re-think this philosophy in light of a new policy environment that desires a different outcome. Urban policies have shifted from reliance on the private car for access, to employing a wide range of alternative modes. Car dominated travel is influenced by various parameters, of which the availability and location of parking plays a significant role. The question is therefore, what is the right strategy to achieve the desired transport outcomes for SA. The focus of this paper is used to assess this issue with regard to parking provision, and specifically at a tertiary institution. A parking audit was conducted at the Stellenbosch campus of Stellenbosch University, monitoring occupancy at all 60 parking areas, every hour during business hours over a five-day period. The data from this survey was compared with the prescribed number of parking bays according to the Stellenbosch Municipality zoning scheme (requiring a minimum of 0.4 bays per student). The analysis shows that by providing 0.09 bays per student, the maximum total daily occupation of all the parking areas did not exceed an 80% occupation rate. It is concluded that the prevailing parking standards are not supportive of the new urban and transport policy environment, but that it is extremely conservative from a practical demand point of view.

Keywords: parking provision, parking requirements, travel behaviour, travel demand management

Procedia PDF Downloads 181
819 Family Firms and Investment–Cash Flow Sensitivity: Empirical Evidence from Canada

Authors: Imen Latrous

Abstract:

Family firm is the most common form of business organization in the world. Many family businesses rely heavily on their own capital to finance their expansion. This dependence on internal funds for their investment may be deliberate to maintain the family dominant position or involuntary as family firms have limited access to external funds. Our understanding of family firm’s choice to fund their own growth using existing capital is somewhat limited. The aim of this paper is to study whether the presence of a controlling family in the company either mitigates or exacerbates external financing constraints. The impact of family ownership on investment–cash flow sensitivity is ultimately an empirical question. We use a sample of 406 Canadian firms listed in Toronto Stock exchange (TSX) over the period 2005–2014 in order to explore this relationship. We distinguish between three elements in the definition of family firms, specifically ownership, control and management, to explore the issue whether family firms are more efficient organisational form. Our research contributes to the extant literature on family ownership in several ways. First, as our understanding of family firm’s investment cash flow sensitivity is somewhat limited in recession times, we explore the effect of family firms on the relation between investment and cash flow during the recent 2007-2009 financial crisis. We also analyse this relationship difference between family firms and non family firms before and during financial crisis. Finally, our paper addresses the endogeneity problem of family ownership and investment-cash flow sensitivity.

Keywords: family firms, investment–cash flow sensitivity, financial crisis, corporate governance

Procedia PDF Downloads 325
818 Waterborne Platooning: Cost and Logistic Analysis of Vessel Trains

Authors: Alina P. Colling, Robert G. Hekkenberg

Abstract:

Recent years have seen extensive technological advancement in truck platooning, as reflected in the literature. Its main benefits are the improvement of traffic stability and the reduction of air drag, resulting in less fuel consumption, in comparison to using individual trucks. Platooning is now being adapted to the waterborne transport sector in the NOVIMAR project through the development of a Vessel Train (VT) concept. The main focus of VT’s, as opposed to the truck platoons, is the decrease in manning on board, ultimately working towards autonomous vessel operations. This crew reduction can prove to be an important selling point in achieving economic competitiveness of the waterborne approach when compared to alternative modes of transport. This paper discusses the expected benefits and drawbacks of the VT concept, in terms of the technical logistic performance and generalized costs. More specifically, VT’s can provide flexibility in destination choices for shippers but also add complexity when performing special manoeuvres in VT formation. In order to quantify the cost and performances, a model is developed and simulations are carried out for various case studies. These compare the application of VT’s in the short sea and inland water transport, with specific sailing regimes and technologies installed on board to allow different levels of autonomy. The results enable the identification of the most important boundary conditions for the successful operation of the waterborne platooning concept. These findings serve as a framework for future business applications of the VT.

Keywords: autonomous vessels, NOVIMAR, vessel trains, waterborne platooning

Procedia PDF Downloads 223
817 Senior Entrepreneurship and the Takeover of Family Businesses: The Case of Moroccan Family-Owned Small Medium-Sized Enterprises

Authors: Brahim Ouzaka, Said Ouhadi

Abstract:

Family businesses (FB) represent the oldest and most resilient form of organization. However, they are weakened by problems of entrepreneurial discontinuity. The objective of this paper is to analyze the problem of the succession of FBs created by senior entrepreneurs. This study analyzes and explores the constructs of senior entrepreneurship and the strategy and takeover policies of the Moroccan Family owned Small and Medium-Sized Businesses. Our main research question is formulated as follows: how does senior entrepreneurship promote the takeover of Moroccan family SMEs? So we aim through this study to analyze the challenge of the takeover of the FB created by senior entrepreneurs in order to explore and understand the specificities, choices and strategies as well as the reality of the takeover process among this category of senior entrepreneurs. After a review of the literature on the relationship between the constructs of senior entrepreneurship and the takeover of FBs, the empirical study will consist of an exploratory qualitative approach of 3 family SMEs created by senior entrepreneurs and subsequently transmitted to their descendants. This qualitative research serves to explore the choices, the strategies as well as the specificities of the entrepreneurial acts and processes of this category of entrepreneurs. The interviews were conducted with senior entrepreneurs and successors of three Moroccan family SMEs, focusing on the specificity of entrepreneurial actions and strategies in the case of SMEs launched by senior entrepreneurs and on the reality of the conduct and preparation of the takeover process, the methods of socialization and training of buyers in the context of these companies.

Keywords: senior entrepreneurship, family SME, family business, takeover

Procedia PDF Downloads 87
816 Using Social Media to Amplify Social Entrepreneurial Message

Authors: Irfan Khairi

Abstract:

It is arguable that today's social media has dramatically redefined human contact, and chiefly because the platforms enable communication opportunities unprecedented. Without question, billions of individuals globally engage in the media, a reality by no means lost on businesses and social entrepreneurs desirous of generating interest in a cause, movement, or other social effort. If, however, the opportunities are immense, so too is the competition. Private persons and entrepreneurial concerns alike virtually saturate the popular sites of Facebook, Twitter, and Instagram, and most are intent on capturing as much external interest as possible. At the same time, however, the social entrepreneur possesses an advantage over the individual concerned only the social aspects of the sites, as they express interests in, and measures applicable to, important causes of which the public at large may be unaware. There is, unfortunately, no single means of assuring success in using the media outlets to generate interest. Nonetheless, a general awareness of how social media sites function, as well as the psychological elements relevant to the functioning, is necessary. It is as important to comprehend basic realities of the platforms and approaches that fail as it is to develop strategy, for the latter relies on knowledge of the former. This awareness in place, the social entrepreneur is then better enabled to determine strategy, in terms of which sites to focus upon and how to most effectively convey their message. What is required is familiarity with the online communities, with attention to the specific advantages each provides. Ultimately, today's social entrepreneur may establish a highly effective platform of promotion and engagement, provided they fully comprehend the social investment necessary for success.

Keywords: social media, marketing, e-commerce, internet business

Procedia PDF Downloads 212
815 Exploring the Impact of Transformational Collegial Leadership in Organizations

Authors: Prakash Singh

Abstract:

Far-reaching organizational and structural changes are required to address the severe imbalances in the provision and strong bureaucratic controls in many organizations at all levels. Transformational collegial leadership (TCL) is a collective action generated by transforming leadership which empowers all individuals who participate in this process, whether it is in business or education, or in any other organization. Recent research is strongly supportive of collegiality as a key factor in transforming traditional bureaucratic management practices (TBMPs) in organizations. The primary objective of this study was therefore to gauge the extent to which organizations have affected a shift from TBMPs towards TCL and how this can affect the development of human resources. This qualitative study investigated the impact of TCL on developing human resources in two organizations which were purposively selected to participate in this study. The findings of this study affirm that human resource development and TCL embrace the values of collaboration, confrontation, authenticity, trust, support and openness. In order to overcome TBMPs, a clear sense of direction must be communicated by collegial leaders throughout their organizations so that lower-level employees can initiate actions without the same degree of vulnerability. The TCL approach must respond to needs amongst followers and must look for motives, extrinsic and intrinsic, to satisfy those needs by enhancing opportunities, empowering people and giving more freedom, performance evaluation and the full support of the leader. Evidently, the collegial model emphasizes the valuing of individuals where there is a breadth of leadership and an absence of hierarchy.

Keywords: bureaucratic management model, human resource development, transformational collegial leadership model, transforming leader

Procedia PDF Downloads 431
814 Determination of Safe Ore Extraction Methodology beneath Permanent Extraction in a Lead Zinc Mine with the Help of FLAC3D Numerical Model

Authors: Ayan Giri, Lukaranjan Phukan, Shantanu Karmakar

Abstract:

Structure and tectonics play a vital role in ore genesis and deposition. The existence of a swelling structure below the current level of a mine leads to the discovery of ores below some permeant developments of the mine. The discovery and the extraction of the ore body are very critical to sustain the business requirement of the mine. The challenge was to extract the ore without hampering the global stability of the mine. In order to do so, different mining options were considered and analysed by numerical modelling in FLAC3d software. The constitutive model prepared for this simulation is the improved unified constitutive model, which can better and more accurately predict the stress-strain relationships in a continuum model. The IUCM employs the Hoek-Brown criterion to determine the instantaneous Mohr-Coulomb parameters cohesion (c) and friction (ɸ) at each level of confining stress. The extra swelled part can be dimensioned as north-south strike width 50m, east-west strike width 50m. On the north side, already a stope (P1) is excavated of the dimension of 25m NS width. The different options considered were (a) Open stoping of extraction of southern part (P0) of 50m to the full extent, (b) Extraction of the southern part of 25m, then filling of both the primaries and extraction of secondary (S0) 25m in between. (c) Extraction of the southern part (P0) completely, preceded by backfill and modify the design of the secondary (S0) for the overall stability of the permanent excavation above the stoping.

Keywords: extraction, IUCM, FLAC 3D, stoping, tectonics

Procedia PDF Downloads 212
813 Supply Chains Resilience within Machine-Made Rug Producers in Iran

Authors: Malihe Shahidan, Azin Madhi, Meisam Shahbaz

Abstract:

In recent decades, the role of supply chains in sustaining businesses and establishing their superiority in the market has been under focus. The realization of the goals and strategies of a business enterprise is largely dependent on the cooperation of the chain, including suppliers, distributors, retailers, etc. Supply chains can potentially be disrupted by both internal and external factors. In this paper, resilience strategies have been identified and analyzed in three levels: sourcing, producing, and distributing by considering economic depression as a current risk factor for the machine-made rugs industry. In this study, semi-structured interviews for data gathering and thematic analysis for data analysis are applied. Supply chain data has been gathered from seven rug factories before and after the economic depression through semi-structured interviews. The identified strategies were derived from literature review and validated by collecting data from a group of eighteen industry and university experts, and the results were analyzed using statistical tests. Finally, the outsourcing of new products and products in the new market, the development and completion of the product portfolio, the flexibility in the composition and volume of products, the expansion of the market to price-sensitive, direct sales, and disintermediation have been determined as strategies affecting supply chain resilience of machine-made rugs' industry during an economic depression.

Keywords: distribution, economic depression, machine-made rug, outsourcing, production, sourcing, supply chain, supply chain resilience

Procedia PDF Downloads 162
812 Web Proxy Detection via Bipartite Graphs and One-Mode Projections

Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo

Abstract:

With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.

Keywords: bipartite graph, one-mode projection, clustering, web proxy detection

Procedia PDF Downloads 245
811 The “Ecological Approach” to GIS Implementation in Low Income Countries’ and the Role of Universities: Union of Municipalities of Joumeh Case Study

Authors: A. Iaaly, O. Jadayel, R. Jadayel

Abstract:

This paper explores the effectiveness of approaches used for the implementation of technology within central governments specifically Geographic Information Systems (GIS). It examines the extent to which various strategies to GIS implementation and its roll out to users within an organization is crucial for its long term assimilation. Depending on the contextual requirements, various implementation strategies exist spanning from the most revolutionary to the most evolutionary, which have an influence on the success of GIS projects and the realization of resulting business benefits within the central governments. This research compares between two strategies of GIS implementation within the Lebanese Municipalities. The first strategy is the “Technological Approach” which is focused on technology acquisition, overlaid on existing governmental frameworks. This approach gives minimal attention to capability building and the long term sustainability of the implemented program. The second strategy, referred to as the “Ecological Approach”, is naturally oriented to the function of the organization. This approach stresses on fostering the evolution of the program and on building the human capabilities. The Union of the Joumeh Municipalities will be presented as a case study under the “Ecological Approach” and the role of the GIS Center at the University of Balamand will be highlighted. Thus, this research contributes to the development of knowledge on technology implementation and the vital role of academia in the specific context of the Lebanese public sector so that this experience may pave the way for further applications.

Keywords: ecological approach GIS, low income countries, technological approach

Procedia PDF Downloads 305
810 Improving the Teaching of Mathematics at University Using the Inverted Classroom Model: A Case in Greece

Authors: G. S. Androulakis, G. Deli, M. Kaisari, N. Mihos

Abstract:

Teaching practices at the university level have changed and developed during the last decade. Implementation of inverted classroom method in secondary education consists of a well-formed basis for academic teachers. On the other hand, distance learning is a well-known field in education research and widespread as a method of teaching. Nonetheless, the new pandemic found many Universities all over the world unprepared, which made adaptations to new methods of teaching a necessity. In this paper, we analyze a model of an inverted university classroom in a distance learning context. Thus, the main purpose of our research is to investigate students’ difficulties as they transit to a new style of teaching and explore their learning development during a semester totally different from others. Our teaching experiment took place at the Business Administration department of the University of Patras, in the context of two courses: Calculus, a course aimed at first-year students, and Statistics, a course aimed at second-year students. Second-year students had the opportunity to attend courses in the university classroom. First-year students started their semester with distance learning. Using a comparative study of these two groups, we explored significant differences in students’ learning procedures. Focused group interviews, written tests, analyses of students’ dialogues were used in a mixed quantity and quality research. Our analysis reveals students’ skills, capabilities but also a difficulty in following, non-traditional style of teaching. The inverted classroom model, according to our findings, offers benefits in the educational procedure, even in a distance learning environment.

Keywords: distance learning, higher education, inverted classroom, mathematics teaching

Procedia PDF Downloads 133
809 The Effect of Racism in the Media to Deal With Migration

Authors: Rasha Ali Dheyab, Edurad Vlad

Abstract:

Migration is associated with other important global issues, including development, poverty, and human rights. Migrants are often the most dynamic members of society; historically, migration has supported economic development and the rise of nations and enriched cultures. It also presents significant challenges. The word ‘racism’ is not just about beliefs or statements; it also contains the ability to force those beliefs or world views as hegemonic and as a basis for the refusal of rights or equality. For this reason, racism is embedded in power relations of different types. Racism is not only an awareness of distinction and groups, but it also has extremely practical roles in maintaining: First, inequitable social power arrangements; and second, racist behavioral manifestations such as verbal rejection, avoidance, discrimination, physical attack, and elimination. The focus is on aspects of racism in the media to deal with the migration phenomenon. The reproduction and promotion of racism by certain areas of the media is not a simple and straightforward process. It is important to see how the media serves in the reproduction of racism. This article shows attitudes to migration as they have appeared in British periodicals over the last few years. One might conclude that the reproduction of racism by the media is not a simple and straightforward process. It has become obvious that the role of the media in the reproduction of racism is inextricably linked to the general characteristics of racism and white domination in society, particularly the structural and ideological structuring of that kind of group power. This highlights the press's function as a business, social, and cultural institution. The press has to be examined in connection to the institutions of the economic and political as well.

Keywords: British periodicals, culture studies, migration, racism

Procedia PDF Downloads 213
808 Impact of Changes of the Conceptual Framework for Financial Reporting on the Indicators of the Financial Statement

Authors: Nadezhda Kvatashidze

Abstract:

The International Accounting Standards Board updated the conceptual framework for financial reporting. The main reason behind it is to resolve the tasks of the accounting, which are caused by the market development and business-transactions of a new economic content. Also, the investors call for higher transparency of information and responsibility for the results in order to make a more accurate risk assessment and forecast. All these make it necessary to further develop the conceptual framework for financial reporting so that the users get useful information. The market development and certain shortcomings of the conceptual framework revealed in practice require its reconsideration and finding new solutions. Some issues and concepts, such as disclosure and supply of information, its qualitative characteristics, assessment, and measurement uncertainty had to be supplemented and perfected. The criteria of recognition of certain elements (assets and liabilities) of reporting had to be updated, too and all this is set out in the updated edition of the conceptual framework for financial reporting, a comprehensive collection of concepts underlying preparation of the financial statement. The main objective of conceptual framework revision is to improve financial reporting and development of clear concepts package. This will support International Accounting Standards Board (IASB) to set common “Approach & Reflection” for similar transactions on the basis of mutually accepted concepts. As a result, companies will be able to develop coherent accounting policies for those transactions or events that are occurred from particular deals to which no standard is used or when standard allows choice of accounting policy.

Keywords: conceptual framework, measurement basis, measurement uncertainty, neutrality, prudence, stewardship

Procedia PDF Downloads 126
807 Political Economy of Social Movements: The Influence of Capitalism on the Emergence of the Feminist Movement in Ukraine

Authors: Nadiya Didyk

Abstract:

This thesis deals with the unique history of the emergence of the Ukrainian feminist movement. Ukrainian feminism is still in its making, so the field is under-investigated in general. Nevertheless, the perspective of political economy and the enabling and constraining effects of capitalist dynamics are almost absent from the research on the emergence and the development of the feminist movement in Ukraine. This research was inspired by Hetland and Goodwin’s approach and an attempt to test their approach on the case of the Ukrainian feminist movement. Hetland and Goodwin claim that many scholars tend to neglect political economy from analysis of feminism as a new social movements, namely because such movement are not about class or materialist concerns, and thus have no discernible connection to capitalism. Both scholars, however, point out that there at least four ways in which capitalism has been of high importance for any social movement. Accordingly, the following issues are analysed in this paper: capitalism as the facilitator of the emergence and development of Ukrainian feminism; the influence of class balance in society on the formation of the Ukrainian feminist movement, and the ways in which class divisions within the movement shape its goals and strategies. This paper also focuses on the role of capitalist institutions and free wage labour expansion in shaping collective feminist identities and solidarities. Specific attention is paid to the representativeness of women in the highest echelons in business and politics under the capitalist systems. This study shows that there is a significant hole in the literature regarding the feminist movement in Ukraine and aims to motivate further detailed research.

Keywords: feminism, hetland, goodwin, new soical movements, political economy

Procedia PDF Downloads 312
806 Establishing a Change Management Model for Precision Machinery Industry in Taiwan

Authors: Feng-Tsung Cheng, Shu-Li Wang, Mei-Fang Wu, , Hui-Yu Chuang

Abstract:

Due to the rapid development of modern technology, the widespread usage of the Internet makes business environment changing quickly. In order to be a leader in the global competitive market and to pursuit survive, “changing” becomes an unspoken rules need to follow for the company survival. The purpose of this paper is to build change model by using SWOT, strategy map, and balance scorecard, KPI and change management theory. The research findings indicate that organizational change plan formulated by the case company should require the employee to resist change factors and performance management system issues into consideration and must be set organizational change related programs, such as performance appraisal reward system, consulting and counseling mechanisms programs to improve motivation and reduce staff negative emotions. Then according to the model revised strategy maps and performance indicators proposed in this paper, such as strategy maps add and modify corporate culture, improve internal processes management, increase the growth rate of net income and other strategies. The performance indicators are based on strategy maps new and modified by adding net income growth rate, to achieve target production rate, manpower training achievement rates and other indicators, through amendments to achieve the company’s goal, be a leading brand of precision machinery industry.

Keywords: organizational change, SWOT analysis, strategy maps, performance indicators

Procedia PDF Downloads 284
805 A Methodological Concept towards a Framework Development for Social Software Adoption in Higher Education System

Authors: Kenneth N. Ohei, Roelien Brink

Abstract:

For decades, teaching and learning processes have centered on the traditional approach (Web 1.0) that promoted teacher-directed pedagogical practices. Currently, there is a realization that the traditional approach is not adequate to effectively address and improve all student-learning outcomes. The subsequent incorporation of social software, Information, and Communication Technology (ICT) tools in universities may serve as complementary to support educational goals, offering students the affordability and opportunity to educational choices and learning platforms. Consequently, educators’ inability to incorporate these instructional ICT tools in their teaching and learning practices remains a challenge. This will signify that educators still lack the ICT skills required to administer lectures and bridging learning gaps. This study probes a methodological concept with the aim of developing a framework towards the adoption of social software in HES to help facilitate business processes and can build social presence among students. A mixed method will be appropriate to develop a comprehensive framework needed in Higher Educational System (HES). After research have been conducted, the adoption of social software will be based on the developed comprehensive framework which is supposed to impact positively on education and approach of delivery, improves learning experience, engagement and finally, increases educational opportunities and easy access to educational contents.

Keywords: blended and integrated learning, learning experience and engagement, higher educational system, HES, information and communication technology, ICT, social presence, Web 1.0, Web 2.0, Web 3.0

Procedia PDF Downloads 157
804 Facilitation of Digital Culture and Creativity through an Ideation Strategy: A Case Study with an Incumbent Automotive Manufacturer

Authors: K. Ö. Kartal, L. Maul, M. Hägele

Abstract:

With the development of new technologies come additional opportunities for the founding of companies and new markets to be created. The barriers to entry are lowered and technology makes old business models obsolete. Incumbent companies have to be adaptable to this quickly changing environment. They have to start the process of digital maturation and they have to be able to adapt quickly to new and drastic changes that might arise. One of the biggest barriers for organizations in order to do so is their culture. This paper shows the core elements of a corporate culture that supports the process of digital maturation in incumbent organizations. Furthermore, it is explored how ideation and innovation can be used in a strategy in order to facilitate these core elements of culture that promote digital maturity. Focus areas are identified for the design of ideation strategies, with the aim to make the facilitation and incitation process more effective, short to long term. Therefore, one in-depth case study is conducted with data collection from interviews, observation, document review and surveys. The findings indicate that digital maturity is connected to cultural shift and 11 relevant elements of digital culture are identified which have to be considered. Based on these 11 core elements, five focus areas that need to be regarded in the design of a strategy that uses ideation and innovation to facilitate the cultural shift are identified. These are: Focus topics, rewards and communication, structure and frequency, regions and new online formats.

Keywords: digital transformation, innovation management, ideation strategy, creativity culture, change

Procedia PDF Downloads 196
803 Children and Migration in Ghana: Unveiling the Realities of Vulnerability and Social Exclusion

Authors: Thomas Yeboah

Abstract:

In contemporary times, the incessant movement of northern children especially girls to southern Ghana at the detriment of their education is worrisome. Due to the misplaced mindset of the migrants concerning southern Ghana, majority of them move without an idea of where to stay and what to do exposing them to hash conditions of living. Majority find menial work in cocoa farms, illegal mining and head porterage business. This study was conducted in the Kumasi Metropolis to ascertain the major causes of child migration from the northern part of Ghana to the south and their living conditions. Both qualitative and quantitative tools of data collection and analysis were employed. The purposive sampling technique was used to select 90 migrants below 18 years. Specifically, interviews, focus group discussions and questionnaires were used to elicit responses from the units of analysis. The study revealed that the major cause of child migration from northern Ghana to the south is poverty. It was evident that respondents were vulnerable to the new environment in which they lived. They are exposed to harsh environmental conditions; sexual, verbal and physical assault; and harassment from arm robbers. The paper recommends that policy decisions should be able to create an enabling environment for the labour force in the north to ameliorate the compelling effects poverty has on child migration. Efforts should also be made to create a proper psychological climate in the minds of the children regarding their destination areas through sensitization and education.

Keywords: child migration, vulnerability, social exclusion, child labour, Ghana

Procedia PDF Downloads 443
802 Gender Inequality in the Workplace: A Literature Review on the Discrimination of Women by Human Resources Instruments

Authors: Katja Wiedemann, Melinda Gainschnigg

Abstract:

This paper deals with gender inequality in companies. In the context of this paper, it is analyzed how women are discriminated by means of Human Resources instruments. The existing gender inequality is made apparent by the ‘Equal Pay Day. Women in Austria work without payment from 20 October onwards, which represents inequality of 21.7 percent points. This gender pay gap is due to the unequal distribution of paid and unpaid work between men and women. Since the majority of activities related to the family and care are carried out by women, there are human capital deficits on women’s side. In addition to the discrimination of women in compensation, there are also discrimination cases caused by other Human Resources instruments. The aim of this paper is to analyze the use of Human Resources instruments with regard to the discrimination of women and to identify measures to counteract this discrimination. Within the scope of this paper, possible instructions for companies on how to design and implement Human Resources instruments will be elaborated. Therefore personnel planning, recruiting, workforce management, compensation, and leadership are used as the basis for that analysis. The data were collected by a literature review and evaluated by means of a summary content analysis. The literature analysis includes papers of scientific journals from various business fields. On the basis of the results of the literature review, it is clear that women are discriminated by all analyzed Human Resources instruments. As a result, existing potentials are not optimally used. In order to limit or even prevent this loss of potential, companies must take specific measures to counteract the discrimination of women.

Keywords: employment issues, gender inequality , women's studies, workplace

Procedia PDF Downloads 249
801 Passing the Charity Walking Tours as a Poverty Reduction Establishment in Denpasar City, Bali

Authors: I. Wayan Wiwin

Abstract:

Poverty is one of the big problems faced by big cities in the world. Urbanization one cause, many rural communities trying to earn a living to the city in the hope that they can improve the level of economy, but not equipped with adequate skills so that it becomes an urban demographic problem. Denpasar as the capital of the province of Bali one of them, in the city area of Denpasar there are many slum dwellings inhabited by the poor, whereas Bali is known as one of the best tourist destinations in the world. This condition is very inversely proportional to the progress of tourism in Bali. For that it is necessary to attempt to overcome poverty in the city of Denpasar, one with the development of city tours in the form of charity walking tours, where tourists are invited to take a walk to see directly the state of the poor in the city of Denpasar and provide assistance to them in the form of home assistance, educational scholarships, health assistance, as well as skill and business capital assistance. This research is explorative-qualitative, that is exploring the potential of charity walking tour to overcome poverty in Denpasar City, which is written qualitatively. In the end based on potential data and information, then analyzed into a decision whether it is possible to develop. Therefore, this study only requires respondents or informants who are able to provide answers or qualitative information about matters related to the potential development of charity walking tour. Thus, informants in this study are tourism stakeholders, such as Municipal government officials, businessmen, community leaders and tourism actors, who are considered to be providing information relating to the development of urban tourism.

Keywords: tourism, city tours, charity walking tours, poverty

Procedia PDF Downloads 159
800 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 281
799 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 324
798 Pattern and Risk Factors of Menstrual Regulation Service Use among Ever-married Women in Bangladesh: Evidence from a Nationally Representative Cross-sectional Study

Authors: Md. Rashed Aalm, Md. Nuruzzaman Khan, Yothin Sawangdee

Abstract:

Background: Around 47% of the total pregnancies are unintended in Bangladesh, which lead to several adverse consequences, including maternal and child mortality. Use of menstrual regulation (MR) can help women to reduce unintended pregnancy related adverse consequences. We explored the prevalence and determinants of MR services among ever-married women in Bangladesh. Methods: Total of 14,346 ever-married women data were analysed from the 2017 Bangladesh Demographic and Health Survey. Our study variable was use or non-use of MR services. Individual, household, and community level factors were the explanatory factors. Multilevel mixed-effect Poisson regression model was used to determine the factors associated with MR services in Bangladesh. Results: Nearly 7% of the total women in Bangladesh use MR services. Use of MR services was found higher among women who were aged 20-30 ages (IRR 1.60, 95% CI: 1.17–2.17), who were overweight (IRR 1.43, 95% CI: 1.13–1.81), had at least 1 child (IRR 2.97, 95% CI: 2.34– 3.77) or > 2 children (IRR 3.22, 95% CI: 2.45–4.20), and the birth preceding birth interval was(2 – 4) years (IRR 1.56, 95% CI: 1.13–2.15). Around 1.39 times (95% CI: 1.11–1.73) higher likelihood of MR was found among women whose husbands were engage with business. At the community level, MR service was found lower among the women who resided in the community with higherilliteracy (IRR 0.67, 95% CI: 0.42–0.96) and the Mymensingh division (IRR 0.39, 95% CI: 0.31–0.91). Conclusion: Use of MR service is comparatively low, which indicate a significant proportion of unintended pregnancy continued toward life-birth. This could be responsible for higher adverse maternal and child health outcomes in Bangladesh. Initiatives should be taken to ensure MR services is available when women need this service.

Keywords: menstrual regulation, pattern, risk, maternal health, Bangladesh

Procedia PDF Downloads 161
797 Implementation of Unclos 1982 on Capture Fisheries in the Case of Illegal Fishing in the Waters of Indonesia’s Exclusive Economic Zone

Authors: Habson Batubara, Patawari, Lisa Mery, Mohammad Syaichuddin, Sitti Faridah, Hamzah, Akmal, Abdul Gafur, Iman Sudrajad, Lideman, Yuani Mundaya, Kamaruddin, Muslimin, Herlina Jompa, Joula Sondack, Nani Undap, Suciati, Elisa Winanda, Arfandi Amin, Suciati

Abstract:

This study aims to determine the status of the law, legislation, and its implementation against Foreign Nationals (WNA) Illegal Fishing Business Actors in the waters of the Indonesian Exclusive Economic Zone (EEZ), based on the Indonesian Positive Law and UNCLOS 1982. The research method used is normative juridical with a qualitative approach to study the Fisheries Criminal Verdict (Tipikan) and the Bitung District Court / Fisheries SIPP from 2019 to 2020. The results showed that cases of Illegal Fishing by Foreign Nationals (WNA) in the Indonesian Exclusive Economic Zone (EEZ) were examined, tried, and decided in accordance with the fisheries law, criminal sanctions were not in accordance with and contrary to Indonesian positive law, both criminal law and fisheries law, but followed and were in line with UNCLOS Year 1982. Legal status and responsibility are only imposed on the master as the leader on board the ship as the representative of the ship owner/company. Meanwhile, the application of Indonesia's positive law to Unclos in 1982 was only in the form of fines and confiscation of evidence as an effort to seek compensation for illegal fishing activities in the waters of the Indonesian Exclusive Zone (EEZ).

Keywords: EEZ, illegal fishing, WNA, positive law, Unclos 1982

Procedia PDF Downloads 71
796 The Implementation of an E-Government System in Developing Countries: A Case of Taita Taveta County, Kenya

Authors: Tabitha Mberi, Tirus Wanyoike, Joseph Sevilla

Abstract:

The use of Information and Communication Technology (ICT) in Government is gradually becoming a major requirement to transform delivery of services to its stakeholders by improving quality of service and efficiency. In Kenya, the devolvement of government from local authorities to county governments has resulted in many counties adopting online revenue collection systems which can be easily accessed by its stakeholders. Strathmore Research and Consortium Centre (SRCC) implemented a revenue collection system in Taita Taveta, a County in coastal Kenya. It consisted of two systems that are integrated; an online system dubbed “CountyPro” for processing county services such as Business Permit applications, General Billing, Property Rates Payments and any other revenue streams from the county. The second part was a Point of Sale(PoS) system used by the county revenue collectors to charge for market fees and vehicle parking fees. This study assesses the success and challenges in adoption of the integrated system. Qualitative and quantitative data collection methods were used to collect data on the adoption of the system with the researcher using focus groups, interviews, and questionnaires to collect data from various users of the system An analysis was carried out and revealed that 87% of the county revenue officers who are situated in county offices describe the system as efficient and has made their work easier in terms of processing of transactions for customers.

Keywords: e-government, counties, information technology, online system, point of sale

Procedia PDF Downloads 247
795 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 167
794 Investigating the Critical Drivers of Behavior: The Case of Online Taxi Services

Authors: Rosa Hendijani, Mohammadhesam Hajighasemi

Abstract:

As of late, the sharing economy has become an important type of business model. Online taxi services are one example that has grown rapidly around the world. This study examines the factors influencing the use of online taxis as one form of IT-enabled sharing services based on the theory of planned behavior (TPB). Based on the theory of planned behavior, these factors can be divided into three categories, including the ones related to attitude (e.g., image and perceived usefulness), normative believes (e.g., subjective norms), and behavioral control (e.g., technology facilitating conditions and self-efficacy). Three other factors were also considered based on the literature, including perceived economic benefits, openness towards using shared services, and perceived availability. The effect of all these variables was tested both directly and indirectly through intention as the mediating variable. A survey method was used to test the research hypotheses. In total, 361 individuals partook in the study. The results of a multiple regression analysis on behavior showed that perceived economic benefits, compatibility, and subjective norms were important factors influencing behavior among online taxi users. In addition, intention partially mediated the effect of perceived economic benefits and compatibility on behavior. It can be concluded that perceived economic benefits, compatibility, and subjective norms are the three main factors that influence behavior among online taxi users.

Keywords: collaborative consumption, IT-enabled sharing services model, online taxi, sharing economy, theory of planned behavior

Procedia PDF Downloads 138