Search results for: strategic attack
1887 Ethical Consumers, The Myth or the Reality?: The Effects of Ethics in CSR on Corporate Authenticity and Pro-Firm Behaviours
Abstract:
This study investigates how consumers’ evaluations of a multinational corporation’s corporate social responsibility program connected to the perceived corporate authenticity and consumers’ pro-firm behavioral intention. With special attention to the two different types of CSR motives, business-oriented CSR motive and society-oriented motive, the current study empirically tests a theoretical model of a mediating role of corporate authenticity between perception of CSR motives and the consumers’ subsequent pro-firm behaviours. Results indicate significant mediation effects of corporate authenticity between perception of altruistic and societal CSR motives and consumers’ pro-firm behaviours. Unlike previous notions of the negative influence of self-interested motives on corporate authenticity, perceived strategic and business-oriented motives in CSR does not negatively affect the evalution of corporate authenticity when stakeholders have utilitarian ethical perspectives. Unlike the Korean participants, US participants are not willing to conduct pro-firm behaviors when they perceive strategic and business-oriented CSR motives. Theoretical and practical implications are discussed.Keywords: corporate authenticity, corporate social responsibility, CSR motives, strategic CSR, utilitarian ethics, kantian ethics
Procedia PDF Downloads 4831886 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 111885 Unsteady 3D Post-Stall Aerodynamics Accounting for Effective Loss in Camber Due to Flow Separation
Authors: Aritras Roy, Rinku Mukherjee
Abstract:
The current study couples a quasi-steady Vortex Lattice Method and a camber correcting technique, ‘Decambering’ for unsteady post-stall flow prediction. The wake is force-free and discrete such that the wake lattices move with the free-stream once shed from the wing. It is observed that the time-averaged unsteady coefficient of lift sees a relative drop at post-stall angles of attack in comparison to its steady counterpart for some angles of attack. Multiple solutions occur at post-stall and three different algorithms to choose solutions in these regimes show both unsteadiness and non-convergence of the iterations. The distribution of coefficient of lift on the wing span also shows sawtooth. Distribution of vorticity changes both along span and in the direction of the free-stream as the wake develops over time with distinct roll-up, which increases with time.Keywords: post-stall, unsteady, wing, aerodynamics
Procedia PDF Downloads 3701884 Enhancing Mental Health Services Through Strategic Planning: The East Tennessee State University Counseling Center’s 2024-2028 Plan
Authors: R. M. Kilonzo, S. Bedingfield, K. Smith, K. Hudgins Smith, K. Couper, R. Ratley, Z. Taylor, A. Engelman, M. Renne
Abstract:
Introduction: The mental health needs of university students continue to evolve, necessitating a strategic approach to service delivery. The East Tennessee State University (ETSU) Counseling Center developed its inaugural Strategic Plan (2024-2028) to enhance student mental health services. The plan focuses on improving access, quality of care, and service visibility, aligning with the university’s mission to support academic success and student well-being. Aim: This strategic plan aims to establish a comprehensive framework for delivering high-quality, evidence-based mental health services to ETSU students, addressing current challenges, and anticipating future needs. Methods: The development of the strategic plan was a collaborative effort involving the Counseling Center’s leadership, staff, with technical support from Doctor of Public Health-community and behavioral health intern. Multiple workshops, online/offline reviews, and stakeholder consultations were held to ensure a robust and inclusive process. A SWOT analysis and stakeholder mapping were conducted to identify strengths, weaknesses, opportunities, and challenges. Key performance indicators (KPIs) were set to measure service utilization, satisfaction, and outcomes. Results: The plan resulted in four strategic priorities: service application, visibility/accessibility, safety and satisfaction, and training programs. Key objectives include expanding counseling services, improving service access through outreach, reducing stigma, and increasing peer support programs. The plan also focuses on continuous quality improvement through data-driven assessments and research initiatives. Immediate outcomes include expanded group therapy, enhanced staff training, and increased mental health literacy across campus. Conclusion and Recommendation: The strategic plan provides a roadmap for addressing the mental health needs of ETSU students, with a clear focus on accessibility, inclusivity, and evidence-based practices. Implementing the plan will strengthen the Counseling Center’s capacity to meet the diverse needs of the student population. To ensure sustainability, it is recommended that the center continuously assess student needs, foster partnerships with university and external stakeholders, and advocate for increased funding to expand services and staff capacity.Keywords: strategic plan, university counseling center, mental health, students
Procedia PDF Downloads 181883 Information Technology Outsourcing and Knowledge Transfer: Achieving Strategic Alignment through Organizational Learning
Authors: M. Kolotylo, H. Zheng, R. Parente, R. Dahiya
Abstract:
Large number of organizations, frequently motivated by budget and cost cuts, outsource their Information Technology (IT) positions every year. Although the objective of reduction in financial obligations is often not accomplished, many buyer companies still manage to benefit from outsourcing projects. Knowledge Transfer (KT), being one of the major processes that take place during IT outsourcing partnership, may exert a strong impact on the performance of the parties involved, particularly that of the buyer. Research, however, lacks strong conceptual basis for the possible benefits that KT from supplier may bring to the buyer; and for the mechanisms that may be adopted by the buyer to maximize such benefit. This paper aims to fill this gap by proposing a conceptual framework of organizational learning and development of dynamic capabilities enabled by KT from the supplier to the buyer. The study examines buyer-supplier relationships in the context of IT outsourcing transactions, and theorizes how KT from the supplier to the buyer helps the performance of the buyer. It warrants that more research is carried out in order to explicate and provide evidence regarding the role that KT plays in strategic improvements for the buyer. The paper proposes to take up a two-fold approach to the research: conceptual development that utilizes logical argumentation and interpretive historical research, as well as a qualitative case study which aims to capture and understand the complex processes involved. Thus, the study provides a comprehensive visualization of the dynamics of the conditions under which participation in IT outsourcing partnership might be of benefit to the buyer company. The framework demonstrates the mechanisms involved in buyer’s achievement of strategic alignment through organizational learning enabled by KT from the supplier. It highlights that organizational learning involves a balance between exploitation of assets and exploration of new possibilities, and further notes that the dynamic capabilities mediate the effect of organizational learning on firm performance. The paper explicates in what ways managers can leverage outsourcing projects to execute strategy, which would enable their organization achieve better performance. The study concludes that organizational learning enables the firm to develop IT capabilities of strategic planning, IT integration, and IT relationships in the outsourcing context, and that IT capabilities developed through the organizational learning would help the firm in achieving strategic alignment.Keywords: dynamic capabilities, it outsourcing, knowledge transfer, organizational learning, strategic alignment
Procedia PDF Downloads 4391882 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme
Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh
Abstract:
This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature
Procedia PDF Downloads 5011881 Data Science in Military Decision-Making: A Semi-Systematic Literature Review
Authors: H. W. Meerveld, R. H. A. Lindelauf
Abstract:
In contemporary warfare, data science is crucial for the military in achieving information superiority. Yet, to the authors’ knowledge, no extensive literature survey on data science in military decision-making has been conducted so far. In this study, 156 peer-reviewed articles were analysed through an integrative, semi-systematic literature review to gain an overview of the topic. The study examined to what extent literature is focussed on the opportunities or risks of data science in military decision-making, differentiated per level of war (i.e. strategic, operational, and tactical level). A relatively large focus on the risks of data science was observed in social science literature, implying that political and military policymakers are disproportionally influenced by a pessimistic view on the application of data science in the military domain. The perceived risks of data science are, however, hardly addressed in formal science literature. This means that the concerns on the military application of data science are not addressed to the audience that can actually develop and enhance data science models and algorithms. Cross-disciplinary research on both the opportunities and risks of military data science can address the observed research gaps. Considering the levels of war, relatively low attention for the operational level compared to the other two levels was observed, suggesting a research gap with reference to military operational data science. Opportunities for military data science mostly arise at the tactical level. On the contrary, studies examining strategic issues mostly emphasise the risks of military data science. Consequently, domain-specific requirements for military strategic data science applications are hardly expressed. Lacking such applications may ultimately lead to a suboptimal strategic decision in today’s warfare.Keywords: data science, decision-making, information superiority, literature review, military
Procedia PDF Downloads 1671880 The Link between Strategic Sense-Making and Performance in Dubai Public Sector
Authors: Mohammad Rahman, Guy Burton, Megan Mathias
Abstract:
Strategic management as an organizational practice was adopted by the public sector in the New Public Management (NPM) era that began in most parts of the world in the 1980s. Strategy as a new public management concept was subscribed by governments in both developed and developing world, as they were persuaded that clearly defined vision, mission and goals, as well as programs and projects - aligned with the goals - could potentially help achieve government vision at the national level and organizational goals at the service-delivery level. The advocates for strategic management in the public sector saw an inherent link between strategy and performance, claiming that the implementation of organizational strategy has an effect on the overall performance of an organization. Arguably, many government entities that have failed in enhancing team and individual performance had poorly-designed strategy or weak strategy implementation. Another key argument about low-level performance is linked with lack of strategic sense-making and orientation by middle managers in particular. Scholars maintain that employees at all levels need to understand strategic management plan in order to facilitate its implementation. Therefore, involving employees (particularly the middle managers) from the beginning potentially helps an organization avoid the drop in performance, and on the contrary would increase their commitment. The United Arab Emirates (UAE) is well known for adopting public sector reform strategies and tools since the 1990s. This observation is contextually pertinent in the case of the Government of Dubai, which has provided a Strategy Execution Guide to all of its entities to achieve high level strategic success in service delivery. The Dubai public sector also adopts road maps for e-Government, Smart Dubai, Expo 2020, investment, environment, education, health and other sectors. Evidently, some of these strategies are bringing tangible (e.g. Smart Dubai transformation) results in a transformational manner. However, the amount of academic research and literature on the strategy process vis-à-vis staff performance in the Government of Dubai is limited. In this backdrop, this study examines how individual performance of public sector employees in Dubai is linked with their sense-making, engagement and orientation with strategy development and implementation processes. Based on a theoretical framework, this study will undertake a sample-based questionnaire survey amongst middle managers in Dubai public sector to (a) measure the level of engagement of middle managers in strategy development and implementation processes as perceived by them; (b) observe the organizational landscape in which role expectations are placed on middle managers; and (c) examine the impact of employee engagement in strategy development process and the conditions for role expectations on individual performance. The paper is expected to provide new insights on the interface between strategic sense-making and performance in order to contribute a better understanding of the current culture/practices of staff engagement in strategic management in the public sector of Dubai.Keywords: employee performance, government of Dubai, middle managers, strategic sense-making
Procedia PDF Downloads 1971879 An Effective Change in the Strategic Structure of Quality Management Systems: The Organization’s Needs Management
Authors: Joel Carlos Vieira Reinhardt, Mariana de Freitas Dewes, Odair Lelis Gonçalez
Abstract:
This paper proposes a method to implement a strategic framework for the quality management system that considers the analysis of prospective scenarios in the determination of policy, mission, vision, objectives, processes, monitoring, and goals. Semantic categorization of qualitative testimonial research on employee perception shows it was possible to implement an effective change in the organizations at the Department of Aerospace Science and Technology through the focus on the organization's needs management, producing a rupture with the historical managerial practice.Keywords: management of company needs, mission, prospective scenarios, quality management, quality policy, vision
Procedia PDF Downloads 1171878 The Effect of Partially Replacing Cement with Metakaolin on the Properties of Concrete
Authors: Gashaw Abebaw
Abstract:
Concrete usage in Ethiopia is expanding at a faster rate than before. Cement is the most important and costly ingredient in this respect. The construction industry is currently challenged by cement scarcity and stock market inflation. Scholars' trays, on the other hand, will use natural pozzolan material to substitute cement. Apart from that, Metakaolin has pozzolanic characteristics. According to the industrial mineral occurrence map, Ethiopia kaolin may be found in abundance. Some of them include Debretabor, so it is good to utilize Metakaolin as cement replacement material. In this study, the capability of Ethiopian Metakaolin as a partial substitute for cement in C-25 concrete production with 0%, 5%, 10%, 15%, and 20% replacement of PPC by MA with 0.49 percent water to cement ratio is investigated. The study examines; the chemical properties of MA, Physical properties of cement paste, workability, compressive strength, water absorption, density and sulfate attack of concrete was investigated. The chemical composition of Metakaolin was examined and the summation of SiO₂, AlO₃, and FeO₃ is 86.25% and the ash was classified class N pozzolan. The normal consistency percent of water increases as the MA replacement amount increase and both initial and final setting time rang increase as the MA replacement amount increase. On the 28th day, the compressive strength of concrete with MA replacement of 5%, 10%, and 15% exceeds the goal mean strength (33.5Mpa) with compressive strength enhancements of 2.23 %, 4.05 %, and 2.23 %, respectively. Similarly, on the 56th day, 5 %, 10%, and 15% replacement enhance concrete strength by 2.06 %, 3.06 %, and 1.2 %, respectively. The MA mixed concrete has improved significantly in terms of water absorption and sulphate attack, with a 15% replacement level. MA content Metakaolin could possibly replace cement up to 15%, according to the studies. The study's findings will help to offset cement price increases while also boosting house affordability without significantly degrading.Keywords: metakaolin, compressive strength, sulphate attack, water absorption, N pozzolan
Procedia PDF Downloads 1191877 The Role of Management Information Systems in the Strategic Management of Institutions of Higher Education
Authors: Szilvia Vincze, Zoltán Bács
Abstract:
It has become increasingly important for institutions of higher education as well to use available resources as effectively as possible for the implementation of the institution’s strategic plans and, at the same time, to ensure a stable future. This is the responsibility of the management and administration of the institution. Having access to complete and comprehensive information is indispensable for making dynamic and well-founded decisions that consider the realization of objectives to be primary and that manage possibly emerging risks, etc. The present paper introduces the role of Management Information Systems (MIS) at the University of Debrecen, one of the largest institutions of higher education in Hungary, and also discusses the utilization of this and associated information systems in management functions.Keywords: management information system (MIS), higher education, Hungary, strategy formulation
Procedia PDF Downloads 5051876 Literature Review: Adversarial Machine Learning Defense in Malware Detection
Authors: Leidy M. Aldana, Jorge E. Camargo
Abstract:
Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.Keywords: Malware, adversarial, machine learning, defense, attack
Procedia PDF Downloads 621875 The Future of Sharia Financing Analysis of Green Finance Financing Strategies in the Sharia State of Aceh
Authors: Damanhur Munardi, Muhammad Hafiz, Dina Nurmalita Sari, Syarifah Ridani Alifa
Abstract:
Purpose: This research aims to analyze the Benefits, Opportunity, Cost, and Risk aspects of applying the Green Finance concept and to obtain the right Green Finance financing strategy to be implemented within a long-term and short-term strategic framework.Methodology: This research method uses a qualitative-descriptive analysis approach. The analysis technique uses Analytical Network Process (ANP) with a BOCR network structure approach.Findings: The research results show that the most priority long-term strategic alternative based on the long-term BOCR analysis is increasing awareness among the public and industry by 52% and the importance of coordination between related institutions by 50%. Meanwhile, the most priority short-term strategic alternatives are the importance of coordination between related institutions 29%, increasing awareness among the public and industry 28%, the banking industry proactively funding environmentally friendly companies and technology 23%, the existence of Green Finance POS (Standard Operating Procedures) 20%.Implications: This research can be used as a reference for regulators and policymakers in making strategic decisions that can increase green finance financing. The novelty of this research is identifying problems that occur in green finance financing in Aceh province by analyzing opinions from experts in related fields and financial regulators in Aceh to create a strategy that can be implemented to increase green finance financing in Aceh province through BPD in Aceh, namely Bank Aceh.Keywords: green financing, banking, sharia, islamic
Procedia PDF Downloads 641874 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel
Authors: Afif J. Arabi
Abstract:
On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory
Procedia PDF Downloads 441873 Urban Health and Strategic City Planning: A Case from Greece
Authors: Alexandra P. Alexandropoulou, Andreas Fousteris, Eleni Didaskalou, Dimitrios A. Georgakellos
Abstract:
As urbanization is becoming a major stress factor not only for the urban environment but also for the wellbeing of city dwellers, incorporating the issues of urban health in strategic city planning and policy-making has never been more relevant. The impact of urbanization can vary from low to severe and relates to all non-communicable diseases caused by the different functions of cities. Air pollution, noise pollution, water and soil pollution, availability of open green spaces, and urban heat island are the major factors that can compromise citizens' health. Urban health describes the effects of the social environment, the physical environment, and the availability and accessibility to health and social services. To assess the quality of urban wellbeing, all urban characteristics that might have an effect on citizens' health must be considered, evaluated, and introduced in integrated local planning. A series of indices and indicators can be used to better describe these effects and set the target values in policy making. Local strategic planning is one of the most valuable development tools a local city administration can possess; thus, it has become mandatory under Greek law for all municipalities. It involves a two-stage procedure; the first aims to collect, analyse and evaluate data on the current situation of the city (administrative data, population data, environmental data, social data, swot analysis), while the second aims to introduce a policy vision described and supported by distinct (nevertheless integrated) actions, plans and measures to be implemented with the aim of city development and citizen wellbeing. In this procedure, the element of health is often neglected or under-evaluated. A relative survey was conducted among all Greek local authorities in order to shed light on the current situation. Evidence shows that the rate of incorporation of health in strategic planning is lacking behind. The survey also highlights key hindrances and concerns raised by local officials and suggests a path for the way forward.Keywords: urban health, strategic planning, local authorities, integrated development
Procedia PDF Downloads 731872 Intangible Cultural Heritage as a Strategic Place Branding Tool
Authors: L. Ozoliņa
Abstract:
Place branding as a strategic marketing tool is applied in Latvia since 2000. The main objective of the study is to find unique connecting aspects of the intangible cultural heritage elements on the development of sustainable place branding. The study is based on in-depth semi-structured interviews with Latvian place branding experts and content analysis of Latvia's place brand identities. The study indicates place branding as an internal co-creational and educational process of all involved stakeholders of the place and highlights a critical view on the local place branding practices on the notability of the in-depth research of the intangible cultural heritage.Keywords: belonging, identity, intangible cultural heritage, narrative, self-image, place branding
Procedia PDF Downloads 1441871 Tracing Back the Bot Master
Authors: Sneha Leslie
Abstract:
The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.Keywords: bonet, DDoS attack, network security, detection system, metasploit framework
Procedia PDF Downloads 2541870 Second Time’s a Charm: The Intervention of the European Patent Office on the Strategic Use of Divisional Applications
Authors: Alissa Lefebre
Abstract:
It might seem intuitive to hope for a fast decision on the patent grant. After all, a granted patent provides you with a monopoly position, which allows you to obstruct others from using your technology. However, this does not take into account the strategic advantages one can obtain from keeping their patent applications pending. First, you have the financial advantage of postponing certain fees, although many applicants would probably agree that this is not the main benefit. As the scope of the patent protection is only decided upon at the grant, the pendency period introduces uncertainty amongst rivals. This uncertainty entails not knowing whether the patent will actually get granted and what the scope of protection will be. Consequently, rivals can only depend upon limited and uncertain information when deciding what technology is worth pursuing. One way to keep patent applications pending, is the use of divisional applications. These applicants can be filed out of a parent application as long as that parent application is still pending. This allows the applicant to pursue (part of) the content of the parent application in another application, as the divisional application cannot exceed the scope of the parent application. In a fast-moving and complex market such as the tele- and digital communications, it might allow applicants to obtain an actual monopoly position as competitors are discouraged to pursue a certain technology. Nevertheless, this practice also has downsides to it. First of all, it has an impact on the workload of the examiners at the patent office. As the number of patent filings have been increasing over the last decades, using strategies that increase this number even more, is not desirable from the patent examiners point of view. Secondly, a pending patent does not provide you with the protection of a granted patent, thus not only create uncertainty for the rivals, but also for the applicant. Consequently, the European patent office (EPO) has come up with a “raising the bar initiative” in which they have decided to tackle the strategic use of divisional applications. Over the past years, two rules have been implemented. The first rule in 2010 introduced a time limit, upon which divisional applications could only be filed within a 24-month limit after the first communication with the patent office. However, after carrying-out a user feedback survey, the EPO abolished the rule again in 2014 and replaced it by a fee mechanism. The fee mechanism is still in place today, which might be an indication of a better result compared to the first rule change. This study tests the impact of these rules on the strategic use of divisional applications in the tele- and digital communication industry and provides empirical evidence on their success. Upon using three different survival models, we find overall evidence that divisional applications prolong the pendency time and that only the second rule is able to tackle the strategic patenting and thus decrease the pendency time.Keywords: divisional applications, regulatory changes, strategic patenting, EPO
Procedia PDF Downloads 1281869 Attribution of Strategic Motive, Business Efficiencies, Firm Economies, and Market Factors as Motivations of Restaurant Industry Vertical Integration Adoption: A Structural Equation Model
Authors: Sy, Melecio Jr
Abstract:
The decision to adopt vertical integration (VI) is firm-specific, but there is a common practice among businesses in an industry to maximize the massive potential benefits of VI. This study aims to determine VI adoption in the restaurant industry in Davao City. Using a two-step sampling process, the study used a validated survey questionnaire among 264 restaurant owners and managers randomly selected and geographically classified. It is a quantitative study where the data were subjected to a structural equation model (SEM). The results revealed that VI is present but limited to procurement, production, restaurant services, and online marketing. Raw materials were outsourced while delivery to customers through third-party delivery services. VI slowly increased over ten years except for online marketing, which has grown significantly in a few years. The endogenous and exogenous variables were correlated and established the linear regression model. The SEM's best fit model revealed that strategic motives (SMOT) and market factors (MFAC) influenced VI adoption while MFAC is the best predictor. Favorable market factors may lead restaurants to adopt VI. It is, thus, recommended for restaurants to institutionalize strategic management, quantify the impact of double marginalization in future studies as a reason for VI and conduct this study during the new normal to see the influence of business efficiencies and firm economies on VI adoption.Keywords: business efficiencies, business management, davao city, firm economies, market factors, philippines, strategic motives, structural equation model, supply chain, vertical integration adoption
Procedia PDF Downloads 701868 Local Farmer’s Perception on the Role of Room for the River in Livelihoods: Case Study in An Phu District, An Giang Province, Vietnam
Authors: Hoang Vo Thi Minh, Duyen Nguyen Thi Phuong, Gerardo Van Halsema
Abstract:
As one of the deltas which is extremely vulnerable to climate change, the Mekong Delta, Vietnam is facing many challenges that need to be addressed in strategic and holistic ways. In this study scope, a strategic delta planning is recently considered as a new vision of Adaptive Delta Management for the Mekong Delta. In Adaptive Delta Management, Room for the Rivers (RftR) has been formulated as a typical innovation, which is currently in need of careful consideration for implementing in the Mekong Delta’s planning process. This study then attempts to investigate the roles and analyze sociological aspects of the RftR as potential strategic 'soft' measure, in upstream of Hau River in An Phu district, An Giang province, especially in terms of its so-called multifunctions. The study applied social science approach embedded with a few qualitative methods including in-depth interviews and questionnaire distribution and conjoint analysis as a quantitative approach. The former mainly aims at gaining the local community’s perceptions about the RftR solution. The latter tries to gain farmers’ willingness to accept (WTA) with regard to their level of preference towards the three selected solutions which are considered as strategic plans for sustainably developing the MD. Qualitative data analysis shows that, farmers perceive RftR as very useful for their livelihoods due to its multifunctions as well as in terms of water management. The quantitative results illustrated that respondents expressed their WTAs on RftR as 84. 240 thousand VND / year. Amongst the three solutions that are analysed within this study (Floating rice for upper delta, Room for the Rivers for the Middle, and Shrimp-Mangrove integration for the coastal delta), RfrR was ranked as second preference from respondents. This result is not exactly reflecting the real values of these three mentioned solutions but showing a tendency that can be seen as a reference for the decision-makers in delta planning processes.Keywords: strategic delta planning, room for the River, farmers’ perception, willingness-to-accept, local livelihoods
Procedia PDF Downloads 2271867 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 2501866 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area
Authors: Feng-jie Xie, Jian-hong Yan
Abstract:
Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road
Procedia PDF Downloads 1961865 Development of an Instructional Model for Health Education Based On Social Cognitive Theory and Strategic Life Planning to Enhance Self-Regulation and Learning Achievement of Lower Secondary School Students
Authors: Adisorn Bansong, Walai Isarankura Na Ayudhaya, Aumporn Makanong
Abstract:
A Development of an Instructional Model for Health Education was the aim to develop and study the effectiveness of an instructional model for health education to enhance self-regulation and learning achievement of lower secondary school students. It was the Quasi-Experimental Designs, used a Single-group Interrupted Time-series Designs, conducted by 2 phases: 1. To develop an instructional model based on Social Cognitive Theory and Strategic Life Planning. 2. To trial and evaluate effectiveness of an instructional model. The results as the following: i. An Instructional Model for Health Education consists of five main components: a) Attention b) Forethought c) Tactic Planning d) Execution and e) Reflection. ii. After an Instructional Model for Health Education has used for a semester trial, found the 4.07 percent of sample’s Self-Regulation higher and learning achievement on post-test were significantly higher than pre-test at .05 levels (p = .033, .000).Keywords: social cognitive theory, strategic life planning, self-regulation, learning achievement
Procedia PDF Downloads 4651864 Evaluation of European Surveys in the Area of Health and Safety at Work and Identification of New Risks in the Labor Environment
Authors: Alena Dadova, Katarina Holla, Anna Cidlinova, Linda Makovicka Osvaldova, Jiri Vala, Samuel Kockar
Abstract:
Occupational health and safety (ASH) is an area in which procedures and applications are constantly evolving and changing through legislation and new directives and guidelines. In this way, the relevant organizations strive to ensure continuous progress and the advantage of up-to-date information to ensure safety and prevent occupational accidents. Three ESENER surveys have been carried out in the European Union, led by the Agency for Safety and Health at Work (EU-OSHA). On the basis of surveys, it was determined how European workplaces manage risks and how they manage the field of safety and health protection at work. Thousands of companies and organizations in the European Union were involved in the surveys. Organizations and businesses were presented with a questionnaire that focused on the following topics: the impact of general risks on the field of OSH and the possibility of their management, psychosocial risks and other factors such as stress, harassment and bullying, and employee participation in OSH procedures. The article is dedicated to the fundamental conclusions from these surveys and their subsequent connection with the strategic intent of the Strategic Framework of European Union for the years 2021 - 2027. In the conclusion, emerging risks are identified and EU will soon have to deal with them.Keywords: ESENER, emerging risks, strategic framework in OSH, EU
Procedia PDF Downloads 1141863 Demonic Possession and Health Care Complications: Concept and Remedy from Islamic Point-of-View
Authors: Khalid Ishola Bello
Abstract:
Many religions and cultures believe in the existence of invisible beings who co-exist with man on earth. Muslims, for example, believe in malaikah (Angel) and jinn (demon), who have their source of creation from light and flame, respectively. Jinn, according to Islamic texts, possesses unique characteristics which give them an advantage over the man. Invisibility, transforming into or taking possession of another being are parts of advantages jinn have above man. Hence, jinn can attack man and truncate his well-being by causing malfunction of his physiological and psychological realms, which may go beyond physical health care. It is on this background that this paper aims to articulate the possibility of a demonic attack on human health and the care processes recommended by Islam to heal and restore well-being of the victim. Through analysis of the inductive, deductive, and historical approaches, the process of ruqyah (healing method based on recitation of the Qur’an) and hijamah (cupping) therapies shall be analyzed. The finding shows the efficacy of Islamic remedies to demonic possession, which usually complicates health challenges in the care of man. This alternative approach is therefore recommended for holistic health care since physical health care cannot fix spiritual health challenges.Keywords: wellbeing, healthcare, demonic possession, cupping, jinn
Procedia PDF Downloads 641862 The Impact of Demographic Profile on Strategic HRM Practices and its Challenges Faced by HR Managers in IT Firm, India: An Empirical Study
Authors: P. Saravanan, A. Vasumathi
Abstract:
Strategic Human Resource Management (SHRM) plays a vital role in formulating the policies and strategies for the company, in order to fulfill the employee’s requirement and to perform the job efficiently within the organisation. Human Resource Management (HRM) functions helps in attracting and motivating the talented workforce for the organisation and by increasing the performance of an individual, will result in achieving the defined goals and objectives for the company. HRM function plays an important role in managing the workers within organisation through a formal communication channel. Since HR functions acts as a mediatory role in between the employee as well as the employers within the organisation that helps in improving the efficacy and skills of the individuals employed within the company. HR manager acts as a change agent, enabling and driving the change management program with respect to business HR functions and its future requirements of the company. Due to change in the business environment, the focus of HR manager is shifting from administrative/personal functions in to a strategic business HR function. HR managers plays a strategic role in managing various HR functions such as recruitment and selection, human resource information system, manpower planning, performance management, conflict management, employee engagement, compensation management, policy formation and retention strategies followed within the industry. Major challenges faced by HR managers at work place are managing the level of engagement for the talented resources within the organisation, reducing the conflicts at workplace, mapping the talented resources through succession planning process, building the effective appraisal process and performance management system and mapping the compensation based on the skills and experience possed by the employee within the company. The authors conducted a study for the sample size of 75 HR managers from an Indian IT company through systematic sampling method. This study identifies that the female employees are facing lesser conflict than the male employees against their managers within the organisation and also the study determines the impact of demographic profile on strategic HRM practices and its challenges faced by HR managers in IT firm, India.Keywords: strategic human resource management, change agent, employee engagement, performance management, succession planning and conflict management
Procedia PDF Downloads 2981861 Western and Eastern Ways of Special Warfare: The Strategic History of Special Operations from Western and Eastern Sources
Authors: Adam Kok Wey Leong
Abstract:
Special operations were supposedly a new way of irregular warfare that was officially formed during World War 2. For example, the famous British Special Operations Executive (SOE) and the Americans’ Office for Strategic Services (OSS) – the forerunners of modern day CIA were born in World War 2. These special operations units were tasked with the conduct of sabotage and subversion activities behind enemy lines, placing great importance in forming Fifth Column activities and supporting resistance movements. This pointed to a paradoxical argument that modern day special operations is a product of Western modern military innovation but utilizing Eastern ways of ‘ungentlemanly’ warfare. This thesis is superfluous as special operations had been well practised by both ancient Western empires such as the Greeks and Romans, and around the same time in the East, such as in China, and Japan. This paper will describe the practice of special operations, first from the Western military history of the Greeks during the Peloponnesian war. It will then highlight the similar practice of special operations by the Near Eastern Assassins and Eastern militaries by using examples from the Chinese and the Japanese. This paper propounds that special operations, or ways of warfare as a whole, has no cultural and geographical divide, but rather very similarly practiced by men from all over the world. Ideas of fighting, killing and ultimately winning a war have similar undertones – attempts to find ways to win economically and at the least time.Keywords: special operations, strategic culture, ways of warfare, Sun Tzu, Frontinus
Procedia PDF Downloads 4721860 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers
Authors: Pawan Kumar, Pitamber Singh Negi
Abstract:
Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed
Procedia PDF Downloads 1481859 Investigation of the Kutta Condition Using Unsteady Flow
Authors: K. Bhojnadh, M. Fiddler, D. Cheshire
Abstract:
An investigation into the Kutta effect on the trailing edge of a subsonic aerofoil was conducted which led to an analysis using Ansys Fluent to determine the effect of flow separation over a NACA 0012 aerofoil. This aerofoil was subjected to oscillations to create an unsteady flow over the aerofoil, therefore, creating turbulence, with unsteady aerodynamics playing a key role to determine the flow regimes when the aerofoil is subjected to different angles of attack along with varying Reynolds numbers. Many theories were evolved to determine the flow parameters of a 2-D aerofoil in these unsteady conditions because they behave unpredictably at the trailing edge when subjected to a different angle of attack. The shear area observed in the boundary layer at the trailing edge tends towards an unsteady turbulent flow even at small angles of attack, creating drag as the flow separates, reducing the aerodynamic performance of aerofoil. In this paper, research was conducted to determine the effect of Kutta circulation over the aerofoil and the effect of that circulation in reducing the effect of pressure and boundary layer distribution over the aerofoil. The effect of circulation is observed by using Ansys Fluent by using varying flow parameters and differential schemes to observe the flow behaviour on the aerofoil. Initially, steady flow analysis was conducted on the aerofoil to determine the effect of circulation, and it was noticed that the effect of circulation could only be properly observed when the aerofoil is subjected to oscillations. Therefore, that was modelled by using Ansys user-defined functions, which define the motion of the aerofoil by creating a dynamic mesh on the aerofoil. Initial results were observed, and further development of the dynamic mesh functions in Ansys is taking place. This research will determine the overall basic principles of unsteady flow aerodynamics applied to the investigation of Kutta related circulation, and gives an indication regarding the generation of vortices which is discussed further in this paper.Keywords: circulation, flow seperation, turbulence modelling, vortices
Procedia PDF Downloads 2051858 O.MG- It’s a Cyber-Enabled Fraud
Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt
Abstract:
This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud
Procedia PDF Downloads 158