Search results for: access to finances
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3269

Search results for: access to finances

3269 The Impact of Access to Finances on Survival of Small and Medium Enterprises: The South African Perspective in an Covid-19 Era

Authors: Thabiso Sthembiso Msomi

Abstract:

SMEs are the main engine of growth in most developing economies. One of the main factors that hinder the development of SME is access to finance. In this study, we explored the factors that hinder the growth and survival of SMEs in South Africa. The capital structure theory formed the theoretical underpinning for the study. The quantitative research design was adopted and data was collected from retail, construction, manufacturing and agriculture sectors of SMEs within the KwaZulu-Natal province of South Africa. The modified version of the Cochran formula was used to determine the sample size as 321 SMEs and analysed using the five-point Likert scale. The purposive sampling technique was used to select owners of SME. Statistical Package for the Social Sciences (SPSS) was used for the data analysis through Exploratory Factor Analysis (EFA) to determine the factor structures of items employed to measure each of the constructs in this study. Then, the Cronbach’s alpha test was conducted to determine the reliability of each construct. Kaiser-Meyer-Olkin (KMO) was used to determine the adequacy of the sample size. Linear regression was done to determine the effect of the independent variables on the dependent variable. The findings suggest that the main constraints facing South African SMEs were the lack of experienced management. Furthermore, the SMEs would fail to raise customer awareness of their products and services, which in turn affects their market access and monthly turnover. The study recommends that SMEs keep up-to-date records of business transactions to enable the business to keep track of its operations. The study recommends that South African banks adopt an SME accounting and bookkeeping program. The finding of this study benefits policymakers in both the private and public sectors.

Keywords: small businesses, access to finances, COVID-19, SMEs survival

Procedia PDF Downloads 147
3268 Microfinance and Women Empowerment in Bangladesh: Impact in Economic Dimension

Authors: Abm Mostafa, Rumbidzai Mukono, Peijie Wang

Abstract:

Using 285 respondents from two microfinance institutions, this research aims to assess the impact of microfinance on women’s economic empowerment in Bangladesh. Empirical measures of economic empowerment used in this paper are underpinned by a bargaining theory of household. Questionnaire is used for data collection following purposive sampling. Descriptive statistics, chi-square test, Kruskal-Wallis test, binary, and ordinal logistic regressions are deployed for data analysis. The findings of this study show that around three quarters of respondents have increased household income. They have increased their savings overwhelmingly; nonetheless, many of them are found to have a very small amount of savings. Still, more than half of the respondents are reported to have increased their savings when it is checked against at least 500 BDT per month. On the contrary, the percentage of women is moderate in terms of increasing control over finances. Empirical findings demonstrate the evidence of a relationship between the amount of loan and women’s household income, their savings, and control over finances. Nonetheless, no relationship is found in women’s areas. This study infers that women’s access to financial resources is fundamental to empower them in economic dimension.

Keywords: microfinance, women, economic, empowerment, Bangladesh

Procedia PDF Downloads 102
3267 Model of Application of Blockchain Technology in Public Finances

Authors: M. Vlahovic

Abstract:

This paper presents a model of public finances, which combines three concepts: participatory budgeting, crowdfunding and blockchain technology. Participatory budgeting is defined as a process in which community members decide how to spend a part of community’s budget. Crowdfunding is a practice of funding a project by collecting small monetary contributions from a large number of people via an Internet platform. Blockchain technology is a distributed ledger that enables efficient and reliable transactions that are secure and transparent. In this hypothetical model, the government or authorities on local/regional level would set up a platform where they would propose public projects to citizens. Citizens would browse through projects and support or vote for those which they consider justified and necessary. In return, they would be entitled to a tax relief in the amount of their monetary contribution. Since the blockchain technology enables tracking of transactions, it can be used to mitigate corruption, money laundering and lack of transparency in public finances. Models of its application have already been created for e-voting, health records or land registries. By presenting a model of application of blockchain technology in public finances, this paper takes into consideration the potential of blockchain technology to disrupt governments and make processes more democratic, secure, transparent and efficient. The framework for this paper consists of multiple streams of research, including key concepts of direct democracy, public finance (especially the voluntary theory of public finance), information and communication technology, especially blockchain technology and crowdfunding. The framework defines rules of the game, basic conditions for the implementation of the model, benefits, potential problems and development perspectives. As an oversimplified map of a new form of public finances, the proposed model identifies primary factors, that influence the possibility of implementation of the model, and that could be tracked, measured and controlled in case of experimentation with the model.

Keywords: blockchain technology, distributed ledger, participatory budgeting, crowdfunding, direct democracy, internet platform, e-government, public finance

Procedia PDF Downloads 125
3266 Interest Charges and Sustainability Challenges: The Case of OECD Countries

Authors: Aime Philombe Zapji Ymele

Abstract:

Servicing public debt is a significant budgetary burden. In the sense that the payment of interest charges is a liability on the balance sheet of the public budget and affects fiscal policy. Interest charges can sometimes become a burden if they crowd out private activities. In order to analyse and understand the determinants of the debt burden and its impact on the sustainability of public finances, the present work focuses on OECD countries. It is noted from the literature that the factors that determine interest charges are macroeconomic (inflation, GDP growth, and interest rates) and public finances (primary balance and public debt). After analysing a panel of 33 OECD countries and using ordinary least squares (OLS), we find that public debt, inflation, and long-term interest rates are positively correlated with interest charges. An increase in any of these variables leads to an increase in debt charges. On the other hand, a growth in GDP is negatively associated with interest charges. Indeed, an increase in GDP generates enough revenue to meet the repayment of debt charges. According to the empirical analysis, we can say that, despite the large and growing debt-to-GDP ratio of major OECD countries, interest charges are not a threat to the sustainability of public finances. However, it is important for these countries to reduce the ratio of public debt to GDP because, in the face of the many challenges (health, aging population, etc.) that are looming on the horizon, an increase in interest rates could bring with it considerable burdens that would threaten the budgetary balance of these states.

Keywords: interest charges, sustainability, public debt, interest rates

Procedia PDF Downloads 96
3265 Interest Charges and Sustainability Challenges: The Case of OECD Countries

Authors: Zapji Ymele Aime Philombe

Abstract:

Servicing public debt is a significant budgetary burden in the sense that the payment of interest charges is a liability on the balance sheet of the public budget and affects fiscal policy. Interest charges can sometimes become a burden if they crowd out private activities. In order to analyse and understand the determinants of the debt burden and its impact on the sustainability of public finances, the present work focuses on OECD countries. It is noted from the literature that the factors that determine interest charges are macroeconomic (inflation, GDP growth and interest rates) and public finances (primary balance and public debt). After analysing a panel of 33 OECD countries and using ordinary least squares (OLS), we find that public debt, inflation and long-term interest rates are positively correlated with interest charges. An increase in any of these variables leads to an increase in debt charges. On the other hand, a growth in GDP is negatively associated with interest charges. Indeed, an increase in GDP generates enough revenue to meet the repayment of debt charges. According to the empirical analysis, we can say that, despite the large and growing debt-to-GDP ratio of major OECD countries, interest charges are not a threat to the sustainability of public finances. However, it is important for these countries to reduce the ratio of public debt to GDP because, in the face of the many challenges (health, aging population, etc.) that are looming on the horizon, an increase in interest rates could bring with it considerable burdens that would threaten the budgetary balance of these states.

Keywords: interests charges, public debt, sustainability, interest rates

Procedia PDF Downloads 95
3264 RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model

Authors: Jamil Ahmed

Abstract:

Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system.

Keywords: authorization, access control model, role based access control, attribute based access control

Procedia PDF Downloads 131
3263 Dry Season Rice Production along Hadejia Valley Irrigation Scheme in Auyo Local Government Area in Jigawa State

Authors: Saifullahi Umar, Baba Mamman Yarima, Mohammed Bello Usman, Hassan Mohammed

Abstract:

This study was conducted along with the Hadejia valley project irrigation under the Hadejia-Jama’are River Basin Development Authority (HRBDA) in Jigawa State. The multi-stage sampling procedure was used to select 72 rice farmers operating along with the Hadejia Valley Irrigation Project. Data for the study were collected using a structured questionnaire. The analytical tools employed for the study were descriptive statistics and Farm budget technique. The result shows that 55% of the farmers were between 31-40 years of age, 66.01% were male, and the result also revealed that the total cost of cultivation of an acre of land for rice production during the dry season was N73,900 with input cost accounting for 63.59% of the total cost of production. The gross return was N332,500, with a net return of N258,600 per acre. The estimated benefit-cost ratio of 3.449 indicates the strong performance of the dry season rice production. The leading constraints to dry season rice production were low access to quality extension services, low access to finance, poor quality fertilizers, and poor prices. The study, therefore, concludes that dry season rice production is a profitable enterprise in the study area hence, to productivity the farmers should be linked to effective extension service delivery institutions, expanding their access to productive sources of finances, the government should strengthen fertilizer quality control measures and comprehensive market linkages for the farmers.

Keywords: Auyo, dry season, Hadejia Valley, rice

Procedia PDF Downloads 130
3262 Competitiveness and Pricing Policy Assessment for Resilience Surface Access System at Airports

Authors: Dimitrios J. Dimitriou

Abstract:

Considering a worldwide tendency, air transports are growing very fast and many changes have taken place in planning, management and decision making process. Given the complexity of airport operation, the best use of existing capacity is the key driver of efficiency and productivity. This paper deals with the evaluation framework for the ground access at airports, by using a set of mode choice indicators providing key messages towards airport’s ground access performance. The application presents results for a sample of 12 European airports, illustrating recommendations to define policy and improve service for the air transport access chain.

Keywords: airport ground access, air transport chain, airport access performance, airport policy

Procedia PDF Downloads 345
3261 Net Neutrality and Asymmetric Platform Competition

Authors: Romain Lestage, Marc Bourreau

Abstract:

In this paper we analyze the interplay between access to the last-mile network and net neutrality in the market for Internet access. We consider two Internet Service Providers (ISPs), which act as platforms between Internet users and Content Providers (CPs). One of the ISPs is vertically integrated and provides access to its last-mile network to the other (non-integrated) ISP. We show that a lower access price increases the integrated ISP's incentives to charge CPs positive termination fees (i.e., to deviate from net neutrality), and decreases the non-integrated ISP's incentives to charge positive termination fees.

Keywords: net neutrality, access regulation, internet access, two-sided markets

Procedia PDF Downloads 340
3260 Low Electrical Energy Access Rate in Burundi as a Barrier to Achieving the United Nations' Sustainable Development Goals

Authors: Gatoto Placide, Michel Roddy Lollchund, Gace Athanase Dalson

Abstract:

This paper first presents a review of the current situation of energy access rate in Burundi, which is relatively low compared to other countries. The paper aims to identify the key gaps in improving the electrical energy access in Burundi and proposes a solution to overcome these gaps. It is shown that the electrical power grid is old and concentrated in north-west and in Bujumbura city while other regions lack access to national grids. Next to that, the link between electricity access and sustainable development in Burundi is clarified. Further, some solutions are suggested to solve energy access problems such as the electricity transmission lines extension and renovation, diversification of energy sources.

Keywords: Burundi, energy access, hydropower, sustainable development

Procedia PDF Downloads 145
3259 Open Minds but Closed Access: Why Are There so Few Gold Open Access LIS Journals And Why Are so Many Librarians Unwilling to Unlock Their Scholarship?

Authors: Sarah Baker, Jayati Chaudhuri

Abstract:

Librarians have embraced the open access movement in all disciplines but their own. They are strong advocates on college campuses and curate institutional repositories, yet there are surprisingly few open access LIS journals. Presenters evaluated the open access availability of library and information science literature. After analyzing the top 100 library science journals (the top 50 journals from Scimago and JCR) and finding very few gold open access journals, they then investigated the availability of open access articles from the top 10 closed access journals. Presenters would like to generate a conversation on what type of proactive approach librarians can take to increase open access to literature within our discipline. Librarians like their colleagues in other disciplines are not motivated to submit their articles to their institutional repositories. Presenters have found a similar reluctance from their fellow colleagues regarding open access initiatives on campus. Presenters will describe Open Access Week activities as part of a campus-wide initiative and share some faculty comments, concerns, and misconceptions that came up as a part of this dialog. Presenters will discuss their personal experiences providing access to faculty publications through the California State University Los Angeles institutional repository.

Keywords: faculty scholarship, institutional repositories, library and information science journals, open access

Procedia PDF Downloads 304
3258 Access Control System for Big Data Application

Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud

Abstract:

Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.

Keywords: access control, security, Big Data, domain

Procedia PDF Downloads 105
3257 Author Self-Archiving in Open Access Institutional Repositories for Awareness Creation in Universities

Authors: Kwame Kodua-Ntim

Abstract:

The study explored the authors self-archiving to create awareness of open-access institutional repositories in universities. The qualitative approach of the study was informed by the interpretive paradigm as well as the case research design. The target population for the study was all twelve (12) open-access institutional repositories managers and administrators purposively selected from the five (5) universities in Ghana. The universities were chosen since they were the only ones listed in the Directory of Open Access Repositories. Interviews were conducted using a semi-structured interview guide and data were analyzed using thematic analysis. The study revealed that academics had some information about self-archiving in open-access institutional repositories and university libraries with open-access institutional repositories were using DSpace software. Managers and administrators of open-access institutional repositories mediated content uploaded and believed that author self-archiving could improve awareness of open-access institutional repositories. The study recommended that universities should fully implement the author’s self-archiving protocol, and academics should be trained to be able to upload research works onto open-access institutional repositories. Furthermore, the university and university library should provide rigorous policies on author self-archiving and incentives for author self-archiving in the open access institutional repositories.

Keywords: author, awareness, institutional repositories, open access, open archive, self-archiving

Procedia PDF Downloads 50
3256 A Conceptual Framework for Managing Municipal Finances in South Africa

Authors: Abongile Zweni

Abstract:

As a post-apartheid strategy to redress the social imbalances of the past, local governments are tasked with the role of delivering crucial services to their constituents. Apart from political instability, evidence shows that managers in South African municipalities lack effective financial management skills and competencies. This resulted in a failure to fulfill its administrative obligations, particularly municipal financial management. Most municipalities have, however, failed in this role, which has led them to be placed under administration by the provincial government in terms of Section 139 of the constitution of the Republic of South Africa. Thus, this study proposed a leadership conceptual framework for effectively managing ever-eroding municipal finances in South Africa. The study adopted a desktop research approach to explore the key components of leadership and municipal financial management toward the development of the conceptual framework. The study fostered a better understanding of the need for transformation in relation to the current financial management practices and sustainability of a municipality. Moreover, the conceptual framework applies not only to municipalities but also to other government departments and public authorities in the country for financial management.

Keywords: leadership, municipal finance, financial performance, management skills, municipality

Procedia PDF Downloads 265
3255 The Inherent Flaw in the NBA Playoff Structure

Authors: Larry Turkish

Abstract:

Introduction: The NBA is an example of mediocrity and this will be evident in the following paper. The study examines and evaluates the characteristics of the NBA champions. As divisions and playoff teams increase, there is an increase in the probability that the champion originates from the mediocre category. Since it’s inception in 1947, the league has been mediocre and continues to this day. Why does a professional league allow any team with a less than 50% winning percentage into the playoffs? As long as the finances flow into the league, owners will not change the current algorithm. The objective of this paper is to determine if the regular season has meaning in finding an NBA champion. Statistical Analysis: The data originates from the NBA website. The following variables are part of the statistical analysis: Rank, the rank of a team relative to other teams in the league based on the regular season win-loss record; Winning Percentage of a team based on the regular season; Divisions, the number of divisions within the league and Playoff Teams, the number of playoff teams relative to a particular season. The following statistical applications are applied to the data: Pearson Product-Moment Correlation, Analysis of Variance, Factor and Regression analysis. Conclusion: The results indicate that the divisional structure and number of playoff teams results in a negative effect on the winning percentage of playoff teams. It also prevents teams with higher winning percentages from accessing the playoffs. Recommendations: 1. Teams that have a winning percentage greater than 1 standard deviation from the mean from the regular season will have access to playoffs. (Eliminates mediocre teams.) 2. Eliminate Divisions (Eliminates weaker teams from access to playoffs.) 3. Eliminate Conferences (Eliminates weaker teams from access to the playoffs.) 4. Have a balanced regular season schedule, (Reduces the number of regular season games, creates equilibrium, reduces bias) that will reduce the need for load management.

Keywords: alignment, mediocrity, regression, z-score

Procedia PDF Downloads 105
3254 Structural Challenges, the Forgotten Elephant in the Quest of Access to Justice: The Case of the South African Labour and Labour Appeal Courts

Authors: Carlos Joel Tchawouo Mbiada

Abstract:

This paper intends to refrain from debating the different meanings of justice, such as its social or moral meaning, nor to discuss the different theories of justice. This paper focuses on the legal understanding of access to justice to mean access to the court. Using the Labour and Labour Appeal Courts as a case study, this paper investigates whether the composition of the bench, the personnel and state mechanisms to promote access to court offer ideal conditions to access to court. The investigation is benchmarked against the South African new constitutional order underpinned by the concept of social justice to eradicate past injustices. To provide justice to all, the Constitution of the Republic of South Africa 1996 guarantees the right to access to the court. The question that takes centre stage in this paper is whether litigants are denied the right to access the Labour and Labour Appeal Courts. The paper argues that factors such as the status of the Labour and Labour Appeal Courts, the number of judges, and the building structure prevent litigants from accessing these courts. The paper advocates for a legislative overhaul of the Labour and Labour Appeal Courts structure so that litigants may access the courts. Until such time, the paper argues that the right to access the Labour and Labour Appeal Courts would remain far from the reach of many litigants.

Keywords: access to justice, access to court, labour court, labour appeal court

Procedia PDF Downloads 46
3253 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 102
3252 Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b, and 802.11g

Authors: Amandeep Singh Dhaliwal

Abstract:

Networking solutions, particularly wireless local area networks have revolutionized the technological advancement. Wireless Local Area Networks (WLANs) have gained a lot of popularity as they provide location-independent network access between computing devices. There are a number of access methods used in Wireless Networks among which DCF and PCF are the fundamental access methods. This paper emphasizes on the impact of DCF and PCF access mechanisms on the performance of the IEEE 802.11a, 802.11b and 802.11g standards. On the basis of various parameters viz. throughput, delay, load etc performance is evaluated between these three standards using above mentioned access mechanisms. Analysis revealed a superior throughput performance with low delays for 802.11g standard as compared to 802.11 a/b standard using both DCF and PCF access methods.

Keywords: DCF, IEEE, PCF, WLAN

Procedia PDF Downloads 396
3251 Enacting Educational Technology Affordances as Mechanisms Responsible for Gaining Epistemological Access: A Case of Underprivileged Students at Higher Institutions in Northern Nigeria

Authors: Bukhari Badamasi, Chidi G. Ononiwu

Abstract:

Globally, educational technology (EdTech) has become a known catalyst for gaining access to education, job creation, and national development of a nation. Howbeit, it is common understanding that higher institutions continue to deploy digital technologies, to help provide access to education, but in most case, it is somehow institutional access not epistemological access especially in sub Saharan African higher institutions. Some scholars, however, lament the fact that studies on educational technology affordances are mostly fragmented because they focus on specific theme or sub aspect of access (i.e., institutional access). Thus, drawing from the Archer Morphogenetic approach, and Gibson Affordance theory, and applying critical realist based Danermark model for explanatory research, the study seeks to conduct a realist case study on underprivileged students in Higher institutions on how they gain epistemological access by enacting educational technology (EdTech) affordances.

Keywords: affordance, epistemological access, educational technology, underprivileged students

Procedia PDF Downloads 51
3250 Digital Divide and Its Impact on the Students’ Performance

Authors: Aissa Hanifi

Abstract:

People across different world societies are using information and communication technology (ICT) for different purposes. Unfortunately, in contemporary societies, some people have little access to ICT and thus cannot have effective participation in society compared with those who have better access. The purpose of this study is to test the impact of ICTs on university life in general and students' performance in particular. The study relied on an online survey questionnaire that was administered to 30 undergraduate students at Chef University. The findings of the survey revealed that there is still an important number of students who do not have easy access to ICT. Such limited access to ICTs is attributed to varied factors. Some students live in rural areas, where due to the poor internet coverage, they face difficulties in competing with students who live in urban areas with better ICT access. The lack of ICT access has hindered the students' university performance in general and their language skills, and the exchange of information with teachers and classmates.

Keywords: access, communication, ICT, performance, technology

Procedia PDF Downloads 85
3249 Legal Means for Access to Information Management

Authors: Sameut Bouhaik Mostafa

Abstract:

Information Act is the Canadian law gives the right of access to information for the institution of government. It declares the availability of government information to the public, but that exceptions should be limited and the necessary right of access to be specific, and also states the need to constantly re-examine the decisions on the disclosure of any government information independently from the government. By 1982, it enacted a dozen countries, including France, Denmark, Finland, Sweden, the Netherlands and the United States (1966) newly legally to access the information. It entered access to Canadian information into force of the Act of 1983, under the government of Pierre Trudeau, allowing Canadians to recover information from government files, and the development of what can be accessed from the information, and the imposition of timetables to respond. It has been applied by the Information Commissioner in Canada.

Keywords: law, information, management, legal

Procedia PDF Downloads 380
3248 A Robust Implementation of a Building Resources Access Rights Management System

Authors: Eugen Neagoe, Victor Balanica

Abstract:

A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights).

Keywords: smart building controller, software security, access rights, access authorization

Procedia PDF Downloads 411
3247 The Contribution of a Workshop Aimed at Providing Social Work Students with Practical Tools for Managing Household Finances

Authors: Ahuva Even-Zohar

Abstract:

Context: Families living in poverty often struggle with poor financial management and accumulating debts. Social workers play a crucial role in assisting these families, but they typically receive no formal training in financial management. Research Aim: The aim of this study was to assess the impact of a voluntary organization called Paamonim on social work students' attitudes toward providing material support and assistance in financial management to families living in poverty. Additionally, the study aimed to evaluate the students' perception of the workshop's contribution and their actual use of the tools acquired during the training. Methodology: The study involved 134 social work students, with 55 in a regular program and 79 in a retraining program. The first stage of the study involved the students receiving an explanation of the research, ensuring confidentiality, and signing informed consent. The students completed two questionnaires: The Student Attitudes Questionnaire and a sociodemographic questionnaire. In the second stage, three months after the workshop, the students completed the questionnaires again, along with a feedback questionnaire. Findings: The study found that there were no significant differences in the students' attitudes toward providing material support and proper financial management to families living in poverty before and after the workshop. However, their attitudes remained positive, at a medium level or higher. The students reported that the workshop provided them with tools to assist families in poverty, and they used these tools to some extent in their practical training. They found the workshop interesting and acknowledged its importance in raising awareness about budget management and enriching their knowledge of money management. The students acknowledged the workshop's effectiveness but mentioned that it was too short. Theoretical Importance: This study highlights the importance of developing programs to help families living in poverty manage their household finances. The workshop enriched the students' knowledge and skills, which are vital for their role as social workers working with families in poverty to rehabilitate their financial situations. Data Collection and Analysis Procedures: The students completed self-report questionnaires before and after the workshop, providing insights into their attitudes and perception about the role of social workers in providing material support for families living in poverty and helping them manage their household finances. Statistical analysis was conducted to compare the students' attitudes pre and post-workshop, and a feedback questionnaire assessed the students' perception of the contribution of the workshop. Question Addressed: This study addressed the question of whether a workshop on financial management can positively impact social work students' attitudes and skills in assisting families living in poverty with their household finances. Conclusion: Despite being short and consisting of only one session, the workshop proved to be valuable in enriching the students' knowledge and providing them with important tools for their role as social workers. The students reported positive attitudes toward providing material support and financial assistance to families in need. The practical recommendation is to continue offering such workshops as part of the social work curriculum to further enhance students' abilities to help families manage their finances effectively.

Keywords: financial literacy, poverty, social work students, workshop

Procedia PDF Downloads 40
3246 Competition, Stability, and Economic Growth: A Causality Approach

Authors: Mahvish Anwaar

Abstract:

Research Question: In this paper, we explore the causal relationship between banking competition, banking stability, and economic growth. Research Findings: The unbalanced panel data starting from 2000 to 2018 is collected to analyze the causality among banking competition, banking stability, and economic growth. The main focus of the study is to check the direction of causality among selected variables. The results of the study support the demand following, supply leading, feedback, and neutrality hypothesis conditional to different measures of banking competition, banking stability, and economic growth. Theoretical Implication: Jayakumar, Pradhan, Dash, Maradana, and Gaurav (2018) proposed a theoretical model of the causal relationship between banking competition, banking stability, and economic growth by using different indicators. So, we empirically test the proposed indicators in our study. This study makes a contribution to the literature by showing the defined relationship between developing and developed countries. Policy Implications: The study covers various policy implications regarding investors to analyze how to properly manage their finances, and government agencies will take help from the present study to find the best and most suitable policies by examining how the economy can grow concerning its finances.

Keywords: competition, stability, economic growth, vector auto-regression, granger causality

Procedia PDF Downloads 32
3245 Air Access Liberalisation and Tourism Trade Evidence from a Sids

Authors: Seetanah Boopen, R. V. Sannassee

Abstract:

The objective of the present study is two-fold. Firstly, to assess the impact of air access liberalization on tourism demand for Mauritius and secondly to analyses the dual impact of the interplay between air access liberalization and marketing promotion efforts on tourism demand. Using an Autoregressive Distributed Lag model, the results suggest that air access liberalization is an important ingredient, albeit to a lesser extent as compared to other classical explanatory variables, of tourism demand. The results also highlight the fact that Mauritius is perceived as a luxurious destination and tourists are deemed price sensitive. Moreover, our dynamic approach interestingly confirms the presence of repeat tourism in the island. Finally, the findings also uncover the positive impact of the interplay between air access liberalization and marketing promotion efforts on fostering tourism demand.

Keywords: air access liberalization, ARDL, SIDS, time series

Procedia PDF Downloads 276
3244 SPBAC: A Semantic Policy-Based Access Control for Database Query

Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage

Abstract:

Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.

Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML

Procedia PDF Downloads 56
3243 Access to the Forest Ecosystem Services: Understanding the Interaction between Livelihood Capitals and Access

Authors: Abu S. M. G. Kibria, Alison M. Behie, Robert Costanza, Colin Groves, Tracy Farrell

Abstract:

This study is aimed to understand the level of access and the influence of livelihood capitals in maintaining access and control of ecosystem services (ESS) in the Sundarbans, Bangladesh. Besides the villagers, we consider other stakeholders including the forest department, coast guard, police, merchants, pirates and villagers who ‘controlled’ or ‘maintained’ access to ESS (crab catching, shrimp fry, honey, shrimp, mixed fish, fuel wood) in this region. Villagers used human, physical, natural and social capitals to gain access to ESS. The highest level of access was observed in crab catching and the lowest was found in honey collection, both of which were done when balancing the costs and benefits of accessing one ESS against another. The outcomes of these ongoing access negotiations were determined by livelihood capitals of the households. In addition, it was often found that the certain variables could have a positive effect on one ESS and a negative effect on another. For instance, human, social and natural capitals (eldest daughter’s education and No. of livelihood group membership and) had significant positive effects on honey collection while two components of human and social capitals including ‘eldest son’s education’ and ‘severity of pirate problem’ had exactly the opposite impact. These complex interactions were also observed in access to other ESS. It thus seems that access to ESS is not anything which is provided, but rather it is achieved by using livelihood capitals. Protecting any ecosystem from over exploitation and improve wellbeing can be achieved by properly balancing the livelihood capital-access nexus.

Keywords: provisioning services, access level, livelihood capital, interaction, access gain

Procedia PDF Downloads 253
3242 Component Lifecycle and Concurrency Model in Usage Control (UCON) System

Authors: P. Ghann, J. Shiguang, C. Zhou

Abstract:

Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: Authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON.

Keywords: access control, concurrency, digital container, usage control

Procedia PDF Downloads 298
3241 Analysis of Strategies to Reduce Patients’ Disposition Holding Time from Emergency Department to Ward

Authors: Kamonwat Suksumek, Seeronk Prichanont

Abstract:

Access block refers to the situation where Emergency Department (ED) patients requiring hospital admission spend an unreasonable holding time in an ED because their access to a ward is blocked by the full utilization of the ward’s beds. Not only it delays the proper treatments required by the patients, but access block is also the cause of ED’s overcrowding. Clearly, access block is an inter-departmental problem that needs to be brought to management’s attention. This paper focuses on the analysis of strategies to address the access block problem, both in the operational and intermediate levels. These strategies were analyzed through a simulation model with a real data set from a university hospital in Thailand. The paper suggests suitable variable levels for each strategy so that the management will make the final decisions.

Keywords: access block, emergency department, health system analysis, simulation

Procedia PDF Downloads 377
3240 Functional Variants Detection by RNAseq

Authors: Raffaele A. Calogero

Abstract:

RNAseq represents an attractive methodology for the detection of functional genomic variants. RNAseq results obtained from polyA+ RNA selection protocol (POLYA) and from exonic regions capturing protocol (ACCESS) indicate that ACCESS detects 10% more coding SNV/INDELs with respect to POLYA. ACCESS requires less reads for coding SNV detection with respect to POLYA. However, if the analysis aims at identifying SNV/INDELs also in the 5’ and 3’ UTRs, POLYA is definitively the preferred method. No particular advantage comes from ACCESS or POLYA in the detection of fusion transcripts.

Keywords: fusion transcripts, INDEL, RNA-seq, WES, SNV

Procedia PDF Downloads 262