Search results for: enterprise IoT cybersecurity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 654

Search results for: enterprise IoT cybersecurity

534 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 114
533 Investigating the Impact of Enterprise Resource Planning System and Supply Chain Operations on Competitive Advantage and Corporate Performance (Case Study: Mamot Company)

Authors: Mohammad Mahdi Mozaffari, Mehdi Ajalli, Delaram Jafargholi

Abstract:

The main purpose of this study is to investigate the impact of the system of ERP (Enterprise Resource Planning) and SCM (Supply Chain Management) on the competitive advantage and performance of Mamot Company. The methods for collecting information in this study are library studies and field research. A questionnaire was used to collect the data needed to determine the relationship between the variables of the research. This questionnaire contains 38 questions. The direction of the current research is applied. The statistical population of this study consists of managers and experts who are familiar with the SCM system and ERP. Number of statistical society is 210. The sampling method is simple in this research. The sample size is 136 people. Also, among the distributed questionnaires, Reliability of the Cronbach's Alpha Cronbach's Questionnaire is evaluated and its value is more than 70%. Therefore, it confirms reliability. And formal validity has been used to determine the validity of the questionnaire, and the validity of the questionnaire is confirmed by the fact that the score of the impact is greater than 1.5. In the present study, one variable analysis was used for central indicators, dispersion and deviation from symmetry, and a general picture of the society was obtained. Also, two variables were analyzed to test the hypotheses; measure the correlation coefficient between variables using structural equations, SPSS software was used. Finally, multivariate analysis was used with statistical techniques related to the SPLS structural equations to determine the effects of independent variables on the dependent variables of the research to determine the structural relationships between the variables. The results of the test of research hypotheses indicate that: 1. Supply chain management practices have a positive impact on the competitive advantage of the Mammoth industrial complex. 2. Supply chain management practices have a positive impact on the performance of the Mammoth industrial complex. 3. Planning system Organizational resources have a positive impact on the performance of the Mammoth industrial complex. 4. The system of enterprise resource planning has a positive impact on Mamot's competitive advantage. 5.The competitive advantage has a positive impact on the performance of the Mammoth industrial complex 6.The system of enterprise resource planning Mamot Industrial Complex Supply Chain Management has a positive impact. The above results indicate that the system of enterprise resource planning and supply chain management has an impact on the competitive advantage and corporate performance of Mamot Company.

Keywords: enterprise resource planning, supply chain management, competitive advantage, Mamot company performance

Procedia PDF Downloads 61
532 Motivational Antecedents that Influenced a Higher Education Institution in the Philippines to Adopt Enterprise Architecture

Authors: Ma. Eliza Jijeth V. dela Cruz

Abstract:

Technology is a recent prodigy in people’s everyday life that has taken off. It infiltrated almost every aspect of one’s lives, changing how people work, how people learn and how people perceive things. Academic Institutions, just like other organizations, have deeply modified its strategies to integrate technology into the institutional vision and corporate strategy that has never been greater. Information and Communications Technology (ICT) continues to be recognized as a major factor in organizations realizing its aims and objectives. Consequently, ICT has an important role in the mobilization of an academic institution’s strategy to support the delivery of operational, strategic or transformational objectives. This ICT strategy should align the institution with the radical changes of the ICT world through the use of Enterprise Architecture (EA). Hence, EA’s objective is to optimize the islands of legacy processes to be integrated that is receptive to change and supportive of the delivery of the strategy. In this paper, the focus is to explore the motivational antecedents during the adoption of EA in a Higher Education Institution in the Philippines for its ICT strategic plan. The seven antecedents (viewpoint, stakeholders, human traits, vision, revolutionary innovation, techniques and change components) provide understanding into EA adoption and the antecedents that influences the process of EA adoption.

Keywords: Enterprise Architecture, Adoption, Antecedents, Higher Educational Institutions

Procedia PDF Downloads 87
531 A Conceptual Framework for Assessing the Development of Health Information Systems Enterprise Architecture Interoperability

Authors: Prosper Tafadzwa Denhere, Ephias Ruhode, Munyaradzi Zhou

Abstract:

Health Information Systems (HISs) interoperability is emerging to be the future of modern healthcare systems Enterprise Architecture (EA), where healthcare entities are seamlessly interconnected to share healthcare data. The reality that the healthcare industry has been characterised by an influx of fragmented stand-alone e-Health systems, which present challenges of healthcare information sharing across platforms, desires much attention for systems integration efforts. The lack of an EA conceptual framework resultantly crates the need for investigating an ideal solution to the objective of Health Information Systems interoperability development assessment. The study takes a qualitative exploratory approach through a design science research context. The research aims to study the various themes withdrawn from the literature that can help in the assessment of interoperable HISs development through a literature study. Themes derived from the study include HIS needs, HIS readiness, HIS constraints, and HIS technology integration elements and standards tied to the EA development architectural layers of The Open Group Architecture Framework (TOGAF) as an EA development methodology. Eventually, the themes were conceptualised into a framework reviewed by two experts. The essence of the study was to provide a framework within which interoperable EA of HISs should be developed.

Keywords: enterprise architecture, eHealth, health information systems, interoperability

Procedia PDF Downloads 69
530 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 18
529 The Concept of an Agile Enterprise Research Model

Authors: Maja Sajdak

Abstract:

The aim of this paper is to present the concept of an agile enterprise model and to initiate discussion on the research assumptions of the model presented. The implementation of the research project "The agility of enterprises in the process of adapting to the environment and its changes" began in August 2014 and is planned to last three years. The article has the form of a work-in-progress paper which aims to verify and initiate a debate over the proposed research model. In the literature there are very few publications relating to research into agility; it can be concluded that the most controversial issue in this regard is the method of measuring agility. In previous studies the operationalization of agility was often fragmentary, focusing only on selected areas of agility, for example manufacturing, or analysing only selected sectors. As a result the measures created to date can only be treated as contributory to the development of precise measurement tools. This research project aims to fill a cognitive gap in the literature with regard to the conceptualization and operationalization of an agile company. Thus, the original contribution of the author of this project is the construction of a theoretical model that integrates manufacturing agility (consisting mainly in adaptation to the environment) and strategic agility (based on proactive measures). The author of this research project is primarily interested in the attributes of an agile enterprise which indicate that the company is able to rapidly adapt to changing circumstances and behave pro-actively.

Keywords: agile company, acuity, entrepreneurship, flexibility, research model, strategic leadership

Procedia PDF Downloads 316
528 A Coevolutionary Framework of Business-IT Alignment through the Lens of Enterprise Architecture

Authors: Mengmeng Zhang, Honghui Chen, Kalle Lyytinen

Abstract:

The major challenges for sustainable business-IT alignment (BITA) in a company root in its volatile external competitive environment, increasingly complex internal relationships, and subversive IT roles. Failure to adequately address BITA results in wasting organizational resources, losing competitive advantages, and failing to produce adequate returns on investments. The coevolution is more suitable to describe the dynamic relationships of business and IT and has received certain attention in recent years. Multiple mechanisms for achieving BITC (e.g., sharing domain knowledge, modular design) were obtained. However, instead of a complete managing process, BITC achievement is still hard to operate in practice. This study emphasizes what the BITC management process looks like and how to execute this coevolution step-by-step. A practical coevolutionary framework that combines the enterprise architecture (EA) method with misalignment analysis is proposed in this paper. It contains steps of EA design, misalignment detection, misalignment correction, and EA management /misalignment prevention. The step of misalignment correction is especially discussed at length. This study also evaluates the proposed framework by comparing the characteristics, principles, and approaches of coevolution in the literature.

Keywords: business-IT alignment, business-IT coevolution, enterprise architecture, misalignment analysis, misalignment correction

Procedia PDF Downloads 114
527 A Study on the Korean Connected Industrial Parks Smart Logistics It Financial Enterprise Architecture

Authors: Ilgoun Kim, Jongpil Jeong

Abstract:

Recently, a connected industrial parks (CIPs) architecture using new technologies such as RFID, cloud computing, CPS, Big Data, 5G 5G, IIOT, VR-AR, and ventral AI algorithms based on IoT has been proposed. This researcher noted the vehicle junction problem (VJP) as a more specific detail of the CIPs architectural models. The VJP noted by this researcher includes 'efficient AI physical connection challenges for vehicles' through ventilation, 'financial and financial issues with complex vehicle physical connections,' and 'welfare and working conditions of the performing personnel involved in complex vehicle physical connections.' In this paper, we propose a public solution architecture for the 'electronic financial problem of complex vehicle physical connections' as a detailed task during the vehicle junction problem (VJP). The researcher sought solutions to businesses, consumers, and Korean social problems through technological advancement. We studied how the beneficiaries of technological development can benefit from technological development with many consumers in Korean society and many small and small Korean company managers, not some specific companies. In order to more specifically implement the connected industrial parks (CIPs) architecture using the new technology, we noted the vehicle junction problem (VJP) within the smart factory industrial complex and noted the process of achieving the vehicle junction problem performance among several electronic processes. This researcher proposes a more detailed, integrated public finance enterprise architecture among the overall CIPs architectures. The main details of the public integrated financial enterprise architecture were largely organized into four main categories: 'business', 'data', 'technique', and 'finance'.

Keywords: enterprise architecture, IT Finance, smart logistics, CIPs

Procedia PDF Downloads 131
526 Cybersecurity Assessment of Decentralized Autonomous Organizations in Smart Cities

Authors: Claire Biasco, Thaier Hayajneh

Abstract:

A smart city is the integration of digital technologies in urban environments to enhance the quality of life. Smart cities capture real-time information from devices, sensors, and network data to analyze and improve city functions such as traffic analysis, public safety, and environmental impacts. Current smart cities face controversy due to their reliance on real-time data tracking and surveillance. Internet of Things (IoT) devices and blockchain technology are converging to reshape smart city infrastructure away from its centralized model. Connecting IoT data to blockchain applications would create a peer-to-peer, decentralized model. Furthermore, blockchain technology powers the ability for IoT device data to shift from the ownership and control of centralized entities to individuals or communities with Decentralized Autonomous Organizations (DAOs). In the context of smart cities, DAOs can govern cyber-physical systems to have a greater influence over how urban services are being provided. This paper will explore how the core components of a smart city now apply to DAOs. We will also analyze different definitions of DAOs to determine their most important aspects in relation to smart cities. Both categorizations will provide a solid foundation to conduct a cybersecurity assessment of DAOs in smart cities. It will identify the benefits and risks of adopting DAOs as they currently operate. The paper will then provide several mitigation methods to combat cybersecurity risks of DAO integrations. Finally, we will give several insights into what challenges will be faced by DAO and blockchain spaces in the coming years before achieving a higher level of maturity.

Keywords: blockchain, IoT, smart city, DAO

Procedia PDF Downloads 65
525 Significant Factors to Motivate Small and Medium Enterprise (SME) Construction Firms in the Philippines to Implement ISO 9001:2008

Authors: Joseph Berlin P. Juanzon, Manuel M. Muhi

Abstract:

Motivating SME-based construction firms to adopt different management systems is not a simple task, especially if they are not aware of the benefits that they will gain from the new process-based management system. The implementation of ISO 9001:2008, Quality Management System in the construction industry is an ongoing trend, more so in the Small and Medium Enterprise. However, the level of awareness and readiness of the construction industry in the Philippines is still low as compared to the neighboring countries in Asia and in the western countries where ISO 9001:2008 originated. The purpose of this research is to determine the significant factors that will motivate SME-based construction firms in the Philippines to implement ISO 9001:2008. A field study was conducted on SME based construction firms in the Philippines, wherein a total of 139 respondents out of the 613 SME-based construction firms in CALABARZON areas were surveyed. Results reveal that the three main factors that will motivate SME-based construction firms to implement ISO 9001:2008 are: - if required by their clients, - to qualify for bidding, and - to increase customer satisfaction. Therefore, based on the results and findings, a certification of ISO 9001:2008 from an accredited auditor shall be required by clients as a constituent in accrediting SME-based construction firms and to qualify for bidding.

Keywords: construction, ISO 9001:2008, quality management systems (QMS), small medium enterprise (SME)

Procedia PDF Downloads 355
524 Envisioning Process in Medium Enterprises: An Exploratory Study of Cambodian Living Arts

Authors: Alexandre Bédard, Caroline Coulombe, Jonathan Harvey

Abstract:

Envisioning process (EP) in medium enterprises is treated equally in very small enterprises. Building on the concept of social construction, this study aims to explore how envisioning is constructed in a medium enterprise in which stakeholders are involved and how it is influenced. We use a unique case method based on qualitative data collected through 11 interviews representing various members of the organization. Through the discussion of the findings, we were able to confirm the social construction of the EP and to identify three main stakeholders responsible for the construction of the vision, mainly political and social powers, actors of the organization, and financial providers. Moreover, EP is influenced by external factors; in this case, the history of the organization and the value and importance of the art and the culture for Cambodians.

Keywords: envisioning process, social constructivism, medium enterprise, legitimacy

Procedia PDF Downloads 76
523 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 92
522 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 131
521 The Impacts of Soft and Hard Enterprise Resource Planning to the Corporate Business Performance through the Enterprise Resource Planning Integrated System

Authors: Sautma Ronni Basana, Zeplin Jiwa Husada Tarigan, Widjojo Suprapto

Abstract:

Companies have already implemented the Enterprise Resource Planning (ERP) system to increase the data integration so that they can improve their business performance. Although some companies have managed to implement the ERP well, they still need to improve gradually so that the ERP functions can be optimized. To obtain a faster and more accurate data, the key users and IT department have to customize the process to suit the needs of the company. In reality, sustaining the ERP technology system requires soft and hard ERP so it enables to improve the business performance of the company. Soft and hard ERP are needed to build a tough system to ensure the integration among departments running smoothly. This research has three questions. First, is the soft ERP bringing impacts to the hard ERP and system integration. Then, is the hard ERP having impacts to the system integration. Finally, is the business performance of the manufacturing companies is affected by the soft ERP, hard ERP, and system integration. The questionnaires are distributed to 100 manufacturing companies in East Java, and are collected from 90 companies which have implemented the ERP, with the response rate of 90%. From the data analysis using PLS program, it is obtained that the soft ERP brings positive impacts to the hard ERP and system integration for the companies. Then, the hard ERP brings also positive impacts to the system integration. Finally, the business process performance of the manufacturing companies is affected by the system integration, soft ERP, and hard ERP simultaneously.

Keywords: soft ERP, hard ERP, system integration, business performance

Procedia PDF Downloads 370
520 Entrepreneurship in Nigeria-Funding and Financing Strategies

Authors: Yusuf Abdullahi

Abstract:

The contribution of entrepreneurship in the economic development cannot be over-emphasized neither it should be underestimated for any reason as this is already a known fact that it plays an important role as a change agent and as a prime mover of economy. In developed or underdeveloped economy, the essence of entrepreneurship is highly significant as this exist in both private as well as public sectors of any economy. The roles of entrepreneurship are worldly acclaimed but yet as laudable as these roles there can be no significant success by any entrepreneur except with availability of finance. Nonetheless, mere availability of finance also cannot guarantee the success of an enterprise but there must be in place appropriate financial strategies for the funding/investment needs of an enterprise. Thus, little has been said when it comes to strategies needed to access various sources of finance. This paper, therefore, establishes appropriate strategies to obtain funds sources of finance by both small and as well as medium enterprises.

Keywords: entrepreneurship, Nigeria, financial strategies, economic development

Procedia PDF Downloads 447
519 Risk Management through Controlling in Industrial Enterprises Operating in Slovakia

Authors: Mária Hudáková, Mária Lusková

Abstract:

This report is focused on widening the theoretical knowledge as well as controlling practical application from the risk management point of view, regarding to dynamic business changes that have occurred in Slovakia which recently has been considered to be an environment full of risk and uncertainty. The idea of the report is the proposal of the controlling operation model in the course of risk management process in an enterprise operating in Slovakia, by which the controller is able to identify early risk factors in suggested major areas of the business management upon appropriate business information integration, consecutive control and prognoses and to prepare in time full-value documents in order to suggest measures for reduction thereof. Dealing with risk factors, that can quickly limit the growth potential of the enterprise, is an essential part of managerial activities on each level. This is the reason why mutual unofficial, ergo collegial cooperation of individual departments is necessary for controlling application from the business risk management point of view. An important part of the report is elaborated survey of the most important risk factors existing in major management areas of enterprises operating in Slovakia. The outcome of the performed survey is a catalogue of the most important enterprise risk factors. The catalogue serves for better understanding risk factors affecting the Slovak enterprises, their importance and evaluation.

Keywords: controlling, information, risks, risk factor, crisis

Procedia PDF Downloads 358
518 Managing HR Knowledge in a Large Privately Owned Enterprise: An Empirical Case Analysis

Authors: Cindy Wang-Cowham, Judy Ningyu Tang

Abstract:

The paper contributes towards the development of scarce literature on HR knowledge management. Drawing literature from knowledge management, the authors define the meaning of HR knowledge and propose that there are social mechanisms in organizations that facilitate the management and sharing of HR knowledge. Instead of investigating the subject in large multinational corporations, the present paper examines it in a large Chinese privately owned enterprise, which has an international standing. The main finding of the case analysis is that communication and feedback plays a pivotal role when managing HR knowledge. Social mechanisms can stimulate the communication and feedback between employees, thus facilitate knowledge exchange.

Keywords: HR knowledge, knowledge management, large privately owned enterprises, China

Procedia PDF Downloads 498
517 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 82
516 Overview of Development of a Digital Platform for Building Critical Infrastructure Protection Systems in Smart Industries

Authors: Bruno Vilić Belina, Ivan Župan

Abstract:

Smart industry concepts and digital transformation are very popular in many industries. They develop their own digital platforms, which have an important role in innovations and transactions. The main idea of smart industry digital platforms is central data collection, industrial data integration, and data usage for smart applications and services. This paper presents the development of a digital platform for building critical infrastructure protection systems in smart industries. Different service contraction modalities in service level agreements (SLAs), customer relationship management (CRM) relations, trends, and changes in business architectures (especially process business architecture) for the purpose of developing infrastructural production and distribution networks, information infrastructure meta-models and generic processes by critical infrastructure owner demanded by critical infrastructure law, satisfying cybersecurity requirements and taking into account hybrid threats are researched.

Keywords: cybersecurity, critical infrastructure, smart industries, digital platform

Procedia PDF Downloads 72
515 Program Accreditation as a Change Enterprise in Oman

Authors: Mahmoud Mohamed Emam, Yasser Fathy Hendawy Al-Mahdy

Abstract:

Higher education institutions (HEIs) in Arab countries have witnessed large scope transformations as a result of embracing globalised practices. The introduction of program academic accreditation in HEIs in the Arab context has been regarded as a change enterprise that has proponents and opponents. In essence, introducing new systems or practices trigger changes that may shatter employees at a given organization. Therefore, it is argued that the interaction between organizational, contextual, and individual-related variables are likely to determine how the organization succeeds in facing resistance to change. This study investigated a mediated-effects model of organizational support and citizenship behavior. The model proposes organizational support as an antecedent of citizenship behavior and commitment to change as a mediator in the organizational support–citizenship behavior relationship. Survey data were collected and analyzed from university faculty (n=221) using structural equation modeling. Findings showed that organizational support significantly contributes to increasedcitizenshipbehaviour and the commitment of university faculty to program accreditation as a change enterprise, which has a significant and direct impact on their citizenship behaviour. We conclude that university-level organizational support shapes faculty’s commitment to change both directly and indirectly. The findings have significant practical implications for HEIs in Arab countries when they introduce new practices that aim at improving institutional effectiveness.

Keywords: organizational support, accreditation, commitment, citizenship behaviour

Procedia PDF Downloads 64
514 The Complementary Explanations of Institutional and Feminist Perspectives for Female Social Enterprise in Pakistan

Authors: Mohammad Sohail Yunis, Hina Hashim, Alistair R. Anderson

Abstract:

Entrepreneurship is gendered with masculine qualities, yet social enterprise epitomizes caring a feminine quality. However enterprising practices may have little to do with gender. Consequently, the purpose of this paper is to examine practices using two very different explanatory theories, feminist and institutional theory, to establish the role played by gender. This study is situated in KP, the poor but traditional north of Pakistan. Utilising on an interpretive qualitative research approach, this research collected data through in-depth interviews with ten women social entrepreneurs of KP, Pakistan and analyzed using thematic analysis. Empirically, this paper identifies and describes on a number of interesting themes that relate to the women entrepreneurship such as 'women empowerment, patriarchal culture, role of culture and societal norms, religious extremism and terrorism, forced entrepreneurs, change creators, institutional corruption, and security issues'. In addition, female social enterprise in KP is set in a patriarchal, masculine culture, but the practices negotiate institutional obstacles to bring benefits to the disenfranchised. Finally, this research claims to present an original insight into female social entrepreneurship in a developing country context and provide fresh theoretical and empirical perspectives to advance knowledge and scholarship.

Keywords: female social entrepreneurship, institutional theory, feminist theory, developing countries

Procedia PDF Downloads 182
513 Understanding the Construction of Social Enterprises in India: Through Identity and Context of Social Entrepreneurs

Authors: K. Bose

Abstract:

India is one of the largest democracies in the global south, which demonstrates the highest social enterprise activities in the subcontinent. Although there has been a meteoric rise in social enterprise activities, it is not a new phenomenon, as it dates back to Vinoba Bhave's Land Gift movement in 1950. India also has a rich history of a welfare mix where non-governmental organisations played a significant role in the public welfare provision. Lately, the government’s impetus on entrepreneurship has contributed to a burgeoning social enterprise sector in the country; however, there is a lack in understanding of how social enterprises are constructed in India. Social entrepreneurship as practice has been conceptualised as a multi-dimensional concept, which is predominantly explained through the characteristics of a social entrepreneur. Social enterprise organisation, which is a component of social entrepreneurship practice are also classified through the role of the social entrepreneur; thus making social entrepreneur a vital unit shaping organisation and practice. Hence, individual identity of the social entrepreneur acts as a steering agent for defining organisation and practice. Individual identity does not operate in a vacuum and different isomorphic pressures (resource-rich actors/institutions) leads to negotiation in these identities. Dey and Teasdale's work investigated this identity work of non-profit practitioners within the practice of social enterprises in England. Furthermore, the construction of social enterprises is predominantly understood through two approaches i.e. an institutional logic perspective emerging from Europe and process and outcome perspective derived from the United States. These two approaches explain social enterprise as an inevitable institutional outcome in a linear and simplistic manner. Such linear institutional transition is inferred from structural policy reforms and austerity measures adopted by the government, which led to heightened competition for funds in the non-profit sector. These political and economic challenges were specific to the global north, which is different from transitions experienced in the global south, thus further investigation would help understand social enterprise activities as a contextual phenomenon. There is a growing interest in understanding the role of the context within the entrepreneurship literature, additionally, there is growing recognition in entrepreneurship research that economic behaviour is realised far better within its historical, temporal, institutional, spatial and social context, as these contexts provide boundaries to individuals in terms of opportunities and actions. Social enterprise phenomenon too is realised as contextual phenomenon though it differs from traditional entrepreneurship in terms of its dual mission (social and economic), however, the understanding of the role of context in social entrepreneurship has been limited. Hence, this work in progress study integrates identity work of social entrepreneur and the role of context. It investigates the identities of social entrepreneur and its negotiation within its context. Further, how this negotiated identity transcends into organisational practice in turn shaping how social enterprises are constructed in a specific region. The study employs a qualitative inquiry of semi-structured interviews and ethnographic institutionalism. Interviews were analysed using critical discourse analysis and the preliminary outcomes are currently a work in progress.

Keywords: context, Dey and Teasdale, identity, social entrepreneurs, social enterprise, social entrepreneurship

Procedia PDF Downloads 146
512 Partnership Brokering as a Driver of Social Business

Authors: Lani Fraizer, Faiz Shah

Abstract:

Extreme poverty continues to plague the world. Forty-seven million people live well-below the poverty line in Bangladesh, enduring poor quality of life, often with no access to basic human needs like shelter and healthcare. It is not surprising that poverty eradication is central to the mission of social change makers, such as Muhammad Yunus, who have demonstrated how enterprise-led development initiatives empower individuals at the grassroots, and can galvanize entire communities to emerge out of poverty. Such strategies call for system-wide change, and like a number of systems leaders, social business champions have typically challenged the status quo, and broken out of silos to catalyze vibrant multi-stakeholder partnerships across sectors. Apart from individual charisma, social change makers succeed because they garner collaborative impact through socially beneficial partnerships. So while enterprise-led social development evolves in scope and complexity, in step with the need to create and sustain partnerships, Partnership Brokering is emerging as an approach to facilitate collaborative processes. As such, it may now be possible for anyone motivated by the idea of social business to acquire the skills and sophistication necessary for building enriching partnerships that harness the power of the market to address poverty. This paper examines dimensions of partnership brokering in the context of social business, and explores the implications of this emerging approach on fostering poverty eradication.

Keywords: poverty, social business, partnership brokering, social entrepreneurship, systems change, enterprise-led development, change making

Procedia PDF Downloads 226
511 The Guideline of Overall Competitive Advantage Promotion with Key Success Paths

Authors: M. F. Wu, F. T. Cheng, C. S. Wu, M. C. Tan

Abstract:

It is a critical time to upgrade technology and increase value added with manufacturing skills developing and management strategies that will highly satisfy the customers need in the precision machinery global market. In recent years, the supply side, each precision machinery manufacturers in each country are facing the pressures of price reducing from the demand side voices that pushes the high-end precision machinery manufacturers adopts low-cost and high-quality strategy to retrieve the market. Because of the trend of the global market, the manufacturers must take price reducing strategies and upgrade technology of low-end machinery for differentiations to consolidate the market. By using six key success factors (KSFs), customer perceived value, customer satisfaction, customer service, product design, product effectiveness and machine structure quality are causal conditions to explore the impact of competitive advantage of the enterprise, such as overall profitability and product pricing power. This research uses key success paths (KSPs) approach and f/s QCA software to explore various combinations of causal relationships, so as to fully understand the performance level of KSFs and business objectives in order to achieve competitive advantage. In this study, the combination of a causal relationships, are called Key Success Paths (KSPs). The key success paths guide the enterprise to achieve the specific outcomes of business. The findings of this study indicate that there are thirteen KSPs to achieve the overall profitability, sixteen KSPs to achieve the product pricing power and seventeen KSPs to achieve both overall profitability and pricing power of the enterprise. The KSPs provide the directions of resources integration and allocation, improve utilization efficiency of limited resources to realize the continuous vision of the enterprise.

Keywords: precision machinery industry, key success factors (KSFs), key success paths (KSPs), overall profitability, product pricing power, competitive advantages

Procedia PDF Downloads 236
510 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 335
509 Traditional Industries Innovation and Brand Value Analysis in Taiwan: Case Study of a Certain Plastic Company

Authors: Ju Shan Lin

Abstract:

The challenges for traditional industries in Taiwan the past few years are the changes of overall domestic and foreign industry structure, the entrepreneurs not only need to keep on improving their profession skills but also continuously research and develop new products. It is also necessary for the all traditional industries to keep updating the business strategy, let the enterprises continue to progress, and won't be easily replaced by the other industries. The traditional industry in Taiwan attach great importance to the field of enterprises upgrading and innovation in recent years, by the enterprise innovation and transformation can enhance the overall business situation also enable them to obtain more additional profits than in the past. Except the original industry structure's need to transform and upgrade, the brand's business and marketing strategy are also essential. This study will take a certain plastic company as case analysis, for the brand promotion of traditional industries, brand values and business innovation model for further exploration. It will also be mentioned that the other traditional industries cases which were already achieved success on the enterprise's upgrading and innovation, at the same time, the difficulties which they faced with and the way they overcome will be explored as well. This study will use the case study method combined with expert interviews to discuss and analyze this certain plastic company's current business situation, the existing products and the possible trends in the future. Looking forward to providing an innovative business model that will enable this plastic company to upgrade its corporate image and the brand could transform successfully.

Keywords: brand marketing strategy, enterprise upgrade, industrial transformation, traditional industry

Procedia PDF Downloads 210
508 Service-Oriented Enterprise Architecture (SoEA) Adoption and Maturity Measurement Model: A Systematic Review

Authors: Nur Azaliah Abu Bakar, Harihodin Selamat, Mohd Nazri Kama

Abstract:

This article provides a systematic review of existing research related to the Service-oriented Enterprise Architecture (SoEA) adoption and maturity measurement model. The review’s main goals are to support research, to facilitate other researcher’s search for relevant studies and to propose areas for future studies within this area. In addition, this article provides useful information on SoEA adoption issues and its related maturity model, based on research-based knowledge. The review results suggest that motives, critical success factors (CSFs), implementation status and benefits are the most frequently studied areas and that each of these areas would benefit from further exposure.

Keywords: systematic literature review, service-oriented architecture, adoption, maturity model

Procedia PDF Downloads 287
507 Social Media Marketing in Indonesian Social Enterprise: The Effect of Members' Level of Participation on Brand Trust and Brand Commitment

Authors: Irsanti Hasyim, Christian Wibisono, Angela Teressia

Abstract:

Social enterprises, as one of the way of doing business are on the rise and emerging from the innovations of decades of social initiatives. In simple way, social enterprises use the business platform to achieve social and/or environmental objectives whilst simultaneously seeking a financial return. In Indonesia, the number of social enterprises rapidly grows and most of them were using social media as their business platform. Social Media are perceived as tools for creating online communities of users who share interests, activities, and objectives. Many companies view the use of online communities in social media as a profitable marketing tool from which they can derive several benefits. Through social media, consumers share experiences with and suggest ideas to others while developing new relationships within their communities. Therefore, this study intends to identify the benefits that participants in online communities seek and examine the relationships between members’ levels of participation, brand trust, and brand commitment. Using convenience sampling method, 236 fully answered questioner was collected and used as a sample of this research. The sample of this research consisted of member or follower in several social media from selected social enterprise in Indonesia. Data collected in this research were process by using Partial Least Square and came up with the result that functional benefit and monetary benefit, are only two from five benefits that proposed were the only variable that has significant result even though from APC, ARS and AARS outcomes show that the model can be claimed to be significant.

Keywords: brand trust, brand commitment, social enterprise, social media

Procedia PDF Downloads 203
506 Design and Māori Values: A Rebrand Project for the Social Enterprise Sector

Authors: M. Kiarna, S. Junjira, S. Casey, M. Nolwazi, M. S. Marcos, A. T. Tatiana, L. Cassandra

Abstract:

This paper details a rebrand design project developed for a non-profitable organization called Te Roopu Waiora (TRW), which is currently located in Auckland, Aotearoa New Zealand. This social enterprise is dedicated to supporting the Māori community living with sensorial, physical and intellectual disabilities (whānau hauā). As part of a year three bachelor design brief, the rebrand project enabled students to reflect on Kaupapa Māori principles and appropriately address the values of the organisation. As such, the methodology used a pragmatic paradigm approach and mixed methods design practices involving a human-centred design to problem solving. As result, the student project culminated in the development in a range of cohesive design artefacts, aiming to improve the rentability and perception of the brand with the audience and stakeholders.

Keywords: design in Aotearoa New Zealand, Kaupapa Māori, branding, design education, human-centered design

Procedia PDF Downloads 100
505 Energy Enterprise Information System for Strategic Decision-Making

Authors: Woosik Jang, Seung H. Han, Seung Won Baek, Chan Young Park

Abstract:

Natural gas (NG) is a local energy resource that exists in certain countries, and most NG producers operate within unstable governments. Moreover, about 90% of the liquefied natural gas (LNG) market is governed by a small number of international oil companies (IOCs) and national oil companies (NOCs), market entry of second movers is extremely limited. To overcome these barriers, project viability should be assessed based on limited information at the project screening perspective. However, there have been difficulties at the early stages of projects as follows: (1) What factors should be considered? (2) How many experts are needed to make a decision? and (3) How to make an optimal decision with limited information? To answer these questions, this research suggests a LNG project viability assessment model based on the Dempster-Shafer theory (DST). Total of 11 indices for the gas field analysis and 23 indices for the market environment analysis are identified that reflect unique characteristics of LNG industry. Moreover, the proposed model evaluates LNG projects based on questionnaire survey and it provides not only quantified results but also uncertainty level of results based on DST. Consequently, the proposed model as a systematic framework can support the decision-making process from the gas field projects using quantitative results, and it is developed to a stand-alone system to enhance the practical usability. It is expected to improve the decision-making quality and opportunity in LNG projects for enterprise through informed decision.

Keywords: project viability, LNG project, enterprise information system, Dempster-Shafer Theory, strategic decision-making

Procedia PDF Downloads 228