Search results for: over exploitation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 555

Search results for: over exploitation

555 Exploration and Exploitation within Operations

Authors: D. Gåsvaer, L. Stålberg, A. Fundin, M. Jackson, P. Johansson

Abstract:

Exploration and exploitation capabilities are both important within Operations as means for improvement when managed separately, and for establishing dynamic improvement capabilities when combined in balance. However, it is unclear what exploration and exploitation capabilities imply in improvement and development work within an operations context. So in order to better understand how to develop exploration and exploitation capabilities within operations, the main characteristics of these constructs needs to be identified and further understood. Thus, the objective of this research is to increase the understanding about exploitation and exploration characteristics, to concretize what they translates to within the context of improvement and development work in an operations unit, and to identify practical challenges. A literature review and a case study are presented. In the literature review, different interpretations of exploration and exploitation are portrayed, key characteristics have been identified, and a deepened understanding of exploration and exploitation characteristics is described. The case in the study is an operations unit, and the aim is to explore to what extent and in what ways exploration and exploitation activities are part of the improvement structures and processes. The contribution includes an identification of key characteristics of exploitation and exploration, as well as an interpretation of the constructs. Further, some practical challenges are identified. For instance, exploration activities tend to be given low priority, both in daily work as in the manufacturing strategy. Also, the overall understanding about the concepts of exploitation and exploration (or any similar aspect of dynamic improvement capabilities) is very low.

Keywords: exploitation, exploration, improvement, lean production, manufacturing

Procedia PDF Downloads 485
554 Sustainable Use of Fresh Groundwater Lens of Pleistocene Aquifer in Nam Dinh, Vietnam

Authors: Tran Thanh Le, Pham Trong Duc

Abstract:

The fresh groundwater lens of the Pleistocene aquifer in Nam Dinh was formed since 12,900 years ago. Currently, the Pleistocene aquifer has been continuously exploited on average of 154,163m3/day, distributed mainly in the districts of Nghia Hung, Hai Hau, a part of Truc Ninh, Y Yen, Nam Truc and Giao Thuy. The groundwater level is still on a declining trend, saltwater intrusion in this freshwater lens can occur if the growth rate in exploitation is maintained. This study focused on groundwater sustainable use by means of 4 groups of criteria including: Groundwater quality and pollution; Aquifers’ productivity and capacity; Environment impacts due to exploitation (groundwater level decline, land subsidence due to water exploitation); Social and economic impacts. Using a combination of methods including field surveys, geophysics, hydrogeochemistry, isotope and numerical models to determine safe groundwater exploitation thresholds for the whole study area has been determined to be 544,314m3/day and the actual exploitation amount is currently about 30% compared to the safe exploitation threshold. However, it should also be noted that the current groundwater exploitation threshold and level of its exploitation compared to the safe exploitation threshold of each locality are not the same. From this result, the groundwater exploitation threshold map of the study area was established to serve the management, licensing and orientation of groundwater exploitation.

Keywords: criteria, groundwater, fresh groundwater lens, pleistocene, Nam Dinh

Procedia PDF Downloads 157
553 Linking Market Performance to Exploration and Exploitation in The Pharmaceutical Industry

Authors: Johann Valentowitsch, Wolfgang Burr

Abstract:

In organizational research, strategies of exploration and exploitation are often considered to be contradictory. Building on the tradeoff argument, many authors have assumed that a company's market performance should be positively dependent on its strategic balance between exploration and exploitation over time. In this study, we apply this reasoning to the pharmaceutical industry. Using exploratory regression analysis we show that the long-term market performance of a pharmaceutical company is linked to both its ability to carry out exploratory projects and its ability to develop exploitative competencies. In particular, our findings demonstrate that, on average, the company's annual sales performance is higher the better the strategic alignment between exploration and exploitation is balanced. The contribution of our research is twofold. On the one hand, we provide empirical evidence for the initial tradeoff hypothesis and thus support the theoretical position of those who understand exploration and exploitation as strategic substitutes. On the other hand, our findings show that a balanced relationship between exploration and exploitation is also important in research-intensive industries, which naturally tend to place more emphasis on exploration.

Keywords: exploitation, exploration, market performance, pharmaceutical industry, strategy

Procedia PDF Downloads 217
552 Religious Coercion as Means of Trafficking in Women and Faith Communities’ Role in Ending Such Religious Exploitation

Authors: Xiaoyu Stephanie Ren

Abstract:

With the increase of massive migration, economic polarization, as well as increasing awareness and respects for religious freedom in the world, women have become unprecedentedly vulnerable to trafficking involving religious coercion. Such cases can also bring enormous challenges for prosecution in which the prosecutor bears the burden of proving that the victim acted, or not acted in a certain way due to the exploitation of her belief system: (1) Jurors who are nonbelievers tend not to be convinced that something of intangible nature can act as the force to get victim into women trafficking situation; (2) Court more often than not rules in favor of victims in women trafficking cases involving religious exploitation only when there is physical coercion in addition to religious coercion; (3) Female victims are often reluctant to testify at court due to their godly fear and loyalty to trafficker. Using case study methodology, this paper examines the unique characteristics of religious coercion as means of trafficking in women from a legal perspective and proposes multiple ways based on communal beliefs that faith communities, as victims for such crime themselves, can act in order to help to end religious exploitation. The purpose of this paper is threefold: to improve acknowledgment for the role of religious coercion as a sole force for women trafficking situation; to discuss legal hurdles in prosecuting women trafficking cases involving religious coercion; and to propose collaboration across borders among faith communities to end such exploitation.

Keywords: women trafficking, sex violence, religious exploitation, faith community, prosecution, law

Procedia PDF Downloads 166
551 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 203
550 Globalisation and the Resulting Labour Exploitation in Business Operations and Supply Chains

Authors: Akilah A. Jardine

Abstract:

The integration and expansion of the global economy have indeed brought about a number of positive changes such as access to new goods and services and the opportunity for individuals and businesses to migrate, communicate, and work globally. Nevertheless, the interconnectedness of world economies is not without its negative and shameful side effects. The subsequent overabundance of goods and services has resulted in heightened competition among firms and their supply chains, fuelling the exploitation of impoverished and vulnerable individuals who are unable to equally salvage from the benefits of the integrated economy. To maintain their position in a highly competitive arena, the operations of many businesses have adopted unethical and unscrupulous practices to maximise profit, often targeting the most marginalised members of society. Simultaneously, in a consumerist obsessed society preoccupied with the consumption and accumulation of material wealth, the demand for goods and services greatly contributes to the pressure on firms, thus bolstering the exploitation of labour. This paper aims to examine the impact of business operations on the practice of labour exploitation. It explores corrupt business practices that firms adopt and key labour exploitative conditions outlined by the International Labour Organization, particularly, paying workers low wages, forcing individuals to work in abusive and unsafe conditions, and considers the issue regarding individuals’ consent to exploitative environments. Further, it considers the role of consumers in creating the high demand for goods and services, which in turn fosters the exploitation of labour. This paper illustrates that the practice of labour exploitation in the economy is a by-product of both global competitive business operations and heightened consumer consumption.

Keywords: globalisation, labour exploitation, modern slavery, sweatshops, unethical business practices

Procedia PDF Downloads 142
549 The Implementation of Sovereignty over Natural Resources Principle: Case Study Indonesian Forest

Authors: Sri Wartini

Abstract:

Based on the sovereignty over natural resources principle, the Indonesian government has an authority to exploit the natural resources within a national jurisdiction of Indonesia. The forest is one of the natural resources which is very valuable for Indonesia. It becomes the source of raw material for many industrial activities, such as pharmaceutical industry, pulp industry, and household furniture industry. Hence, it contributes to the economic development of Indonesia. However, the exploitation of the forest may cause negative impacts, such as environmental pollution and environmental degradation. The implementation of the sovereignty over natural resources principle in Indonesia may jeopardize the forest and affect the sustainability of the forest if there is no appropriate policy of the government to exploit the forest in a sustainable manner. The exploitation of the forest in Indonesia, in some extent, has caused serious impact to environment and biodiversity. Hence, in order to sustain and to maintain the forest as the valuable resources to the future generation, the government of Indonesia has already adopted many programmes and action plans. The aim of the research is to undertake a critical examination of the issues relating to the the implementation of sovereignty over natural resources to the exploitation of the forest in Indonesia. It is a normative research and the methodology employed in this research is library research. While the approaches employed in the research are conceptual approach., statutory approach, and comparative approach. The research finds that the implementation of sovereignty over natural resources principle in the exploitation of the forest in Indonesia is limited by other principles of international environmental law, such as sustainable development principle, intergenerational principle and common concern principle which have been adopted in the government policy and various regulations regarding the exploitation of the forest in Indonesia.

Keywords: Environmental damage, negative impacts, pollution, the sovereignty over natural resources

Procedia PDF Downloads 385
548 A Novel Exploration/Exploitation Policy Accelerating Learning In Both Stationary And Non Stationary Environment Navigation Tasks

Authors: Wiem Zemzem, Moncef Tagina

Abstract:

In this work, we are addressing the problem of an autonomous mobile robot navigating in a large, unknown and dynamic environment using reinforcement learning abilities. This problem is principally related to the exploration/exploitation dilemma, especially the need to find a solution letting the robot detect the environmental change and also learn in order to adapt to the new environmental form without ignoring knowledge already acquired. Firstly, a new action selection strategy, called ε-greedy-MPA (the ε-greedy policy favoring the most promising actions) is proposed. Unlike existing exploration/exploitation policies (EEPs) such as ε-greedy and Boltzmann, the new EEP doesn’t only rely on the information of the actual state but also uses those of the eventual next states. Secondly, as the environment is large, an exploration favoring least recently visited states is added to the proposed EEP in order to accelerate learning. Finally, various simulations with ball-catching problem have been conducted to evaluate the ε-greedy-MPA policy. The results of simulated experiments show that combining this policy with the Qlearning method is more effective and efficient compared with the ε-greedy policy in stationary environments and the utility-based reinforcement learning approach in non stationary environments.

Keywords: autonomous mobile robot, exploration/ exploitation policy, large, dynamic environment, reinforcement learning

Procedia PDF Downloads 416
547 Labor Migration: An Anthropological Study of Migrants Socio-Economic Development and Exploitation

Authors: Usman Khan

Abstract:

The article discusses mass migration, which has been a problem throughout history. People moved for a variety of reasons, including better job opportunities, prosperous, healthy lifestyles, and other basic needs. This research focuses on the issues and challenges that immigrants face when they arrive at their destination countries especially Saudi Arab. Among these issues are the Kapala system, irregular salaries, living conditions, document seizure, and so on. The primary data sources for this qualitative anthropological study include in-depth interviews and focus group discussions (FGDs). The research was carried out in the villages of Zulam and Shagokas in Khyber Pakhtunkhwa's Dir Lower District. The article concludes by stating that the agents and employers treated labor migrants/workers inhumanely. Throughout the process, they have been subjected to severe exploitation and suffering. Finally, the migrants sent back remittances that aided the region's economic and infrastructure development.

Keywords: Migration, Exploitation, labour, Middle East, Kafala and Tanazol System.

Procedia PDF Downloads 73
546 Assessment of Forest Resource Exploitation in the Rural Communities of District Jhelum

Authors: Rubab Zafar Kahlon, Ibtisam Butt

Abstract:

Forest resources are deteriorating and experiencing decline around the globe due to unsustainable use and over exploitation. The present study was an attempt to determine the relationship between human activities, forest resource utilization, extraction methods and practices of forest resource exploitation in the district Jhelum of Pakistan. For this purpose, primary sources of data were used which were collected from 8 villages through structured questionnaire and tabulated in Microsoft Excel 365 and SPSS 22 was used for multiple linear regression analysis. The results revealed that farming, wood cutting, animal husbandry and agro-forestry were the major occupations in the study area. Most commonly used resources included timber 26%, fuelwood 25% and fodder 19%. Methods used for resource extraction included gathering 49%, plucking 34% trapping 11% and cutting 6%. Population growth, increased demand of fuelwood and land conversion were the main reasons behind forest degradation. Results for multiple linear regression revealed that Forest based activities, sources of energy production, methods used for wood harvesting and resource extraction and use of fuelwood for energy production contributed significantly towards extensive forest resource exploitation with p value <0.5 within the study area. The study suggests that effective measures should be taken by forest department to control the unsustainable use of forest resources by stringent management interventions and awareness campaigns in Jhelum district.

Keywords: forest resource, biodiversity, expliotation, human activities

Procedia PDF Downloads 91
545 A Robust Implementation of a Building Resources Access Rights Management System

Authors: Eugen Neagoe, Victor Balanica

Abstract:

A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights).

Keywords: smart building controller, software security, access rights, access authorization

Procedia PDF Downloads 438
544 Rural Tourism in Essaouira in Morocco: From the Appropriation of Space to the Sustainability of Exploitation

Authors: Hadach Mohamed

Abstract:

In Essaouira, tourism is the main economic activity, and the destination has a place in the segment of rural and sustainable tourism. The hinterland of the destination has natural and tourist potential of great attractiveness, but the natives still appropriate the territory and are faced with the dilemma of appropriation and tourist exploitation. This article analyzes the determinants of the appropriation of a rural tourist space in light of the massive touristification and the need to set up income-generating activities for the inhabitants. After a review of the literature, a survey was carried out among the main actors of tourism in the destination to evaluate the question of the appropriation of the tourist space and the sustainability of a destination.

Keywords: rural tourism, sustainability, appropriation, tourism destination

Procedia PDF Downloads 106
543 Impacts of Environmental Science in Biodiversity Conservation

Authors: S. O. Ekpo

Abstract:

Environmental science deals with everyday challenges such as a cell for call for good and safe quality air, water, food and healthy leaving condition which include destruction of biodiversity and how to conserve these natural resources for sustainable development. Biodiversity or species richness is the sum of all the different species of animals, plants, fungi and microorganisms leaving on earth and variety of habitats in which they leave. Human beings leave on plants and animals on daily basis for food, clothing, medicine, housing, research and trade or commerce; besides this, biodiversity serves to purify the air, water and land of contaminant, and recycle useful materials for continual use of man. However, man continual incessant exploitation and exploration has affected biodiversity negatively in many ways such habitant fragmentation and destruction, introduction of invasive species, pollution, overharvesting, prediction and pest control amongst others. Measures such as recycling material, establishing natural parks, sperm bank, limiting the exploitation of renewable resources to sustainable yield and urban and industrial development as well as prohibiting hunting endangered species and release of non native live forms into an area will go a long way towards conserving biodiversity for continues profitable yield.

Keywords: biodiversity, conservation, exploitation and exploration sustainable yield, recycling of materials

Procedia PDF Downloads 223
542 Effect of Waste Dumping on Groundwater Quality at Guntun Layi Funtua, Katsina State

Authors: Isiya Aminu Dabai, Adebola Kayode, Adeosun Kayode Daniel

Abstract:

Rural water supply relies mainly on groundwater exploitation, because it is more accessible, reliable, cheaper to develop and maintain, also with good quality compared to the surface water. Despite these advantages, groundwater has come under pollution threats like waste dumps, mineral exploitation, industrialization etc. This study investigates the effects of an open dumping to the surrounding groundwater. Ten hand dug well water samples were collected from the surroundings and tested. The average result shows that temperature, colour and turbidity to be 8.50 c, 6.1 TCU and 3.1 NTU respectively and pH, conductivity, total dissolved solids, chloride content and hardness to be 7.2, 4.78, 1.8, 5.7, and 3.4 respectively while in the bacteriological test well no. 1, 2, 3, and 5 shows the presence of coliforms and E. Coli bacteria.

Keywords: groundwater, pollution, waste, dump site, unsafe, quality

Procedia PDF Downloads 680
541 Human Trafficking and Prostitution in Amsterdam

Authors: Isabel Roiz, Alejandra Cossio

Abstract:

This essay will talk about the problems of forced prostitution, human trafficking, and sexual exploitation in the Netherlands. This work conveys information from different sources stating the numbers and statistics of human trafficking throughout Europe and the different types of sexual exploitation as well as the means used for coercing victims into this illegal net. The research aims to inform and compare the way this business is handled and the ways used by criminals to lure and retain victims in spite of the law. It also tries to compare the laws in the Netherlands and Sweden regarding prostitution affects the illegal migration problems and how they change the ways those who work as prostitutes are treated. The aim of the paper is to take all of these aspects into consideration and reach a decision of what laws would most beneficiate the victims.

Keywords: human trafficking, prostitution, laws of migration, Amsterdam

Procedia PDF Downloads 347
540 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 320
539 Facilitating Knowledge Transfer for New Product Development in Portfolio Entrepreneurship: A Case Study of a Sodium-Ion Battery Start-up in China

Authors: Guohong Wang, Hao Huang, Rui Xing, Liyan Tang, Yu Wang

Abstract:

Start-ups are consistently under pressure to overcome liabilities of newness and smallness. They must focus on assembling resource and engaging constant renewal and repeated entrepreneurial activities to survive and grow. As an important form of resource, knowledge is constantly vital to start-ups, which will help start-ups with developing new product in hence forming competitive advantage. However, significant knowledge is usually needed to be identified and exploited from external entities, which makes it difficult to achieve knowledge transfer; with limited resources, it can be quite challenging for start-ups balancing the exploration and exploitation of knowledge. The research on knowledge transfer has become a relatively well-developed domain by indicating that knowledge transfer can be achieved through plenty of patterns, yet it is still under-explored that what processes and organizational practices help start-ups facilitating knowledge transfer for new product in the context portfolio entrepreneurship. Resource orchestration theory emphasizes the initiative and active management of company or the manager to explain the fulfillment of resource utility, which will help understand the process of managing knowledge as a certain kind of resource in start-ups. Drawing on the resource orchestration theory, this research aims to explore how knowledge transfer can be facilitated through resource orchestration. A qualitative single-case study of a sodium-ion battery new venture was conducted. The case company is sampled deliberately from representative industrial agglomeration areas in Liaoning Province, China. It is found that distinctive resource orchestration sub-processes are leveraged to facilitate knowledge transfer: (i) resource structuring makes knowledge available across the portfolio; (ii) resource bundling makes combines internal and external knowledge to form new knowledge; and (iii) resource harmonizing balances specific knowledge configurations across the portfolio. Meanwhile, by purposefully reallocating knowledge configurations to new product development in a certain new venture (exploration) and gradually adjusting knowledge configurations to being applied to existing products across the portfolio (exploitation), resource orchestration processes as a whole make exploration and exploitation of knowledge balanced. This study contributes to the knowledge management literature through proposing a resource orchestration view and depicting how knowledge transfer can be facilitated through different resource orchestration processes and mechanisms. In addition, by revealing the balancing process of exploration and exploitation of knowledge, and laying stress on the significance of the idea of making exploration and exploitation of knowledge balanced in the context of portfolio entrepreneurship, this study also adds specific efforts to entrepreneurship and strategy management literature.

Keywords: exploration and exploitation, knowledge transfer, new product development, portfolio entrepreneur, resource orchestration

Procedia PDF Downloads 125
538 A Literature Review and a Proposed Conceptual Framework for Learning Activities in Business Process Management

Authors: Carin Lindskog

Abstract:

Introduction: Long-term success requires an organizational balance between continuity (exploitation) and change (exploration). The problem of balancing exploitation and exploration is a common issue in studies of organizational learning. In order to better face the tough competition in the face of changes, organizations need to exploit their current business and explore new business fields by developing new capabilities. The purpose of this work in progress is to develop a conceptual framework to shed light on the relevance of 'learning activities', i.e., exploitation and exploration, on different levels. The research questions that will be addressed are as follows: What sort of learning activities are found in the Business Process Management (BPM) field? How can these activities be linked to the individual level, group, level, and organizational level? In the work, a literature review will first be conducted. This review will explore the status of learning activities in the BPM field. An outcome from the literature review will be a conceptual framework of learning activities based on the included publications. The learning activities will be categorized to focus on the categories exploitation, exploration or both and into the levels of individual, group, and organization. The proposed conceptual framework will be a valuable tool for analyzing the research field as well as identification of future research directions. Related Work: BPM has increased in popularity as a way of working to strengthen the quality of the work and meet the demands of efficiency. Due to the increase in BPM popularity, more and more organizations reporting on BPM failure. One reason for this is the lack of knowledge about the extended scope of BPM to other business contexts that include, for example, more creative business fields. Yet another reason for the failures are the fact of the employees’ are resistant to changes. The learning process in an organization is an ongoing cycle of reflection and action and is a process that can be initiated, developed and practiced. Furthermore, organizational learning is multilevel; therefore the theory of organizational learning needs to consider the individual, the group, and the organization level. Learning happens over time and across levels, but it also creates a tension between incorporating new learning (feed-forward) and exploiting or using what has already been learned (feedback). Through feed-forward processes, new ideas and actions move from the individual to the group to the organization level. At the same time, what has already been learned feeds back from the organization to a group to an individual and has an impact on how people act and think.

Keywords: business process management, exploitation, exploration, learning activities

Procedia PDF Downloads 124
537 Examining Individual and Organisational Legal Accountability for Sexual Exploitation Perpetrated by International Humanitarian Workers in Haiti

Authors: Elizabeth Carthy

Abstract:

There is growing recognition that sexual exploitation and abuse (SEA) perpetrated by humanitarian workers is widespread, most recently affirmed by allegations of high-ranking Oxfam officials paying women for sex in post-earthquake Haiti. SEA covers a range of gendered abuses, including rape, sexual assault, and ‘transactional’ or ‘survival’ sex. Holding individuals legally accountable for such behaviors is difficult in all contexts even more so in fragile and conflict-affected settings. Transactional sex, for the purposes of this paper, refers to situations where humanitarian workers exchange aid or assistance for sexual services. This paper explores existing organizational accountability measures relating to transactional sex engaged in by international humanitarian workers through a descriptive and interpretive case study approach-examining the situation in Haiti. It comparatively analyses steps the United Nations has taken to combat this problem. Then it examines the possibility of domestic legal accountability for such conduct in Haiti. Finally, the paper argues that international human rights law can fill in potential gaps in domestic legal frameworks to ensure states hold humanitarian workers and potentially organizations accountable for engaging in and/or perpetuating this gendered abuse of power.

Keywords: gender-based violence, humanitarian action, international human rights law, sexual exploitation

Procedia PDF Downloads 163
536 Female Victimization and Capitalist Patriarchy in Literature: An Eco-Feminist Study

Authors: Uzma Imtiaz

Abstract:

Ecological feminism adheres to the basic philosophy that patriarchy is the wellspring of natural and gender domination. It explores the relationship between women and nature in a patriarchal society. Eco-feminism argues that women and nature have an intrinsic association and exploitation of women is the exploitation of nature itself. It further views the world as a holistic institution that offers equal opportunities for men and women. Eco-feminism rejects male domination in a patriarchal society where men and women do not get equal rights to survival. Furthermore, it investigates modern capitalist practices that exert unjust male dominance over nature and women. Cultural eco-feminist theorists argue that industrialization and modern science are male-centered and exhibit male chauvinistic views in attempts to control females’ ability to reproduce. This research intends to analyze an eco-feminist novel by Laila Halaby from the eco-feminism theoretical framework of Maria Mies and Vandana Shiva. The feminist dystopian novel throws light on the double-faced processes of capitalism and housewifization that destroy the autonomy of women over their bodies and life. Moreover, this study aims to highlight the unjust capitalistic processes and policies that turn other countries and women into colonies to exploit them by white men in the name of progress and civilization. The novel brings the patriarchal ways of dominance over women into question. This research paper concludes that women and men should get equal opportunities to survive in society, and women should have given rights over their bodies to decide their future. The research is qualitative in nature, so the method of close reading is selected to analyze the hypodermic effect of patriarchy in society. This study is valuable in highlighting the exploitative ways of men to subjugate women and nature and helps to give awareness to women against gender exploitation in society.

Keywords: housewifization, exploitation, capitalist patriarchy, female victimization

Procedia PDF Downloads 76
535 Real-Time Monitoring Approaches of Groundwater Conductivity and Level to Pre-Alert the Seawater Intrusion in Sand Coast of Liaodong Bay of China

Authors: Yuguang Wang, Chuanjun Wang

Abstract:

At present, many coastal areas around the world suffer from seawater intrusion. Seawater intrusion is the superimposed result of two factors which are nature and human social economical activities in particular area. In recent years, due to excessive exploitation of groundwater, the seawater intrusion phenomenon aggravate in coastal zone of the Bohai and Huanghai seas in our country. Moreover, with sea-level rising, the original hydrodynamic equilibrium between saltwater and freshwater has been damaged to a certain extent, and it will further aggravate seawater intrusion in the land plains. In addition, overexploitation of groundwater declined groundwater level and increase saltwater intrusion in coastal areas. Therefore, in view of the sensitivity and vulnerability of the impact of sea-level rise in the future, the risk of sea-level rise in coastal zone should be considered, reasonable exploitation, utilization and management of coastal zone’s groundwater should be formulated. The response mechanism of sea-level rise should be studied to prevent and reduce the harm of seawater intrusion, which has important theoretical and realistic significances. In this paper, through the long-term monitoring of groundwater level and conductibility in the transition region of seawater intrusion for the sand coast area, realtimely master the situation of seawater intrusion. Combined with the seasonal exploitation station of groundwater and sea level variation, early alert the seawater intrusion to prevent and reduce the harm of seawater intrusion.

Keywords: groundwater level, sea level, seawater intrusion, sand coast

Procedia PDF Downloads 467
534 Using India’s Traditional Knowledge Digital Library on Traditional Tibetan Medicine

Authors: Chimey Lhamo, Ngawang Tsering

Abstract:

Traditional Tibetan medicine, known as Sowa Rigpa (Science of healing), originated more than 2500 years ago with an insightful background, and it has been growing significant attention in many Asian countries like China, India, Bhutan, and Nepal. Particularly, the Indian government has targeted Traditional Tibetan medicine as its major Indian medical system, including Ayurveda. Although Traditional Tibetan medicine has been growing interest and has a long history, it is not easily recognized worldwide because it exists only in the Tibetan language and it is neither accessible nor understood by patent examiners at the international patent office, data about Traditional Tibetan medicine is not yet broadly exist in the Internet. There has also been the exploitation of traditional Tibetan medicine increasing. The Traditional Knowledge Digital Library is a database aiming to prevent the patenting and misappropriation of India’s traditional medicine knowledge by using India’s Traditional knowledge Digital Library on Sowa Rigpa in order to prevent its exploitation at international patent with the help of information technology tools and an innovative classification systems-traditional knowledge resource classification (TKRC). As of date, more than 3000 Sowa Rigpa formulations have been transcribed into a Traditional Knowledge Digital Library database. In this paper, we are presenting India's Traditional Knowledge Digital Library for Traditional Tibetan medicine, and this database system helps to preserve and prevent the exploitation of Sowa Rigpa. Gradually it will be approved and accepted globally.

Keywords: traditional Tibetan medicine, India's traditional knowledge digital library, traditional knowledge resources classification, international patent classification

Procedia PDF Downloads 127
533 Exploitation of Technology by the Tshwane Residence for Tourism Development Purposes

Authors: P. P. S. Sifolo, P. Tladi, J. Maimela

Abstract:

This article investigates technology used by Tshwane residents intended for tourism purposes. The aim is to contribute information to the Tshwane interested parties for planning and management concerning technology within the tourism sector. This study identified the types of tourist related technologies used by the Tshwane residents, be it for business purposes or personal use. The study connected the exploitation of technology for tourism purposes through unpacking the tourism sector as it utilizes technology. Quantitative research methodology was used whereby self-completed questionnaires were chosen as research instruments. The research study carried out a search for knowledge on technology for tourism and the Tshwane residents; however the study revealed that technology has certainly imprinted tourism massively because of its effectiveness and efficiency. Technology has assisted tourism businesses stay abreast of competition with ICT and because of that, SA is on the map as one the economically performing countries in Africa. Moreover, technology and tourism make a meaningful impact on job creation and Gross Domestic Product (GDP).

Keywords: tourism, information and communication technology, Tshwane residents, technology for tourism

Procedia PDF Downloads 388
532 Do the Health Benefits of Oil-Led Economic Development Outweigh the Potential Health Harms from Environmental Pollution in Nigeria?

Authors: Marian Emmanuel Okon

Abstract:

Introduction: The Niger Delta region of Nigeria has a vast reserve of oil and gas, which has globally positioned the nation as the sixth largest exporter of crude oil. Production rapidly rose following oil discovery. In most oil producing nations of the world, the wealth generated from oil production and export has propelled economic advancement, enabling the development of industries and other relevant infrastructures. Therefore, it can be assumed that majority of the oil resource such as Nigeria’s, has the potential to improve the health of the population via job creation and derived revenues. However, the health benefits of this economic development might be offset by the environmental consequences of oil exploitation and production. Objective: This research aims to evaluate the balance between the health benefits of oil-led economic development and harmful environmental consequences of crude oil exploitation in Nigeria. Study Design: A pathway has been designed to guide data search and this study. The model created will assess the relationship between oil-led economic development and population health development via job creation, improvement of education, development of infrastructure and other forms of development as well as through harmful environmental consequences from oil activities. Data/Emerging Findings: Diverse potentially suitable datasets which are at different geographical scales have been identified, obtained or applied for and the dataset from the World Bank has been the most thoroughly explored. This large dataset contains information that would enable the longitudinal assessment of both the health benefits and harms from oil exploitation in Nigeria as well as identify the disparities that exist between the communities, states and regions. However, these data do not extend far back enough in time to capture the start of crude oil production. Thus, it is possible that the maximum economic benefits and health harms could be missed. To deal with this shortcoming, the potential for a comparative study with countries like United Kingdom, Morocco and Cote D’ivoire has also been taken into consideration, so as to evaluate the differences between these countries as well as identify the areas of improvement in Nigeria’s environmental and health policies. Notwithstanding, these data have shown some differences in each country’s economic, environmental and health state over time as well as a corresponding summary statistics. Conclusion: In theory, the beneficial effects of oil exploitation to the health of the population may be substantial as large swaths of the ‘wider determinants’ of population heath are influenced by the wealth of a nation. However, if uncontrolled, the consequences from environmental pollution and degradation may outweigh these benefits. Thus, there is a need to address this, in order to improve environmental and population health in Nigeria.

Keywords: environmental pollution, health benefits, oil-led economic development, petroleum exploitation

Procedia PDF Downloads 339
531 Utilization Of Medical Plants Tetrastigma glabratum (Blume) Planch from Mount Prau in the Blumah, Central Java

Authors: A. Lianah, B. Peter Sopade, C. Krisantini

Abstract:

Walikadep/Tetrastigma glabratum (Blume) Planch is a traditional herb that has been used by people of Blumah village; it is believed to have a stimulant effect and ailments for many illnesses. Our survey demonstrated that the people of Blumah village has exploited walikadep from Protected Forest of Mount Prau. More than 10% of 448 households at Blumah village have used walikadep as traditional herb or jamu. Part of the walikadep plants used is the liquid extract of the stem. The population of walikadep is getting scarce and it is rarely found now. The objectives of this study are to examine the stimulant effect of walikadep, to measure growth and exploitation rate of walikadep, and to find ways to effectively propagate the plants, as well as identifying the impact on the environment through field experiments and explorative survey. Stimulant effect was tested using open-field and hole-board test. Data were collected through field observation and experiment, and data were analysed using lab test and Anova. Rate of exploitation and plant growth was measured using Regression analysis; comparison of plant growth in-situ and ex-situ used descriptive analysis. The environmental impact was measured by population structure vegetation analysis method by Shannon Weinner. The study revealed that the walikadep exudates did not have a stimulant effect. Exploitation of walikadep and the long time required to reach harvestable size resulted in the scarcity of the plant in the natural habitat. Plant growth was faster in-situ than ex-situ; and fast growth was obtained from middle part cuttings treated with vermicompost. Biodiversity index after exploitation was higher than before exploitation, possibly due to the toxic and allellopathic effect (phenolics) of the plant. Based on these findings, further research is needed to examine the toxic effects of the leave and stem extract of walikadep and their allelopathic effects. We recommend that people of Blumah village to stop using walikadep as the stimulant. The local people, village government in the regional and central levels, and perhutani should do an integrated efforts to conserve walikadep through Pengamanan Terpadu Konservasi Walikadep Lestari (PTKWL) program, so this population of this plant in the natural habitat can be maintained.

Keywords: utilization, medical plants, traditional, Tetastigma glabratum

Procedia PDF Downloads 280
530 Posttraumatic Distress, Hope and Growth in Survivors of Commercial Sexual Exploitation and Sex Trafficking in Nepal

Authors: Rebekah Volgin, Jane Shakespeare-Finch, Ian Shochet

Abstract:

Commercial sexual exploitation (CSE) and sex trafficking affect between 5000-7000 girls and women in Nepal each year and can have devastating physical and psychological consequences. Much research has documented these effects, however, there is no published longitudinal research that focuses on whether healing and growth outcomes are possible for survivors of CSE and sex trafficking. The narratives of 27 girls and women (13-22 years) were taken at two-time points during participation in a six-week group psychoeducation and art therapy program which was delivered across three NGO’s in Kathmandu, Nepal. These narratives form part of a larger ethnographic project. Thematic analysis of the data was undertaken. Themes emerging from time point 1 were: psychological distress in the form of anxiety and grief over loss of family, psychosomatic symptoms, empathy and compassion, and posttraumatic growth (PTG) in the form of new possibilities, relating to others and personal strength. Posttraumatic growth refers to positive changes in the aftermath of trauma. The themes emerging from time point 2, were: empathy and compassion and PTG (cognitive restructuring, new possibilities, relating to others and personal strength). Alongside the distress that these participants experienced, they also experienced positive outcomes such as empathy and compassion and psychological growth. Future research would advance knowledge by further examining the process of PTG in this population, if the changes observed were lasting, and if so, ways in which PTG can be facilitated or promoted.

Keywords: commercial sexual exploitation, human trafficking, posttraumatic growth, sexual trauma

Procedia PDF Downloads 257
529 The Exploitation of the MOSES Project Outcomes on Supply Chain Optimisation

Authors: Reza Karimpour

Abstract:

Ports play a decisive role in the EU's external and internal trade, as about 74% of imports and exports and 37% of exchanges go through ports. Although ports, especially Deep Sea Shipping (DSS) ports, are integral nodes within multimodal logistic flows, Short Sea Shipping (SSS) and inland waterways are not so well integrated. The automated vessels and supply chain optimisations for sustainable shortsea shipping (MOSES) project aims to enhance the short sea shipping component of the European supply chain by addressing the vulnerabilities and strains related to the operation of large containerships. The MOSES concept can be shortly described as a large containership (mother-vessel) approaching a DSS port (or a large container terminal). Upon her arrival, a combined intelligent mega-system consisting of the MOSES Autonomous tugboat swarm for manoeuvring and the MOSES adapted AutoMoor system. Then, container handling processes are ready to start moving containers to their destination via hinterland connections (trucks and/or rail) or to be shipped to destinations near small ports (on the mainland or island). For the first case, containers are stored in a dedicated port area (Storage area), waiting to be moved via trucks and/or rail. For the second case, containers are stacked by existing port equipment near-dedicated berths of the DSS port. They then are loaded on the MOSES Innovative Feeder Vessel, equipped with the MOSES Robotic Container-Handling System that provides (semi-) autonomous (un) feeding of the feeder. The Robotic Container-Handling System is remotely monitored through a Shore Control Centre. When the MOSES innovative Feeder vessel approaches the small port, where her docking is achieved without tugboats, she automatically unloads the containers using the Robotic Container-Handling System on the quay or directly on trucks. As a result, ports with minimal or no available infrastructure may be effectively integrated with the container supply chain. Then, the MOSES innovative feeder vessel continues her voyage to the next small port, or she returns to the DSS port. MOSES exploitation activity mainly aims to exploit research outcomes beyond the project, facilitate utilisation of the pilot results by others, and continue the pilot service after the project ends. By the mid-lifetime of the project, the exploitation plan introduces the reader to the MOSES project and its key exploitable results. It provides a plan for delivering the MOSES innovations to the market as part of the overall exploitation plan.

Keywords: automated vessels, exploitation, shortsea shipping, supply chain

Procedia PDF Downloads 108
528 Analysis of Exploitation Damages of the Frame Scaffolding

Authors: A. Robak, M. Pieńko, E. Błazik-Borowa, J. Bęc, I. Szer

Abstract:

The analyzes and classifications presented in the article were based on the research carried out in year 2016 and 2017 on a group of nearly one hundred scaffoldings assembled and used on construction sites in different parts of Poland. During scaffolding selection process efforts were made to maintain diversification in terms of parameters such as scaffolding size, investment size, type of investment, location and nature of conducted works. This resulted in the research being carried out on scaffoldings used for church renovation in a small town or attached to the facades of classic apartment blocks, as well as on scaffoldings used during construction of skyscrapers or facilities of the largest power plants. This variety allows to formulate general conclusions about the technical condition of used frame scaffoldings. Exploitation damages of the frame scaffolding elements were divided into three groups. The first group includes damages to the main structural components, which reduce the strength of the scaffolding elements and hence the whole structure. The qualitative analysis of these damages was made on the basis of numerical models that take into account the geometry of the damage and on the basis of computational nonlinear static analyzes. The second group focuses on exploitation damages such as the lack of a pin on the guardrail bolt which may cause an imminent threat to people using scaffolding. These are local damages that do not affect the bearing capacity and stability of the whole structure but are very important for safe use. The last group consider damages that reduce only aesthetic values and do not have direct impact on bearing capacity and safety of use. Apart from qualitative analyzes the article will present quantitative analyzes showing how frequently given type of damage occurs.

Keywords: scaffolding, damage, safety, numerical analysis

Procedia PDF Downloads 258
527 Household's Willingness to Pay for Safe Non-Timber Forest Products at Morikouali-Ye Community Forest in Cameroon

Authors: Eke Balla Sophie Michelle

Abstract:

Forest provides a wide range of environmental goods and services among which, biodiversity or consumption goods and constitute public goods. Despite the importance of non-timber forest products (NTFPs) in sustaining livelihood and poverty smoothening in rural communities, they are highly depleted and poorly conserved. Yokadouma is a town where NTFPs is a renewable resource in active exploitation. It has been found that such exploitation is done in the same conditions as other localities that have experienced a rapid depletion of their NTFPs in destination to cities across Cameroon, Central Africa, and overseas. Given these realities, it is necessary to access the consequences of this overexploitation through negative effects on both the population and the environment. Therefore, to enhance participatory conservation initiatives, this study determines the household’s willingness to pay in community forest (CF) of Morikouali-ye, eastern region of Cameroon, for sustainable exploitation of NTFPs using contingent valuation method (CVM) through two approaches, one parametric (Logit model) and the other non-parametric (estimator of the Turnbull lower bound). The results indicate that five species are the most collected in the study area: Irvingia gabonensis, the Ricinodendron heudelotii, Gnetum, the Jujube and bark, their sale contributes significantly to 41 % of total household income. The average willingness to pay through the Logit model and the Turnbull estimator is 6845.2861 FCFA and 4940 FCFA respectively per household per year with a social cost of degradation estimated at 3237820.3253 FCFA years. The probability to pay increases with income, gender, number of women in the household, age, the commercial activity of NTFPs and decreases with the concept of sustainable development.

Keywords: non timber forest product, contingent valuation method, willingness to pay, sustainable development

Procedia PDF Downloads 445
526 Intellectual Property Laws: Protection of Celebrities’ Identity

Authors: Soumya Chaturvedi

Abstract:

Ever since India opened its doors for the world economy to enter, there has not been a single instance of recoil. A consequence of this move by the government of India resulted in India evolving as a consumer-driven market and in order to survive in this era of extreme competition, the corporate houses have employed every possible means to reach out and hit onto the sentiments of the consumers. The most obvious way to ensure a strong perseverance towards the specific product or brand is through celebrity endorsements. In a country like India, whose film industry accounts for the largest sales and output, it is indeed appalling to acknowledge the fact that it lacks an effective mechanism of protection of the commercial exploitation of celebrities’ attributes under the ambit of law. The western half of the globe has very well accepted and recognized the rights of the celebrities to decide upon the quantum of commercial exploitation of their own attributes and earn profit out of the same. However, the eastern half seems to be a little reluctant in accepting and enforcing these views per se. A celebrity has a right to publicity over the traits of his personality which involves voice, autographs, reputation, and style, so on and so forth as it is these attributes that are responsible for huge trade profits concerning the products to which such traits are attributed to. This clearly involves the right of the celebrity to benefit himself by commercially exploiting the same and refraining the unauthorized gain to third parties. The market is making it nearly impossible to proceed further with such weak laws considering the escalating rate of celebrity endorsements in the nation. This paper discusses the lacunae in law per se to identify a right as such by a celebrity over his traits that are potentially under the circle of commercial exploitation and the need of a definite legislation that would ensure a change in the paradigm of the Courts in India. Also, it discusses the only remedy available currently for violation, which is, a suit for passing off by Indian Courts under Trademark and Copyright laws and a comparison of the same with the mechanisms adopted by the legal systems across the globe.

Keywords: celebrity, rights, intellectual property, trademark, copyrights

Procedia PDF Downloads 334