Search results for: periphery stakeholder network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4988

Search results for: periphery stakeholder network

4958 Perceptions of Corporate Governance and Business Ethics Practices in Kuwaiti Islamic and Conventional Banks

Authors: Khaled Alotaibi, Salah Alhamadi, Ibraheem Almubarak

Abstract:

The study attempts to explore both corporate governance (GC) and business ethics (BE) practices in Kuwaiti banks and the relationship between CG and BE, using an accountability framework. By examining the perceptions of key stakeholder groups, this study investigates the practices of BE and CG in Islamic banks (IBs) compared to conventional banks (CBs). We contribute to the scarce studies concerned with relations between CG and BE. We have employed a questionnaire survey method for a random sample of crucial relevant stakeholder groups. The empirical analysis of the participants’ perceptions highlights the importance of applying CG regulations and BE for Kuwaiti banks and the clear link between the two concepts. We find that the main concern is not the absence of CG and BE codes, but the lack of consistent enforcement of the regulations. Such a system needs to be strictly and effectively implemented in Kuwaiti banks to protect all stakeholders’ wealth, not only that of stockholders. There are significant patterns in the CG and BE expectations among different stakeholder groups. Most interestingly, banks’ client groups illustrate high expectations concerning CG and BE practices.

Keywords: corporate governance, GC, business ethics, BE, Islamic banks, IBs, conventional banks, CBs, accountability

Procedia PDF Downloads 127
4957 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 470
4956 Network Functions Virtualization-Based Virtual Routing Function Deployment under Network Delay Constraints

Authors: Kenichiro Hida, Shin-Ichi Kuribayashi

Abstract:

NFV-based network implements a variety of network functions with software on general-purpose servers, and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. In this paper, we evaluate the influence of the maximum tolerable network delay on the virtual routing function deployment guidelines which the authors proposed previously. Our evaluation results have revealed the following: (1) the more the maximum tolerable network delay condition becomes severe, the more the number of areas where the route selection function is installed increases and the total network cost increases, (2) the higher the routing function cost relative to the circuit bandwidth cost, the increase ratio of total network cost becomes larger according to the maximum tolerable network delay condition.

Keywords: NFV (Network Functions Virtualization), resource allocation, virtual routing function, minimum total network cost

Procedia PDF Downloads 215
4955 Solar Energy Technology Adoption; A Vignette Study for the Up-Scale Residential Sector in Egypt

Authors: Mazen Zaki, Sherwat E. Ibrahim

Abstract:

Renewable energy has become a very important and critical topic all around the world due to the limited resources that led to shifting to the trend of renewable energy and its integration with the conventional ones. This paper investigates the adoption of the solar energy technology for up-scale residential sector in Cairo, Egypt. The technology acceptance model uses several stakeholder points’ of views to develop vignettes to be used in examining the intention and attitude of the householders to adopt the solar energy technology.

Keywords: solar energy, technology acceptance model, TAM, stakeholder analysis, vignette, residential sector

Procedia PDF Downloads 116
4954 Transmission Network Expansion Planning in Deregulated Power Systems to Facilitate Competition under Uncertainties

Authors: Hooshang Mohammad Alikhani, Javad Nikoukar

Abstract:

Restructuring and deregulation of power industry have changed the objectives of transmission expansion planning and increased the uncertainties. Due to these changes, new approaches and criteria are needed for transmission planning in deregulated power systems. The objective of this research work is to present a new approach for transmission expansion planning with considering new objectives and uncertainties in deregulated power systems. The approach must take into account the desires of all stakeholders in transmission expansion planning. Market based criteria must be defined to achieve the new objectives. Combination of market based criteria, technical criteria and economical criteria must be used for measuring the goodness of expansion plans to achieve market requirements, technical requirements, and economical requirements altogether.

Keywords: deregulated power systems, transmission network, stakeholder, energy systems

Procedia PDF Downloads 619
4953 Examining the Effects of Production Method on Aluminium A356 Alloy and A356-10%SiCp Composite for Hydro Turbine Bucket Application

Authors: Williams S. Ebhota, Freddie L. Inambao

Abstract:

This study investigates the use of centrifugal casting method to fabricate functionally graded aluminium A356 Alloy and A356-10%SiCp composite for hydro turbine bucket application. The study includes the design and fabrication of a permanent mould. The mould was put into use and the buckets of A356 Alloy and A356-10%SiCp composite were cast, cut and machined into specimens. Some specimens were given T6 heat treatment and the specimens were prepared for different examinations accordingly. The SiCp particles were found to be more at inner periphery of the bucket. The maximum hardness of As-Cast A356 and A356-10%SiCp composite was recorded at the inner periphery to be 60 BRN and 95BRN, respectively. And these values were appreciated to 98BRN and 122BRN for A356 alloy and A356-10%SiCp composite, respectively. It was observed that the ultimate tensile stress and yield tensile stress prediction curves show the same trend.

Keywords: A356 alloy, A356-10%SiCp composite, centrifugal casting, Pelton bucket, turbine blade

Procedia PDF Downloads 255
4952 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 419
4951 Developing API Economy: Associating Value to APIs and Microservices in an Enterprise

Authors: Mujahid Sultan

Abstract:

The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) methodologies and development approaches. SDLCs range from waterfall to agile, and the development approaches from monolith to microservices. Management, orchestration, and monetization of microservices have created an API economy in the modern enterprise. There are two approaches to API design, code first and design first. Design first is gaining popularity in the industry as this allows capturing the API needs from the stakeholders rather than the development teams guesstimating the needs and associating a monetary value with the APIs and microservices. In this publication, we describe an approach to organizing and creating stakeholder needs and requirements for designing microservices and APIs.

Keywords: requirements engineering, enterprise architecture, APIs, microservices, DevOps, continuous delivery, continuous integration, stakeholder viewpoints

Procedia PDF Downloads 155
4950 Managing Early Stakeholder Involvement at the Early Stages of a Building Project Life Cycle

Authors: Theophilus O. Odunlami, Hasan Haroglu, Nader Saleh-Matter

Abstract:

The challenges facing the construction industry are often worsened by the compounded nature of projects coupled with the complexity of key stakeholders involved at different stages of the project. Projects are planned to achieve outlined benefits in line with the business case; however, a lack of effective management of key stakeholders can result in unrealistic delivery aspirations, unnecessary re-works, and overruns. The aim of this study is to examine the early stages of a project lifecycle and investigate the stakeholder management and involvement processes and their impact on the successful delivery of the project. The research engaged with conventional construction organisations and project personnel and stakeholders on diverse projects, using a research strategy to analyse existing project case studies, narrative enquiries, interviews, and surveys using a combined qualitative, quantitative, and mixed method of analysis. Research findings have shown that the involvement of stakeholders at different levels during the early stages has pronounced effects on project delivery; it helps to forge synergy and promotes a clear understanding of individual responsibilities, strengths, and weaknesses. This has often fostered a positive sense of productive collaboration right through the early stages of the project. These research findings intend to contribute to the development of a process framework for stakeholder and project team involvement in the early stages of a project. This framework will align with the selection criteria for stakeholders, contractors, and resources, ultimately contributing to the successful completion of projects. The primary question addressed in this study is stakeholder involvement and management of the early stages of a building project life cycle impacts project delivery. Findings showed that early-stage stakeholder involvement and collaboration between project teams and contractors significantly contribute to project success. However, a strong and healthy communication strategy would be required to maintain the flow of value-added ideas among stakeholders at the early stages to benefit the project at the execution stage.

Keywords: early stages, project lifecycle, stakeholders, decision-making strategy, project framework

Procedia PDF Downloads 54
4949 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture

Authors: Takumi Shindo, Koji Okamura

Abstract:

The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.

Keywords: ICN, information centric network, CCN, energy

Procedia PDF Downloads 304
4948 Adopting a Stakeholder Perspective to Profile Successful Sustainable Circular Business Approaches: A Single Case Study

Authors: Charleen von Kolpinski, Karina Cagarman, Alina Blaute

Abstract:

The circular economy concept is often framed by politicians, scientists and practitioners as being the solution to sustainability problems of our times. However, the focus of these discussions and publications is very often set on environmental and economic aspects. In contrast, the social dimension of sustainability has been neglected and only a few recent and mostly conceptual studies targeted the inclusion of social aspects and the SDGs into circular economy research. All stakeholders of this new circular system have to be included to represent a truly sustainable solution to all the environmental, economic and social challenges caused by the linear economic system. Hence, this empirical research aims to analyse, next to the environmental and economic dimension, also explicitly the social dimension of a sustainable circular business model. This inductive and explorative approach applies the single case study method. A multi-stakeholder view is adopted to shed light on social aspects of the circular business model. Different stakeholder views, tensions between stakeholders and conflicts of interest are detected. In semi-structured interviews with different stakeholders of the company, this study compares the different stakeholder views to profile the success factors of its business model in terms of sustainability implementation and to detect its shortcomings. These findings result in the development of propositions which cover different social aspects of sustainable circular business model implementation. This study is an answer to calls for future empirical research about the social dimension of the circular economy and contributes to sustainable business model thinking in entrepreneurial contexts of the circular economy. It helps identifying all relevant stakeholders and their needs to successfully and inclusively implement a sustainable circular business model. The method of a single case study has some limitations by nature as it only covers one enterprise with its special business model. Therefore, more empirical studies are needed to research sustainable circular business models from multiple stakeholder perspectives, in different countries and industries. Future research can build upon the developed propositions of this study and develop hypotheses to be tested.

Keywords: circular economy, single case study, social dimension, sustainable circular business model

Procedia PDF Downloads 134
4947 Perspectives on the Role of Stakeholder Engagement and Community Participation in River Basin Management in South Africa: A Study of the Hennops River

Authors: Lucien N. James, Mulala D. Simatele

Abstract:

As a country that already faces hydrological and climatological challenges, South Africa’s socio-economic situation only complicates water resource management. This is observable through the state of rivers in the Gauteng Province such as the Hennops and Jukskei which are plagued by pollution from surrounding urban areas. While communities in the Hennops River basin contribute to its degradation, their potential in improved water resource management strategies is yet to be established. Therefore, the aim of this study was to investigate the myriad of ways in which stakeholder and community engagement, mobilisation, as well as participation can be harnessed in contested urban spaces to facilitate a sustainable management system for river basins. Through meetings, clean-up campaigns, and a community workshop, the community of Tembisa and several key informants were engaged. The role of communities and their perceptions on an integrated and participatory approach to solving the Hennops River basin’s current pollution crisis were therefore explored. The findings of this study suggest that meaningful participation is tied to the level of awareness within communities as well as the amount of support attributed to active involvement through the initiatives of stakeholders such as NonGovernmental Organisations. For meaningful participation to take place, more needs to be done to shift communities away from a “bystander” position to a more active role. An approach to community engagement is therefore proposed arguing for the further support of stakeholder-driven initiatives and the raising of awareness around environmental challenges in poorer communities. The findings of this study demonstrate the value of engagement with stakeholders and communities, highlighting ways through which better water management and environmental governance can be achieved in South Africa.

Keywords: community participation, integrated water resource management, river basin management, stakeholder engagement

Procedia PDF Downloads 57
4946 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 613
4945 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 419
4944 A Social Network Analysis of the Palestinian Feminist Network Tal3at

Authors: Maath M. Musleh

Abstract:

This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.

Keywords: feminism, Palestine, social network analysis, Tal3at

Procedia PDF Downloads 220
4943 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 397
4942 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: all-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk

Procedia PDF Downloads 426
4941 Collaboration with Governmental Stakeholders in Positioning Reputation on Value

Authors: Zeynep Genel

Abstract:

The concept of reputation in corporate development comes to the fore as one of the most frequently discussed topics in recent years. Many organizations, which make worldwide investments, make effort in order to adapt themselves to the topics within the scope of this concept and to promote the name of the organization through the values that might become prominent. The stakeholder groups are considered as the most important actors determining the reputation. Even, the effect of stakeholders is not evaluated as a direct factor; it is signed as indirect effects of their perception are a very strong on ultimate reputation. It is foreseen that the parallelism between the projected reputation and the perceived c reputation, which is established as a result of communication experiences perceived by the stakeholders, has an important effect on achieving these objectives. In assessing the efficiency of these efforts, the opinions of stakeholders are widely utilized. In other words, the projected reputation, in which the positive and/or negative reflections of corporate communication play effective role, is measured through how the stakeholders perceptively position the organization. From this perspective, it is thought that the interaction and cooperation of corporate communication professionals with different stakeholder groups during the reputation positioning efforts play significant role in achieving the targeted reputation or in sustainability of this value. The governmental stakeholders having intense communication with mass stakeholder groups are within the most effective stakeholder groups of organization. The most important reason of this is that the organizations, regarding which the governmental stakeholders have positive perception, inspire more confidence to the mass stakeholders. At this point, the organizations carrying out joint projects with governmental stakeholders in parallel with sustainable communication approach come to the fore as the organizations having strong reputation, whereas the reputation of organizations, which fall behind in this regard or which cannot establish the efficiency from this aspect, is thought to be perceived as weak. Similarly, the social responsibility campaigns, in which the governmental stakeholders are involved and which play efficient role in strengthening the reputation, are thought to draw more attention. From this perspective, the role and effect of governmental stakeholders on the reputation positioning is discussed in this study. In parallel with this objective, it is aimed to reveal perspectives of seven governmental stakeholders towards the cooperation in reputation positioning. The sample group representing the governmental stakeholders is examined under the lights of results obtained from in-depth interviews with the executives of different ministries. It is asserted that this study, which aims to express the importance of stakeholder participation in corporate reputation positioning especially in Turkey and the effective role of governmental stakeholders in strong reputation, might provide a new perspective on measuring the corporate reputation, as well as establishing an important source to contribute to the studies in both academic and practical domains.

Keywords: collaborative communications, reputation management, stakeholder engagement, ultimate reputation

Procedia PDF Downloads 196
4940 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 702
4939 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 165
4938 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 394
4937 The Role of Businesses in Peacebuilding in Nigeria: A Stakeholder Approach

Authors: Jamila Mohammed Makarfi, Yontem Sonmez

Abstract:

Developing countries like Nigeria have recently been affected by conflicts characterized by violence, high levels of risk and insecurity, resulting in loss of lives, livelihoods, displacement of communities, degradation of health, educational and social infrastructure as well as economic underdevelopment. The Nigerian government’s response to most of these conflicts has mainly been reactionary in the form of military deployments, as against precautionary to prevent or address the root causes of the conflicts. Several studies have shown that at various points of a conflict, conflict regions can benefit from the resources and expertise available outside the government, mainly from the private sector through mechanisms such as corporate social responsibility (CSR) by businesses. The main aim of this study is to examine the role of businesses in peacebuilding in Northern Nigeria through CSR in the last decade. The expected contributions from this will answer research questions, such as the key business motivations to engage in peacebuilding, as well as the degree of influence exerted from various stakeholder groups on the business decision to engage. The methodology of the study adopts a multiple case study of over 120 businesses of various sizes, ranging from small, medium and large-scale. A mixed method enabled the collection of quantitative and qualitative primary data to augment the secondary data. The results indicated that the most important business motivations to engage in peacebuilding were the negative effects of the conflict on economic stability, as well as stakeholder-driven motives. On the other hand, out of the 12 identified stakeholders, micro-, small- and medium-scale enterprises (MSMEs) considered the chief executive officer’s interest to be the most important factor, while large companies rated the government and community pressure as the highest. Overall, the foreign stakeholders scored low on the influence chart for all business types.

Keywords: conflict, corporate social responsibility, peacebuilding, stakeholder

Procedia PDF Downloads 186
4936 Network Automation in Lab Deployment Using Ansible and Python

Authors: V. Andal Priyadharshini, Anumalasetty Yashwanth Nath

Abstract:

Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment.

Keywords: Python network automation, Ansible configuration, container lab deployment, software-defined networking, networking lab

Procedia PDF Downloads 133
4935 CSR Communication Strategies: Stakeholder and Institutional Theories Perspective

Authors: Stephanie Gracelyn Rahaman, Chew Yin Teng, Manjit Singh Sandhu

Abstract:

Corporate scandals have made stakeholders apprehensive of large companies and expect greater transparency in CSR matters. However, companies find it challenging to strategically communicate CSR to intended stakeholders and in the process may fall short on maximizing on CSR efforts. Given that stakeholders have the ability to either reward good companies or take legal action or boycott against corporate brands who do not act socially responsible, companies must create shared understanding of their CSR activities. As a result, communication has become a strategy for many companies to demonstrate CSR engagement and to minimize stakeholder skepticism. The main objective of this research is to examine the types of CSR communication strategies and predictors that guide CSR communication strategies. Employing Morsing & Schultz’s guide on CSR communication strategies, the study integrates stakeholder and institutional theory to develop a conceptual framework. The conceptual framework hypothesized that stakeholder (instrumental and normative) and institutional (regulatory environment, nature of business, mimetic intention, CSR focus and corporate objectives) dimensions would drive CSR communication strategies. Preliminary findings from semi-structured interviews in Malaysia are consistent with the conceptual model in that stakeholder and institutional expectations guide CSR communication strategies. Findings show that most companies use two-way communication strategies. Companies that identified employees, the public or customers as key stakeholders have started to embrace social media to be in-sync with new trends of communication. This is especially with the Gen Y which is their priority. Some companies creatively use multiple communication channels because they recognize different stakeholders favor different communication channels. Therefore, it appears that companies use two-way communication strategies to complement the perceived limitation of one-way communication strategies as some companies prefer a more interactive platform to strategically engage stakeholders in CSR communication. In addition to stakeholders, institutional expectations also play a vital role in influencing CSR communication. Due to industry peer pressures, corporate objectives (attract international investors and customers), companies may be more driven to excel in social performance. For these reasons companies tend to go beyond the basic mandatory requirement, excel in CSR activities and be known as companies that champion CSR. In conclusion, companies use more two-way than one-way communication and companies use a combination of one and two-way communication to target different stakeholders resulting from stakeholder and institutional dimensions. Finally, in order to find out if the conceptual framework actually fits the Malaysian context, companies’ responses for expected organizational outcomes from communicating CSR were gathered from the interview transcripts. Thereafter, findings are presented to show some of the key organizational outcomes (visibility and brand recognition, portray responsible image, attract prospective employees, positive word-of-mouth, etc.) that companies in Malaysia expect from CSR communication. Based on these findings the conceptual framework has been refined to show the new identified organizational outcomes.

Keywords: CSR communication, CSR communication strategies, stakeholder theory, institutional theory, conceptual framework, Malaysia

Procedia PDF Downloads 262
4934 Using Mixed Methods in Studying Classroom Social Network Dynamics

Authors: Nashrawan Naser Taha, Andrew M. Cox

Abstract:

In a multi-cultural learning context, where ties are weak and dynamic, combining qualitative with quantitative research methods may be more effective. Such a combination may also allow us to answer different types of question, such as about people’s perception of the network. In this study the use of observation, interviews and photos were explored as ways of enhancing data from social network questionnaires. Integrating all of these methods was found to enhance the quality of data collected and its accuracy, also providing a richer story of the network dynamics and the factors that shaped these changes over time.

Keywords: mixed methods, social network analysis, multi-cultural learning, social network dynamics

Procedia PDF Downloads 487
4933 Increasing of Resiliency by Using Gas Storage in Iranian Gas Network

Authors: Mohsen Dourandish

Abstract:

Iran has a huge pipeline network in every state of country which is the longest and vastest pipeline network after Russia and USA (360,000 Km high pressure pipelines and 250,000 Km distribution networks). Furthermore in recent years National Iranian Gas Company is planning to develop natural gas network to cover all cities and villages above 20 families, in a way that 97 percent of Iran population will be gas consumer by 2020. In this condition, network resiliency will be the first priority of NIGC and due to that several planning for increasing resiliency of gas network is under construction. The most important strategy of NIGC is converting tree form pattern network to loop gas networks and developing underground gas storage near main gas consuming centers. In this regard NIGC is planning for construction of over 3500 km high-pressure pipeline and also 10 TCM gas storage capacities in UGSs.

Keywords: Iranian gas network, peak shaving, resiliency, underground gas storage

Procedia PDF Downloads 296
4932 Decentralization and Participatory Approach in the Cultural Heritage Management in Local Thailand

Authors: Amorn Kritsanaphan

Abstract:

This paper illustrates the decentralization of cultural heritage management in local Thailand, a place similar to other middle- income developing countries characterized by rapid tourism-industrialization, weakness formal state institutions and procedures, and intensity use of the cultural heritage resources. The author conducted field research in local Thailand, principally using qualitative primary data gathering. These were combined with records reviews and content analysis of documents. The author also attended local public meetings, and social activities, and interacted casually with local residents and governments. Cultural heritage management has been supposed to improve through multi-stakeholder participation and decentralization. However, processes and outcomes are far from being straightforward and depend on a variety of contingencies and contexts involved. Multi-stakeholder and participatory approach in decentralization of the cultural heritage management in Thailand have pushed to the forefront and sharpened a number of existing problems. However, under the decentralization, the most significant contribution has been in creating real political space where various local stakeholders have become active, respond and address their concerns in various ways vis-à-vis cultural heritage problems. Improving cultural heritage sustainability and viability of local livelihoods through decentralization and participatory approach is by no means certain. However, the shift instead creates spaces potent with possibilities for a meaningful and constructive engagement between and among local state and non-state actors that can lead to synergies and positive outcomes.

Keywords: decentralization, participatory approach, cultural heritage management, multi-stakeholder approach

Procedia PDF Downloads 119
4931 Dual-Network Memory Model for Temporal Sequences

Authors: Motonobu Hattori

Abstract:

In neural networks, when new patters are learned by a network, they radically interfere with previously stored patterns. This drawback is called catastrophic forgetting. We have already proposed a biologically inspired dual-network memory model which can much reduce this forgetting for static patterns. In this model, information is first stored in the hippocampal network, and thereafter, it is transferred to the neocortical network using pseudo patterns. Because, temporal sequence learning is more important than static pattern learning in the real world, in this study, we improve our conventional dual-network memory model so that it can deal with temporal sequences without catastrophic forgetting. The computer simulation results show the effectiveness of the proposed dual-network memory model.

Keywords: catastrophic forgetting, dual-network, temporal sequences, hippocampal

Procedia PDF Downloads 239
4930 Integrating Knowledge Distillation of Multiple Strategies

Authors: Min Jindong, Wang Mingxia

Abstract:

With the widespread use of artificial intelligence in life, computer vision, especially deep convolutional neural network models, has developed rapidly. With the increase of the complexity of the real visual target detection task and the improvement of the recognition accuracy, the target detection network model is also very large. The huge deep neural network model is not conducive to deployment on edge devices with limited resources, and the timeliness of network model inference is poor. In this paper, knowledge distillation is used to compress the huge and complex deep neural network model, and the knowledge contained in the complex network model is comprehensively transferred to another lightweight network model. Different from traditional knowledge distillation methods, we propose a novel knowledge distillation that incorporates multi-faceted features, called M-KD. In this paper, when training and optimizing the deep neural network model for target detection, the knowledge of the soft target output of the teacher network in knowledge distillation, the relationship between the layers of the teacher network and the feature attention map of the hidden layer of the teacher network are transferred to the student network as all knowledge. in the model. At the same time, we also introduce an intermediate transition layer, that is, an intermediate guidance layer, between the teacher network and the student network to make up for the huge difference between the teacher network and the student network. Finally, this paper adds an exploration module to the traditional knowledge distillation teacher-student network model. The student network model not only inherits the knowledge of the teacher network but also explores some new knowledge and characteristics. Comprehensive experiments in this paper using different distillation parameter configurations across multiple datasets and convolutional neural network models demonstrate that our proposed new network model achieves substantial improvements in speed and accuracy performance.

Keywords: object detection, knowledge distillation, convolutional network, model compression

Procedia PDF Downloads 248
4929 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 371