Search results for: security culture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6028

Search results for: security culture

5938 The Role of Parents in Teaching Entrepreneurship Culture to Their Children in Family Businesses

Authors: Ahmet Diken, Meral Erdirençelebi

Abstract:

Similar to economies in many countries; family-owned enterprises have a significant role in the development of Turkish economy. Although they have a large share in economic terms, their lifetime is limited to working life of their founders. Failure in achieving their sustainability deeply affects not only these businesses but also the economy. Therefore, two basic elements of family owned enterprises, family and organizational culture and especially entrepreneurship culture, should be examined closely. The degree of effectiveness of parents in instilling their children with entrepreneurship culture and their effects on children's profession choices are examined through face-to-face surveys with the managers owning family businesses randomly chosen among family-owned enterprises registered in Konya Chamber of Industry, which are active in specific sectors and which had different generations in their management.

Keywords: family businesses, entrepreneurship, entrepreneurial culture, family culture

Procedia PDF Downloads 458
5937 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 103
5936 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 466
5935 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 132
5934 The Interpretation of World Order by Epistemic Communities in Security Studies

Authors: Gabriel A. Orozco

Abstract:

The purpose of this article is to make an approach to the Security Studies, exposing their theories and concepts to understand the role that have had in the interpretation of the changes and continuities of the world order and their impact on policies or decision-making facing the problems of the 21st century. The aim is to build a bridge between the security studies as a subfield and the meaning that has been given to the world order. The idea of epistemic communities serves as a methodological proposal about the different programs of research in security studies, showing their influence in the realities of States, intergovernmental organizations and transnational forces, moving to implement, perpetuate and project a vision of the world order.

Keywords: security studies, epistemic communities, international, relations

Procedia PDF Downloads 242
5933 Culture of Manager of a Medium or Small Enterprises

Authors: Omar Bendjimaa, Karzabi Abdelatif

Abstract:

Small and medium enterprises have witnessed several developments in recent years thanks to the policies and programs of support given by the state, and that is due to their importance in local and national development. Nevertheless, the success and development of these firms depends on a number of factors, especially the human element, for instance, the culture of the manager has its origin in the culture of the community and is of crucial influence in these firms. In fact, this culture is nothing more than a set of values, perceptions, beliefs, symbols and practices repeated, in addition to the knowledge it has received from the readings and the modern means of education. All these factors have an impact on the effectiveness of governance, its resolutions, instructions and performance of its function as a manager of a medium or small enterprise is inevitably affected by these cultural values, it is the driving force, the leader, and the observer at the same time.

Keywords: small and medium enterprises, the culture of the manager, the culture of the community, values, perceptions, beliefs, symbols, performance

Procedia PDF Downloads 353
5932 English as a Foreign Language Students’ Perceptions towards the British Culture: The Case of Batna 2 University, Algeria

Authors: Djelloul Nedjai

Abstract:

The issue of cultural awareness triggers many controversies, especially in a context where individuals do not share the same cultural backgrounds and characteristics. The Algerian context is no exception. It has been widely documented by the literature that culture remains essential in many domains. In higher education, for instance, culture plays a pivotal role in shaping individuals’ perceptions and attitudes. Henceforth, the current paper attempts to look at the perceptions of the British culture held by students engaged in learning English as a Foreign Language (EFL) at the department of English at Banta 2 University, Algeria. It also inquires into EFL students’ perceptions of British culture. To address the aforementioned research queries, a descriptive study has been carried out wherein a questionnaire of fifteen (15) items has been deployed to collect students’ attitudes and perceptions toward British culture. Results showcase that, indeed, EFL students of the department of English at Banta 2 University hold both positive and negative perceptions towards British culture at different levels. The explanation could relate to the student's lack of acquaintance with and awareness of British culture. Consequently, this paper is an attempt to address the issue of cultural awareness from the perspective of EFL students.

Keywords: British culture, cultural awareness, EFL students’ perceptions, higher education

Procedia PDF Downloads 54
5931 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 74
5930 Implications of Private Military Security Companies on Stewardship of the Profession of Arms

Authors: Kevin Krupski

Abstract:

Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.

Keywords: stewardship, military profession, civil-military, security

Procedia PDF Downloads 220
5929 The Effect of the Cultural Constraint on the Reform of Corporate Governance: The Observation of Taiwan's Efforts to Transform Its Corporate Governance

Authors: Yuanyi (Richard) Fang

Abstract:

Under the theory of La Porta, Lopez-de-Silanes, Shleifer, and Vishny, if a country can increase its legal protections for minority shareholders, the country can develop an ideal securities market that only arises under the dispersed ownership corporate governance. However, the path-dependence scholarship, such as Lucian Arye Bebchuk and Mark J. Roe, presented a different view with LLS&V. They pointed out that the initial framework of the ownership structure and traditional culture will prevent the change of the corporate governance structure through legal reform. This paper contends that traditional culture factors as an important aspect when forming the corporate governance structure. However, it is not impossible for the government to change its traditional corporate governance structure and traditional culture because the culture does not remain intact. Culture evolves with time. The occurrence of the important events will affect the people’s psychological process. The psychological process affects the evolution of culture. The new cultural norms can help defeat the force of the traditional culture and the resistance from the initial corporate ownership structure. Using Taiwan as an example, through analyzing the historical background, related corporate rules and the reactions of adoption new rules from the media, this paper try to show that Taiwan’s culture norms do not remain intact and have changed with time. It further provides that the culture is not always the hurdle for the adoption of the dispersed ownership corporate governance structure as the culture can change. A new culture can provide strong support for the adoption of the new corporate governance structure.

Keywords: LLS&V theory, corporate governance, culture, path–dependent theory

Procedia PDF Downloads 446
5928 Recent Advances of Isolated Microspore Culture Response in Durum Wheat

Authors: Zelikha Labbani

Abstract:

Many biotechnology methods have been used in plant breeding programs. The in vitro isolated microspore culture is the one of these methods. For durum wheat, the use of this technology has been limited for a long time due to the low number of embryos produced and also most regeneration plants are albina. The objective of this paper is to show that using isolated microspores culture on durum wheat is possible due to the development of the new methods using the new pretreatment of the microspores before their isolation and cultivation.

Keywords: isolated microspore culture, pretreatments, in vitro embryogenesis, plant breeding program

Procedia PDF Downloads 502
5927 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 202
5926 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 159
5925 Comparison Analysis on the Safety Culture between the Executives and the Operators: Case Study in the Aircraft Manufacturer in Taiwan

Authors: Wen-Chen Hwang, Yu-Hsi Yuan

Abstract:

According to the estimation made by researchers of safety and hygiene, 80% to 90% of workplace accidents in enterprises could be attributed to human factors. Nevertheless, human factors are not the only cause for accidents; instead, happening of accidents is also closely associated with the safety culture of the organization. Therefore, the most effective way of reducing accident rate would be to improve the social and the organizational factors that influence organization’s safety performance. Overview the present study is to understand the current level of safety culture in manufacturing enterprises. A tool for evaluating safety culture matching the needs and characteristics of manufacturing enterprises was developed by reviewing literature of safety culture, and taking the special backgrounds of the case enterprises into consideration. Expert validity was also implied for developing the questionnaire. Moreover, safety culture assessment was conducted through the practical investigation of the case enterprises. Total 505 samples were involved, 53 were executives and 452 were operators. The result of this study in comparison of the safety culture level between the executives and the operators was reached the significant level in 8 dimensions: Safety Commitment, Safety System, Safety Training, Safety Involvement, Reward and Motivation, Communication and Reporting, Leadership and Supervision, Learning and Changing. In general, the overall safety culture were executive level higher than operators level (M: 74.98 > 69.08; t=2.87; p < 0.01).

Keywords: questionnaire survey, safety culture, t-test, media studies

Procedia PDF Downloads 283
5924 The Enquiry of Food Culture Products, Practices and Perspectives: An Action Research on Teaching and Learning Food Culture from International Food Documentary Films

Authors: Tsuiping Chen

Abstract:

It has always been an international consensus that food forms a big part of any culture since the old times. However, this idea has not been globally concretized until the announcement of including food or cuisine as intangible cultural heritage by UNESCO in 2010. This announcement strengthens the value of food culture, which is getting more and more notice by every country. Although Taiwan is not one of the members of the United Nations, we cannot detach ourselves from this important global trend, especially when we have a lot of culinary students expected to join the world culinary job market. These students should have been well educated with the knowledge of world food culture to make them have the sensibility and perspectives for the occurring global food issues before joining the culinary jobs. Under the premise of the above concern, the researcher and also the instructor took on action research with one class of students in the 'Food Culture' course watching, discussing, and analyzing 12 culinary documentary films selected from one decade’s (2007-2016) of Berlin Culinary Cinema in one semester of class hours. In addition, after class, the students separated themselves into six groups and joined 12 times of one-hour-long focus group discussion on the 12 films conducted by the researcher. Furthermore, during the semester, the students submitted their reflection reports on each film to the university e-portfolio system. All the focus discussions and reflection reports were recorded and collected for further analysis by the researcher and one invited film researcher. Glaser and Strauss’ Grounded Theory (1967) constant comparison method was employed to analyze the collected data. Finally, the findings' results were audited by all participants of the research. All the participants and the researchers created 200 items of food culture products, 74 items of food culture practices, and 50 items of food culture perspectives from the action research journey through watching culinary documentaries. The journey did broaden students’ points of view on world food culture and enhance their capability on perspective construction for food culture. Four aspects of significant findings were demonstrated. First, learning food culture through watching Berlin culinary films helps students link themselves to the happening global food issues such as food security, food poverty, and food sovereignty, which direct them to rethink how people should grow, share and consume food. Second, watching different categories of documentary food films enhances students’ strong sense of responsibility for ensuring healthy lives and promoting well-being for all people in every corner of the world. Third, watching these documentary films encourages students to think if the culinary education they have accepted in this island is inclusive and the importance of quality education, which can promote lifelong learning. Last but not least, the journey of the culinary documentary film watching in the 'Food Culture' course inspires students to take pride in their profession. It is hoped the model of teaching food culture with culinary documentary films will inspire more food culture educators, researchers, and the culinary curriculum designers.

Keywords: food culture, action research, culinary documentary films, food culture products, practices, perspectives

Procedia PDF Downloads 83
5923 Civility in Indonesia: Comparison of Indonesian People's Friendliness with the Past

Authors: Abshari Nabilah Fiqi, Sekar Ayu Dian Kusumaningtyas, Amira Eka Pratiwi

Abstract:

Since a very long time ago, Indonesia are well known for their hospitality. Hospitality has been one of the civility concepts that represented Indonesia’s culture. However, as an Indonesian, we found that nowadays we are starting to lose this particular culture. The influence of modern culture is undeniably strong. As a capital city, Jakarta is one of the most modern cities in Indonesia. We conduct this experimental study to find out whether the people in Jakarta are still willing to maintain their identity as a friendly Indonesian or not by testing their willingness to reply greetings from strangers.

Keywords: city, civility, culture, greetings, hospitality, modern

Procedia PDF Downloads 450
5922 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 234
5921 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.

Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security

Procedia PDF Downloads 136
5920 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 777
5919 The Relationship between Organizational Culture and Application of Management Accounting Innovation: Evidence from Iran

Authors: Zohreh Hajiha

Abstract:

Culture affects the ability of the organization in expressing and achieving the goals. Organizational culture influences the selection of instruments applied in the management of organizations. All the instruments applied in organizations to control, promote and create innovations are influenced by organizational culture. This research studies organizational culture based on the cultural model of Muijen and its relationship with applying management accounting innovations in Iranian listed firms. Management accounting innovations of this study include activity-based costing, activity-based management, balanced scorecard, target costing, standard costing, quality costing, Kaizen costing and dimensions of organizational culture include support orientation, innovation orientation, rules orientation and goal orientation. 105 questionnaires were sent to financial executives of production companies and 73 questionnaires were returned. The findings show that there is a significant difference between organizational culture of firms that have applied management accounting innovations and those which have used these innovations less. Also, dimensions of support orientation and culture goal orientation are the highest in groups that apply management accounting innovations. The findings suggest that proper organization culture could promote the use od management accounting tools in Iranian firms.

Keywords: organizational culture, innovation, management accounting, muijen model

Procedia PDF Downloads 332
5918 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 475
5917 Leadership Style and Organizational Culture on Unethical Work Behaviour among Employees

Authors: Ojo Adeshina Akinwumi

Abstract:

This study investigated leadership style and organizational culture as predictors of unethical work behaviour among employees in corporate organizations. This study adopted an expo facto research design. Two Hundred and Seventy-Four (274) employees (149 males, 125 females) sampled from the organization participated in the study. Their ages ranged from 19 to 65, with a mean of 36.36 years and a standard deviation of 10.43. Unethical Work Behaviour was measured using Unethical Work Behaviour Scale (UWBC), Organizational Culture was measured using Organizational Culture Scale, (and OCS and Leadership Styles were measured using Multifactor Leadership Questionnaire (LSMLQ). Two hypotheses were formulated and tested using Pearson Product Moment Correlation and Multiple Regressions Analysis. Results indicated that leadership styles had no significant relationship with unethical work behaviour (r(274)=.09;>0.05). However, organizational culture had a significant relationship with unethical work behaviour (r(274)=.15;p,0.05). Lastly, leadership style and organizational culture jointly predicted unethical work behaviour among employees. [F (2, 273) =3.65, p<0.05). Findings from this study were discussed in line with existing literature. It was also recommended that leadership styles and organizational culture should be improved upon in order to reduce unethical work behaviour by employees.

Keywords: leadership style, organizational culture, unethical work behavior, employees in corporate organisations in Nigeria

Procedia PDF Downloads 74
5916 Formation of Convergence Culture in the Framework of Conventional Media and New Media

Authors: Berkay Buluş, Aytekin İşman, Kübra Yüzüncüyıl

Abstract:

Developments in media and communication technologies have changed the way we use media. The importance of convergence culture has been increasing day by day within the framework of these developments. With new media, it is possible to say that social networks are the most powerful platforms that are integrated to this digitalization process. Although social networks seem like the place that people can socialize, they can also be utilized as places of production. On the other hand, audience has become users within the framework of transformation from national to global broadcasting. User generated contents make conventional media and new media collide. In this study, these communication platforms will be examined not as platforms that replace one another but mediums that unify each other. In the light of this information, information that is produced by users regarding new media platforms and all new media use practices are called convergence culture. In other words, convergence culture means intersections of conventional and new media. In this study, examples of convergence culture will be analyzed in detail.

Keywords: new media, convergence culture, convergence, use of new media, user generated content

Procedia PDF Downloads 239
5915 Adding Security Blocks to the DevOps Lifecycle

Authors: Andrew John Zeller, Francis Pouatcha

Abstract:

Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.

Keywords: information security, data security, cybersecurity, devOps, IT management

Procedia PDF Downloads 70
5914 The Effects of Cross-Border Use of Drones in Nigerian National Security

Authors: H. P. Kerry

Abstract:

Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.

Keywords: armed drones, drones, cross-border, national security

Procedia PDF Downloads 130
5913 The Effect of the Marketing Culture on Improving the E-service Quality: A Comparative Study of Foreign and Domestic Information Technology Companies in the Arab Republic of Egypt

Authors: E. Elgohary, R. Abdelazyz

Abstract:

The research aims to clarify the effect of the marketing culture on improving the e-service quality for foreign and domestic information technology companies in the Arab Republic of Egypt. So the researcher sought to include the dimensions of the marketing culture, which are (customer service, management style, sales mission, internal communications, technology, wages and rewards, innovation) as measures of marketing culture for its effect on improving the e-service quality in this research. The research population consists of employees and customers of the companies under study. The research problem was the following question: What is the effect of the actual application of marketing culture on improving the e-service quality? To answer that, three main hypotheses were adopted, and they were tested by statistical means for the data collected through a questionnaire prepared and distributed for this purpose. Accordingly, the research presented a set of results, the most important of which are: the need to pay attention to the dimensions of the marketing culture to improve the e-service quality, foreign companies were the most popular companies in applying the marketing culture compared to local companies. The research also recommends designing a system to continuously measure the performance of electronic service providers and work on spreading the culture of innovation among employees, linking reward programs to the extent of commitment to applying the elements of marketing culture while doing business.

Keywords: marketing culture, e-service quality, measurement models, quality measurements

Procedia PDF Downloads 183
5912 Renewable Energy and Energy Security in Malaysia: A Quantitative Analysis

Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet

Abstract:

Robust economic growth, increasing population, and personal consumption are the main drivers for the rapid increase of energy demand in Malaysia. Increasing demand has compounded the issue of national energy security due to over-dependence on fossil fuel, depleting indigenous domestic conventional energy resources which in turns has increased the country’s energy import dependence. In order to improve its energy security, Malaysia has seriously embarked on a renewable energy journey. Many initiatives on renewable energy have been introduced in the past decade. These strategies have resulted in the exploding growth of renewable energy deployment in Malaysia. Therefore, this study investigated the impact of renewable energy deployment on energy security. Secondary data was used to calculate the energy security indicators. The study also compared the results of applying different energy security indicators namely availability, applicability, affordability and acceptability dimension of energy resources. The evaluation shows that Malaysia will experience slight improvement in availability and acceptability dimension of energy security. This study suggests that energy security level could be further enhanced by efficient utilization of energy, reducing carbon content of energy and facilitating low-carbon industries.

Keywords: energy policy, energy security, Malaysia, renewable energy

Procedia PDF Downloads 208
5911 Comparative Study of Globalization and Homogenous Society: South Korea and Greek Society Reaction to Foreign Culture

Authors: Putri Mentari Racharjo

Abstract:

The development of current technology is simplifying globalization process. An easier globalization process and mobilization are increasing interactions among individuals and societies in different countries. It is also easier for foreign culture to enter a country and create changes to the society. Differences brought by foreign culture will most likely affect any society. It will be easier for heterogeneous society to accept new culture, considering that they have various cultures, and they are used to differences. So it will be easier for a heterogeneous society to accept new culture as long as the culture is not contrary to their essential values. However for a homogenous society, where they have only one language and culture, it will take a longer adjustment time to fully accept the new culture. There will be a tendency for homogenous societies to react in a more negative way to new culture. Greece and South Korea are the examples for homogeneous societies. Greece, a destination country for immigrants, is having a hard time adjusting themselves to accept many immigrants with many cultures. There are various discrimination cases of immigrants in Greece, when the Greek society cannot fully accept the new culture brought by immigrants. South Korea, a newly popular country with K-pop and K-dramas, is attracting people from all over the world to come to South Korea. However a homogenous South Korean society is also having a hard time to fully accept foreign cultures, resulting in many discrimination cases based on race and culture in South Korea. With a qualitative method through a case study and literature review, this article will discuss about Greek and South Korean societies reaction to new cultures as an effect of globalization.

Keywords: foreign culture, globalization, greece, homogenous society, South Korea

Procedia PDF Downloads 308
5910 Effect of Interaction between Different Concentrations of Colchicine, Time Duration and Two Verities of Crepis capillaris on Chromosome Polyploidy in vitro Culture

Authors: Mosleh M. S. Duhoky, Payman A. A. Zibari

Abstract:

These experiments were conducted at Tissue Culture Laboratory/ Faculty of Agriculture and Forestry/ University of Duhok during the period from January 2011 to May 2013. The objectives of this study were to study the effects of interaction between three different factors on percentage of polyploidy of Crepis capillaris by using Tissue culture technology. Concerning the data it is obvious that shaking of Crepis capillaris with 2B chromosome with 0.15 mM for ten days inscribed a high percentage of polyploidy within most fifteen passages.

Keywords: crepis capillaris, 2B chromosome, tissue culture, polyploidy

Procedia PDF Downloads 318
5909 The Analysis of Indian Culture through the Lexicographical Discourse of Hindi-French Dictionary

Authors: Tanzil Ansari

Abstract:

A dictionary is often considered as a list of words, arranged in alphabetical orders, providing information on a language or languages and it informs us about the spelling, the pronunciation, the origin, the gender and the grammatical functions of new and unknown words. In other words, it is first and foremost a linguistic tool. But, the research across the world in the field of linguistic and lexicography proved that a dictionary is not only a linguistic tool but also a cultural product through which a lexicographer transmits the culture of a country or a linguistic community from his or her ideology. It means, a dictionary does not present only language and its metalinguistic functions but also its culture. Every language consists of some words and expressions which depict the culture of its language. In this way, it is impossible to disassociate language from its culture. There is always an ideology that plays an important role in the depiction of any culture. Using the orientalism theory of Edward Said to represent the east, the objective of the present research is to study the representation of Indian culture through the lexicographical discourse of Hindi-French Dictionary of Federica Boschetti, a French lexicographer. The results show that the Indian culture is stereotypical and monolithic. It also shows India as male oriented country where women are exploited by male-dominated society. The study is focused on Hindi-French dictionary, but its line of argument can be compared to dictionaries produced in other languages.

Keywords: culture, dictionary, lexicographical discourse, stereotype image

Procedia PDF Downloads 273