Search results for: shared value
1006 The Impact of Shared Culture, Trust and Information Exchange on Satisfaction and Financial Performance: Moderating Effects of Supply Chain Dependence
Authors: Hung Nguyen, Norma Harrison
Abstract:
This paper examines the role supply chain dependence as contingency factors which affect the effectiveness of different critical factors (in terms trust, information exchange and shared culture) in delivering supply chain satisfaction and financial performance. Using the data of 468 manufacturing firms in the Global Manufacturing Research Group, this study shows that supply chain dependence strengthens the positive relationship between shared culture & vision and supply chain satisfaction while dampens the relationship between trust and satisfaction. The study also demonstrates the direct positive effect of satisfaction on financial performance. Supply chain managers were advised to emphasize on the alignments of common understanding, codes, languages, common shared vision and similar cultures.Keywords: information exchange, shared culture, satisfaction, supply chain dependence
Procedia PDF Downloads 3841005 The Relevance of Shared Cultural Leadership in the Survival of the Language and of the Francophone Culture in a Minority Language Environment
Authors: Lyne Chantal Boudreau, Claudine Auger, Arline Laforest
Abstract:
As an English-speaking country, Canada faces challenges in French-language education. During both editions of a provincial congress on education planned and conducted under shared cultural leadership, three organizers created a Francophone space where, for the first time in the province of New Brunswick (the only officially bilingual province in Canada), a group of stakeholders from the school, post-secondary and community sectors have succeeded in contributing to reflections on specific topics by sharing winning practices to meet the challenges of learning in a minority Francophone environment. Shared cultural leadership is a hybrid between theories of leadership styles in minority communities and theories of shared leadership. Through shared cultural leadership, the goal is simply to guide leadership and to set up all minority leaderships in minority context through shared leadership. This leadership style requires leaders to transition from a hierarchical to a horizontal approach, that is, to an approach where each individual is at the same level. In this exploratory research, it has been demonstrated that shared leadership exercised under the T-learning model best fosters the mobilization of all partners in advancing in-depth knowledge in a particular field while simultaneously allowing learning of the elements related to the domain in question. This session will present how it is possible to mobilize the whole community through leaders who continually develop their knowledge and skills in their specific field but also in related fields. Leaders in this style of management associated to shared cultural leadership acquire the ability to consider solutions to problems from a holistic perspective and to develop a collective power derived from the leadership of each and everyone in a space where all are rallied to promote the ultimate advancement of society.Keywords: education, minority context, shared leadership, t-leaning
Procedia PDF Downloads 2471004 Development Process and Design Methods for Shared Spaces in Europe
Authors: Kazuyasu Yoshino, Keita Yamaguchi, Toshihiko Nishimura, Masashi Kawasaki
Abstract:
Shared Space, the planning and design concept that allows pedestrians and vehicles to coexist in a street space, has been advocated and developed according to the traffic conditions in each country in Europe. Especially in German/French-speaking countries, the "Meeting Zone," which is a traffic rule combining speed regulation (20km/h) and pedestrian priority, is often applied when designing shared spaces at intersections, squares, and streets in the city center. In this study, the process of establishment and development of the Meeting Zone in Switzerland, France, and Austria was chronologically organized based on the descriptions in the major discourse and guidelines in each country. Then, the characteristics of the spatial design were extracted by analyzing representative examples of Meeting Zone applications. Finally, the relationships between the different approaches to designing of Meeting Zone and traffic regulations in different countries were discussed.Keywords: shared space, traffic calming, meeting zone, street design
Procedia PDF Downloads 941003 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun
Abstract:
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.Keywords: cloud storage security, sharing storage, attributes, Hash algorithm
Procedia PDF Downloads 3901002 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey
Authors: Priti Kumari, Tricha Anjali
Abstract:
Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys
Procedia PDF Downloads 3641001 To Be Freed from Conformists for Better Shared Leadership
Authors: Lyne Chantal Boudreau, Claudine Auger, Arline Laforest
Abstract:
In order to meet the challenges of learning in a minority Francophone environment, three organizers created a space where a group of stakeholders from the school system and from the post-secondary and community sectors could contribute to reflections on specific educational topics by sharing winning practices. The success of this provincial congress rest on shared leadership which was intuitively used by the organizers who planned and conducted both editions. This leadership style requires leaders to transition from a hierarchical to a horizontal approach, that is, to an approach where each individual is at the same level. In this exploratory research, it has been demonstrated that this shared leadership’s success depends on the capacity of the leaders to free themselves from conformists who are found at all levels of the education system. This ability best fosters the mobilization of all education stakeholders in advancing in-depth knowledge in a particular field while simultaneously creating a sense of collective efficacy among these partners and developing the learners’ full potential. This session will present ways in which it is possible to be freed from conformists through knowing how to recognize conformism, through taking risks and through opening genuine discussions. Shared leadership revolves around a collective power derived from the leadership of each and everyone in a space where all are rallied to promote the ultimate advancement of society.Keywords: conformists, education, minority context, shared leadership
Procedia PDF Downloads 3101000 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 233999 Creating Shared Value: A Paradigm Shift from Corporate Social Responsibility to Creating Shared Value
Authors: Bolanle Deborah Motilewa, E.K. Rowland Worlu, Gbenga Mayowa Agboola, Marvellous Aghogho Chidinma Gberevbie
Abstract:
Businesses operating in the modern business world are faced with varying challenges; amongst which is the need to ensure that they are performing their societal function of being responsible in the society in which they operate. This responsibility to society is generally termed as corporate social responsibility. For many years, the practice of corporate social responsibility (CSR) was solely philanthropic, where organizations gave ‘charity’ or ‘alms’ to society, without any link to the organization’s mission and objectives. However, there has arisen a shift in the application of CSR from an act of philanthropy to a strategy with a business model engaged in by organizations to create a win-win situation of performing their societal obligation, whilst simultaneously performing their economic obligation. In more recent times, the term has moved from CSR to creating shared value, which is simply corporate policies and practices that enhance the competitiveness of a business organization while simultaneously advancing social and economic conditions in the communities in which the company operates. Creating shared value has in more recent light found more meaning in underdeveloped countries, faced with deep societal challenges that businesses can solve whilst creating economic value. This study thus reviews literature on CSR, conceptualizing the shift to creating shared value and finally viewing its potential significance in Africa’s development.Keywords: africapitalism, corporate social responsibility, development, shared value
Procedia PDF Downloads 278998 An Efficient Traceability Mechanism in the Audited Cloud Data Storage
Authors: Ramya P, Lino Abraham Varghese, S. Bose
Abstract:
By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.Keywords: data integrity, dynamic group, group signature, public auditing
Procedia PDF Downloads 392997 The Proposal of a Shared Mobility City Index to Support Investment Decision Making for Carsharing
Authors: S. Murr, S. Phillips
Abstract:
One of the biggest challenges entering a market with a carsharing or any other shared mobility (SM) service is sound investment decision-making. To support this process, the authors think that a city index evaluating different criteria is necessary. The goal of such an index is to benchmark cities along a set of external measures to answer the main two challenges: financially viability and the understanding of its specific requirements. The authors have consulted several shared mobility projects and industry experts to create such a Shared Mobility City Index (SMCI). The current proposal of the SMCI consists of 11 individual index measures: general data (demographics, geography, climate and city culture), shared mobility landscape (current SM providers, public transit options, commuting patterns and driving culture) and political vision and goals (vision of the Mayor, sustainability plan, bylaws/tenders supporting SM). To evaluate the suitability of the index, 16 cities on the East Coast of North America were selected and secondary research was conducted. The main sources of this study were census data, organisational records, independent press releases and informational websites. Only non-academic sources where used because the relevant data for the chosen cities is not published in academia. Applying the index measures to the selected cities resulted in three major findings. Firstly, density (city area divided by number of inhabitants) is not an indicator for the number of SM services offered: the city with the lowest density has five bike and carsharing options. Secondly, there is a direct correlation between commuting patterns and how many shared mobility services are offered. New York, Toronto and Washington DC have the highest public transit ridership and the most shared mobility providers. Lastly, except one, all surveyed cities support shared mobility with their sustainability plan. The current version of the shared mobility index is proving a practical tool to evaluate cities, and to understand functional, political, social and environmental considerations. More cities will have to be evaluated to refine the criteria further. However, the current version of the index can be used to assess cities on their suitability for shared mobility services and will assist investors deciding which city is a financially viable market.Keywords: carsharing, transportation, urban planning, shared mobility city index
Procedia PDF Downloads 303996 Shared Vision System Support for Maintenance Tasks of Wind Turbines
Authors: Buket Celik Ünal, Onur Ünal
Abstract:
Communication is the most challenging part of maintenance operations. Communication between expert and fieldworker is crucial for effective maintenance and this also affects the safety of the fieldworkers. To support a machine user in a remote collaborative physical task, both, a mobile and a stationary device are needed. Such a system is called a shared vision system and the system supports two people to solve a problem from different places. This system reduces the errors and provides a reliable support for qualified and less qualified users. Through this research, it was aimed to validate the effectiveness of using a shared vision system to facilitate communication between on-site workers and those issuing instructions regarding maintenance or inspection works over long distances. The system is designed with head-worn display which is called a shared vision system. As a part of this study, a substitute system is used and implemented by using a shared vision system for maintenance operation. The benefits of the use of a shared vision system are analyzed and results are adapted to the wind turbines to improve the occupational safety and health for maintenance technicians. The motivation for the research effort in this study can be summarized in the following research questions: -How can expert support technician over long distances during maintenance operation? -What are the advantages of using a shared vision system? Experience from the experiment shows that using a shared vision system is an advantage for both electrical and mechanical system failures. Results support that the shared vision system can be used for wind turbine maintenance and repair tasks. Because wind turbine generator/gearbox and the substitute system have similar failures. Electrical failures, such as voltage irregularities, wiring failures and mechanical failures, such as alignment, vibration, over-speed conditions are the common and similar failures for both. Furthermore, it was analyzed the effectiveness of the shared vision system by using a smart glasses in connection with the maintenance task performed by a substitute system under four different circumstances, namely by using a shared vision system, an audio communication, a smartphone and by yourself condition. A suitable method for determining dependencies between factors measured in Chi Square Test, and Chi Square Test for Independence measured for determining a relationship between two qualitative variables and finally Mann Whitney U Test is used to compare any two data sets. While based on this experiment, no relation was found between the results and the gender. Participants` responses confirmed that the shared vision system is efficient and helpful for maintenance operations. From the results of the research, there was a statistically significant difference in the average time taken by subjects on works using a shared vision system under the other conditions. Additionally, this study confirmed that a shared vision system provides reduction in time to diagnose and resolve maintenance issues, reduction in diagnosis errors, reduced travel costs for experts, and increased reliability in service.Keywords: communication support, maintenance and inspection tasks, occupational health and safety, shared vision system
Procedia PDF Downloads 261995 Travellers’ Innovation Segmentation for Shared Accommodation: Comparing Travellers’ Segmentation Pre- and Post-adoption in Shanghai, China
Authors: Lei Qin
Abstract:
As shared accommodation has become one of the most important market developments in the tourism industry, numerous contributions have emerged on travelers’ motivations to choose shared accommodation. A debated question, however, resides in the heterogeneity of travelers based on motivations. This paper aims to reconcile opposing perspectives by comparing motivation segmentation at two distinct phases of innovation adoption of this new hospitality option: (i) before the first travel – potential users showing interest (n=420) and (ii) after the first travel – users (n=420). Interestingly, we find that travelers (including pre-and-post adopters) have a stronger agreement in experiential motivations than practical motivations. However, the heterogeneity of motivations among travelers is significantly higher in users, increasing from two to six clusters, which means travelers cluster into more and distinct motivation groups after adoption. Rather than invalidating specific assumptions used in the literature in terms of motivation heterogeneity, this paper reconciles opposing findings by putting them along with one another in the process of innovation adoption. A subsequent tourists’ segmentation based on motivations were conducted according to their innovation adoption stages.Keywords: motivation, pre-and-post adoption, shared accommodation, segmentation
Procedia PDF Downloads 143994 The Role of Dialogue in Shared Leadership and Team Innovative Behavior Relationship
Authors: Ander Pomposo
Abstract:
Purpose: The aim of this study was to investigate the impact that dialogue has on the relationship between shared leadership and innovative behavior and the importance of dialogue in innovation. This study wants to contribute to the literature by providing theorists and researchers a better understanding of how to move forward in the studies of moderator variables in the relationship between shared leadership and team outcomes such as innovation. Methodology: A systematic review of the literature, originally adopted from the medical sciences but also used in management and leadership studies, was conducted to synthesize research in a systematic, transparent and reproducible manner. A final sample of 48 empirical studies was scientifically synthesized. Findings: Shared leadership gives a better solution to team management challenges and goes beyond the classical, hierarchical, or vertical leadership models based on the individual leader approach. One of the outcomes that emerge from shared leadership is team innovative behavior. To intensify the relationship between shared leadership and team innovative behavior, and understand when is more effective, the moderating effects of other variables in this relationship should be examined. This synthesis of the empirical studies revealed that dialogue is a moderator variable that has an impact on the relationship between shared leadership and team innovative behavior when leadership is understood as a relational process. Dialogue is an activity between at least two speech partners trying to fulfill a collective goal and is a way of living open to people and ideas through interaction. Dialogue is productive when team members engage relationally with one another. When this happens, participants are more likely to take responsibility for the tasks they are involved and for the relationships they have with others. In this relational engagement, participants are likely to establish high-quality connections with a high degree of generativity. This study suggests that organizations should facilitate the dialogue of team members in shared leadership which has a positive impact on innovation and offers a more adaptive framework for the leadership that is needed in teams working in complex work tasks. These results uncover the necessity of more research on the role that dialogue plays in contributing to important organizational outcomes such as innovation. Case studies describing both best practices and obstacles of dialogue in team innovative behavior are necessary to gain a more detailed insight into the field. It will be interesting to see how all these fields of research evolve and are implemented in dialogue practices in the organizations that use team-based structures to deal with uncertainty, fast-changing environments, globalization and increasingly complex work.Keywords: dialogue, innovation, leadership, shared leadership, team innovative behavior
Procedia PDF Downloads 182993 Wave State of Self: Findings of Synchronistic Patterns in the Collective Unconscious
Authors: R. Dimitri Halley
Abstract:
The research within Jungian Psychology presented here is on the wave state of Self. What has been discovered via shared dreaming, independently correlating dreams across dreamers, is beyond the Self stage into the deepest layer or the wave state Self: the very quantum ocean, the Self archetype is embedded in. A quantum wave or rhyming of meaning constituting synergy across several dreamers was discovered in dreams and in extensively shared dream work with small groups at a post therapy stage. Within the format of shared dreaming, we find synergy patterns beyond what Jung called the Self archetype. Jung led us up to the phase of Individuation and delivered the baton to Von Franz to work out the next synchronistic stage, here proposed as the finding of the quantum patterns making up the wave state of Self. These enfolded synchronistic patterns have been found in group format of shared dreaming of individuals approximating individuation, and the unfolding of it is carried by belief and faith. The reason for this format and operating system is because beyond therapy and of living reality, we find no science – no thinking or even awareness in the therapeutic sense – but rather a state of mental processing resembling more like that of spiritual attitude. Thinking as such is linear and cannot contain the deepest layer of Self, the quantum core of the human being. It is self reflection which is the container for the process at the wave state of Self. Observation locks us in an outside-in reactive flow from a first-person perspective and hence toward the surface we see to believe, whereas here, the direction of focus shifts to inside out/intrinsic. The operating system or language at the wave level of Self is thus belief and synchronicity. Belief has up to now been almost the sole province of organized religions but was viewed by Jung as an inherent property in the process of Individuation. The shared dreaming stage of the synchronistic patterns forms a larger story constituting a deep connectivity unfolding around individual Selves. Dreams of independent dreamers form larger patterns that come together as puzzles forming a larger story, and in this sense, this group work level builds on Jung as a post individuation collective stage. Shared dream correlations will be presented, illustrating a larger story in terms of trails of shared synchronicity.Keywords: belief, shared dreaming, synchronistic patterns, wave state of self
Procedia PDF Downloads 196992 Read-Aloud with Multimedia Enhancement Strategy as an Effective Strategy to Use in the Classroom
Authors: Rahime Filiz Kiremit
Abstract:
This study identifies six different articles to explain which strategies are most effective for kindergarten English Language Learners. The literature review project has information about six different research articles, purpose of the studies, and results of the studies. There are several strategies can be used for ELL students to help them to develop their English language skills. Some articles mention technology as a multimedia integrated into the curriculum, some of them mention writing as a method of learning English as a second language. However, they all have a common strategy that is shared reading. According to these six articles, shared reading has a big role of ELL students’ language developmental process. All in all, read-aloud with multimedia enhancement strategy is the best strategy to use in the classroom, because this strategy is based on shared reading and also integrated with technology.Keywords: bilingual education, effective strategies, english language learners, kindergarten
Procedia PDF Downloads 293991 The Understanding-Without-Reflection in Psychoanalytic Supervision
Authors: Hanoch Yerushalmi
Abstract:
One of the transformational therapeutic experiences is the therapeutic dyad's immersion in and recovery from shared regressive states that are often provoked by an awakened childhood fear of breakdown. the suggest that the supervisory dyad has parallel transformational experiences―the shared regressive states that follow continuous incomprehension of the unfolding therapeutic reality. Moreover, when the supervisory partners immerse themselves in a shared regressive state, a unique, inclusive, embodied, unsymbolized, and procedural understanding-without-reflection emerges spontaneously. Analytic writers describe such an understanding as unconscious knowledge, and existentialist writers describe it as prereflective consciousness. Before translating this unique understanding into a therapeutic narrative, the supervisor needs to recover from the regressive state and organize it according to discursive and logical analytic principles. From this perspective, the already existing experiential and analytic theoretical knowledge serves as a platform for creating new perceptions and analytic discourses.Keywords: supervision, existentialism, prereflective consciousness, regressive states
Procedia PDF Downloads 119990 AI-Based Information System for Hygiene and Safety Management of Shared Kitchens
Authors: Jongtae Rhee, Sangkwon Han, Seungbin Ji, Junhyeong Park, Byeonghun Kim, Taekyung Kim, Byeonghyeon Jeon, Jiwoo Yang
Abstract:
The shared kitchen is a concept that transfers the value of the sharing economy to the kitchen. It is a type of kitchen equipped with cooking facilities that allows multiple companies or chefs to share time and space and use it jointly. These shared kitchens provide economic benefits and convenience, such as reduced investment costs and rent, but also increase the risk of safety management, such as cross-contamination of food ingredients. Therefore, to manage the safety of food ingredients and finished products in a shared kitchen where several entities jointly use the kitchen and handle various types of food ingredients, it is critical to manage followings: the freshness of food ingredients, user hygiene and safety and cross-contamination of cooking equipment and facilities. In this study, it propose a machine learning-based system for hygiene safety and cross-contamination management, which are highly difficult to manage. User clothing management and user access management, which are most relevant to the hygiene and safety of shared kitchens, are solved through machine learning-based methodology, and cutting board usage management, which is most relevant to cross-contamination management, is implemented as an integrated safety management system based on artificial intelligence. First, to prevent cross-contamination of food ingredients, we use images collected through a real-time camera to determine whether the food ingredients match a given cutting board based on a real-time object detection model, YOLO v7. To manage the hygiene of user clothing, we use a camera-based facial recognition model to recognize the user, and real-time object detection model to determine whether a sanitary hat and mask are worn. In addition, to manage access for users qualified to enter the shared kitchen, we utilize machine learning based signature recognition module. By comparing the pairwise distance between the contract signature and the signature at the time of entrance to the shared kitchen, access permission is determined through a pre-trained signature verification model. These machine learning-based safety management tasks are integrated into a single information system, and each result is managed in an integrated database. Through this, users are warned of safety dangers through the tablet PC installed in the shared kitchen, and managers can track the cause of the sanitary and safety accidents. As a result of system integration analysis, real-time safety management services can be continuously provided by artificial intelligence, and machine learning-based methodologies are used for integrated safety management of shared kitchens that allows dynamic contracts among various users. By solving this problem, we were able to secure the feasibility and safety of the shared kitchen business.Keywords: artificial intelligence, food safety, information system, safety management, shared kitchen
Procedia PDF Downloads 69989 Students’ Perception of Careers in Shared Services Industry
Authors: Oksana Koval, Stephen Nabareseh
Abstract:
Talent attraction is identified as a top priority between 2015 – 2020 for Shared Service Centers (SSCs) based on an industry-wide studies. Due to market dynamics and the structure of labour force, shared service industries in Eastern and Central Europe strive for qualified graduates with appropriate and unique skills to occupy such job places. The inbuilt interest and course prescriptions undertaken by prospective job seekers determine whether SSCs will eventually admit such professionals. This paper assesses students’ overall perception of careers in the shared services industry and further diagnosis gender impact and influence on the job preferences among students. Questionnaires were distributed among students in the Czech Republic universities using an online mode. Respondents vary by study year, gender, age, course of study, and work preferences. A total of 1283 student responses has been analyzed using Stata data analytics software. It was discovered that over 70% of respondents who are aware of SSCs are quite ignorant of the job opportunities offered by the centers. While majority of respondents are interested in support positions (e.g. procurement specialist, planning specialist, human resource specialist, process improvement specialist and payroll specialist, etc.), around a third of respondents (32.8 percent) will decline a job offer from SSCs. The analysis also revealed that males are more likely than females to seek careers in international companies, hence, tend to be more favorable towards shared service jobs. Females, however, have stronger preferences towards marketing and PR jobs. The research results provide insights into the job aspirations of students interviewed. The findings provide a huge resource for recruitment agencies and shared service industries to renew and redirect their search for talents into SSCs. Based on the fact that great portion of respondents are planning to start their career within 6-12 months, the research provides important highlights for the talent attraction and recruitment strategies in the industry and provides a curriculum direction in academia.Keywords: Czech Republic labour market, gender, talent attraction, shared service centers, students
Procedia PDF Downloads 230988 Using Computer Simulations to Prepare Teachers
Authors: Roberta Gentry
Abstract:
The presentation will begin with a brief literature review of the use of computer simulation in teacher education programs. This information will be summarized. Additionally, based on the literature review, advantages and disadvantages of using computer simulation in higher education will be shared. Finally, a study in which computer simulations software was used with 50 initial licensure teacher candidates in both an introductory course and a behavior management course will be shared. Candidates reflected on their experiences with using computer simulation. The instructor of the course will also share lessons learned.Keywords: simulations, teacher education, teacher preparation, educational research
Procedia PDF Downloads 650987 The Management Accountant’s Roles for Creation of Corporate Shared Value
Authors: Prateep Wajeetongratana
Abstract:
This study investigates the management accountant’s roles that link with the creation of corporate shared value to enable more effective decision-making and improve the information needs of stakeholders. Mixed method is employed to collect using triangulation for credibility. A quantitative approach is employed to conduct a survey of 200 Thai companies providing annual reports in the Stock Exchange of Thailand. The results of the study reveal that environmental and social data incorporated in a corporate social responsibility (CSR) disclosure are based on the indicators of the Global Reporting Initiatives (GRI) at a statistically significant level of 0.01. Environmental and social indicators in CSR are associated with environmental and social data disclosed in the annual report to support stakeholders’ and the public’s interests that are addressed and show that a significant relationship between environmental and social in CSR disclosures and the information in annual reports is statistically significant at the 0.01 level.Keywords: corporate social responsibility, creating shared value, management accountant’s roles, stock exchange of Thailand
Procedia PDF Downloads 222986 Dual Band Shared Aperture Antenna for 5G Communications
Authors: Zunnurain Ahmad
Abstract:
This work presents design of a dual band antenna for the 5G communications in the millimeter wave band. As opposed to conventional patch antennas which are limited to single narrow band operation a shared aperture concept is utilized for this antenna. The patch aperture is coupled through two rectangular slots etched on a thin printed circuit board (100μm). The patch is elevated in air thus avoiding excitation of surface waves and minimizing dielectric losses at millimeter wave frequencies. With this approach the radiator can cover lower band of 28 GHz and upper band of 37/ 39 GHz dedicated for the fifth generation communications. The simulated radiation efficiency of the antenna stays above 90%.Keywords: antenna, millimeter wave, 5G, 3D
Procedia PDF Downloads 61985 Creativity and Innovation in a Military Unit of South America: Decision Making Process, Socio-Emotional Climate, Shared Flow and Leadership
Authors: S. da Costa, D. Páez, E. Martínez, A. Torres, M. Beramendi, D. Hermosilla, M. Muratori
Abstract:
This study examined the association between creative performance, organizational climate and leadership, affectivity, shared flow, and group decision making. The sample consisted of 315 cadets of a military academic unit of South America. Satisfaction with the decision-making process during a creative task was associated with the usefulness and effectiveness of the ideas generated by the teams with a weighted average correlation of r = .18. Organizational emotional climate, positive and innovation leadership were associated with this group decision-making process r = .25, with shared flow, r = .29 and with positive affect felt during the performance of the creative task, r = .12. In a sequential mediational analysis positive organizational leadership styles were significantly associated with decision-making process and trough cohesion with utility and efficacy of the solution of a creative task. Satisfactory decision-making was related to shared flow during the creative task at collective or group level, and positive affect with flow at individual level.This study examined the association between creative performance, organizational climate and leadership, affectivity, shared flow, and group decision making. The sample consisted of 315 cadets of a military academic unit of South America. Satisfaction with the decision-making process during a creative task was associated with the usefulness and effectiveness of the ideas generated by the teams with a weighted average correlation of r = .18. Organizational emotional climate, positive and innovation leadership were associated with this group decision-making process r = .25, with shared flow, r = .29 and with positive affect felt during the performance of the creative task, r = .12. In a sequential mediational analysis positive organizational leadership styles were significantly associated with decision-making process and trough cohesion with utility and efficacy of the solution of a creative task. Satisfactory decision-making was related to shared flow during the creative task at collective or group level, and positive affect with flow at individual level.Keywords: creativity, innovation, military, organization, teams
Procedia PDF Downloads 123984 Exposure to Social Media Shared Video-Clips on Irregularities from the 2023 Election in Nigeria and Audience Perception of the Outcome
Authors: Obiakor Casmir Uchenna, Ikegbunam Peter Chierike, Ezeja Perpetual Chisom
Abstract:
Irregularities have been a major feature of the Nigerian political activities since 1999. The rate at which such impunities thrive in the country has made elections grossly unacceptable among the people because the outcomes have never reflected the wish of the masses. Conscious of this, citizens have subscribed to the use of social media in exposing the ugly faces of the country’s elections which have always been against the less privileged. This study is an exploration of the relationship between exposure to social media shared video-clips and the respondents’ perception of the 2023 presidential election in Nigeria. The general objective of the study is to find out what the respondents make of the election as a result of the video-clips shared on different social media platforms showing electoral irregularities. The study adopted survey research method in studying 378 university undergraduates from NAU, COOU and Paul University selected through purposive sampling technique. The study was premised on the theoretical provision of violation of expectation theory. Findings revealed that the respondents are well exposed to different video-clips showing irregularities on the election. It was also found that the respondents have negative perception of the election. It was concluded that electoral umpire, the government in power and the security apparatus violated the respondents’ expectation from the election based on the pre-election promises made to the citizens. It was recommended among others, that Nigeria must strengthen the various institutions responsible for the conduct of elections if violence will not be made the best option for the poor masses.Keywords: social media shared video-clips, exposure, irregularities, elections, audience perception, outcome
Procedia PDF Downloads 61983 Design of Low Latency Multiport Network Router on Chip
Authors: P. G. Kaviya, B. Muthupandian, R. Ganesan
Abstract:
On-chip routers typically have buffers are used input or output ports for temporarily storing packets. The buffers are consuming some router area and power. The multiple queues in parallel as in VC router. While running a traffic trace, not all input ports have incoming packets needed to be transferred. Therefore large numbers of queues are empty and others are busy in the network. So the time consumption should be high for the high traffic. Therefore using a RoShaQ, minimize the buffer area and time The RoShaQ architecture was send the input packets are travel through the shared queues at low traffic. At high load traffic the input packets are bypasses the shared queues. So the power and area consumption was reduced. A parallel cross bar architecture is proposed in this project in order to reduce the power consumption. Also a new adaptive weighted routing algorithm for 8-port router architecture is proposed in order to decrease the delay of the network on chip router. The proposed system is simulated using Modelsim and synthesized using Xilinx Project Navigator.Keywords: buffer, RoShaQ architecture, shared queue, VC router, weighted routing algorithm
Procedia PDF Downloads 542982 Unpacking the Summarising Event in Trauma Emergencies: The Case of Pre-briefings
Authors: Professor Jo Angouri, Polina Mesinioti, Chris Turner
Abstract:
In order for a group of ad-hoc professional to perform as a team, a shared understanding of the problem at hand and an agreed action plan are necessary components. This is particularly significant in complex, time sensitive professional settings such as in trauma emergencies. In this context, team briefings prior to the patient arrival (pre-briefings) constitute a critical event for the performance of the team; they provide the necessary space for co-constructing a shared understanding of the situation through summarising information available to the team: yet the act of summarising is widely assumed in medical practice but not systematically researched. In the vast teamwork literature, terms such as ‘shared mental model’, ‘mental space’ and ‘cognate labelling’ are used extensively, and loosely, to denote the outcome of the summarising process, but how exactly this is done interactionally remains under researched. This paper reports on the forms and functions of pre-briefings in a major trauma centre in the UK. Taking an interactional approach, we draw on 30 simulated and real-life trauma emergencies (15 from each dataset) and zoom in on the use of pre-briefings, which we consider focal points in the management of trauma emergencies. We show how ad hoc teams negotiate sharedness of future orientation through summarising, synthesising information, and establishing common understanding of the situation. We illustrate the role, characteristics, and structure of pre-briefing sequences that have been evaluated as ‘efficient’ in our data and the impact (in)effective pre-briefings have on teamwork. Our work shows that the key roles in the event own the act of summarising and we problematise the implications for leadership in trauma emergencies. We close the paper with a model for pre-briefing and provide recommendations for clinical practice, arguing that effective pre-briefing practice is teachable.Keywords: summarising, medical emergencies, interaction analysis, shared/mental models
Procedia PDF Downloads 94981 The Whole Is Greater than ‘Them’ and ‘Us’: The Effect of a Shared Workplace of Israeli-Jews and Non-Israeli Palestinians Physicians on Mutual Attitudes
Authors: Idit Miller
Abstract:
This paper examines the effect of a common organizational identity on intergroup relations of Israeli-Jews and non-Israeli Palestinians medical interns who are employed together within the Israeli hospitals, while asymmetrical relationships and ongoing conflict between the two groups still exist. Using mixed theory, which included the Intergroup contact, Othering, and the Common social identity theories, the study examines the intra-organizational identities dynamic involved within the hospital department and its effects on intergroup relations. In-depth, semi-structured interviews with the Palestinian and Jews physicians were conducted. Findings show three social identity responses are being constructed during the shared employment: Them vs. Us construction, Them vs. Us deconstruction, and an 'Organizational Us' reconstruction. Despite the inequality inherent within the intergroup relations, by holding a universal identity and using a deconstruction pattern, positive emotions are demonstrated by both sides. The adoption of a shared professional super-identity is found as an essential component for fostering and maintaining positive attitudes between the parties. This finding strengthens the significance of a long-term continuous intergroup contact inside the organization and especially between two polarized groups.Keywords: common social identity theory, intergroup contact theory, inequality, intergroup conflict, othering theory
Procedia PDF Downloads 152980 Frailty Models for Modeling Heterogeneity: Simulation Study and Application to Quebec Pension Plan
Authors: Souad Romdhane, Lotfi Belkacem
Abstract:
When referring to actuarial analysis of lifetime, only models accounting for observable risk factors have been developed. Within this context, Cox proportional hazards model (CPH model) is commonly used to assess the effects of observable covariates as gender, age, smoking habits, on the hazard rates. These covariates may fail to fully account for the true lifetime interval. This may be due to the existence of another random variable (frailty) that is still being ignored. The aim of this paper is to examine the shared frailty issue in the Cox proportional hazard model by including two different parametric forms of frailty into the hazard function. Four estimated methods are used to fit them. The performance of the parameter estimates is assessed and compared between the classical Cox model and these frailty models through a real-life data set from the Quebec Pension Plan and then using a more general simulation study. This performance is investigated in terms of the bias of point estimates and their empirical standard errors in both fixed and random effect parts. Both the simulation and the real dataset studies showed differences between classical Cox model and shared frailty model.Keywords: life insurance-pension plan, survival analysis, risk factors, cox proportional hazards model, multivariate failure-time data, shared frailty, simulations study
Procedia PDF Downloads 359979 Generalization of Blom Key Predistribution Scheme
Authors: Abbas Cheraghi
Abstract:
A key predistribution scheme provides one method to distribute secret ahead of time. Blom’s scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom. In this kind of scheme, trusted authority gives each user a secret key and a public identifier, which enables any two users to create independently a shared key for communicating between each other. However, if an attacker can compromise the keys of at least Known numbers of users, he can break the scheme and reconstruct every shared key. In this paper generalized Blom’s Scheme by multivariate Lagrange interpolation formula. This scheme is a form of threshold secret sharing scheme. In this new scheme, the amount of information transmitted by the trusted authority is independent of the numbers of users. In addition, this scheme is unconditionally secure against any individual user.Keywords: key predistribution, blom’s scheme, secret sharing, unconditional secure
Procedia PDF Downloads 437978 Parallel Querying of Distributed Ontologies with Shared Vocabulary
Authors: Sharjeel Aslam, Vassil Vassilev, Karim Ouazzane
Abstract:
Ontologies and various semantic repositories became a convenient approach for implementing model-driven architectures of distributed systems on the Web. SPARQL is the standard query language for querying such. However, although SPARQL is well-established standard for querying semantic repositories in RDF and OWL format and there are commonly used APIs which supports it, like Jena for Java, its parallel option is not incorporated in them. This article presents a complete framework consisting of an object algebra for parallel RDF and an index-based implementation of the parallel query engine capable of dealing with the distributed RDF ontologies which share common vocabulary. It has been implemented in Java, and for validation of the algorithms has been applied to the problem of organizing virtual exhibitions on the Web.Keywords: distributed ontologies, parallel querying, semantic indexing, shared vocabulary, SPARQL
Procedia PDF Downloads 205977 BAN Logic Proof of E-passport Authentication Protocol
Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana
Abstract:
E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic
Procedia PDF Downloads 435