Search results for: international organizations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1224

Search results for: international organizations

594 The Shanghai Cooperation Organization: China's Grand Strategy in Central Asia

Authors: Mara Gubaidullina, Aigerim Yelibayeva

Abstract:

The Shanghai Cooperation Organization is one of the successful outcomes of China's foreign policy since the end of the Cold war. The expansion of multilateral ties all over the world by dint of pursuing institutional strategies as SCO, identify China as a more constructive power. SCO became a new model of cooperation that was formed on remains of collapsed Soviet system, and predetermined China's geopolitical role in the region. As the fast developing effective regional mechanism, SCO today has more of external impact on the international system and forms a new type of interaction for promoting China's grand strategy of 'peaceful rise'.

Keywords: Central Asia, China's grand strategy, Shanghai Cooperation Organization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2015
593 Using Data Mining Technique for Scholarship Disbursement

Authors: J. K. Alhassan, S. A. Lawal

Abstract:

This work is on decision tree-based classification for the disbursement of scholarship. Tree-based data mining classification technique is used in other to determine the generic rule to be used to disburse the scholarship. The system based on the defined rules from the tree is able to determine the class (status) to which an applicant shall belong whether Granted or Not Granted. The applicants that fall to the class of granted denote a successful acquirement of scholarship while those in not granted class are unsuccessful in the scheme. An algorithm that can be used to classify the applicants based on the rules from tree-based classification was also developed. The tree-based classification is adopted because of its efficiency, effectiveness, and easy to comprehend features. The system was tested with the data of National Information Technology Development Agency (NITDA) Abuja, a Parastatal of Federal Ministry of Communication Technology that is mandated to develop and regulate information technology in Nigeria. The system was found working according to the specification. It is therefore recommended for all scholarship disbursement organizations.

Keywords: Decision tree, classification, data mining, scholarship.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2165
592 Qualitative Case Study Research in Accounting: Challenges and Prospects the Libyan Case Study

Authors: Bubaker F. Shareia

Abstract:

Much of the literature on research design has focused on research conducted in developed, uni-cultural or primarily English speaking countries. Studies of qualitative case study research, the challenges, and prospects have been embedded in Western/Eurocentric society and social theories. Although there have been some theoretical studies, few empirical studies have been conducted to explore the nature of the challenges of qualitative case study in developing countries. These challenges include accessibility to organizations, conducting interviews in developing countries, accessing documents and observing official meetings, language and cultural challenges, the use of consent forms, issues affecting access to companies, respondent issues, and data analysis. The author, while conducting qualitative case study research in Libya, faced all these issues. The discussion in this paper examines these issues in order to make a contribution toward the literature in this area.

Keywords: Accounting, Libya, culture, language, developing countries, qualitative case study.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2295
591 Forecasting e-Learning Efficiency by Using Artificial Neural Networks and a Balanced Score Card

Authors: Petar Halachev

Abstract:

Forecasting the values of the indicators, which characterize the effectiveness of performance of organizations is of great importance for their successful development. Such forecasting is necessary in order to assess the current state and to foresee future developments, so that measures to improve the organization-s activity could be undertaken in time. The article presents an overview of the applied mathematical and statistical methods for developing forecasts. Special attention is paid to artificial neural networks as a forecasting tool. Their strengths and weaknesses are analyzed and a synopsis is made of the application of artificial neural networks in the field of forecasting of the values of different education efficiency indicators. A method of evaluation of the activity of universities using the Balanced Scorecard is proposed and Key Performance Indicators for assessment of e-learning are selected. Resulting indicators for the evaluation of efficiency of the activity are proposed. An artificial neural network is constructed and applied in the forecasting of the values of indicators for e-learning efficiency on the basis of the KPI values.

Keywords: artificial neural network, balanced scorecard, e-learning

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1551
590 A Context-Aware based Authorization System for Pervasive Grid Computing

Authors: Marilyn Lim Chien Hui, Nabil Elmarzouqi, Chan Huah Yong

Abstract:

This paper describes the authorization system architecture for Pervasive Grid environment. It discusses the characteristics of classical authorization system and requirements of the authorization system in pervasive grid environment as well. Based on our analysis of current systems and taking into account the main requirements of such pervasive environment, we propose new authorization system architecture as an extension of the existing grid authorization mechanisms. This architecture not only supports user attributes but also context attributes which act as a key concept for context-awareness thought. The architecture allows authorization of users dynamically when there are changes in the pervasive grid environment. For this, we opt for hybrid authorization method that integrates push and pull mechanisms to combine the existing grid authorization attributes with dynamic context assertions. We will investigate the proposed architecture using a real testing environment that includes heterogeneous pervasive grid infrastructures mapped over multiple virtual organizations. Various scenarios are described in the last section of the article to strengthen the proposed mechanism with different facilities for the authorization procedure.

Keywords: Pervasive Grid, Authorization System, Contextawareness, Ubiquity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2161
589 Good Practices in the Development of the Erasmus Mundus Master program in Color in Informatics and Media Technology

Authors: J. Hardeberg, J. Hernandez-Andrès, J. L. Nieves, M. Hauta-Kasari, J. Parkkinen, A. Trémeau

Abstract:

The main objective of this paper is to identify and disseminate good practice in quality assurance and enhancement as well as in teaching and learning at master level. This paper focuses on the experience of the Erasmus Mundus Master program CIMET (Color in Informatics and Media Technology). Amongst topics covered, we discuss the adjustments necessary to a curriculum designed for excellent international students and their preparation for a global labor market.

Keywords: Good practice, internal quality systems, innovationsin curriculum design, challenges of internationalization

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1472
588 Mainland Chinese Customers' Intention toward Medical Tourism in Taiwan

Authors: Hsiu-Yuan Wang, Shwu-Huey Wang

Abstract:

This study proposes and tests a rescapturing elements of perceived gain and loss that, by perceived value of medical tourism products, influencintention of potential customers. Data from 301 usable qwere tested against the research model using the structmodeling approach. The results indicated that perceivedkey predictor of customer intentions. As for benefimedical quality, service quality and enjoyment wcomponents that significantly influenced the perceptiRegarding sacrifice, the effects of perceived risk on pewere significant. The findings can provide insights intohow destination countries can make medical tourism a wfor themselves and international patients.KeywordsMedical tourism, perceived valueintention.

Keywords: Medical tourism, perceived valueintention.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2208
587 Examining Effects of Electronic Market Functions on Decrease in Product Unit Cost and Response Time to Customer

Authors: Maziyar Nouraee

Abstract:

Electronic markets in recent decades contribute remarkably in business transactions. Many organizations consider traditional ways of trade non-economical and therefore they do trade only through electronic markets. There are different categorizations of electronic markets functions. In one classification, functions of electronic markets are categorized into classes as information, transactions, and value added. In the present paper, effects of the three classes on the two major elements of the supply chain management are measured. The two elements are decrease in the product unit cost and reduction in response time to the customer. The results of the current research show that among nine minor elements related to the three classes of electronic markets functions, six factors and three factors influence on reduction of the product unit cost and reduction of response time to the customer, respectively.

Keywords: Electronic Commerce, Electronic Market, B2B Trade, Supply Chain Management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2016
586 Antecedent Factors of Ethical Ideologies in Moral Judgment: Evidence from the Mixed Method Study

Authors: N. Mustamil, M. Quaddus

Abstract:

This research investigates the factors that influence moral judgments when dealing with ethical dilemmas in the organizational context. It also investigates the antecedents of individual ethical ideology (idealism and relativism). A mixed method study, which combines qualitative (field study) and quantitative (survey) approaches, was used in this study. An initial model was developed first, which was then fine-tuned based on field studies. Data were collected from managers in Malaysian large organizations. The results of this study reveal that in-group collectivism culture, power distance culture, parental values, and religiosity were significant as antecedents of ethical ideology. However, direct effects of these variables on moral judgment were not significant. Furthermore, the results of this study confirm the significant effects of ethical ideology on moral judgment. This study provides valuable insight into evaluating the validity of existing theory as proposed in the literature and offers significant practical implications.

Keywords: Antecedents Factors, Ethical Ideology, Mixed Method, Moral Judgment

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2432
585 Collaborative Business Strategy of PTT Energy Trading Co. Ltd. for LNG form of Coal Bed Methane in B2B Transaction to Japanese Shareholder, Especially to Electricity and Power Supply Companies

Authors: Shabrina Pritta Radyanti, Harimukti Wandebori

Abstract:

A research study was conducted with an objective to propose a collaborative business strategy of a oil and gas trading company, representing PPT Energy Trading Co., Ltd., with its shareholder, especially electricity and power supply companies for LNG Form of Coal Bed Methane in B2B Transaction. Collaborative business strategy is a strategy to collaborate with other organizations due to have future benefits in both parties, or achieve the business objective through the collaboration of business, its strategy and partners. A structured interview was established to collect the required primary data from the company. Not only interview, but also company’s business plan and annual report were collected and analyzed for the company’s current condition. As the result, this research shows a recommendation to propose a new collaborative strategy with limiting its target market, diversifying product, conducting new business model, and considering other stakeholders.

Keywords: collaborative business strategy, trading company, LNG, coal bed methane

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2575
584 Determinants of Information Security Affecting Adoption of Web-based Integrated Information Systems

Authors: Jaehun Joo, Mie-jung Kim, Ismatilla Normatov, Lyunhwa Kim

Abstract:

The purpose of this paper is to analyze determinants of information security affecting adoption of the Web-based integrated information systems (IIS). We introduced Web-based information systems which are designed to formulate strategic plans for Peruvian government. Theoretical model is proposed to test impact of organizational factors (deterrent efforts and severity; preventive efforts) and individual factors (information security threat; security awareness) on intentions to proactively use the Web-based IIS .Our empirical study results highlight that deterrent efforts and deterrent severity have no significant influence on the proactive use intentions of IIS, whereas, preventive efforts play an important role in proactive use intentions of IIS. Thus, we suggest that organizations need to do preventive efforts by introducing various information security solutions, and try to improve information security awareness while reducing the perceived information security threats.

Keywords: Information security, Deterrent efforts, deterrentseverity, preventive efforts, information security awareness, information security threats, integrated information systems

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2323
583 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance

Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug

Abstract:

Well organized digitalization and information systems have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are to be identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, with a focus on information system risks.

Keywords: information system risk, operational risk, microfinance performance, DR Congo

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 629
582 The Perception of Omani E-consumers on the Importance and Performance of Dubai SMHs' Website Dimensions and Attributes

Authors: Mohammed G. Montasser, Rehab Y. Zoweil

Abstract:

There is no doubt that Internet technology is widely used by hotels and its demand is constantly booming. Hotels have largely adopted website information services through using different interactive tools, dimensions and attributes to achieve excellence in functionality and usability but these do not necessary equate with website effectiveness. One way to investigate the effectiveness of hotel website is from the perspective ofe-consumers. This exploratory research is to investigate the perceived importance of websites effectiveness of some selected independent small and medium-sized hotels (SMHs) located in Dubai, United Arab Emirates, from the perspective of Omanie-consumers by using non-random sampling method. From 400 questionnaire addressed to respondents in 27 organizations in Muscat the capital city of Oman, 173 are valid. Findings of this study assist SMHs management in Dubai with the reallocation of their resources and efforts in order to supportebusiness development and to sustain a competitive advantage.

Keywords: Dubai's SMHs, Hotel websites, Omani e-consumer perception, weight and performance evaluation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1793
581 Assessment of Green and Smart IT Level: A Case Study on Public Research Institute

Authors: Han-Gook Kim, Dong-Suk Hong

Abstract:

As the latest advancement and trend in IT field, Green & Smart IT has attracted more and more attentions from researchers. This study focuses on the development of assessing tools which can be used for evaluating Green & Smart IT level within an organization. In order to achieve meaningful results, a comprehensive review of relevant literature was performed in advance, then, Delphi survey and other processes were also employed to develop the assessment tools for Green & Smart IT level. Two rounds of Delphi questionnaire survey were conducted with 20 IT experts in public sector. The results reveal that the top five weighted KPIs to evaluate maturity of Green & Smart IT were: (1) electronic execution of business process; (2) shutdown of unused IT devices; (3) virtualization of severs; (4) automation of constant temperature and humidity; and (5) introduction of smart-work system. Finally, these tools were applied to case study of a public research institute in Korea. The findings presented in this study provide organizations with useful implications for the introduction and promotion of Green & Smart IT in the future

Keywords: Assessment, Case Study, Delphi, Green & Smart

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1511
580 The Investigation of the Role of Institutions in the Process of Growth and Development of Economy

Authors: Seyed Mohammad Reza Hosseini

Abstract:

The new institutional Economics helps generalization and expansion of new classic by adding the institution theories to Economic. It is clear that the appropriate institution is among the factors that lead to success in Economic programs. If the institutional are appropriate, the society will save the source and when we make use of time to apply the program, there will be welfare and average revenue product will also increase. In Economy, one should not expect the real manifestation of Economic programs only with a model for estimating and predicting rather institutions of the same purpose and along with production are needed to form the process of growth and development costs. In this research, the institution role in transaction costs, financial markets, distribution of revenue and capital and its influence on the process of growth and development are investigated so that handicaps and problems of Iran Economic Institutions can be recognized. In other words, incapability, non productivity and ambiguity of the institution in Iran Economic are some of the factors that handicap Economic growth and development. For example, Iran government as an important institution while having 20 ministries,83 organizations and 60 years of programming could not go along the growth and development but why?

Keywords: Institution, New institutional economics, Transaction costs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1624
579 Development of an Organizational Knowledge Capabilities Assessment (OKCA) Method for Innovative Technology Enterprises

Authors: C.F. Cheung, Ricky Ma, W.Y. Wong, Y.L. Tse

Abstract:

Knowledge capabilities are increasingly important for the innovative technology enterprises to enhance the business performance in terms of product competitiveness, innovation and sales. Recognition of the company capability by auditing allows them to further pursue advancement, strategic planning and hence gain competitive advantages. This paper attempts to develop an Organizations- Knowledge Capabilities Assessment (OKCA) method to assess the knowledge capabilities of technology companies. The OKCA is a questionnaire-based assessment tool which has been developed to uncover the impact of various knowledge capabilities on different organizational performance. The collected data is then analyzed to find out the crucial elements for different technological companies. Based on the results, innovative technology enterprises are able to recognize the direction for further improvement on business performance and future development plan. External environmental factors affecting organization performance can be found through the further analysis of some selected reference companies.

Keywords: Audit and Assessment, Innovation, Intellectual Capital, Knowledge and Technology Management, Knowledge Capability

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1886
578 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR Triad Model, DVE, vulnerability intelligence, vulnerability recurrence.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 702
577 Hardware Implementations for the ISO/IEC 18033-4:2005 Standard for Stream Ciphers

Authors: Paris Kitsos

Abstract:

In this paper the FPGA implementations for four stream ciphers are presented. The two stream ciphers, MUGI and SNOW 2.0 are recently adopted by the International Organization for Standardization ISO/IEC 18033-4:2005 standard. The other two stream ciphers, MICKEY 128 and TRIVIUM have been submitted and are under consideration for the eSTREAM, the ECRYPT (European Network of Excellence for Cryptology) Stream Cipher project. All ciphers were coded using VHDL language. For the hardware implementation, an FPGA device was used. The proposed implementations achieve throughputs range from 166 Mbps for MICKEY 128 to 6080 Mbps for MUGI.

Keywords: Cryptography, ISO/IEC 18033-4:2005 standard, Hardware implementation, Stream ciphers

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1806
576 Mobile Phone as a Tool for Data Collection in Field Research

Authors: Sandro Mourão, Karla Okada

Abstract:

The necessity of accurate and timely field data is shared among organizations engaged in fundamentally different activities, public services or commercial operations. Basically, there are three major components in the process of the qualitative research: data collection, interpretation and organization of data, and analytic process. Representative technological advancements in terms of innovation have been made in mobile devices (mobile phone, PDA-s, tablets, laptops, etc). Resources that can be potentially applied on the data collection activity for field researches in order to improve this process. This paper presents and discuss the main features of a mobile phone based solution for field data collection, composed of basically three modules: a survey editor, a server web application and a client mobile application. The data gathering process begins with the survey creation module, which enables the production of tailored questionnaires. The field workforce receives the questionnaire(s) on their mobile phones to collect the interviews responses and sending them back to a server for immediate analysis.

Keywords: Data Gathering, Field Research, Mobile Phone, Survey.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2067
575 Role of Leaders in Managing Employees’ Dysfunctional Behavior at Workplace

Authors: Aya Maher, Pakinam Youssef

Abstract:

The objective of this theoretical study is to explore in depth the role of leaders in managing employees’ dysfunctional behavior at workplace in an effort to recommend strategies and solutions for these destructive behaviors that affect employees’ performance. The significance of the study lies in the fact that dysfunctional behavior has been widely spread in almost all organizations, public and private, with its very destructive manifestations. Dysfunctional behavior may be classified into thefts, sabotage, sexual harassment, jealousy, envy, revenge, vulgarity all of which affect employees’ moral, self-esteem and satisfaction level drastically which will be reflected negatively on their performance and productivity. The main research question will focus on the role of leaders in managing employees’ dysfunctional behavior effectively at the workplace through the different strategies and control measures. In this study, the data will be collected from different academic literature and through some primary data by conducting interviews with some public and private employees from different managerial levels and fields.

Keywords: Dysfunctional behavior, employees’ deviant behavior, employees moral, leaders’ role.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3801
574 Using Structural Equation Modeling in Causal Relationship Design for Balanced-Scorecards' Strategic Map

Authors: A. Saghaei, R. Ghasemi

Abstract:

Through 1980s, management accounting researchers described the increasing irrelevance of traditional control and performance measurement systems. The Balanced Scorecard (BSC) is a critical business tool for a lot of organizations. It is a performance measurement system which translates mission and strategy into objectives. Strategy map approach is a development variant of BSC in which some necessary causal relations must be established. To recognize these relations, experts usually use experience. It is also possible to utilize regression for the same purpose. Structural Equation Modeling (SEM), which is one of the most powerful methods of multivariate data analysis, obtains more appropriate results than traditional methods such as regression. In the present paper, we propose SEM for the first time to identify the relations between objectives in the strategy map, and a test to measure the importance of relations. In SEM, factor analysis and test of hypotheses are done in the same analysis. SEM is known to be better than other techniques at supporting analysis and reporting. Our approach provides a framework which permits the experts to design the strategy map by applying a comprehensive and scientific method together with their experience. Therefore this scheme is a more reliable method in comparison with the previously established methods.

Keywords: BSC, SEM, Strategy map.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2711
573 A Model for Collaborative COTS Software Acquisition (COSA)

Authors: Torsti Rantapuska, Sariseelia Sore

Abstract:

Acquiring commercial off-the-shelf (COTS) software applications is becoming routine in organizations. However, eliciting user requirements, finding the candidate COTS products and making the decision is a complex task, especially for SMEs who do not have the time and knowledge needed to do the task properly. The existing models intended to help the decision makers are originally designed for professional use. SMEs are obligated to rely on the software vendor’s ability to solve the problem with the systems provided.  In this paper, we develop a model for SMEs for the acquisition of Commercial Off-The-Shelf (COTS) software products. A leading idea of the model is that the ICT investment is basically a change initiative and therefore it should also be taken as a process of organizational learning. The model is designed bearing three objectives in mind: 1) business orientation, 2) agility, and 3) Learning and knowledge management orientation. The model can be applied to ICT investments in SMEs which have a professional team leader with basic business and IT knowledge. 

 

Keywords: COTS acquisition, ICT investment, organizational learning, ICT adoption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1776
572 Process-Oriented Learning Requirements for Employees and for Organizations

Authors: Richard Pircher, Lukas Zenk, Hanna Risku

Abstract:

Using activity theory, organisational theory and didactics as theoretical foundations, a comprehensive model of the organisational dimensions relevant for learning and knowledge transfer will be developed. In a second step, a Learning Assessment Guideline will be elaborated. This guideline will be designed to permit a targeted analysis of organisations to identify the status quo in those areas crucial to the implementation of learning and knowledge transfer. In addition, this self-analysis tool will enable learning managers to select adequate didactic models for e- and blended learning. As part of the European Integrated Project "Process-oriented Learning and Information Exchange" (PROLIX), this model of organisational prerequisites for learning and knowledge transfer will be empirically tested in four profit and non-profit organisations in Great Britain, Germany and France (to be finalized in autumn 2006). The findings concern not only the capability of the model of organisational dimensions, but also the predominant perceptions of and obstacles to learning in organisations.

Keywords: Activity theory, knowledge management organisational theory, "Process-oriented Learning and Information Exchange" (PROLIX).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1749
571 Business-Intelligence Mining of Large Decentralized Multimedia Datasets with a Distributed Multi-Agent System

Authors: Karima Qayumi, Alex Norta

Abstract:

The rapid generation of high volume and a broad variety of data from the application of new technologies pose challenges for the generation of business-intelligence. Most organizations and business owners need to extract data from multiple sources and apply analytical methods for the purposes of developing their business. Therefore, the recently decentralized data management environment is relying on a distributed computing paradigm. While data are stored in highly distributed systems, the implementation of distributed data-mining techniques is a challenge. The aim of this technique is to gather knowledge from every domain and all the datasets stemming from distributed resources. As agent technologies offer significant contributions for managing the complexity of distributed systems, we consider this for next-generation data-mining processes. To demonstrate agent-based business intelligence operations, we use agent-oriented modeling techniques to develop a new artifact for mining massive datasets.

Keywords: Agent-oriented modeling, business Intelligence management, distributed data mining, multi-agent system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1386
570 Small Businesses' Decision to have a Website Saudi Arabia Case Study

Authors: M. Al-hawari, H. AL–Yamani, B. Izwawa

Abstract:

Recognizing the increasing importance of using the Internet to conduct business, this paper looks at some related matters associated with small businesses making a decision of whether or not to have a Website and go online. Small businesses in Saudi Arabia struggle to have this decision. For organizations, to fully go online, conduct business and provide online information services, they need to connect their database to the Web. Some issues related to doing that might be beyond the capabilities of most small businesses in Saudi Arabia, such as Website management, technical issues and security concerns. Here we focus on a small business firm in Saudi Arabia (Case Study), discussing the issues related to going online decision and the firm's options of what to do and how to do it. The paper suggested some valuable solutions of connecting databases to the Web. It also discusses some of the important issues related to online information services and e-commerce, mainly Web hosting options and security issues.

Keywords: E-Commerce, Saudi Arabia, Small business, Webdatabase connection, Web hosting, World Wide Web (Web).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1974
569 Perceived Ease-of-Use and Intention to Use E-Government Services in Ghana: The Moderating Role of Perceived Usefulness

Authors: Isaac Kofi Mensah

Abstract:

Public sector organizations, ministries, departments and local government agencies are adopting e-government as a means to provide efficient and quality service delivery to citizens. The purpose of this research paper is to examine the extent to which perceived usefulness (PU) of e-government services moderates between perceived ease-of-use (PEOU) of e-government services and intention to use (IU) e-government services in Ghana. A structured research questionnaire instrument was developed and administered to 700 potential respondents in Ghana, of which 693 responded, representing 99% of the questionnaires distributed. The Technology Acceptance Model (TAM) was used as the theoretical framework for the study. The Statistical Package for Social Science (SPSS) was used to capture and analyze the data. The results indicate that even though predictors such as PU and PEOU are main determiners of citizens’ intention to adopt and use e-government services in Ghana, it failed to show that PEOU and IU e-government services in Ghana is significantly moderated by the PU of e-government services. The implication of this finding on theory and practice is further discussed.

Keywords: E-government services, intention to use, moderating role, perceived ease-of-use, perceived usefulness, Ghana, technology acceptance model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1541
568 Determination of Cadmium and Lead in Sewage Sludge from the Middle Region (Misrata, Msallata and Tarhünah Cities) of Libya

Authors: J. A. Mayouf, Q. A. Najim, H. S. Al-Bayati

Abstract:

The concentrations of cadmium and lead in sewage sludge samples were determined by Atomic Absorption Spectrometric Method. Samples of sewage sludge were obtained from three sewage treatment plants localised in Middle Region of Libya (Misrata, Msallata and Tarhünah cities). The results shows that, the mean levels of Cadmium for all regions are ranges from 81 to 123.4 ppm and these values are higher than the limitations for the international standard which are not registered more than 50 ppm (dry weight) in USA, Egypt and the EU countries. While, the lead concentrations are ranged from 8.0 to 189.2 ppm and all values are within the standard limits which graduated between (275–613) ppm.

Keywords: Cadmium, Lead, Sewage, Spectrometry.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4884
567 Relationships between Social Entrepreneurship, CSR and Social Innovation: In Theory and Practice

Authors: Krisztina Szegedi, Gyula Fülöp, Ádám Bereczk

Abstract:

The shared goal of social entrepreneurship, corporate social responsibility and social innovation is the advancement of society. The business model of social enterprises is characterized by unique strategies based on the competencies of the entrepreneurs, and is not aimed primarily at the maximization of profits, but rather at carrying out goals for the benefit of society. Corporate social responsibility refers to the active behavior of a company, by which it can create new solutions to meet the needs of society, either on its own or in cooperation with other social stakeholders. The objectives of this article are to define concepts, describe and integrate relevant theoretical models, develop a model and introduce some examples of international practice that can inspire initiatives for social development.

Keywords: Corporate social responsibility, CSR, social innovation, social entrepreneurship.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4158
566 Transaction Costs in Institutional Environment and Entry Mode Choice

Authors: K. D. Mroczek

Abstract:

In the study presented institutional context is discussed in terms of companies’ entry mode choice. In contrary to many previous analyses, instead of using one or two aggregated variables, a set of eleven determinants is used to establish equity and non-equity internationalization friendly conditions. Based on secondary data, 140 countries are analyzed and grouped into clusters revealing similar framework. The range of the economies explored is wide as it covers all regions distinguished by The World Bank. The results can prove a useful alternative for operationalization of institutional variables in further research concerning entry modes or strategic management in international markets.

Keywords: Clustering, entry mode choice, institutional environment, transaction costs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3019
565 Determinants of Conference Service Quality as Perceived by International Attendees

Authors: Shiva Hashemi, Azizan Marzuki, S. Kiumarsi

Abstract:

In recent years, conference destinations have been highly competitive; therefore, it is necessary to know about the behaviours of conference participants such as the process of their decision-making and the assessment of perceived conference quality. A conceptual research framework based on the Theory of Planned Behaviour model is presented in this research to get better understanding factors that influence it. This research study highlights key factors presented in previous studies in which behaviour intentions of participants are affected by the quality of conference. Therefore, this study is believed to provide an idea that conference participants should be encouraged to contribute to the quality and behaviour intention of the conference.

Keywords: Conference attendees, service quality, perceives value, trust, behaviour intention.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1577