Abstract: This study analyzed the creativity of student teams
participating in an exploratory information system development
project (ISDP) and examined antecedents of their creativity. By using
partial least squares (PLS) to analyze a sample of thirty-six teams
enrolled in an information system department project training course
that required three semesters of project-based lessons, the results
found social capitals (structural, relational and cognitive social capital)
positively influence knowledge integration. However, relational social
capital does not significantly influence knowledge integration.
Knowledge integration positively affects team creativity. This study
also demonstrated that social capitals significantly influence team
creativity through knowledge integration. The implications of our
findings for future research are discussed.
Abstract: Never has a revolution affected all aspects of
humanity as the communication revolution during the past two
decades. This revolution, with all its advances and utilities, swept the
world thus becoming an integral part of our lives, hence giving way
to emerging applications at the social, economic, political, and
educational levels. More specifically, such applications have changed
the delivery system through which learning is acquired by students.
Interaction with educators, accessibility to content, and creative
delivery options are but a few facets of the new learning experience
now being offered through the use of technology in the educational
field. With different success rates, third world countries have tried to
pace themselves with use of educational technology in advanced
parts of the world. One such country is the small rich-oil state of
Kuwait which has tried to adopt the e-educational model, however,
an evaluation of such trial is yet to be done. This study aimed to fill
the void of research conducted around that topic. The study explored
students' acceptance of incorporating communication technologies in
higher education in Kuwait. Students' responses to survey questions
presented an overview of the e-learning experience in this country,
and drew a framework through which implications and suggestions
for future research were discussed to better serve the advancement of
e-education in developing countries.
Abstract: In this research, the authors analyze network stability
using agent-based simulation. Firstly, the authors focus on analyzing
large networks (eight agents) by connecting different two stable small
social networks (A small stable network is consisted on four agents.).
Secondly, the authors analyze the network (eight agents) shape which
is added one agent to a stable network (seven agents). Thirdly, the
authors analyze interpersonal comparison of utility. The “star-network
"was not found on the result of interaction among stable two small
networks. On the other hand, “decentralized network" was formed
from several combination. In case of added one agent to a stable
network (seven agents), if the value of “c"(maintenance cost of per
a link) was larger, the number of patterns of stable network was
also larger. In this case, the authors identified the characteristics of a
large stable network. The authors discovered the cases of decreasing
personal utility under condition increasing total utility.
Abstract: Modern civilization has come in recent decades into a new phase in its development, called the information society. The concept of "information society" has become one of the most common. Therefore, the attempt to understand what exactly the society we live in, what are its essential features, and possible future scenarios, is important to the social and philosophical analysis. At the heart of all these deep transformations is more increasing, almost defining role knowledge and information as play substrata of «information society». The mankind opened for itself and actively exploits a new resource – information. Information society puts forward on the arena new type of the power, at the heart of which activity – mastering by a new resource: information and knowledge. The password of the new power – intelligence as synthesis of knowledge, information and communications, the strength of mind, fundamental sociocultural values. In a postindustrial society, the power of knowledge and information is crucial in the management of the company, pushing into the background the influence of money and state coercion.
Abstract: R&D risk management has been suggested as one of
the management approaches for accomplishing the goals of public
R&D investment. The investment in basic science and core technology
development is the essential roles of government for securing the
social base needed for continuous economic growth. And, it is also an
important role of the science and technology policy sectors to generate
a positive environment in which the outcomes of public R&D can be
diffused in a stable fashion by controlling the uncertainties and risk
factors in advance that may arise during the application of such
achievements to society and industry. Various policies have already
been implemented to manage uncertainties and variables that may
have negative impact on accomplishing public R& investment goals.
But we may derive new policy measures for complementing the
existing policies and for exploring progress direction by analyzing
them in a policy package from the viewpoint of R&D risk
management.
Abstract: From past many decades human beings are suffering
from plethora of natural disasters. Occurrence of disasters is a
frequent process; it changes conceptual myths as more and more
advancement are made. Although we are living in technological era
but in developing countries like Pakistan disasters are shaped by
socially constructed roles. The need is to understand the most
vulnerable group of society i.e. females; their issues are complex in
nature because of undermined gender status in the society. There is a
need to identify maximum issues regarding females and to enhance
the achievement of millennium development goals (MDGs). Gender
issues are of great concern all around the globe including Pakistan.
Here female visibility in society is low, and also during disasters, the
failure to understand the reality that concentrates on double burden
including productive and reproductive care. Women have to
contribute a lot in society so we need to make them more disaster
resilient. For this non-structural measures like awareness, trainings
and education must be carried out. In rural and in urban settings in
any disaster like earthquake or flood, elements like gender
perspective, their age, physical health, demographic issues contribute
towards vulnerability. In Pakistan the gender issues in disasters were
of less concern before 2005 earthquake and 2010 floods. Significant
achievements are made after 2010 floods when gender and child cell
was created to provide all facilities to women and girls. The aim of
the study is to highlight all necessary facilities in a disaster to build
coping mechanism in females from basic rights till advance level
including education.
Abstract: Integrative teaching methodology is based on
connecting and summarizing knowledge from different subjects in
order to create better understanding of different disciplines and
improvement of competences in general. Integrative teaching
methodology was implemented and realised during one academic
year in 17 Latvian schools according with specially worked out
programme by specialists of different fields for adaptation in social
environment of children and young people with learning, cognitive
functions and motor disorders. Implemented integrative teaching
methodology consisted from three subsections which were
specialised for adaptation in social environment, improvement of
cognitive functions and improvement and harmonization of
personality. The results of investigation showed that the use of
integrative teaching methodology is an effective way for
improvement of learning motivation and negotiation of learning
disorders of different age schoolchildren.
Abstract: As the disfunctions of the information society and
social development progress, intrusion problems such as malicious
replies, spam mail, private information leakage, phishing, and
pharming, and side effects such as the spread of unwholesome
information and privacy invasion are becoming serious social
problems. Illegal access to information is also becoming a problem as
the exchange and sharing of information increases on the basis of the
extension of the communication network. On the other hand, as the
communication network has been constructed as an international,
global system, the legal response against invasion and cyber-attack
from abroad is facing its limit. In addition, in an environment where
the important infrastructures are managed and controlled on the basis
of the information communication network, such problems pose a
threat to national security. Countermeasures to such threats are
developed and implemented on a yearly basis to protect the major
infrastructures of information communication. As a part of such
measures, we have developed a methodology for assessing the
information protection level which can be used to establish the
quantitative object setting method required for the improvement of the
information protection level.
Abstract: This paper proposes an investment cost recovery
based efficient and fast sequential optimization approach to optimal
allocation of thyristor controlled series compensator (TCSC) in
competitive power market. The optimization technique has been used
with an objective to maximizing the social welfare and minimizing
the device installation cost by suitable location and rating of TCSC in
the system. The effectiveness of proposed approach for location of
TCSC has been compared with some existing methods of TCSC
placement, in terms of its impact on social welfare, TCSC investment
recovery and optimal generation as well as load patterns. The results
have been obtained on modified IEEE 14-bus system.
Abstract: The effect of shearing date on behaviors and performances of 20 pregnant Rahmani ewes was evaluated in four groups (5each). Ewes were shorn at 70, 100 and 130 days of pregnancy in the first three groups respectively, while the fourth group was maintained unshorn as a control. Some behavioral and physiological data related to ewes in addition, blood cortisol level were recorded. Results revealed a significant increase in the frequencies of comfort and eating behaviors, respiratory rate, pulse rate, lamb birth weight and blood cortisol level in early and mid pregnancy shorn ewes. Also, a slight increase in pregnancy period was observed for those ewes. On the other hand, social behaviors, and core temperature were not affected by shearing. These results conclude that prenatal shearing (early and mid-pregnancy) of ewes increases the frequencies of comfort and eating behaviors, and improves the survival rates of lambs by increasing their birth weights.
Abstract: This paper concerns a formal model to help the
simulation of agent societies where institutional roles and
institutional links can be specified operationally. That is, this paper
concerns institutional roles that can be specified in terms of a minimal behavioral capability that an agent should have in order to
enact that role and, thus, to perform the set of institutional functions that role is responsible for. Correspondingly, the paper concerns
institutional links that can be specified in terms of a minimal
interactional capability that two agents should have in order to, while
enacting the two institutional roles that are linked by that institutional
link, perform for each other the institutional functions supported by
that institutional link. The paper proposes a cognitive architecture
approach to institutional roles and institutional links, that is, an approach in which a institutional role is seen as an abstract cognitive
architecture that should be implemented by any concrete agent (or set of concrete agents) that enacts the institutional role, and in which
institutional links are seen as interactions between the two abstract
cognitive agents that model the two linked institutional roles. We
introduce a cognitive architecture for such purpose, called the
Institutional BCC (IBCC) model, which lifts Yoav Shoham-s BCC
(Beliefs-Capabilities-Commitments) agent architecture to social
contexts. We show how the resulting model can be taken as a means
for a cognitive architecture account of institutional roles and
institutional links of agent societies. Finally, we present an example
of a generic scheme for certain fragments of the social organization
of agent societies, where institutional roles and institutional links are
given in terms of the model.
Abstract: At present, increased concerns about global
environmental problems have magnified the importance of
sustainability management. To move towards sustainability,
companies need to look at everything from a holistic perspective in
order to understand the interconnections between economic growth
and environmental and social sustainability. This paper aims to gain
an understanding of key determinants that drive sustainability
management and barriers that hinder its development. It employs
semi-structured interviews with key informants, site observation and
documentation. The informants are production, marketing and
environmental managers of the leading wine producer, which aims to
become an Asia-s leader in wine & wine based products. It is found
that corporate image and top management leadership are the primary
factors influencing the adoption of sustainability management. Lack
of environmental knowledge and inefficient communication are
identified as barriers.
Abstract: Unlike Christianity and Buddhism, Islam, being one
of the three universal world religions, actively penetrates into
people-s everyday life. The main reason for this is that in Islam the
religion and ideology, philosophy, religious organizations and state
bodies are closely interrelated. In order to analyze the state of being
of interrelations of religion and civil society in Kazakhstan, it is
necessary to study Islam and its relations with spiritual culture of the
society. According to the Constitution of the Republic of Kazakhstan
the religion is separated from the state, i.e. each performs its own
function without interfering into each other-s affairs. The right of the
citizens of our republic to freedom of thinking and faith is based on
the Constitution of the RK, Civil Code, Law “On freedom of faith
and religious unions in the Republic of Kazakhstan".
Legislatively secured separation of the mosque and church from
the state does not mean that religion has no influence on the latter.
The state, consisting of citizens with their own beliefs, including
religious ones, cannot be isolated from the influence of religion.
Nowadays it is commonly accepted that it is not possible to
understand and forecast key social processes without taking into
account the religious factor.
Abstract: Privacy issues commonly discussed among
researchers, practitioners, and end-users in pervasive healthcare.
Pervasive healthcare systems are applications that can support
patient-s need anytime and anywhere. However, pervasive healthcare
raises privacy concerns since it can lead to situations where patients
may not be aware that their private information is being shared and
becomes vulnerable to threat. We have systematically analyzed the
privacy issues and present a summary in tabular form to show the
relationship among the issues. The six issues identified are medical
information misuse, prescription leakage, medical information
eavesdropping, social implications for the patient, patient difficulties
in managing privacy settings, and lack of support in designing
privacy-sensitive applications. We narrow down the issues and chose
to focus on the issue of 'lack of support in designing privacysensitive
applications' by proposing a privacy-sensitive architecture
specifically designed for pervasive healthcare monitoring systems.
Abstract: Rapid process of urbanism development has increased
the demand for some infrastructures such as supplying potable water,
electricity network and transportation facilities and etc. Nonefficiency
of the existing system with parallel managements of urban
traffic management has increased the gap between supply and
demand of traffic facilities. A sustainable transport system requires
some activities more important than air pollution control, traffic or
fuel consumption reduction and the studies show that there is no
unique solution for solving complicated transportation problems and
solving such a problem needs a comprehensive, dynamic and reliable
mechanism. Sustainable transport management considers the effects
of transportation development on economic efficiency, environmental
issues, resources consumption, land use and social justice and helps
reduction of environmental effects, increase of transportation system
efficiency as well as improvement of social life and aims to enhance
efficiency, goods transportation, provide services with minimum
access problems that cannot be realized without reorganization of
strategies, policies and plans.
Abstract: Money laundering has been described by many as the lifeblood of crime and is a major threat to the economic and social well-being of societies. It has been recognized that the banking system has long been the central element of money laundering. This is in part due to the complexity and confidentiality of the banking system itself. It is generally accepted that effective anti-money laundering (AML) measures adopted by banks will make it tougher for criminals to get their "dirty money" into the financial system. In fact, for law enforcement agencies, banks are considered to be an important source of valuable information for the detection of money laundering. However, from the banks- perspective, the main reason for their existence is to make as much profits as possible. Hence their cultural and commercial interests are totally distinct from that of the law enforcement authorities. Undoubtedly, AML laws create a major dilemma for banks as they produce a significant shift in the way banks interact with their customers. Furthermore, the implementation of the laws not only creates significant compliance problems for banks, but also has the potential to adversely affect the operations of banks. As such, it is legitimate to ask whether these laws are effective in preventing money launderers from using banks, or whether they simply put an unreasonable burden on banks and their customers. This paper attempts to address these issues and analyze them against the background of the Malaysian AML laws. It must be said that effective coordination between AML regulator and the banking industry is vital to minimize problems faced by the banks and thereby to ensure effective implementation of the laws in combating money laundering.
Abstract: Housing is a basic human right. The provision of new
house shall be free from any defects, even for the defects that people
do normally considered as 'cosmetic defects'. This paper studies
about the building defects of newly completed house of 72 unit of
double-storey terraced located in Bangi, Selangor. The building
survey implemented using protocol 1 (visual inspection). As for new
house, the survey work is very stringent in determining the defects
condition and priority. Survey and reporting procedure is carried out
based on CSP1 Matrix that involved scoring system, photographs and
plan tagging. The analysis is done using Statistical Package for Social
Sciences (SPSS). The finding reveals that there are 2119 defects
recorded in 72 terraced houses. The cumulative score obtained was
27644 while the overall rating is 13.05. These results indicate that the
construction quality of the newly terraced houses is low and not up to
an acceptable standard as the new house should be.
Abstract: There is a real threat on the VIPs personal pages on
the Social Network Sites (SNS). The real threats to these pages is
violation of privacy and theft of identity through creating fake pages
that exploit their names and pictures to attract the victims and spread
of lies. In this paper, we propose a new secure architecture that
improves the trusting and finds an effective solution to reduce fake
pages and possibility of recognizing VIP pages on SNS. The
proposed architecture works as a third party that is added to
Facebook to provide the trust service to personal pages for VIPs.
Through this mechanism, it works to ensure the real identity of the
applicant through the electronic authentication of personal
information by storing this information within content of their
website. As a result, the significance of the proposed architecture is
that it secures and provides trust to the VIPs personal pages.
Furthermore, it can help to discover fake page, protect the privacy,
reduce crimes of personality-theft, and increase the sense of trust and
satisfaction by friends and admirers in interacting with SNS.
Abstract: The ever growing sentiment of environmentalism across the globe has made many people think on the green lines. But most of such ideas halt short of implementation because of the short term economic viability issues with the concept of going green. In this paper we have tried to amalgamate the green concept with social entrepreneurship for solving a variety of issues faced by the society today. In addition the paper also tries to ensure that the short term economic viability does not act as a deterrent. The paper comes up three sustainable models of social entrepreneurship which tackle a wide assortment of issues such as nutrition problem, land problems, pollution problems and employment problems. The models described fall under the following heads: - Spirulina cultivation: The model addresses nutrition, land and employment issues. It deals with cultivation of a blue green alga called Spirulina which can be used as a very nutritious food. Also, the implementation of this model would bring forth employment to the poor people of the area. - Biocomposites: The model comes up with various avenues in which biocomposites can be used in an economically sustainable manner. This model deals with the environmental concerns and addresses the depletion of natural resources. - Packaging material from empty fruit bunches (EFB) of oil palm: This one deals with air and land pollution. It is intended to be a substitute for packaging materials made from Styrofoam and plastics which are non-biodegradable. It takes care of the biodegradability and land pollution issues. It also reduces air pollution as the empty fruit bunches are not incinerated. All the three models are sustainable and do not deplete the natural resources any further. This paper explains each of the models in detail and deals with the operational/manufacturing procedures and cost analysis while also throwing light on the benefits derived and sustainability aspects.
Abstract: Latvia is the fourth in the world by means of broadband internet speed. The total number of internet users in Latvia exceeds 70% of its population. The number of active mailboxes of the local internet e-mail service Inbox.lv accounts for 68% of the population and 97.6% of the total number of internet users. The Latvian portal Draugiem.lv is a phenomenon of social media, because 58.4 % of the population and 83.5% of internet users use it. A majority of Latvian company profiles are available on social networks, the most popular being Twitter.com. These and other parameters prove the fact consumers and companies are actively using the Internet.
However, after the authors in a number of studies analyzed how enterprises are employing the e-environment, namely, e-environment tools, they arrived to the conclusions that are not as flattering as the aforementioned statistics. There is an obvious contradiction between the statistical data and the actual studies. As a result, the authors have posed a question: Why are entrepreneurs resistant to e-tools? In order to answer this question, the authors have addressed the Technology Acceptance Model (TAM). The authors analyzed each phase and determined several factors affecting the use of e-environment, reaching the main conclusion that entrepreneurs do not have a sufficient level of e-literacy (digital literacy).
The authors employ well-established quantitative and qualitative methods of research: grouping, analysis, statistic method, factor analysis in SPSS 20 environment etc.
The theoretical and methodological background of the research is formed by, scientific researches and publications, that from the mass media and professional literature, statistical information from legal institutions as well as information collected by the author during the survey.