Abstract: Nowadays, manufacturers are facing great challenges
with regard to the production of green products due to the emerging issue of hazardous substance management (HSM). In particular,
environmental legislation pressures have yielded to increased risk,
manufacturing complexity and green components demands. The green principles were expanded to many departments within
organization, including supply chain. Green supply chain
management (GSCM) was emerging in the last few years. This idea
covers every stage in manufacturing from the first to the last stage of
life cycle. From product lifecycle concept, the cycle starts at the design of a product. QFD is a customer-driven product development
tool, considered as a structured management approach for efficiently
translating customer needs into design requirements and parts deployment, as well as manufacturing plans and controls in order to
achieve higher customer satisfaction. This paper develops an Eco-
QFD to provide a framework for designing Eco-mobile phone by integrating the life cycle analysis LCA into QFD throughout the entire product development process.
Abstract: We assert here that there might be some factors that
influence professional identity construction at the university/higher
education stage. In accord, we propose a conceptual framework of
intervening factors in professional identity construction at university
from a literature review and preliminary data from a qualitative pilot
study using focus groups. This model identifies several factors that
might influence university students- professional identity
construction and group them into categories. In turn, we describe
how these factors might contribute in strengthening or weakening
their professional identity. Finally, we discuss the implications of
strengthening students- PI for the university, individuals and
organizations and we provide a roadmap for future empirical work in
this area.
Abstract: The evolution of ICT has changed all sections of society and these changes have been creating an irreversible impact on higher education institutions, which are expected to adopt innovative technologies in their teaching practices. As theorical framework this study select Rogers theory of innovation diffusion which is widely used to illustrate how technologies move from a localized invented to a widespread evolution on organizational practices. Based on descriptive statistical data collected in a European higher education institution three years longitudinal study was conducted for analyzing and discussion the different stages of a LMS adoption process. Results show that ICT integration in higher education is not progressively successful and a linear process and multiple aspects must be taken into account.
Abstract: This study attempts to investigate the relationship
between internal CSR practices and organizational commitment
based on the social exchange theory (SET). Specifically, we examine
the impact of five dimensions of internal CSR practices on
organizational commitment: health and safety, human rights, training
and education, work life balance and workplace diversity. The
proposed model was tested on a sample of 336 frontline employees
within the banking sector in Jordan. Results showed that all internal
CSR dimensions are significantly and positively related to affective
and normative commitment. In addition, the findings of this study
indicate that all internal CSR dimensions did not have a significant
relationship with continuance commitment. Limitations of the study,
directions for future research, and implications of the findings are
discussed.
Abstract: One of the approaches to democratization is the fostering of civil society organizations. In Africa, civil society organizations did not fully play their role in the continent-s democratization process due to many factors including the repressive regulations imposed on them by governing parties. In Ethiopia, for the first time in the country-s political history, the civil society played a very active role in the 2005 multi-party election. The involvement of the civil society in this election has far-reaching consequences. One of the objectives of this paper is to assess the consequences of such involvement for both the civil society and the political society in the country. The paper also examines the peculiarities of civil society formation in Africa in general, and in Ethiopia in particular by assessing both the “traditional" and “modern" civil society organizations.
Abstract: One of the important steps in a safety and risk management system is the economical evaluation of occupational accident and diseases costs in order to decrease accidents from reoccurring in the workplace. This study proposed a plausible method for calculating occupational accident costs and illnesses in work place. This method design for cost estimation takes into account both the personnel, organizational level as well as the community level especially intended for an Iranian work place. The research indicates that a using systematic method for calculating costs which also provides risk evaluation can help managers to plan correctly the investment in health and safety measures. Using this method is that not only is it comprehensive, easy and practical and could be applied in practice by a manager within a short period of time but it also shows the importance of accident costs as well as calculates the real cost of an accident and illnesses.
Abstract: In recent years with the rapid development of Internet and the Web, more and more web applications have been deployed in many fields and organizations such as finance, military, and government. Together with that, hackers have found more subtle ways to attack web applications. According to international statistics, SQL Injection is one of the most popular vulnerabilities of web applications. The consequences of this type of attacks are quite dangerous, such as sensitive information could be stolen or authentication systems might be by-passed. To mitigate the situation, several techniques have been adopted. In this research, a security solution is proposed using Artificial Neural Network to protect web applications against this type of attacks. The solution has been experimented on sample datasets and has given promising result. The solution has also been developed in a prototypic web application firewall called ANNbWAF.
Abstract: Uranium mining and processing in Brazil occur in a
northeastern area near to Caetité-BA. Several Non-Governmental
Organizations claim that uranium mining in this region is a pollutant
causing health risks to the local population,but those in charge of the
complex extraction and production of“yellow cake" for generating
fuel to the nuclear power plants reject these allegations. This study
aimed at identifying potential problems caused by mining to the
population of Caetité. In this, work,the concentrations of 238U, 232Th
and 40K radioisotopes in the teeth of the Caetité population were
determined by ICP-MS. Teeth are used as bioindicators of
incorporated radionuclides. Cumulative radiation doses in the
skeleton were also determined. The concentration values were below
0.008 ppm, and annual effective dose due to radioisotopes are below
to the reference values. Therefore, it is not possible to state that the
mining process in Caetité increases pollution or radiation exposure in
a meaningful way.
Abstract: If organizations like Mellat Bank want to identify its
customer market completely to reach its specified goals, it can
segment the market to offer the product package to the right segment.
Our objective is to offer a segmentation model for Iran banking
market in Mellat bank view. The methodology of this project is
combined by “segmentation on the basis of four part-quality
variables" and “segmentation on the basis of different in means".
Required data are gathered from E-Systems and researcher personal
observation. Finally, the research offers the organization that at first
step form a four dimensional matrix with 756 segments using four
variables named value-based, behavioral, activity style, and activity
level, and at the second step calculate the means of profit for every
cell of matrix in two distinguished work level (levels α1:normal
condition and α2: high pressure condition) and compare the segments
by checking two conditions that are 1- homogeneity every segment
with its sub segment and 2- heterogeneity with other segments, and
so it can do the necessary segmentation process. After all, the last
offer (more explained by an operational example and feedback
algorithm) is to test and update the model because of dynamic
environment, technology, and banking system.
Abstract: Human-related information security breaches within organizations are primarily caused by employees who have not been made aware of the importance of protecting the information they work with. Information security awareness is accordingly attracting more attention from industry, because stakeholders are held accountable for the information with which they work. The authors developed an Information Security Retrieval and Awareness model – entitled “ISRA" – that is tailored specifically towards enhancing information security awareness in industry amongst all users of information, to address shortcomings in existing information security awareness models. This paper is principally aimed at expounding a prototype for the ISRA model to highlight the advantages of utilizing the model. The prototype will focus on the non-technical, humanrelated information security issues in industry. The prototype will ensure that all stakeholders in an organization are part of an information security awareness process, and that these stakeholders are able to retrieve specific information related to information security issues relevant to their job category, preventing them from being overburdened with redundant information.
Abstract: The Japanese integrative approach to social systems
can be observed in supply chain management as well as in the
relationship between public and private sectors. Both the Lean
Production System and the Developmental State Model are
characterized by efforts towards the achievement of mutual goals,
resulting in initiatives for capacity building which emphasize the
system level. In Brazil, although organizations undertake efforts to
build capabilities at the individual and organizational levels, the
system level is being neglected. Fieldwork data confirmed the findings
of other studies in terms of the lack of integration in supply chain
management in the Brazilian automobile industry. Moreover, due to
the absence of an active role of the Brazilian state in its relationship
with the private sector, automakers are not fully exploiting the
opportunities in the domestic and regional markets. For promoting a
higher level of economic growth as well as to increase the degree of
spill-over of technologies and techniques, a more integrative approach
is needed.
Abstract: Societal security, continuity scenarios and methodological cycling approach explained in this article. Namely societal security organizational challenges ask implementation of international standards BS 25999-2 & global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity & interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization system, resulting to a crisis scene or even to a battle theatre. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management & overmastering in real environments.
Abstract: The purpose of this paper is to consider the
introduction of online courses to replace the current classroom-based
staff training. The current training is practical, and must be
completed before access to the financial computer system is
authorized. The long term objective is to measure the efficacy,
effectiveness and efficiency of the training, and to establish whether
a transfer of knowledge back to the workplace has occurred. This
paper begins with an overview explaining the importance of staff
training in an evolving, competitive business environment and
defines the problem facing this particular organization. A summary
of the literature review is followed by a brief discussion of the
research methodology and objective. The implementation of the
alpha version of the online course is then described. This paper may
be of interest to those seeking insights into, or new theory regarding,
practical interventions of online learning in the real world.
Abstract: Environmental aspects plays a central role in environmental management system (EMS) because it is the basis for the identification of an organization-s environmental targets. The
existing methods for the assessment of environmental aspects are grouped into three categories: risk assessment-based (RA-based),
LCA-based and criterion-based methods. To combine the benefits of
these three categories of research, this study proposes an integrated framework, combining RA-, LCA- and criterion-based methods. The
integrated framework incorporates LCA techniques for the identification of the causal linkage for aspect, pathway, receptor and
impact, uses fuzzy logic to assess aspects, considers fuzzy conditions,
in likelihood assessment, and employs a new multi-criteria decision analysis method - multi-criteria and multi-connection comprehensive
assessment (MMCA) - to estimate significant aspects in EMS. The proposed model is verified, using a real case study and the results show
that this method successfully prioritizes the environmental aspects.
Abstract: Crime is a major societal problem for most of the
world's nations. Consequently, the police need to develop new
methods to improve their efficiency in dealing with these ever increasing crime rates. Two of the common difficulties that the police
face in crime control are crime investigation and the provision of crime information to the general public to help them protect themselves. Crime control in police operations involves the use of
spatial data, crime data and the related crime data from different organizations (depending on the nature of the analysis to be made).
These types of data are collected from several heterogeneous sources
in different formats and from different platforms, resulting in a lack of standardization. Moreover, there is no standard framework for
crime data collection, integration and dissemination through mobile
devices. An investigation into the current situation in crime control was carried out to identify the needs to resolve these issues. This
paper proposes and investigates the use of service oriented
architecture (SOA) and the mobile spatial information service in crime control. SOA plays an important role in crime control as an
appropriate way to support data exchange and model sharing from
heterogeneous sources. Crime control also needs to facilitate mobile
spatial information services in order to exchange, receive, share and release information based on location to mobile users anytime and
anywhere.
Abstract: Business process modeling has become an accepted
means for designing and describing business operations. Thereby,
consistency of business process models, i.e., the absence of modeling
faults, is of upmost importance to organizations. This paper presents
a concept and subsequent implementation for detecting faults in
business process models and for computing a measure of their
consistency. It incorporates not only syntactic consistency but also
semantic consistency, i.e., consistency regarding the meaning of
model elements from a business perspective.
Abstract: In this study, we propose a network architecture for
providing secure access to information resources of enterprise
network from remote locations in a wireless fashion. Our proposed
architecture offers a very promising solution for organizations which
are in need of a secure, flexible and cost-effective remote access
methodology. Security of the proposed architecture is based on
Virtual Private Network technology and a special role based access
control mechanism with location and time constraints. The flexibility
mainly comes from the use of Internet as the communication medium
and cost-effectiveness is due to the possibility of in-house
implementation of the proposed architecture.
Abstract: Appropriate description of business processes through
standard notations has become one of the most important assets for
organizations. Organizations must therefore deal with quality faults
in business process models such as the lack of understandability and
modifiability. These quality faults may be exacerbated if business
process models are mined by reverse engineering, e.g., from existing
information systems that support those business processes. Hence,
business process refactoring is often used, which change the internal
structure of business processes whilst its external behavior is
preserved. This paper aims to choose the most appropriate set of
refactoring operators through the quality assessment concerning
understandability and modifiability. These quality features are
assessed through well-proven measures proposed in the literature.
Additionally, a set of measure thresholds are heuristically established
for applying the most promising refactoring operators, i.e., those that
achieve the highest quality improvement according to the selected
measures in each case.
Abstract: Clustering in high dimensional space is a difficult
problem which is recurrent in many fields of science and
engineering, e.g., bioinformatics, image processing, pattern
reorganization and data mining. In high dimensional space some of
the dimensions are likely to be irrelevant, thus hiding the possible
clustering. In very high dimensions it is common for all the objects in
a dataset to be nearly equidistant from each other, completely
masking the clusters. Hence, performance of the clustering algorithm
decreases.
In this paper, we propose an algorithmic framework which
combines the (reduct) concept of rough set theory with the k-means
algorithm to remove the irrelevant dimensions in a high dimensional
space and obtain appropriate clusters. Our experiment on test data
shows that this framework increases efficiency of the clustering
process and accuracy of the results.
Abstract: This policy participation action research explores the
roles of Thai government units during its 2010 fiscal year on how to
create value added to recycling business in the central part of
Thailand. The research aims to a) study how the government plays a
role to support the business, and its problems and obstacles on
supporting the business, b) to design a strategic action – short,
medium, and long term plans -- to create value added to the recycling
business, particularly in local full-loop companies/organizations
licensed by Wongpanit Waste Separation Plant as well as those
licensed by the Department of Provincial Administration. Mixed
method research design, i.e., a combination of quantitative and
qualitative methods is utilized in the present study in both data
collection and analysis procedures. Quantitative data was analyzed
by frequency, percent value, mean scores, and standard deviation,
and aimed to note trend and generalizations. Qualitative data was
collected via semi-structured interviews/focus group interviews to
explore in-depth views of the operators. The sampling included 1,079
operators in eight provinces in the central part of Thailand.