ola

The St. Nicholas Uganda Children's Fund

Bobby Maddex interviews Peter and Sharon Georges about their mission work in Uganda to help provide accessible education to children and break the cycle of poverty. To learn more about and support this incredible ministry, please visit their website here.




ola

The Equal of Martyrdom: Fr. Nicola Yanney, Holy Man of Nebraska

In this special documentary, Fr. Andrew Stephen Damick goes on pilgrimage to encounter Fr. Nicola Yanney, an early 20th century Orthodox missionary in America and the first priest ordained by St. Raphael of Brooklyn, whose missionary territory included most of the Great Plains. Join Fr. Andrew as he explores the life of this holy man through interviews, research and prayer in Kearney, Nebraska, asking the question: Is Fr. Nicola a saint? Included with this documentary are 9 bonus tracks of extra interviews and other material that was not included in the main documentary.




ola

A Prophet, a Scholar and a Prime Minister

Three Second-Temple Prophets who were among those who prepared the world for the coming of the Messiah have much to teach us about how to keep the Lord uppermost in our hearts and lives.




ola

#RebuildStNicholas

On September 11, an Orthodox church was destroyed under the collapsing Twin Towers. What can its rebuilding teach us about being the bee?




ola

St. Nicholas

So what is it to be a citizen of the Kingdom of God?




ola

Elon Musk was shocked to see Warren Buffett’s Coca-Cola dividends in 2023 — and they've since grown even larger to $776M




ola

Milkman goes extra mile for isolating customers

During lockdown Tony Fowler has offered help to isolated older customers who have been advised to stay indoors.




ola

Grieving in isolation: A Covid widow's story

Jean Sewell's husband died a few days before England's first lockdown leaving her to grieve alone.




ola

Plans to speed up decisions on wind and solar farms

Proposals for renewable energy schemes in Wales could be sped up under new plans.




ola

Charity asks Deputy PM to call in solar farm plans

CPRE Surrey is opposing planning permission given to University of Surrey to build a solar facility.




ola

'Price of chocolate has gone through the roof'

Katie Cross says she is paying £9,000 more per tonne of chocolate than she did a year ago.




ola

Council could face £2m bill in solar farm row

Preston is one of 23 councils facing legal action from a council in Essex over botched investments.




ola

BYD Sealion 7 comes to UK, solar cell turns any wall into solar panel

Specifications for the new Sealion 7 from Chinese EV specialist BYD have been revealed, with the new SUV set to target high-end versions of everything from the Hyundai Ioniq 5 and Kia EV6 to the Peugeot E-3008 and Volkswagen […]

The post BYD Sealion 7 comes to UK, solar cell turns any wall into solar panel appeared first on ShinyShiny.




ola

Prospects for South Americans pursuing F1 “getting better” – Colapinto | RaceFans Round-up

In the round-up: F1 hopes for South Americans "getting better" • Verschoor back to MP for fifth F2 season • Verstappen races in charity event



  • RaceFans Round-up

ola

Search Central Live 2024 in Warsaw, Poland

We're excited to announce a Search Central Live event in Warsaw, Poland on April 24, 2024. Search Central Live is our global Google Search event series specifically for site owners, publishers, and SEOs.




ola

Un nouveau monde bipolaire.

Avec la fin du communisme, nous devions assister à la fin de l’histoire mais les crises économiques en ont décidé autrement. Et ce d’autant plus que depuis, les problématiques de déclassement social, territorial et de questionnement « identitaires » n’ont...




ola

Electronic disciplinary violations and methods of proof in Jordanian and Egyptian laws

The use of electronic means of a public official in carrying out their duties may lead to an instance wherein the person discloses confidential information, which can significantly impact their obligations. After verifying this act as part of electronic misconduct, disciplinary action is enforced upon the concerned party to rectify and ensure proper functioning in delivering public services without any disturbance or infringement. The study presents several significant findings regarding the absence of comparative regulations concerning electronic violations and their judicial evidence. It provides recommendations such as modifying legislative frameworks to enhance public utility disciplinary systems and incorporating rules for electric violations. The fundamental focus revolves around assessing, verifying, and punishing digital misconduct by management or regulatory bodies. Additionally, this research employs descriptive-analytical methods comparing the Jordanian Law with its Egyptian counterpart in exploring these issues.




ola

Transformative advances in volatility prediction: unveiling an innovative model selection method using exponentially weighted information criteria

Using information criteria is a common method for making a decision about which model to use for forecasting. There are many different methods for evaluating forecasting models, such as MAE, RMSE, MAPE, and Theil-U, among others. After the creation of AIC, AICc, HQ, BIC, and BICc, the two criteria that have become the most popular and commonly utilised are Bayesian IC and Akaike's IC. In this investigation, we are innovative in our use of exponential weighting to get the log-likelihood of the information criteria for model selection, which means that we propose assigning greater weight to more recent data in order to reflect their increased precision. All research data is from the major stock markets' daily observations, which include the USA (GSPC, DJI), Europe (FTSE 100, AEX, and FCHI), and Asia (Nikkei).




ola

Introducing Students to Business Intelligence: Acceptance and Perceptions of OLAP Software




ola

Comparing Social Isolation Effects on Students Attrition in Online Versus Face-to-Face Courses in Computer Literacy

This paper compares the effect of social isolation on students enrolled in online courses versus students enrolled in on campus courses (called in this paper Face-to-Face or F2F). Grade data was collected from one online section and two F2F sections of a computer literacy course that was recently taught by one of the authors of this study. The same instructor taught all sections thereby providing a controlled comparison between the two forms of teaching (F2F and online). This paper first introduces the plan and the limitation of this study. It provides a literature review and notes the trend of social isolation found in online courses. This paper then presents a summary of the collected data; and offers a conclusion based on the collected data.




ola

The Role of Informing Systems in Securing Sanity and Wisdom of the Globalizing Society in the Context of Civilization Sustainability in the 21st Century: The Case of Poland

Aim/Purpose: To monitor Sustainability Development Goals (SDG) established by the United Nations through the hierarchical architecture of informing systems Background: The paper discusses the case of Poland and its Gdansk region Contribution: The solution combines the big-picture of civilization with small-picture of a nation, regions, cities, and firms Findings: The presented solution can be implemented if the political will can be secured. Recommendations for Practitioners: Take the main idea of this paper and adapt to your local case. Recommendation for Researchers: Develop some prototypes of presented informing systems and test in your local environment Impact on Society: The success of the sustainability of globalizing society can be secured if the coherent informing systems can be applied to the planning, monitoring, and implementation of the UN's universal SDG. Future Research: Work on the modeling of costs and benefits of the presented solution.




ola

How Different Are Johnson and Wang? Documenting Discrepancies in the Records of Ethnic Scholars in Scopus

Aim/Purpose. This study captures and describes the discrepancies in the performance matrices of comparable Chinese and American scholars as recorded by Scopus. Background. The contributions of Chinese scholars to the global knowledge enterprise are increasing, whereas indexing bibliometric databases (e.g., Scopus) are not optimally designed to track their names and record their work precisely. Methodology. Coarsened exact matching was employed to construct two samples of comparable Chinese and American scholars in terms of gender, fields of work, educational backgrounds, experience, and workplace. Under 200 scholars, around a third being Chinese and the rest American scholars, were selected through this data construction method. Statistical tests, including logit regressions, Poisson regression, and fractional response models, were applied to both samples to measure and verify the discrepancies stored within their Scopus accounts. Contribution. This study complicates the theory of academic identity development, especially on the intellectual strand, as it shows ethnic scholars may face more errors in how their track records are stored and presented. This study also provides inputs for the discussion of algorithmic discrimination from the academic context and to the scientific community. Findings. This paper finds that Chinese scholars are more prone to imprecise records in Scopus (i.e., more duplicate accounts, a higher gap between the best-statistic accounts, and the total numbers of publications and citations) than their American counterparts. These findings are consistent across two samples and with different statistical tests. Recommendations for Practitioners. This paper suggests practitioners and administrators at research institutions treat scholars’ metrics presented in Scopus or other bibliometric databases with caution while evaluating ethnic scholars’ contributions. Recommendations for Researchers. Scholars and researchers are suggested to dedicate efforts to monitoring their accounts on indexing bibliometric platforms. Impact on Society. This paper raises awareness of the barriers that ethnic scholars face in participating in the scientific community and being recognized for their contributions. Future Research. Future research can be built on this paper by expanding the size of the analytical samples and extending similar analyses on comparable data harvested from other bibliometric platforms.




ola

The Use of ICT for Economic Development in the Silesian Region in Poland




ola

Critical Success Factors for Implementing Business Intelligence Systems in Small and Medium Enterprises on the Example of Upper Silesia, Poland




ola

The Survey of Information Systems in Public Administration in Poland




ola

Mise en Scène: A Film Scholarship Augmented Reality Mobile Application




ola

Understanding Internal Information Systems Security Policy Violations as Paradoxes

Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful.




ola

Prosumers’ Engagement in Business Process Innovation – The Case of Poland and the UK

Aim/Purpose: The main purpose of this paper is to identify prosumers’ engagement in business process innovation through knowledge sharing. Background: In the increasingly competitive knowledge-based economy, companies must seek innovative methods of doing business, quickly react to consumer demand, and provide superior value to consumers. Simultaneously, contemporary consumers, named “prosumers”, want to be active co-creators of value and satisfy their consumption needs through collaboration with companies for co-creation, co-design, co-production, co-promotion, co-pricing, co-distribution, co-consumption, and co-maintenance. Consequently, consumer involvement in development and improvement of products and business process must be widely analyzed in various contexts. Methodology: The research is a questionnaire survey study of 388 prosumers in Poland and 76 in the UK. Contribution The contribution of this research is twofold. First, it identifies how prosumers can be engaged in business processes through knowledge sharing. Second, it investigates the differences between Poland- and UK-based prosumers in engagement in business process. Findings: The study found that prosumers are engaged in knowledge sharing at each stage of the business process innovation framework. However, there are differences in the types of processes that draw on prosumers’ engagement. Prosumers in Poland are found to engage mostly in the business process of developing and managing products, whereas prosumers in the UK engage mostly in the business process of managing customer services. Recommendations for Practitioners: This study provides practitioners with guidelines for engaging prosumers and their knowledge sharing to improve process innovation. Companies gain new insight from these findings about prosumers’ knowledge sharing for process innovation, which may help them make better decisions about which projects and activities they can engage with prosumers for future knowledge sharing and creating prospective innovations. Recommendations for Researchers: Researchers may use this methodology and do similar analysis with different samples in Poland, the UK, and other countries, for many additional comparisons between different groups and countries. Moreover, a different methodology may be used for identifying prosumers’ engagement and knowledge sharing for processes improvement. Future Research: This study examined prosumers’ engagement from the prosumers’ standpoint. Therefore prosumers’ engagement from the company perspective should be explored in future research.




ola

Investigating the Impact of Dual Network Embedding and Dual Entrepreneurial Bricolage on Knowledge-Creation Performance: An Empirical Study in Fujian, China

Aim/Purpose: This study investigates the relationship between dual network embedding, dual entrepreneurial bricolage, and knowledge-creation performance. Background: The importance of new ventures for innovation and economic growth has been fully endorsed. Establishing incubation organizations to help new startups overcome constraints and dilemmas has become the consensus of various countries. In particular, the number of Chinese makerspaces has rapidly increased. Startups in the makerspaces form a loosely coupled dual network to cooperate and share resources, especially knowledge. Methodology: By convenience sampling, 400 startups in the makerspaces in Fujian Province, China were selected for the questionnaire survey study. In total, 307 valid responses were collected, yielding a response rate of 76.8%. The survey data were analyzed for hypothesis testing, using the PL-SEM technique with the AMOS20.0 software. Contribution: At the theoretical level, this research supplements the exploration of the influencing factors of the entrepreneurial bricolage of startups at the network level. It deepens the research on the internal mechanism of the dual network embeddedness affecting the knowledge-creation performance. In practice, it provides a theoretical basis and management inspiration for startups in makerspaces to overcome the inherent disadvantage of being too small and weak to explore innovative paths. Findings: First, relational embedding of startups in makerspaces directly affects knowledge-creation performance. Second, dual entrepreneurial bricolage plays a mediating role in diversity. Selective entrepreneurial bricolage plays a partial mediating role between relationship embedding and knowledge-creation performance. Parallel entrepreneurial bricolage plays a complete intermediary role between structural embedding and knowledge-creation performance. Dual entrepreneurial bricolage plays a complete intermediary role between knowledge embedding and knowledge-creation performance. Recommendations for Practitioners: Enterprises in the makerspaces should make dynamic adjustments to the network embedded state and dual entrepreneurial bricolage to improve knowledge-creation performance. When startups conduct selective entrepreneurship bricolage, they should strengthen relational and knowledge embeddedness to improve their relationship strength and tacit knowledge acquisition. When startups conduct parallel entrepreneurship bricolage, structural and knowledge embedding should be strengthened to improve the position of enterprises in the network to acquire diversified knowledge to explore and discover new business opportunities and project resources. Recommendation for Researchers: The heterogeneity of industries and regions may impact the dual network embedding mechanism of startups. Researchers can choose a wider range of regions and industries for sampling. Impact on Society: This study provides a theoretical basis and management inspiration for startups to overcome the inherent disadvantage of being too small and weak to explore innovative paths. It provides a basis to support startups in unleashing innovation vitality and achieving healthy growth. Future Research: Previous studies have shown that network relationships and bricolage behavior have a certain relationship with the enterprise life cycle. Future research can adopt a longitudinal research design across time points, which will increase the explanatory power of research conclusions.




ola

ISOLATING TRUST OUTCOMES FROM EXCHANGE RELATIONSHIPS: SOCIAL EXCHANGE AND LEARNING BENEFITS OF PRIOR TIES IN ALLIANCES

Social exchange theory is a broad theory that has been used to explain trust as an outcome of various exchange relationships, and research commonly presumes trust exists between exchange partners that have prior relationships. In this paper, we contribute to social exchange theory by isolating the trust outcomes of interorganizational exchanges from other outcomes emphasized by learning and knowledge-based perspectives, and by specifying important boundary conditions for the emergence of trust in interorganizational exchanges. We make such a theoretical contribution within the domain of strategic alliances by investigating the effects of previous alliance agreements, or prior ties, between the partnering firms. We find that prior ties generally lead to learning about a partner's anticipated behavioral patterns, which helps a firm predict when self-interested behavior may occur and know how to interact with the partner during the coordination and execution of the alliance tasks. By contrast, it is evident that the kind of trust emphasized in social exchange theory is not generally rooted in prior ties and only emerges from prior relationships under certain conditions. We discuss the implications of these findings for research on social exchange theory and for delineating the theory's domain of applicability.




ola

What David Foster Wallace can teach management scholars

Book Review




ola

Upholding academic freedom is a scholar’s imperative

I HAD the privilege of attending a lecture by Professor Jeffrey Sachs of Columbia University at Universiti Malaya in early January this year.

His candid critique of US economic and foreign policies was both striking and inspiring.

Remarkably, his criticisms were delivered without hindrance and were even appreciated.

Our nation’s highest leaders, the prime minister and higher education minister, were present to listen to his insights.

Ironically, in Malaysia, the academic freedom of our local scholars is still curtailed by Act 605.

The developments at Universiti Kebangsaan Malaysia and the continued existence of legislation that can be used against critical voices within academia should be taken seriously by the academic community and academic unions nationwide.

We cannot allow academic freedom – a cornerstone of the intellectual tradition – to be so easily stifled.

Academic freedom must be preserved, defended and enshrined in law.

In this context, it is crucial to remember that every Oct 5, Malaysia celebrates Academia Day, an annual reminder to appreciate the contributions and struggles of academics worldwide.

On this significant day, stakeholders such as the government, higher education institutions and academic unions should redouble their efforts to uphold and promote the principle of academic freedom.

Academia Day is not merely a celebration of knowledge but a reminder to ensure that the rights of academics continue to be respected and protected.

As public servants are paid with taxpayers’ money, the views of academics should be publicly accessible to the people.

The public has a right to hear their criticisms, research findings and direct commentaries on policies and decisions that affect the nation.

In today’s post-modern era, social media serves as a platform for both local and international academics to constructively express their views on national policies.

If these voices are silenced, all that remains is content that does not contribute to the nation’s development, such as shallow entertainment or sensational issues of no value.

Academics do not merely engage in idle chatter; they share research findings funded by public grants, using validated research instruments to critique and improve existing systems.

For instance, academics are among the critical voices that are actively voicing concerns about the state of the country’s education system based on the findings of their research, using the CIPP (Context, Input, Process and Product) model of curriculum evaluation.

Academics are specifically trained to think critically and analytically, and they are accountable for whatever they produce as my PhD supervisor once reminded me, “Question everything, even the accepted wisdom.”

If this critical thinking is stifled, it is a waste of public funds that finance the higher education of these scholars.

Returning to Sachs’ lecture, our nation will not be able to produce scholars of his calibre if the mouths and hands of our academics are tied by restrictive laws and regulations.

Therefore, academic freedom should be enshrined in stronger laws, such as amendments to the Universities and University Colleges Act.

Certainly other academics and I welcome the statement by Higher Education Minister Datuk Seri Dr Zambry Abdul Kadir, who supports the amendment of Act 605, and we are aware that this amendment effort has gone through important processes as initiated by former education minister Dr Maszlee Malik. Therefore, it should not take long to implement.

This is important so that there are no more circulars or instructions from higher education institutions that attempt to silence legitimate dissent.

If local academics are prevented from voicing their opinions and criticisms for the good of the nation, then there is no point in talking about efforts to educate the people.

Without academic freedom, we will not be able to produce academic figures of the calibre of Sachs, Professor Joseph Stiglitz or Professor Noam Chomsky, who dare to go against the grain and champion the truth.

Freedom of expression for academics is the cornerstone of a nation’s intellectual and moral development.

If we want this country to produce outstanding scholars, we must loosen the bonds of restrictive regulations.

Only with true academic freedom can we ensure that the nation’s intellectual future continues to grow and be competitive on the international stage.

The writer is a senior lecturer at the Department of Building Surveying, Faculty of Built Environment, Universiti Malaya. Comments: letters@thesundaily.com



  • Dr Zahiruddin Fitri Abu Hassan

ola

Zendaya, Tom Holland in cast for Christopher Nolan's next movie

Celebrity couple Tom Holland and Zendaya are the highlight names in the cast for Academy Award-winning director Christopher Nolan's next movie.




ola

openscholar/modules/os/modules/os_migrate/docs/known_issues.md at SCHOLAR-3-0 · openscholar/openscholar · GitHub

Tags:




ola

Using & Managing Apps | OpenScholar Documentation

OpenScholar help site

Tags:




ola

How to customize main front page-OpenScholar 3.0

Tags:




ola

International confab urges India to stop human rights violations in IIOJK

Distinguished guests from the UK, US, Pakistan and other parts of the world participated in conference




ola

India misleading world on human rights violations in IIOJK: AJK president

Sardar Masood says occupation forces is crushing defenceless, weak and unarmed Kashmiri people




ola

Solar power outpaces wind for record-breaking duration

Solar electricity generation exceeded wind generation in May by 1.65 terawatt hours (TWh), and in June by 9.57 TWh




ola

Israeli pleads guilty to violating US sanctions by exporting missile tech to Russia

US Justice Dept announces Haimovich's actions include shipment of components with missile technology applications




ola

Tales of survivors: ‘Isolation, not coronavirus, was my worst nightmare’

I was convinced that if my time is not up, this virus can never kill me




ola

NGO offers transgender people foreign scholarships

Programme will allow selected persons to attend month-long training in host country




ola

Analog Equivalent Rights (17/21): The Previous Inviolability of Diaries

Privacy: For our analog parents, a diary or a personal letter could rarely be touched by authorities, not even by law enforcement searching for evidence of a crime. Objects such as these had protection over and above the constitutional privacy safeguards. For our digital children, however, the equivalent diaries and letters aren’t even considered worthy of basic constitutional privacy.

In most jurisdictions, there is a constitutional right to privacy. Law enforcement in such countries can’t just walk in and read somebody’s mail, wiretap their phonecalls, or track their IP addresses. They need a prior court order to do so, which in turn is based on a concrete suspicion of a serious crime: the general case is that you have a right to privacy, and violations of this rule are the exception, not the norm.

However, there’s usually a layer of protection over and above this: even if and when law enforcement gets permission from a judge to violate somebody’s privacy in the form of a search warrant of their home, there are certain things that may not be touched unless specific and additional permissions are granted by the same type of judge. This class of items includes the most private of the personal: private letters, diaries, and so on.

Of course, this is only true in the analog world of our parents. Even though the letter of the law is the same, this protection doesn’t apply at all to the digital world of our children, to their diaries and letters.

Because the modern diary is kept on a computer. If not on a desktop computer, then certainly on a mobile handheld one — what we’d call a “phone” for historical reasons, but what’s really a handheld computer.

And a computer is a work tool in the analog world of our parents. There are loads of precedent cases that establish any form of electronic device as a work tool, dating back well into the analog world, and law enforcement is falling back on all of them with vigor, even now that our digital devices are holding our diaries, personal letters, and other items far more private than an analog diary was ever capable of.

That’s right: whereas your parents’ diaries were extremely protected under the law of the land, your children’s diaries — no less private to them, than those of your parents were to your parents — are as protected from search and seizure as an ordinary steel wrench in a random workshop.

So the question is how we got from point A to point B here? Why are the Police, who know that they can’t touch an analog diary during a house search, instantly grabbing mobile phones which serve the same purpose for our children?

“Because they can”, is the short answer. “Also because nobody put their foot down” for advanced points on the civics course. It’s because some people saw short term political points in being “tough on crime” and completely erasing hard-won rights in the process.

Encrypt everything.




ola

Imran violated PTI's constitution in nominating Raja as secretary general

PTI leader Salman Akram Raja and founder Imran Khan. —Screengrab/ X/ @salmanAraja/ Instagram/ @ptiofficial/ FileOmar Ayub's resignation not yet formally accepted.Gohar says Raja’s work as secy gen is internal matter.PTI Constitution has no provision for secy gen's nomination.



ola

PTI top leaders, SIC chief released after brief arrest for ‘violating' Section 144

Punjab police personnel arresting top PTI leaders and SIC chief outside Rawalpindi's Adiala jail on November 12, 2024. — ReporterAyub, Qaiser, Raza were detained outside Adiala Jail.Police say top politicians arrested for violating Section 144. PTI says politicians were waiting...




ola

TomTom & Nuon Solar Team join forces to create intelligent solar car

TomTom & Nuon Solar Team join forces to create intelligent solar car




ola

Theater festival offers solace in Burkina Faso, a nation torn by violence

The last three years have been tough for Fanta Charlotte Dabone, a mother of three from the conflict-battered West African country of Burkina Faso.




ola

U.N. force: Israel building on so-called Alpha Line with Syria saw 'severe violations' of cease-fire

United Nations peacekeepers warned Tuesday that the Israeli military has committed "severe violations" of a cease-fire deal with Syria as its military continues a major construction project along the so-called Alpha Line that separates the Israeli-occupied Golan Heights from Syria.




ola

German Chancellor Olaf Scholz says he'll ask for a vote of confidence in December

German Chancellor Olaf Scholz has announced that he will ask for a vote of confidence on Dec. 16, paving the way forward for an early parliamentary election in February.




ola

USC football gets 1 year of probation, fined $50,000 by NCAA for violating coaching staff rules

Southern California's football program has been fined $50,000 and placed on probation for one year by the NCAA because of multiple violations of coaching staff rules over two seasons.