loc Trump blocked me on Twitter. But for democracy’s sake, we can’t ban him. By plasticbag.org Published On :: Wed, 10 Jan 2018 11:33:00 +0000 Twitter is one of the closest things we have today to a de facto "public space" on the internet. Full Article Journalism Politics Social Software Technology
loc Lockdown Photography (Part One) By plasticbag.org Published On :: Tue, 19 May 2020 07:23:04 +0000 When this whole horrible COVID19 experience started—back when we thought maybe we’d be in lockdown for a few weeks, not a few months to a year—I thought to myself that at least it might be something worthy of documenting with my camera. I considered the world so changed and strange in this moment in time […] Full Article Life Photography
loc The London News Sites Reinvigorating Local Journalism By londonist.com Published On :: Wed, 06 Nov 2024 10:00:01 +0000 The Londoner, The London Spy, London Centric... Full Article London journalism news
loc Court ruling conceals local government records from the public By www.mackinac.org Published On :: Tue, 29 Oct 2024 06:10:00 -0400 Decision creates incentives for more secrecy Full Article
loc SDL Trados Studio ? Corrupt file: Missing locked content for Oasis.Xliff 12.x. By blog.cinciala.eu Published On :: Fri, 21 Nov 2014 09:35:43 +0000 I recently accepted a large proofreading job to be completed in SDL Trados Studio 2014. All seemed to be fine until I tried to open some of the project files. This article describes how to deal with “Corrupt file: Missing … Continue reading → Full Article Computer-aided Translation Software-related
loc Linguistic Alchemy to unlock AutoHotkey By multifarious.filkin.com Published On :: Mon, 31 Jul 2023 15:20:02 +0000 In the echoing halls of the Tower of Babel, myriad languages tangled, creating a confusion of tongues and leaving humans estranged. Fast forward to the present day, professional translators stand as the modern-day heroes, bridging linguistic divides and fostering global connections. Yet, these linguists often grapple with the technical juggernaut of AutoHotkey scripting. AutoHotkey, an … Continue reading Linguistic Alchemy to unlock AutoHotkey Full Article Studio Tips Useful tools AI artificial intelligence autohotkey ChatGPT
loc Platform-as-a-Service freedom or lock-in By pzf.fremantle.org Published On :: Tue, 25 May 2010 09:25:00 +0000 There has been a set of discussions about lock-in around Platform-as-a-Service (PaaS): Joe McKendrick and Lori MacVittie in particular bring out some of the real challenges here. Lori brings out the difference between portability and mobility. While I'm not in 100% agreement with Lori's definitions, there is a key point here: its not just code, its the services that the code relies on that buy lock-in into a cloud. So for example, if you use Amazon SQS, Force.com Chatter Collaboration, Google App Engine's bigtable data store, all of these tie you into the cloud you are deployed onto. Amazon isn't really a PaaS yet, so the tie-in is minimal, but Google App Engine (GAE) is based on Authentication, Logging, Data, Cache and other core services. Its almost impossible to imagine building an app without these, and they all tie you into GAE. Similarly, VMForce relies on a set of services from force.com. But its not just about mobility between force.com and Google: between two PaaSes. The typical enterprise needs a private cloud as much as public cloud. So there is a bigger question: Can you move your application from a private PaaS to a public Paas and back again? In other words, even if Google and Force got together and defined a mobility layer, can I then take an app I built and run it internally? Neither Google nor Force is offering a private PaaS. The second key question is this: How can I leverage standard Enterprise Architecture in a PaaS?What I'm getting at here is that as the world starts to implement PaaS, does this fit with existing models? Force.com and Google App Engine have effectively designed their own world view. VMForce and the recent Spring/Google App Engine announcement address one aspect of that - what Lori calls portability. By using Spring as an application model, there is at least a passing similarity to current programming models in Enterprises. But Enterprise Architectures are not just about Java code: what about an ESB? What about a Business Process engine (BPMS)? What about a standard XACML-based entitlement engine? So far PaaS has generally only addressed the most basic requirements of Enterprise core services: databases and a identity model. So my contention is this: you need a PaaS that supports the same core services that a modern Enterprise architecture has: ESB, BPMS, Authentication/Authorization, Portal, Data, Cache, etc. And you need a PaaS that works inside your organization as well as in a public Cloud. And if you really don't want any lock-in.... hadn't that PaaS better be Open Source as well? And yes, this is a hint of things coming very soon! Full Article
loc De Trump à Villiers, quand sonnent les cloches By www.lepoint.fr Published On :: Wed, 13 Nov 2024 06:00:00 +0100 L'EDITO DE FOG. Trump, rempart contre l'ideologie des elites. En France, une partie de la classe politique, en pleine deconstruction, serait-elle en train de pratiquer l'<< ablation de la memoire >>, selon la formule de Philippe de Villiers ? Full Article
loc Coordinated System for Real Time Muscle Deformation during Locomotion By www.jucs.org Published On :: 2011-04-24T11:14:51+02:00 This paper presents a system that simulates, in real time, the volumetric deformation of muscles during human locomotion. We propose a two-layered motion model. The requirements of realism and real time computation lead to a hybrid locomotion system that uses a skeleton as first layer. The muscles, represented by an anatomical surface model, constitute the second layer, whose deformations are simulated with a finite element method (FEM). The FEM subsystem is fed by the torques and forces got from the locomotion system, through a line of action model, and takes into account the geometry and material properties of the muscles. High level parameters (like height, weight, physical constitution, step frequency, step length or speed) allow to customize the individuals and the locomotion and therefore, the deformation of the persons' muscles. Full Article
loc B.C. ports lockout update: Union says it will challenge Ottawa’s intervention in work stoppages - Vancouver Sun By news.google.com Published On :: Tue, 12 Nov 2024 22:41:39 GMT B.C. ports lockout update: Union says it will challenge Ottawa’s intervention in work stoppages Vancouver SunUnion says it will challenge Ottawa's intervention in B.C. port work stoppages CTV NewsLabour minister forcing end of negotiations at Quebec ports marks 'dark day for workers' rights,' union says CBC.caCanada orders ports to restart as labour disputes choke trade Financial PostOpinion: Stuck in the middle, and risking union support The Globe and Mail Full Article
loc Robust and secure file transmission through video streaming using steganography and blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication. Full Article
loc Secure digital academic certificate verification system using blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving. Full Article
loc Springs of digital disruption: mediation of blockchain technology adoption in retail supply chain management By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Supply chain management practices are vital for success and survival in today's competitive Indian retail market. The advent of COVID-19 pandemic necessitates a digital disruption in retail supply chain management centred on efficient technology like blockchain in order to enhance supply chain performance. The present research aims to decipher the nature of associations between supply chain management practices, blockchain technology adoption and supply chain performance in retail firms. The research is based on primary survey of specific food and grocery retailers operating on a supermarket format stores in two Indian cities. The findings pointed towards the presence of significant and positive association of all the constructs with each other. Moreover, the mediating role of blockchain technology adoption was also revealed, i.e., it partially mediates the effects of supply chain management practices on supply chain performance. Full Article
loc An effective differential privacy protection method of location data based on perturbation loss constraint By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 Differential privacy is usually applied to location privacy protection scenarios, which confuses real data by adding interference noise to location points to achieve the purpose of protecting privacy. However, this method can result in a significant amount of redundant noisy data and impact the accuracy of the location. Considering the security and practicability of location data, an effective differential privacy protection method of location data based on perturbation loss constraint is proposed. After applying the Laplace mechanism under the condition of differential privacy to perturb the location data, the Savitzky-Golay filtering technology is used to correct the data with noise, and the data with large deviation and low availability is optimised. The introduction of Savitzky-Golay filtering mechanism in differential privacy can reduce the error caused by noise data while protecting user privacy. The experiments results indicate that the scheme improves the practicability of location data and is feasible. Full Article
loc Access controllable multi-blockchain platform for enterprise R&D data management By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 In the era of big data, enterprises have accumulated a large amount of research and development data. Effective management of their precipitated data and safe sharing of data can improve the collaboration efficiency of research and development personnel, which has become the top priority of enterprise development. This paper proposes to use blockchain technology to assist the collaboration efficiency of enterprise R&D personnel. Firstly, the multi-chain blockchain platform is used to realise the data sharing of internal data of enterprise R&D data department, project internal data and enterprise data centre, and then the process of construction of multi-chain structure and data sharing is analysed. Finally, searchable encryption was introduced to achieve data retrieval and secure sharing, improving the collaboration efficiency of enterprise research and development personnel and maximising the value of data assets. Through the experimental verification, the multi-chain structure improves the collaboration efficiency of researchers and data security sharing. Full Article
loc Blockchain powered e-voting: a step towards transparent governance By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 Elections hold immense significance in shaping the leadership of a nation or organisation, serving as a pivotal moment that influences the trajectory of the entity involved. Despite their centrality to modern democratic systems, elections face a significant hurdle: widespread mistrust in the electoral process. This pervasive lack of confidence poses a substantial threat to the democratic framework, even in the case of prominent democracies such as India and US, where inherent flaws persist in the electoral system. Issues such as vote rigging, electronic voting machine (EVM) hacking, election manipulation, and polling booth capturing remain prominent concerns within the current voting paradigm. Leveraging blockchain for electronic voting systems offers an effective solution to alleviate the prevailing apprehensions associated with e-voting. By incorporating blockchain into the electoral process, the integrity and security of the system could be significantly strengthened, addressing the current vulnerabilities and fostering trust in democratic elections. Full Article
loc The Implementation of Hypertext-based Learning Media for a Local Cultural Based Learning By Published On :: Full Article
loc Research on construction of police online teaching platform based on blockchain and IPFS technology By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 Under the current framework of police online teaching, in order to effectively solve the lack of high-quality resources of the traditional platform, backward sharing technology, poor performance of the digital platform and the privacy problems faced by each subject in sharing. This paper designs and implements the online teaching platform based on blockchain and interplanetary file system (IPFS). Based on the architecture of a 'decentralised' police online teaching platform, the platform uses blockchain to store hashes of encrypted private information and user-set access control policies, while the real private information is stored in IPFS after encryption. In the realisation of privacy information security storage at the same time to ensure the effective control of the user's own information. In order to achieve flexible rights management, the system classifies private information. In addition, the difficulties of police online teaching and training reform in the era of big data are solved one by one from the aspects of communication mode, storage facilities, incentive mechanism and confidentiality system, which effectively improves the stability and security of police online teaching. Full Article
loc Online allocation of teaching resources for ideological and political courses in colleges and universities based on differential search algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the classification accuracy and online allocation accuracy of teaching resources and shorten the allocation time, this paper proposes a new online allocation method of college ideological and political curriculum teaching resources based on differential search algorithm. Firstly, the feedback parameter model of teaching resources cleaning is constructed to complete the cleaning of teaching resources. Secondly, according to the results of anti-interference consideration, the linear feature extraction of ideological and political curriculum teaching resources is carried out. Finally, the online allocation objective function of teaching resources for ideological and political courses is constructed, and the differential search algorithm is used to optimise the objective function to complete the online allocation of resources. The experimental results show that this method can accurately classify the teaching resources of ideological and political courses, and can shorten the allocation time, with the highest allocation accuracy of 97%. Full Article
loc Evaluation method of cross-border e-commerce supply chain innovation mode based on blockchain technology By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In view of the low evaluation accuracy of the effectiveness of cross-border e-commerce supply chain innovation model and the low correlation coefficient of innovation model influencing factors, the evaluation method of cross-border e-commerce supply chain innovation model based on blockchain technology is studied. First, analyse the operation mode of cross-border e-commerce supply chain, and determine the key factors affecting the innovation mode; Then, the comprehensive integration weighting method is used to analyse the factors affecting innovation and calculate the weight value; Finally, the blockchain technology is introduced to build an evaluation model for the supply chain innovation model and realise the evaluation of the cross-border e-commerce supply chain innovation model. The experimental results show that the evaluation accuracy of the proposed method is high, and the highest correlation coefficient of the influencing factors of innovation mode is about 0.99, which is feasible. Full Article
loc Location-Oriented Knowledge Management in a Tourism Context: Connecting Virtual Communities to Physical Locations By Published On :: Full Article
loc The Importance of Partnerships: The Relationship between Small Businesses, ICT and Local Communities By Published On :: Full Article
loc Designing an ‘Electronic Village’ of Local Interest on Tourism: The eKoNES Framework By Published On :: Full Article
loc Locating the Weak Points of Innovation Capability before Launching a Development Project By Published On :: Full Article
loc The Utilisation of Facebook for Knowledge Sharing in Selected Local Government Councils in Delta State, Nigeria By Published On :: 2017-09-07 Aim/Purpose: Facebook has made it possible for organisation to embrace social and network centric knowledge processes by creating opportunities to connect, interact, and collaborate with stakeholders. We have witnessed a significant increase in the popularity and use of this tool in many organisations, especially in the private sector. But the utilisation of Facebook in public organisations is at its infancy, with many also believing that the use of Facebook is not a common practice in many public organisations in Nigeria. In spite of this fact, our discernment on the implications of Facebook usage in public organisations in Nigeria, especially organisations at the local level, seem to be remarkably limited. This paper specifically sought to ascertain if Facebook usage influenced inward and outward knowledge sharing in the selected local government councils in Delta State, Nigeria Methodology: The qualitative method was adopted. The study used interview as the primary means of data gathering. The study purposively sampled thirty-six employees as interviewees, twenty from Oshimili South and sixteen from Oshimili North local government councils respectively. The thematic content analysis method was used to analyse interview transcripts. Contribution: This research made distinct contributions to the available literature in social knowledge management, specifically bringing to the fore the intricacies surrounding the use of Facebook for knowledge sharing purposes in the public sector. Findings: The local government councils were yet to appreciate and utilise the interactive and collaborative nature of Facebook in improving stakeholders’ engagement, feedback, and cooperation. Facebook was used for outward knowledge sharing but not for inward knowledge sharing. Recommendations for Practitioners: Local government councils should encourage interaction via Facebook, show willingness to capture knowledge from identifiable sources, and effectively manage critical knowledge assets in order to build trust, cooperation, and confidence in the system. To gain strategic benefits from the use of Facebook for synchronous communication of knowledge, local government councils should ensure that the use of such technology is aligned with strategic plans and that directional change is in line with the new knowledge economy, where interaction and collaboration through technology are seen as strategic imperatives for continued success and sustainability. In addition, local government councils need to train stakeholders on effective use of Facebook for knowledge sharing, with special emphasis on how, why, who, when, and where to use such tool for knowledge sharing activities. Full Article
loc Establishing a Security Control Framework for Blockchain Technology By Published On :: 2021-07-27 Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different industries throughout the world, such as finance, supply chain, digital identity, energy, healthcare, real estate, and the government sector. Methodology: Risk assessment and treatments were performed on five blockchain use cases to determine their associated risks with respect to security controls. Contribution: The significance of the proposed security controls is manifested in complementing the frameworks that were already established by the International and National Information Security Standards in order to keep pace with the emerging blockchain technology and prevent/reduce its associated information security risks. Findings: The analysis results showed that the proposed security controls herein can mitigate relevant information security risks in blockchain-based solutions and applications and, consequently, protect information and assets from unauthorized disclosure, modification, and destruction. Recommendations for Practitioners: The performed risk assessment on the blockchain use cases herein demonstrates that blockchain can involve security risks that require the establishment of certain measures in order to avoid them. As such, practitioners should not blindly assume that through the use of blockchain all security threats are mitigated. Recommendation for Researchers: The results from our study show that some security risks not covered by existing Standards can be mitigated and reduced when applying our proposed security controls. In addition, researchers should further justify the need for such additional controls and encourage the standardization bodies to incorporate them in their future editions. Impact on Society: Similar to any other emerging technology, blockchain has several drawbacks that, in turn, could have negative impacts on society (e.g., individuals, entities and/or countries). This is mainly due to the lack of a solid national and international standards for managing and mitigating risks associated with such technology. Future Research: The majority of the blockchain use cases in this study are publicly published papers. Therefore, one limitation of this study is the lack of technical details about these respective solutions, resulting in the inability to perform a comprehensive risk identification properly. Hence, this area will be expanded upon in our future work. In addition, covering other standardization bodies in the area of distributed ledger in blockchain technology would also prove fruitful, along with respective future design of relevant security architectures. Full Article
loc Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa By Published On :: 2021-04-05 Aim/Purpose: The paper’s objective is to examine the challenges of using the mobile phone to mine location data for effective contact tracing of symptomatic, pre-symptomatic, and asymptomatic individuals and the implications of this technology for public health governance. Background: The COVID-19 crisis has created an unprecedented need for contact tracing across South Africa, requiring thousands of people to be traced and their details captured in government health databases as part of public health efforts aimed at breaking the chains of transmission. Contact tracing for COVID-19 requires the identification of persons who may have been exposed to the virus and following them up daily for 14 days from the last point of exposure. Mining mobile phone location data can play a critical role in locating people from the time they were identified as contacts to the time they access medical assistance. In this case, it aids data flow to various databases designated for COVID-19 work. Methodology: The researchers conducted a review of the available literature on this subject drawing from academic articles published in peer-reviewed journals, research reports, and other relevant national and international government documents reporting on public health and COVID-19. Document analysis was used as the primary research method, drawing on the case studies. Contribution: Contact tracing remains a critical strategy in curbing the deadly COVID-19 pandemic in South Africa and elsewhere in the world. However, given increasing concern regarding its invasive nature and possible infringement of individual liberties, it is imperative to interrogate the challenges related to its implementation to ensure a balance with public governance. The research findings can thus be used to inform policies and practices associated with contact tracing in South Africa. Findings: The study found that contact tracing using mobile phone location data mining can be used to enforce quarantine measures such as lockdowns aimed at mitigating a public health emergency such as COVID-19. However, the use of technology can expose the public to criminal activities by exposing their locations. From a public governance point of view, any exposure of the public to social ills is highly undesirable. Recommendations for Practitioners: In using contact tracing apps to provide pertinent data location caution needs to be exercised to ensure that sensitive private information is not made public to the extent that it compromises citizens’ safety and security. The study recommends the development and implementation of data use protocols to support the use of this technology, in order to mitigate against infringement of individual privacy and other civil liberties. Recommendation for Researchers: Researchers should explore ways of improving digital applications in order to improve the acceptability of the use of contact tracing technology to manage pandemics such as COVID-19, paying attention to ethical considerations. Impact on Society: Since contact tracing has implications for privacy and confidentiality it must be conducted with caution. This research highlights the challenges that the authorities must address to ensure that the right to privacy and confidentiality is upheld. Future Research: Future research could focus on collecting primary data to provide insight on contact tracing through mining mobile phone location data. Research could also be conducted on how app-based technology can enhance the effectiveness of contact tracing in order to optimize testing and tracing coverage. This has the potential to minimize transmission whilst also minimizing tracing delays. Moreover, it is important to develop contact tracing apps that are universally inter-operable and privacy-preserving. Full Article
loc Predicting Key Predictors of Project Desertion in Blockchain: Experts’ Verification Using One-Sample T-Test By Published On :: 2022-10-04 Aim/Purpose: The aim of this study was to identify the critical predictors affecting project desertion in Blockchain projects. Background: Blockchain is one of the innovations that disrupt a broad range of industries and has attracted the interest of software developers. However, despite being an open-source software (OSS) project, the maintenance of the project ultimately relies on small core developers, and it is still uncertain whether the technology will continue to attract a sufficient number of developers. Methodology: The study utilized a systematic literature review (SLR) and an expert review method. The SLR identified 21 primary studies related to project desertion published in Scopus databases from the year 2010 to 2020. Then, Blockchain experts were asked to rank the importance of the identified predictors of project desertion in Blockchain. Contribution: A theoretical framework was constructed based on Social Cognitive Theory (SCT) constructs; personal, behavior, and environmental predictors and related theories. Findings: The findings indicate that the 12 predictors affecting Blockchain project desertion identified through SLR were important and significant. Recommendations for Practitioners: The framework proposed in this paper can be used by the Blockchain development community as a basis to identify developers who might have the tendency to abandon a Blockchain project. Recommendation for Researchers: The results show that some predictors, such as code testing tasks, contributed code decoupling, system integration and expert heterogeneity that are not covered in the existing developer turnover models can be integrated into future research efforts. Impact on Society: This study highlights how an individual’s design choices could determine the success or failure of IS projects. It could direct Blockchain crypto-currency investors and cyber-security managers to pay attention to the developer’s behavior while ensuring secure investments, especially for crypto-currencies projects. Future Research: Future research may employ additional methods, such as a meta-analysis, to provide a comprehensive picture of the main predictors that can predict project desertion in Blockchain. Full Article
loc Unveiling Roadblocks and Mapping Solutions for Blockchain Adoption by Governments: A Systematic Literature Review By Published On :: 2023-09-04 Aim/Purpose: Blockchain technology (BCT) has emerged as a potential catalyst for transforming government institutions and services, yet the adoption of blockchain in governments faces various challenges, for which previous studies have yet to provide practical solutions. Background: This study aims to identify and analyse barriers, potential solutions, and their relations in implementing BC for governments through a systematic literature review (SLR). The authors grouped the challenges based on the Technology-Organisation-Environment (TOE) framework while exercising a thematic grouping for the solutions, followed by a comprehensive mapping to unveil the relationship between challenges and solutions. Methodology: This study employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 methodology, combined with the tollgate method, to improve the quality of selected articles. The authors further administer a three-level approach (open coding, axial coding, and selective coding) to analyse the challenges and solutions from the articles. Contribution: The authors argue that this study enriches the existing literature on BC adoption, particularly in the government context, by providing a comprehensive framework to analyse and address the unique challenges and solutions, thus contributing to the development of new theories and models for future research in BC adoption in government settings and fostering deeper exploration in the field. Findings: The authors have unveiled 40 adoption challenges categorised using the TOE framework. The most prevalent technological challenges include security concerns and integration & interoperability, while cultural resistance, lack of support and involvement, and employees’ capability hinder adoption at the organisational level. Notably, the environmental dimension lacks legal and standard frameworks. The study further unveils 28 potential solutions, encompassing legal frameworks, security and privacy measures, collaboration and governance, technological readiness and infrastructure, and strategic planning and adoption. The authors of the study have further mapped the solutions to the identified challenges, revealing that the establishment of legal frameworks stands out as the most comprehensive solution. Recommendations for Practitioners: Our findings provide a big picture regarding BC adoption for governments around the globe. This study charts the problems commonly encountered by government agencies and presents proven solutions in their wake. The authors endeavour practitioners, particularly those in governments, to embrace our findings as the cornerstone of BC/BCT adoption. These insights can aid practitioners in identifying existing or potential obstacles in adopting BC, pinpointing success factors, and formulating strategies tailored to their organisations. Recommendation for Researchers: Researchers could extend this study by making an in-depth analysis of challenges or solutions in specific types of countries, such as developed and developing countries, as the authors believe this approach would yield more insights. Researchers could also test, validate, and verify the mapping in this study to improve the quality of the study further and thus can be a great aid for governments to adopt BC/BCT fully. Impact on Society: This study provides a comprehensive exploration of BC adoption in the government context, offering detailed explanations and valuable insights that hold significant value for government policymakers and decision-makers, serving as a bedrock for successful implementation by addressing roadblocks and emphasising the importance of establishing a supportive culture and structure, engaging stakeholders, and addressing security and privacy concerns, ultimately enhancing the efficiency and effectiveness of BC adoption in government institutions and services. Future Research: Future research should address the limitations identified in this study by expanding the scope of the literature search to include previously inaccessible sources and exploring alternative frameworks to capture dynamic changes and contextual factors in BC adoption. Additionally, rigorous scrutiny, review, and testing are essential to establish the practical and theoretical validity of the identified solutions, while in-depth analyses of country-specific and regional challenges will provide valuable insights into the unique considerations faced by different governments. Full Article
loc The Role of Corporate Social Responsibility in Business Performance: The Moderation Influence of Blockchain Technology By Published On :: 2023-07-09 Aim/Purpose: The major challenges for firms to initiate corporate social responsibility (CSR) arise from resource constraints, complexity, and uncertainty. Consuming considerable financial and human resources is the main difficulty for smaller firms or those operating in less profitable industries, and the lack of immediate outputs from CSR initiatives poses a challenge for firms in prioritizing and assessing their effectiveness. Background: To better integrate CSR management into overall business strategy and decision-making processes, Blockchain technology (BCT) could potentially offer a feasible and optimal alternative to CSR reports. Methodology: This study uses the fixed effects regression by way of the Least Squares Dummy Variable (LSDV) approach in STATA to analyze the direct effect of CSR management on business performance and the moderating effect of BCT adoption on this relationship with a panel data set of 5810 observations collected from the 874 listed companies in 2015 in Taiwan Stock Exchange through 2021. Contribution: This study contributes to the literature by shedding light on the organizational factors that influence BCT adoption. Findings: The findings show that firms with high levels of CSR management have better business performance. Additionally, the adoption of BCT strengthens the positive relationship between CSR management and business performance, but it cannot replace the fundamental principles of CSR. Finally, firm size does not significantly affect BCT adoption, indicating that companies of all sizes have an equal opportunity to adopt BCT, which can help to level the playing field in terms of resources available to different firms. Recommendations for Practitioners: This study suggests that firms managing CSR practices have better business performance, and the adoption of BCTs further enhances this positive relationship. However, BCT adoption does not have the same positive effect on business performance as CSR practices. Additionally, this research can help to inform public policy related to BCT adoption and diffusion. Recommendation for Researchers: By exploring the factors that influence BCT adoption, future researchers can provide insights into the key challenges and opportunities faced by organizations of different sizes and help to develop strategies for promoting the effective adoption of BCT. Impact on Society: Given the limitations of current CSR reporting, the understanding gained from BCT applications can provide companies with an alternative mechanism to foster progress in CSR implementation. Future Research: Firstly, while the fixed-effects model might have dampened the power of explanation because it only captures within-unit variation and ignores between-unit variation, the explanatory power is further limited due to only integrating two independent variables in this model. Because of limited data availability, this study only utilizes CSR_Report and firm_size as independent variables. Future studies can consider more key factors and may lead to different results. Additionally, panel data is collected from Taiwan and, therefore, may not be representative of the broader population. Future researchers integrating the Stock Exchange of different countries are recommended. Full Article
loc Fostering Trust Through Bytes: Unravelling the Impact of E-Government on Public Trust in Indonesian Local Government By Published On :: 2024-06-27 Aim/Purpose: This study aims to investigate the influence of e-government public services on public trust at the local government level, addressing the pressing need to understand the factors shaping citizen perceptions and trust in government institutions. Background: With the proliferation of e-government initiatives worldwide, governments are increasingly turning to digital solutions to enhance public service delivery and promote transparency. However, despite the potential benefits, there remains a gap in understanding how these initiatives impact public trust in government institutions, particularly at the local level. This study seeks to address this gap by examining the relationship between e-government service quality, individual perceptions, and public trust, providing valuable insights into the complexities of citizen-government interactions in the digital age. Methodology: Employing a quantitative approach, this study utilises surveys distributed to users of e-government services in one of the regencies in Indonesia. The sample consists of 278 individuals. Data analysis is conducted using Partial Least Squares Structural Equation Modelling, allowing for the exploration of relationships among variables and their influence on public trust. Contribution: This study provides insights into the factors influencing public trust in e-government services at the local government level, offering a nuanced understanding of the relationship between service quality, individual perceptions, and public trust. Findings: This study emphasises information quality and service quality in e-government-based public services as crucial determinants of individual perception in rural areas. Interestingly, system quality in e-government services has no influence on individual perception. In the individual perception, perceived security and privacy emerge as the strongest antecedent of public trust, highlighting the need to guarantee secure and private services for citizens in rural areas. These findings emphasise the importance of prioritising high-quality information, excellent service delivery, and robust security measures to foster and sustain public trust in e-government services. Recommendations for Practitioners: Practitioners must prioritise enhancing the quality of e-government services due to their significant impact on individual perception, leading to higher public trust. Government agencies must ensure reliability, responsiveness, and the effective fulfilment of user needs. Additionally, upholding high standards of information quality in e-government services by delivering accurate, relevant, and timely information remains crucial. Strengthening security measures through robust protocols such as data encryption and secure authentication becomes essential for protecting user data. With that in mind, the authors believe that public trust in government would escalate. Recommendation for Researchers: Researchers could investigate the relation between system quality in e-government services and individual perception in different rural settings. Longitudinal studies could also elucidate how evolving service quality, information quality, and security measures impact user satisfaction and trust over time. Comparative studies across regions or countries can reveal cultural and contextual differences in individual perceptions, identifying both universal principles and region-specific strategies for e-government platforms. Analysing user behaviour and preferences across various demographic groups can inform targeted interventions. Furthermore, examining the potential of emerging technologies such as blockchain or artificial intelligence in enhancing e-government service delivery, security, and user engagement remains an interesting topic. Impact on Society: This study’s findings have significant implications for fostering public trust in government institutions, ultimately strengthening democracy and citizen-government relations. By understanding how e-government initiatives influence public trust, policymakers can make informed decisions to improve service delivery, enhance citizen engagement, and promote transparency, thus contributing to more resilient and accountable governance structures. Future Research: Future research could opt for longitudinal studies to evaluate the long-term effects of enhancements in service quality, information quality, and security. Cross-cultural investigations can uncover universal principles and contextual differences in user experiences, supporting global e-government strategies in rural areas. Future research could also improve the research model by adding more variables, such as risk aversion or fear of job loss, to gauge individual perceptions. Full Article
loc Factors Influencing Adoption of Blockchain Technology in Jordan: The Perspective of Health Care Professionals By Published On :: 2024-05-16 Aim/Purpose: This paper investigates the user acceptability of blockchain technology in the healthcare sector, with a specific focus on healthcare professionals in Jordan. Background: The study seeks to identify the factors that affect healthcare professionals’ use and acceptance of blockchain technology in Jordan. Methodology: The study’s research framework integrates factors from the Technology Acceptance Model (TAM) and the Unified Theory of Acceptance and Use of Technology (UTAUT). A questionnaire was distributed to collect data from 372 healthcare professionals in Jordan, and the results were analyzed using structural equation modeling based on the Partial Least Square (PLS) technique. Contribution: While only a few previous studies have explored blockchain technology acceptance in the healthcare sector using either the TAM or the UTAUT, this study uniquely integrates elements from both models, offering a novel approach that provides a comprehensive understanding of the factors that influence the acceptance of blockchain technology among healthcare professionals in Jordan. The findings can assist decision-makers in developing strategies to enhance the adoption rate of blockchain technology in the Jordanian healthcare sector. Findings: The study revealed that usability, convenience, privacy and security, cost, and trust significantly impact the perceived usefulness of blockchain technology. The findings also suggest that healthcare professionals are more likely to have a positive attitude towards blockchain-based healthcare systems if they perceive them as useful and easy to use. Attitude, social influence, and facilitating conditions were found to significantly impact behavioral intention to use. Recommendations for Practitioners: Stakeholders should focus on developing blockchain-based healthcare systems that are easy to use, convenient, efficient, and effort-free. Recommendation for Researchers: Researchers may compare the acceptance of blockchain technology in the healthcare sector with other industries to identify industry-specific factors that may influence adoption. This comparative analysis can contribute to a broader understanding of technology acceptance. Impact on Society: Successful adoption of blockchain technology in the healthcare sector can lead to improved efficiency, enhanced protection of healthcare data, and reduced administrative burdens. This, in turn, can positively impact patient care and lead to cost savings, which contributes to more sustainable and accessible healthcare services. Future Research: Future research may explore integrating blockchain technology with other emerging technologies, such as artificial intelligence and sidechain, to create more comprehensive and innovative healthcare solutions. Full Article
loc On the Nature of Models: Let us Now Praise Famous Men and Women, from Warren McCulloch to Candace Pert By Published On :: Full Article
loc A fuzzy-probabilistic bi-objective mathematical model for integrated order allocation, production planning, and inventory management By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 An optimisation-based decision-making support is proposed in this study in the form of fuzzy-probabilistic programming, which can be used to solve integrated order allocation, production planning, and inventory management problems in fuzzy and probabilistic uncertain environments. The problem was modelled in an uncertain mathematical optimisation model with two objectives: maximising the expectation of production volume and minimising the expectation of total operational cost subject to demand and other constraints. The model belongs to fuzzy-probabilistic bi-objective integer linear programming, and the generalised reduced gradient method combined with the branch-and-bound algorithm was utilised to solve the derived model. Numerical simulations were performed to illustrate how the optimal decision was formulated. The results showed that the proposed decision-making support was successful in providing the optimal decision with the maximum expectation of the production volume and minimum expectation of the total operational cost. Therefore, the approach can be implemented by decision-makers in manufacturing companies. Full Article
loc Local Density Estimation Procedure for Autoregressive Modeling of Point Process Data By search.ieice.org Published On :: Nat PAVASANT,Takashi MORITA,Masayuki NUMAO,Ken-ichi FUKUI, Vol.E107-D, No.11, pp.1453-1457We proposed a procedure to pre-process data used in a vector autoregressive (VAR) modeling of a temporal point process by using kernel density estimation. Vector autoregressive modeling of point-process data, for example, is being used for causality inference. The VAR model discretizes the timeline into small windows, and creates a time series by the presence of events in each window, and then models the presence of an event at the next time step by its history. The problem is that to get a longer history with high temporal resolution required a large number of windows, and thus, model parameters. We proposed the local density estimation procedure, which, instead of using the binary presence as the input to the model, performed kernel density estimation of the event history, and discretized the estimation to be used as the input. This allowed us to reduce the number of model parameters, especially in sparse data. Our experiment on a sparse Poisson process showed that this procedure vastly increases model prediction performance. Publication Date: 2024/11/01 Full Article
loc Healthcare industry input parameters for a deterministic model that optimally locates additive manufacturing hubs By www.inderscience.com Published On :: 2024-08-06T23:20:50-05:00 Recent innovations in additive manufacturing (AM) have proven its efficacy for not only the manufacturing industry but also the healthcare industry. Researchers from Cal Poly, San Luis Obispo, and California State University Long Beach are developing a model that will determine the optimal locations for additive manufacturing hubs that can effectively serve both the manufacturing and healthcare industries. This paper will focus on providing an overview of the healthcare industry's unique needs for an AM hub and summarise the specific inputs for the model. The methods used to gather information include extensive literature research on current practices of AM models in healthcare and an inclusive survey of healthcare practitioners. This includes findings on AM's use for surgical planning and training models, the workflow to generate them, sourcing methods, and the AM techniques and materials used. This paper seeks to utilise the information gathered through literature research and surveys to provide guidance for the initial development of an AM hub location model that locates optimal service locations. Full Article
loc paper: Automating GDPR Compliance using Policy Integrated Blockchain By ebiquity.umbc.edu Published On :: Sat, 30 May 2020 15:14:51 +0000 A new paper describing a system integrating a GDPR Ontology with blockchain to support checking data operations for compliance. The post paper: Automating GDPR Compliance using Policy Integrated Blockchain appeared first on UMBC ebiquity. Full Article Blockchain cloud computing Ontologies Privacy Semantic Web
loc Local Partnering in Foreign Ventures: Uncertainty, Experiential Learning, and Syndication in Cross-Border Venture Capital Investments By amj.aom.org Published On :: Thu, 14 May 2015 16:16:41 +0000 If partnering with local firms is an intuitive strategy with which to mitigate uncertainty in foreign ventures, then why don't organizations always partner with local firms, especially in uncertain settings? We address this question by unbundling the effects of uncertainty in foreign ventures at the venture and country levels. We contend that, while both levels increase the need for partnering with local firms in foreign ventures, country-level uncertainty increases the difficulty of partnering with local firms and decreases the likelihood of such partnerships. We also posit that experiential learning helps firms manage the two types of uncertainty, and thereby reduces the need for partnering—yet, experience in the host country makes partnering more feasible and increases the likelihood of such partnerships. To test our hypotheses, we conceptualize the decision to partner with a local firm in a foreign venture as a multilayered decision, and model it accordingly. Using a global sample of venture capital investments made between 1984 and 2011, we find support for the distinct effects of venture- and country-level uncertainty as well as for corresponding levels of experiential learning. These findings have implications for the literature on cross-border venture capital investment and international business in general. Full Article
loc The Dark Side of Board Political Capital: Enabling Blockholder Rent Appropriation By amj.aom.org Published On :: Mon, 28 Sep 2015 15:33:36 +0000 Resource dependence theorists argue that boards of directors with political capital can benefit focal firms by reducing uncertainty and providing preferential resources. Here, we develop theory regarding the downside of board political capital. As the principal-principal agency problem characterizes many parts of the world, we argue that board political capital can exacerbate this problem by enabling large blockholders to undertake more appropriation of firm wealth. Further, we explore how this enabling effect is moderated by ownership-, industry-, and environment-level contingencies. We find empirical support for our arguments using 32,174 directors in 1,046 Chinese listed firms over the period 2008 - 2011. Our study sheds light on new ways in which resource dependence and agency theories can be integrated to advance the extant research on board governance and corporate political strategy. Full Article
loc LT ED GLOCK 19 Gen 3 “Trump 2024 Mug Shot” 9mm Pistol $569.99!! By www.ammoland.com Published On :: Tue, 12 Nov 2024 14:33:27 +0000 Merica! Celebrate the landslide trump election win with a limited edition GLOCK 19 Gen 3 "Trump 2024 Mug Shot" 9mm Pistol, now at just $569.99. Full Article Gun Deals 9mm Pistol Daily Gun Deals GLOCK GrabaGun Limited Editions
loc SCT Frame For GLOCK Gen3 G19, G23, & G32 Polymer …now just $69.99! CODE By www.ammoland.com Published On :: Wed, 13 Nov 2024 05:33:29 +0000 Time to upgrade your GLOCK pistol with the SCT Manufacturing Frame For Gen3 G19, G23, & G32 Polymer pistols ...now just $69.99 with a coupon code! Full Article Gun Deals Brownells Daily Gun Deals GLOCK Gun Parts
loc Nescafe rebrands its local coffee drinks By thesun.my Published On :: Wed, 09 Jun 2021 03:32:22 GMT COFFEE lovers in Malaysia will have something to look forward to as Nescafe Ready-to-Drink brings all things Malaysian with the rebranding of its local coffee drinks to the Nescafe Kopitiam Series and the introduction of two new variants, the Nescafe Kopi-C, and Nesaafe Kopi Cham. The new Nescafe Kopi Cham is a combination of tea and coffee, while Nescafe Kopi-C has a smoother blend of coffee and milk. These two flavours are recognised as popular coffee choices in the local coffee shops. Full Article
loc Mother and friend jailed three years for locking boy in cat cage By thesun.my Published On :: Wed, 13 Nov 2024 09:37:19 GMT KUALA LUMPUR: A mother and her friend were sentenced to three years in prison by the Sessions Court today for confining a young boy in a cat cage in February.Judge Siti Shakirah Mohtarudin imposed the sentence on the 20-year-old fast food worker, who is also the victim’s mother, and 35-year-old housewife Adibah Mohd Zaini after they pleaded guilty to the charges.The court ordered the prison sentences to begin immediately, placed them under a five-year good behaviour bond without surety, and required them to complete 240 hours of community service within six months of completing their sentences.The duo were accused of abusing the three-and-a-half-year-old boy by locking him in a cat cage, which could cause both physical and emotional harm, at an apartment in Taman Danau Desa, Brickfields, at 8.16 pm on Feb 10.They were charged under Section 31(1)(a) of the Child Act 2001, which carries a maximum penalty of RM50,000 in fine, up to 20 years in prison, or both upon conviction.The victim’s mother was also sentenced to three years in prison after pleading guilty to another charge under the same Act and section, of abusing her son by wrapping him in adhesive tape at the same location at 3.58 pm on Feb 21.Judge Siti Shakirah ordered both sentences to run concurrently.Deputy public prosecutor Nidzuwan Abd Latip urged the court to impose a deterrent sentence, emphasising that as the victim’s mother, she had a duty to protect her child from harm.“The court should take into account the evidence, especially the photos of the child confined in a cat cage, which is clearly not meant for human use,“ he stated.The mother, unrepresented, pleaded for a lighter sentence, expressing deep regret for her actions. Similarly, Adibah, also without legal representation, requested a reduced sentence on the basis she had to care for her two young children, aged one and eleven.“I deeply regret my actions. Being in detention has made me realise my mistake, and I promise I will never repeat this,“ said Adibah, tearfully.On Monday, Bernama reported that the victim’s mother, Adibah, and another accomplice Nor Azlin Fatin Najihah Lokman, 25, were each sentenced to 14 days in prison and fined RM10,000 by the Sessions Court after pleading guilty to kicking the boy. Full Article BERNAMA
loc Anwar’s Egypt visit unlocks RM4.8 billion in export potential - MITI By thesun.my Published On :: Wed, 13 Nov 2024 02:52:30 GMT KUALA LUMPUR: Prime Minister Datuk Seri Anwar Ibrahim’s official visit to Egypt has bolstered Malaysia-Egypt bilateral relations, unlocking RM4.8 billion (US$1.1 billion) in potential export opportunities for Malaysia, according to the Ministry of Investment, Trade and Industry (MITI).MITI stated that this export potential was largely generated through a roundtable meeting attended by 60 industry and business leaders from 47 Egyptian firms and key business associations, as well as 40 representatives from 20 Malaysian companies.“During the session, productive discussions between Malaysian and Egyptian companies identified export potential worth RM4.8 billion (US$1.1 billion), particularly in high-value sectors such as automotive, chemicals, oleochemicals and renewable energy,” MITI said in a statement.Egyptian companies also expressed interest in investment opportunities in Malaysia, particularly in medical devices and pharmaceuticals, MITI added.The official visit took place from Nov 10-12, 2024.In a bilateral meeting during the visit, MITI Minister Tengku Datuk Seri Zafrul Abdul Aziz and Egypt’s Minister of Investment and International Trade Hassan El Khatib agreed to reactivate the Malaysia-Egypt Joint Trade and Investment Committee (JTIC). Malaysia will host the second JTIC Meeting in early 2025, focusing on collaboration in the semiconductor sector, renewable energy, the halal industry and digital transformation.The two ministers further agreed that Malaysia’s Investment Development Board (MIDA) and Egypt’s General Authority for Investment and Free Zones (GAFI) should sign a memorandum of understanding to enhance bilateral investment relations.To support Malaysian exporters’ access to North African and Arab markets, MITI noted that Malaysia’s trade office in Cairo, managed by the Malaysia External Trade Development Corporation (MATRADE), was upgraded in January 2024, offering improved market access and export support services.Meanwhile, national carmaker Proton has expanded into the Egyptian market with a local assembly plant.Assembly activities began with the first delivery of Proton’s completely knocked down (CKD) vehicles in September 2024, and sales are expected to start in January 2025, with a target of 16,000 units for the period 2024–2026, MITI reported.Bilateral trade between Malaysia and Egypt from January to September 2024 rose 21.4% year-on-year to RM3.0 billion (US$648 million), compared to RM2.4 billion (US$545.5 million) in the same period last year. Egypt was Malaysia’s fifth-largest trading partner in Africa in 2023.Tengku Zafrul said MITI is confident this bilateral relationship will continue to grow, positively impacting the economy and supporting the objectives of the New Malaysian Industrial Master Plan (NIMP) by 2030.“MITI and its agencies will take prompt follow-up action to ensure that all agreed initiatives are implemented efficiently,” he added. Full Article BERNAMA
loc Comment on Google makes it harder to change location for country specific research by David Pearson By www.rba.co.uk Published On :: Sun, 29 Oct 2017 11:01:32 +0000 How does this compare to using the "site:No" syntax to force Google to only return result from .No domains. https://www.google.co.uk/search?num=100&ei=oLL1WeX8NYPtaKS9k4AP&btnG=Search&q=site%3Ano+brexit Full Article
loc Comment on Google makes it harder to change location for country specific research by Karen Blakeman By www.rba.co.uk Published On :: Sun, 29 Oct 2017 11:38:42 +0000 Yes, David, I really should have included that in the possible strategies. Thanks for reminding me. It works well for this particular example (Norway) and gives good but slightly different results and will, of course, miss Norwegian sites that are registered as .com or other international domains. The amount of overlap (or lack of it) will vary depending on the country. Full Article
loc Comment on Google makes it harder to change location for country specific research by Eric Sieverts By www.rba.co.uk Published On :: Sun, 29 Oct 2017 11:50:57 +0000 Would adding the parameter &gl=no to the result URL, still do the job? Full Article
loc Comment on Google makes it harder to change location for country specific research by Karen Blakeman By www.rba.co.uk Published On :: Sun, 29 Oct 2017 12:00:26 +0000 Doesn't work here, Eric :-( Full Article
loc Comment on Google makes it harder to change location for country specific research by Google gjør det vanskeligere for oss! | Bærum bibliotek By www.rba.co.uk Published On :: Mon, 06 Nov 2017 10:24:26 +0000 […] Se også Karen Blakeman’s Bloginnlegg. […] Full Article