138 resultados para Mecca (Saudi Arabia)--In literature


Relevância:

100.00% 100.00%

Publicador:

Resumo:

An exploration is made of the ways in which librarians have been depicted in Australian creative writing. Reference is made to characters in novels, short stories, drama and poetry. With respect to novels, there is some consideration of characterisation and its relationship to plot.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Icelandic sagas reflect a deep social interest in the nature of family obligations. Narrative tension and drama often result from carefully plotted increases in competition between families,while considerable space is given over to family biographies and genealogical information. As a result, the saga authors’ conception of the historical seems closely bound to a desire to represent family life. In Gísla saga Súrssonar and Íslendinga saga, the representation of family life extends to the situation of internal family conflicts, when the strict ethical codes underpinning the centrality of family obligations seem to be complicated and perhaps even threatened by characters’ formation of stronger bonds outside the family. The portrayal of internal family conflicts in these two sagas enabled the authors to express complex and often conflicting ethical issues.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an extensive review on the services, six-sigma, and application of six-sigma in services. In order to improve service quality focus on service process is necessary. Six-sigma is a philosophy which also concentrates on the improvement of process. So, six-sigma if properly applied can be useful for services. This study focuses on the application aspect of six-sigma to wider range of services. The wider applicability of six-sigma depends on identification of key performance indicators(KPIs) for different types of service processes. A case study is conducted in call center services to identify, analyze and compare critical to quality characteristics (CTQs) and KPIs with other types of services available in literature. This study will be helpful to both practitioners and researchers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Web 2.0 technology and concepts are being used increasingly by organisations to enhance knowledge, efficiency, engagement and reputation. Understanding the concepts of Web 2.0, its characteristics, and how the technology and concepts can be adopted, is essential to successfully reap the potential benefits. In fact, there is a debate about using the Web 2.0 idiom to refer to the concept behind it; however, this term is widely used in literature as well as in industry. In this paper, the definition of Web 2.0 technology, its characteristics and the attributes, will be presented. In addition, the adoption of such technology is further explored through the presentation of two separate case examples of Web 2.0 being used: to enhance an enterprise; and to enhance university teaching. The similarities between these implementations are identified and discussed, including how the findings point to generic principles of adoption.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The impact of weather on traffic and its behavior is not well studied in literature primarily due to lack of integrated traffic and weather data. Weather can significant effect the traffic and traffic management measures developed for fine weather might not be optimal for adverse weather. Simulation is an efficient tool for analyzing traffic management measures even before their actual implementation. Therefore, in order to develop and test traffic management measures for adverse weather condition we need to first analyze the effect of weather on fundamental traffic parameters and thereafter, calibrate the simulation model parameters in order to simulate the traffic under adverse weather conditions. In this paper we first, analyses the impact of weather on motorway traffic flow and drivers’ behaviour with traffic data from Swiss motorways and weather data from MeteoSuisse. Thereafter, we develop methodology to calibrate a microscopic simulation model with the aim to utilize the simulation model for simulating traffic under adverse weather conditions. Here, study is performed using AIMSUN, a microscopic traffic simulator.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The concept of Six Sigma was initiated in the 1980s by Motorola. Since then it has been implemented in several manufacturing and service organizations. Till now Six Sigma implementation is mostly limited to healthcare and financial services in private sector. Its implementation is now gradually picking up in services such as call center, education, construction and related engineering etc. in private as well as public sector. Through a literature review, a questionnaire survey, and multiple case study approach the paper develops a conceptual framework to facilitate widening the scope of Six Sigma implementation in service organizations. Using grounded theory methodology, this study develops theory for Six Sigma implementation in service organizations. The study involves a questionnaire survey and case studies to understand and build a conceptual framework. The survey was conducted in service organizations in Singapore and exploratory in nature. The case studies involved three service organizations which implemented Six Sigma. The objective is to explore and understand the issues highlighted by the survey and the literature. The findings confirm the inclusion of critical success factors, critical-to-quality characteristics, and set of tools and techniques as observed from the literature. In case of key performance indicator, there are different interpretations about it in literature and also by industry practitioners. Some literature explain key performance indicator as performance metrics whereas some feel it as key process input or output variables, which is similar to interpretations by practitioners of Six Sigma. The response of not relevant and unknown to us as reasons for not implementing Six Sigma shows the need for understanding specific requirements of service organizations. Though much theoretical description is available about Six Sigma, but there has been limited rigorous academic research on it. This gap is far more pronounced about Six Sigma implementation in service organizations, where the theory is not mature enough. Identifying this need, the study contributes by going through theory building exercise and developing a conceptual framework to understand the issues involving its implementation in service organizations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A newly developed computational approach is proposed in the paper for the analysis of multiple crack problems based on the eigen crack opening displacement (COD) boundary integral equations. The eigen COD particularly refers to a crack in an infinite domain under fictitious traction acting on the crack surface. With the concept of eigen COD, the multiple cracks in great number can be solved by using the conventional displacement discontinuity boundary integral equations in an iterative fashion with a small size of system matrix to determine all the unknown CODs step by step. To deal with the interactions among cracks for multiple crack problems, all cracks in the problem are divided into two groups, namely the adjacent group and the far-field group, according to the distance to the current crack in consideration. The adjacent group contains cracks with relatively small distances but strong effects to the current crack, while the others, the cracks of far-field group are composed of those with relatively large distances. Correspondingly, the eigen COD of the current crack is computed in two parts. The first part is computed by using the fictitious tractions of adjacent cracks via the local Eshelby matrix derived from the traction boundary integral equations in discretized form, while the second part is computed by using those of far-field cracks so that the high computational efficiency can be achieved in the proposed approach. The numerical results of the proposed approach are compared not only with those using the dual boundary integral equations (D-BIE) and the BIE with numerical Green's functions (NGF) but also with those of the analytical solutions in literature. The effectiveness and the efficiency of the proposed approach is verified. Numerical examples are provided for the stress intensity factors of cracks, up to several thousands in number, in both the finite and infinite plates.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: The overuse of antibiotics is becoming an increasing concern. Antibiotic resistance, which increases both the burden of disease, and the cost of health services, is perhaps the most profound impact of antibiotics overuse. Attempts have been made to develop instruments to measure the psychosocial constructs underlying antibiotics use, however, none of these instruments have undergone thorough psychometric validation. This study evaluates the psychometric properties of the Parental Perceptions on Antibiotics (PAPA) scales. The PAPA scales attempt to measure the factors influencing parental use of antibiotics in children. Methods: 1111 parents of children younger than 12 years old were recruited from primary schools’ parental meetings in the Eastern Province of Saudi Arabia from September 2012 to January 2013. The structure of the PAPA instrument was validated using Confirmatory Factor Analysis (CFA) with measurement model fit evaluated using the raw and scaled χ2, Goodness of Fit Index, and Root Mean Square Error of Approximation. Results: A five-factor model was confirmed with the model showing good fit. Constructs in the model include: Knowledge and Beliefs, Behaviors, Sources of information, Adherence, and Awareness about antibiotics resistance. The instrument was shown to have good internal consistency, and good discriminant and convergent validity. Conclusion: The availability of an instrument able to measure the psychosocial factors underlying antibiotics usage allows the risk factors underlying antibiotic use and overuse to now be investigated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction: Dental and medical students worldwide, including in Saudi Arabia, have been reported to have a high incidence of poor psychological health, such as depression, stress, anxiety, and lowlife satisfaction. Self-development coaching programs have become an increasingly popular way to improve individuals’ lives. However, few studies have evaluated the psychological effects of such programs among dental and medical students. Moreover, no studies have been conducted on self-development coaching programs in Saudi Arabia. Aims: The aim of this study was to assess the feasibility of a larger study via a pilot study and to acquire preliminary findings about the effectiveness of a self-development coaching program on psychological health among dental and medical students in Saudi Arabia. Methods: A pre-post interventional study design was used to test a self-development coaching program (How to be an Ultra-Super Student) with a sample of medical students (n=17) at Umm Al-Qura University at Saudi Arabia. The outcome measures were students’ psychological distress (depression, anxiety, and stress), life satisfaction, self-efficacy, the coach, and coaching program characteristics. Results: The study showed that there was a significant improvement in depression (p=0.04), self-efficacy (p=0.02), and satisfaction with life (p=0.04), which supported the feasibility of a large study in the future. Conclusions: The study’s findings encourage the implementation of a randomized, controlled trial study with a larger sample to further test the effectiveness of using self-development coaching programs with medical and dental students in Saudi Arabia to improve their psychological health.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Espionage, surveillance and clandestine operations by secret agencies and governments were something of an East–West obsession in the second half of the twentieth century, a fact reflected in literature and film. In the twenty-first century, concerns of the Cold War and the threat of Communism have been rearticulated in the wake of 9/11. Under the rubric of ‘terror’ attacks, the discourses of security and surveillance are now framed within an increasingly global context. As this article illustrates, surveillance fiction written for young people engages with the cultural and political tropes that reflect a new social order that is different from the Cold War era, with its emphasis on spies, counter espionage, brainwashing and psychological warfare. While these tropes are still evident in much recent literature, advances in technology have transformed the means of tracking, profiling and accumulating data on individuals’ daily activities. Little Brother, The Hunger Games and Article 5 reflect the complex relationship between the real and the imaginary in the world of surveillance and, as this paper discusses, raise moral and ethical issues that are important questions for young people in our age of security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sexual harassment remains a widespread workplace phenomenon, despite laws that proscribe it. Drawing initially on a typology from the violence prevention literature that conceptualizes prevention and response approaches according to when they occur, the paper synthesizes strategies identified in literature addressing workplace sexual harassment, as well as other workplace injustices or grievances. The paper utilizes this previous research to develop a framework of sexual harassment prevention strategies along two dimensions: functions and timing. The framework offers a research-informed set of organization-wide preventative and remedial approaches, a systemic approach to what is often seen as an individual problem, and a means to better focus interventions that are often disparate and unco-ordinated. The paper also highlights important areas for future research including a stronger focus on longer-term (tertiary) corrective actions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With ever-increasing share of power electronic loads constant power instability is becoming a significant issue in microgrids, especially when they operate in the islanding mode. Transient conditions like resistive load-shedding or sudden increase of constant power loads (CPL) might destabilize the whole system. Modeling and stability analysis of AC microgrids with CPLs have already been discussed in literature. However, no effective solutions are provided to stabilize this kind of system. Therefore, this paper proposes a virtual resistance based active damping method to eliminate constant power instability in AC microgrids. Advantages and limitations of the proposed method are also discussed in detail. Simulation results are presented to validate the proposed active damping solution.