19 resultados para Emerging Challenges in offshoring
em Digital Commons at Florida International University
Resumo:
Successfully rehabilitating drained wetlands through hydrologic restoration is dependent on defining restoration targets, a process that is informed by pre-drainage conditions, as well as understanding linkages between hydrology and ecosystem structure. Paleoecological records can inform restoration goals by revealing long-term patterns of change, but are dependent on preservation of biomarkers that provide meaningful interpretations of environmental change. In the Florida Everglades, paleohydrological hind-casting could improve restoration forecasting, but frequent drying of marsh soils leads to poor preservation of many biomarkers. To determine the effectiveness of employing siliceous subfossils in paleohydrological reconstructions, we examined diatoms, plant and sponge silico-sclerids from three soil cores in the central Everglades marshes. Subfossil quality varied among cores, but the abundance of recognizable specimens was sufficient to infer 1,000–3,000 years of hydrologic change at decadal to centennial resolution. Phytolith morphotypes were linked to key marsh plant species to indirectly measure fluctuations in water depth. A modern dataset was used to derive diatom-based inferences of water depth and hydroperiod (R2 = 0.63, 0.47; RMSE = 14 cm, 120 days, respectively). Changes in subfossil quality and abundances at centennial time-scales were associated with mid-Holocene climate events including the Little Ice Age and Medieval Warm Period, while decadal-scale fluctuations in assemblage structure during the twentieth century suggested co-regulation of hydrology by cyclical climate drivers (particularly the Atlantic Multidecadal Oscillation) and water management changes. The successful reconstructions based on siliceous subfossils shown here at a coarse temporal scale (i.e., decadal to centennial) advocate for their application in more highly resolved (i.e., subdecadal) records, which should improve the ability of water managers to target the quantity and variability of water flows appropriate for hydrologic restoration.
Resumo:
Resorts in the future will be feeling the effect of a number of changes in the industry. Changing demographics, economic conditions and the changing priorities of resort guests will play major roles in the future success of resort properties. The authors stress that future resort marketing should emphasize the expansion of current market segments, the creation of new market segments, and hte expansion of qualirty services.
Resumo:
The current study investigated the effects of job satisfaction and organizational commitment on organizational citizenship behavior and turnover intentions. The study also examined the effect of organizational citizenship behavior on turnover intentions. Frontline employees working in five-star hotels in North Cyprus were selected as a sample. The result of multiple regression analyses revealed that job satisfaction is positively related to organizational citizenship behavior and negatively related to turnover intentions. Affective organizational commitment was found to be positively related to organizational citizenship behavior. However, the study found no significant relationship between organizational commitment and turnover intentions. Furthermore, organizational citizenship behavior was negatively associated with turnover intentions. The study provides discussion and avenues for future research.
Resumo:
Co-edited by Peter Hakim, President Emeritus, Inter-American Dialogue and Genaro Arriagada, Non-Resident Senior Fellow, Inter-American Dialogue, this issue examines energy as a priority issue for nearly all Latin American and Caribbean countries and considers its impact on regional integration and both foreign and domestic policy. Articles present opportunities and challenges facing the region, as well as recommendations for addressing the energy issue in Latin America in a strategic, constructive and effective manner.
Resumo:
The purpose of this study was to gain a better understanding of the foreign direct investment location decision making process through the examination of non-Western investors and their investment strategies in non-traditional markets. This was accomplished through in-depth personal interviews with 50 Overseas Chinese business owners and executives in several different industries from Hong Kong, Singapore, Taiwan, Malaysia, and Thailand about 97 separate investment projects in Southeast and East Asia, including The Philippines, Malaysia, Hong Kong, Singapore, Vietnam, India, Pakistan, South Korea, Australia, Indonesia, Cambodia, Thailand, Burma, Taiwan, and Mainland China.^ Traditional factors utilized in Western models of the foreign direct investment decision making process are reviewed, as well as literature on Asian management systems and the current state of business practices in emerging countries of Southeast and East Asia. Because of the lack of institutionalization in these markets and the strong influences of Confucian and patriarchal value systems on the Overseas Chinese, it was suspected that while some aspects of Western rational economic models of foreign direct investment are utilized, these models are insufficient in this context, and thus are not fully generalizable to the unique conditions of the Overseas Chinese business network in the region without further modification.^ Thus, other factors based on a Confucian value system need to be integrated into these models. Results from the analysis of structured interviews suggest Overseas Chinese businesses rely more heavily on their network and traditional Confucian values than rational economic factors when making their foreign direct investment location decisions in emerging countries in Asia. This effect is moderated by the firm's industry and the age of the firm's owners. ^
Resumo:
With hundreds of millions of users reporting locations and embracing mobile technologies, Location Based Services (LBSs) are raising new challenges. In this dissertation, we address three emerging problems in location services, where geolocation data plays a central role. First, to handle the unprecedented growth of generated geolocation data, existing location services rely on geospatial database systems. However, their inability to leverage combined geographical and textual information in analytical queries (e.g. spatial similarity joins) remains an open problem. To address this, we introduce SpsJoin, a framework for computing spatial set-similarity joins. SpsJoin handles combined similarity queries that involve textual and spatial constraints simultaneously. LBSs use this system to tackle different types of problems, such as deduplication, geolocation enhancement and record linkage. We define the spatial set-similarity join problem in a general case and propose an algorithm for its efficient computation. Our solution utilizes parallel computing with MapReduce to handle scalability issues in large geospatial databases. Second, applications that use geolocation data are seldom concerned with ensuring the privacy of participating users. To motivate participation and address privacy concerns, we propose iSafe, a privacy preserving algorithm for computing safety snapshots of co-located mobile devices as well as geosocial network users. iSafe combines geolocation data extracted from crime datasets and geosocial networks such as Yelp. In order to enhance iSafe's ability to compute safety recommendations, even when crime information is incomplete or sparse, we need to identify relationships between Yelp venues and crime indices at their locations. To achieve this, we use SpsJoin on two datasets (Yelp venues and geolocated businesses) to find venues that have not been reviewed and to further compute the crime indices of their locations. Our results show a statistically significant dependence between location crime indices and Yelp features. Third, review centered LBSs (e.g., Yelp) are increasingly becoming targets of malicious campaigns that aim to bias the public image of represented businesses. Although Yelp actively attempts to detect and filter fraudulent reviews, our experiments showed that Yelp is still vulnerable. Fraudulent LBS information also impacts the ability of iSafe to provide correct safety values. We take steps toward addressing this problem by proposing SpiDeR, an algorithm that takes advantage of the richness of information available in Yelp to detect abnormal review patterns. We propose a fake venue detection solution that applies SpsJoin on Yelp and U.S. housing datasets. We validate the proposed solutions using ground truth data extracted by our experiments and reviews filtered by Yelp.
Resumo:
With hundreds of millions of users reporting locations and embracing mobile technologies, Location Based Services (LBSs) are raising new challenges. In this dissertation, we address three emerging problems in location services, where geolocation data plays a central role. First, to handle the unprecedented growth of generated geolocation data, existing location services rely on geospatial database systems. However, their inability to leverage combined geographical and textual information in analytical queries (e.g. spatial similarity joins) remains an open problem. To address this, we introduce SpsJoin, a framework for computing spatial set-similarity joins. SpsJoin handles combined similarity queries that involve textual and spatial constraints simultaneously. LBSs use this system to tackle different types of problems, such as deduplication, geolocation enhancement and record linkage. We define the spatial set-similarity join problem in a general case and propose an algorithm for its efficient computation. Our solution utilizes parallel computing with MapReduce to handle scalability issues in large geospatial databases. Second, applications that use geolocation data are seldom concerned with ensuring the privacy of participating users. To motivate participation and address privacy concerns, we propose iSafe, a privacy preserving algorithm for computing safety snapshots of co-located mobile devices as well as geosocial network users. iSafe combines geolocation data extracted from crime datasets and geosocial networks such as Yelp. In order to enhance iSafe's ability to compute safety recommendations, even when crime information is incomplete or sparse, we need to identify relationships between Yelp venues and crime indices at their locations. To achieve this, we use SpsJoin on two datasets (Yelp venues and geolocated businesses) to find venues that have not been reviewed and to further compute the crime indices of their locations. Our results show a statistically significant dependence between location crime indices and Yelp features. Third, review centered LBSs (e.g., Yelp) are increasingly becoming targets of malicious campaigns that aim to bias the public image of represented businesses. Although Yelp actively attempts to detect and filter fraudulent reviews, our experiments showed that Yelp is still vulnerable. Fraudulent LBS information also impacts the ability of iSafe to provide correct safety values. We take steps toward addressing this problem by proposing SpiDeR, an algorithm that takes advantage of the richness of information available in Yelp to detect abnormal review patterns. We propose a fake venue detection solution that applies SpsJoin on Yelp and U.S. housing datasets. We validate the proposed solutions using ground truth data extracted by our experiments and reviews filtered by Yelp.
Resumo:
Mediation techniques provide interoperability and support integrated query processing among heterogeneous databases. While such techniques help data sharing among different sources, they increase the risk for data security, such as violating access control rules. Successful protection of information by an effective access control mechanism is a basic requirement for interoperation among heterogeneous data sources. ^ This dissertation first identified the challenges in the mediation system in order to achieve both interoperability and security in the interconnected and collaborative computing environment, which includes: (1) context-awareness, (2) semantic heterogeneity, and (3) multiple security policy specification. Currently few existing approaches address all three security challenges in mediation system. This dissertation provides a modeling and architectural solution to the problem of mediation security that addresses the aforementioned security challenges. A context-aware flexible authorization framework was developed in the dissertation to deal with security challenges faced by mediation system. The authorization framework consists of two major tasks, specifying security policies and enforcing security policies. Firstly, the security policy specification provides a generic and extensible method to model the security policies with respect to the challenges posed by the mediation system. The security policies in this study are specified by 5-tuples followed by a series of authorization constraints, which are identified based on the relationship of the different security components in the mediation system. Two essential features of mediation systems, i. e., relationship among authorization components and interoperability among heterogeneous data sources, are the focus of this investigation. Secondly, this dissertation supports effective access control on mediation systems while providing uniform access for heterogeneous data sources. The dynamic security constraints are handled in the authorization phase instead of the authentication phase, thus the maintenance cost of security specification can be reduced compared with related solutions. ^
Resumo:
Next generation networks are characterized by ever increasing complexity, intelligence, heterogeneous technologies and increasing user expectations. Telecommunication networks in particular have become truly global, consisting of a variety of national and regional networks, both wired and wireless. Consequently, the management of telecommunication networks is becoming increasingly complex. In addition, network security and reliability requirements require additional overheads which increase the size of the data records. This in turn causes acute network traffic congestions. There is no single network management methodology to control the various requirements of today's networks, and provides a good level of Quality of Service (QoS), and network security. Therefore, an integrated approach is needed in which a combination of methodologies can provide solutions and answers to network events (which cause severe congestions and compromise the quality of service and security). The proposed solution focused on a systematic approach to design a network management system based upon the recent advances in the mobile agent technologies. This solution has provided a new traffic management system for telecommunication networks that is capable of (1) reducing the network traffic load (thus reducing traffic congestion), (2) overcoming existing network latency, (3) adapting dynamically to the traffic load of the system, (4) operating in heterogeneous environments with improved security, and (5) having robust and fault tolerance behavior. This solution has solved several key challenges in the development of network management for telecommunication networks using mobile agents. We have designed several types of agents, whose interactions will allow performing some complex management actions, and integrating them. Our solution is decentralized to eliminate excessive bandwidth usage and at the same time has extended the capabilities of the Simple Network Management Protocol (SNMP). Our solution is fully compatible with the existing standards.
Resumo:
With the proliferation of multimedia data and ever-growing requests for multimedia applications, there is an increasing need for efficient and effective indexing, storage and retrieval of multimedia data, such as graphics, images, animation, video, audio and text. Due to the special characteristics of the multimedia data, the Multimedia Database management Systems (MMDBMSs) have emerged and attracted great research attention in recent years. Though much research effort has been devoted to this area, it is still far from maturity and there exist many open issues. In this dissertation, with the focus of addressing three of the essential challenges in developing the MMDBMS, namely, semantic gap, perception subjectivity and data organization, a systematic and integrated framework is proposed with video database and image database serving as the testbed. In particular, the framework addresses these challenges separately yet coherently from three main aspects of a MMDBMS: multimedia data representation, indexing and retrieval. In terms of multimedia data representation, the key to address the semantic gap issue is to intelligently and automatically model the mid-level representation and/or semi-semantic descriptors besides the extraction of the low-level media features. The data organization challenge is mainly addressed by the aspect of media indexing where various levels of indexing are required to support the diverse query requirements. In particular, the focus of this study is to facilitate the high-level video indexing by proposing a multimodal event mining framework associated with temporal knowledge discovery approaches. With respect to the perception subjectivity issue, advanced techniques are proposed to support users' interaction and to effectively model users' perception from the feedback at both the image-level and object-level.
Resumo:
Administrative reform is a challenging endeavor for both developed and developing countries alike. For developing countries, the challenge is greater because numerous reforms are implemented concurrently sometimes under conditions of resource scarcity and political instability. So far there is no consensus as to what makes some reforms succeed and others fail. The current study seeks to fill that gap by offering an empirical comparative analysis of the administrative reforms initiated in Uganda and Tanzania since the early 1990s. The purpose of the study is to explain the similarities and differences, and give reasons for the successes and failures of the reform programs in the two countries. It focuses on four major areas; the size of the civil service, pay reform, capacity building, and ethics and accountability. Data were collected via in-depth face to face interviews with 35 key government officials and the content analysis of various documents. The results indicate that the reforms generated initial substantial reduction in the size of the public services in both countries. In Uganda, the traditional civil service was reduced from 140,500 in 1990 to 41,730 in 2004; while in Tanzania Ministries, Departments, and Agencies were reduced by 25%. Pay reform has generated substantial increases in civil servants' salaries in both countries but in Uganda, the government has not been able to abide by the pay strategy while in Tanzania the strategy guides the increments. Civil Service capacity building efforts have focused on enhancing the skills of the personnel. Training needs assessments were undertaken in all ministries in Uganda and a training policy was formulated. In Tanzania, the training needs assessments are still under way and a training policy has not yet been developed. Ethics and accountability are great challenges in both countries, but in Tanzania, there is more political will and commitment to improve the integrity of the civil service. The findings reveal that although Uganda started the reform with much more rigor and initial success, Tanzania has surpassed it and has a more stable, consistent, and promising reform record. This is because Uganda's leadership lacks political legitimacy. The country has since the late 1990s experienced a civil war in the northern and western parts of the country while Tanzania has benefitted from relative peace and high level political legitimacy.
Resumo:
A difficult transition to a new paradigm of Democratic Security and the subsequent process of military restructuring during the nineties led El Salvador, Honduras, Guatemala and Nicaragua to re-consider their old structures and functions of their armed forces and police agencies. This study compares the institutions in the four countries mentioned above to assess their current condition and response capacity in view of the contemporary security challenges in Central America. This report reveals that the original intention of limiting armies to defend and protect borders has been threatened by the increasing participation of armies in public security. While the strength of armies has been consolidated in terms of numbers, air and naval forces have failed to become strengthened or sufficiently developed to effectively combat organized crime and drug trafficking and are barely able to conduct air and sea operations. Honduras has been the only country that has maintained a proportional distribution of its armed forces. However, security has been in the hands of a Judicial Police, supervised by the Public Ministry. The Honduran Judicial Police has been limited to exercising preventive police duties, prohibited from carrying out criminal investigations. Nicaragua, meanwhile, possesses a successful police force, socially recognized for maintaining satisfactory levels of security surpassing the Guatemalan and El Salvadoran police, which have not achieved similar results despite of having set up a civilian police force separate from the military. El Salvador meanwhile, has excelled in promoting a Police Academy and career professional education, even while not having military attachés in other countries. Regarding budgetary issues, the four countries allocate almost twice the amount of funding on their security budgets in comparison to what is allocated to their defense budgets. However, spending in both areas is low when taking into account each country's GDP as well as their high crime rates. Regional security challenges must be accompanied by a professionalization of the regional armies focused on protecting and defending borders. Therefore, strong institutional frameworks to support the fight against crime and drug trafficking are required. It will require the strengthening of customs, greater control of illicit arms trafficking, investment in education initiatives, creating employment opportunities and facilitating significant improvements in the judicial system, as well as its accessibility to the average citizen.
Resumo:
The growth of criminal gangs and organized crime groups has created unprecedented challenges in Central America. Homicide rates are among the highest in the world, countries spend on average close to 10 percent of GDP to respond to the challenges of public insecurity, and the security forces are frequently overwhelmed and at times coopted by the criminal groups they are increasingly tasked to counter. With some 90 percent of the 700 metric tons of cocaine trafficked from South America to the United States passing through Central America, the lure of aiding illegal traffickers through provision of arms, intelligence, or simply withholding or delaying the use of force is enormous. These conditions raise the question: to what extent are militaries in Central America compromised by illicit ties to criminal groups? The study focuses on three cases: Nicaragua, El Salvador, and Honduras. It finds that: Although illicit ties between the military and criminal groups have grown in the last decade, militaries in these countries are not yet “lost’ to criminal groups. Supplying criminal groups with light arms from military stocks is typical and on the rise, but still not common. In general the less exposed services, the navies and air forces, are the most reliable and effective ones in their roles in interdiction. Of the three countries in the study, the Honduran military is the most worrying because it is embedded in a context where civilian corruption is extremely common, state institutions are notoriously weak, and the political system remains polarized and lacks the popular legitimacy and political will needed to make necessary reforms. Overall, the armed forces in the three countries remain less compromised than civilian peers, particularly the police. However, in the worsening crime and insecurity context, there is a limited window of opportunity in which to introduce measures targeted toward the military, and such efforts can only succeed if opportunities for corruption in other sectors of the state, in particular in law enforcement and the justice system, are also addressed. Measures targeted toward the military should include: Enhanced material benefits and professional education opportunities that open doors for soldiers in promising legitimate careers once they leave military service. A clear system of rewards and punishments specifically designed to deter collusion with criminal groups. More effective securing of military arsenals. Skills and external oversight leveraged through combined operations, to build cooperation among those sectors of the military that have successful and clean records in countering criminal groups, and to expose weaker forces to effective best practices.
Resumo:
By 1990 the quick sevice restaurant industry(QSR) achieved 54 percent of commercial food service market share. QSR has a significant role to play in the rapidly-growing global hospitality industry and is expanding into institutional food service to increase its market share. It is expected to be the dominant player in the U.S. food service industry. The authors include an analysis of current and emerging trends in this industry.