CINXE.COM

Search results for: external technology exploitation

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: external technology exploitation</title> <meta name="description" content="Search results for: external technology exploitation"> <meta name="keywords" content="external technology exploitation"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="external technology exploitation" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="external technology exploitation"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 10165</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: external technology exploitation</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10165</span> The Impact of External Technology Acquisition and Exploitation on Firms&#039; Process Innovation Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Thammanoon%20Charmjuree">Thammanoon Charmjuree</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuosre%20F.%20Badir"> Yuosre F. Badir</a>, <a href="https://publications.waset.org/abstracts/search?q=Umar%20Safdar"> Umar Safdar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There is a consensus among innovation scholars that knowledge is a vital antecedent for firm’s innovation; e.g., process innovation. Recently, there has been an increasing amount of attention to more open approaches to innovation. This open model emphasizes the use of purposive flows of knowledge across the organization boundaries. Firms adopt open innovation strategy to improve their innovation performance by bringing knowledge into the organization (inbound open innovation) to accelerate internal innovation or transferring knowledge outside (outbound open innovation) to expand the markets for external use of innovation. Reviewing open innovation research reveals the following. First, the majority of existing studies have focused on inbound open innovation and less on outbound open innovation. Second, limited research has considered the possible interaction between both and how this interaction may impact the firm’s innovation performance. Third, scholars have focused mainly on the impact of open innovation strategy on product innovation and less on process innovation. Therefore, our knowledge of the relationship between firms’ inbound and outbound open innovation and how these two impact process innovation is still limited. This study focuses on the firm’s external technology acquisition (ETA) and external technology exploitation (ETE) and the firm’s process innovation performance. The ETA represents inbound openness in which firms rely on the acquisition and absorption of external technologies to complement their technology portfolios. The ETE, on the other hand, refers to commercializing technology assets exclusively or in addition to their internal application. This study hypothesized that both ETA and ETE have a positive relationship with process innovation performance and that ETE fully mediates the relationship between ETA and process innovation performance, i.e., ETA has a positive impact on ETE, and turn, ETE has a positive impact on process innovation performance. This study empirically explored these hypotheses in software development firms in Thailand. These firms were randomly selected from a list of Software firms registered with the Department of Business Development, Ministry of Commerce of Thailand. The questionnaires were sent to 1689 firms. After follow-ups and periodic reminders, we obtained 329 (19.48%) completed usable questionnaires. The structure question modeling (SEM) has been used to analyze the data. An analysis of the outcome of 329 firms provides support for our three hypotheses: First, the firm’s ETA has a positive impact on its process innovation performance. Second, the firm’s ETA has a positive impact its ETE. Third, the firm’s ETE fully mediates the relationship between the firm’s ETA and its process innovation performance. This study fills up the gap in open innovation literature by examining the relationship between inbound (ETA) and outbound (ETE) open innovation and suggest that in order to benefits from the promises of openness, firms must engage in both. The study went one step further by explaining the mechanism through which ETA influence process innovation performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=process%20innovation%20performance" title="process innovation performance">process innovation performance</a>, <a href="https://publications.waset.org/abstracts/search?q=external%20technology%20acquisition" title=" external technology acquisition"> external technology acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation" title=" external technology exploitation"> external technology exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20innovation" title=" open innovation"> open innovation</a> </p> <a href="https://publications.waset.org/abstracts/92006/the-impact-of-external-technology-acquisition-and-exploitation-on-firms-process-innovation-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92006.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10164</span> Exploitation of Technology by the Tshwane Residence for Tourism Development Purposes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20P.%20S.%20Sifolo">P. P. S. Sifolo</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Tladi"> P. Tladi</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Maimela"> J. Maimela</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article investigates technology used by Tshwane residents intended for tourism purposes. The aim is to contribute information to the Tshwane interested parties for planning and management concerning technology within the tourism sector. This study identified the types of tourist related technologies used by the Tshwane residents, be it for business purposes or personal use. The study connected the exploitation of technology for tourism purposes through unpacking the tourism sector as it utilizes technology. Quantitative research methodology was used whereby self-completed questionnaires were chosen as research instruments. The research study carried out a search for knowledge on technology for tourism and the Tshwane residents; however the study revealed that technology has certainly imprinted tourism massively because of its effectiveness and efficiency. Technology has assisted tourism businesses stay abreast of competition with ICT and because of that, SA is on the map as one the economically performing countries in Africa. Moreover, technology and tourism make a meaningful impact on job creation and Gross Domestic Product (GDP). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tourism" title="tourism">tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20and%20communication%20technology" title=" information and communication technology"> information and communication technology</a>, <a href="https://publications.waset.org/abstracts/search?q=Tshwane%20residents" title=" Tshwane residents"> Tshwane residents</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20for%20tourism" title=" technology for tourism"> technology for tourism</a> </p> <a href="https://publications.waset.org/abstracts/5721/exploitation-of-technology-by-the-tshwane-residence-for-tourism-development-purposes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5721.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10163</span> Exploration and Exploitation within Operations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=D.%20G%C3%A5svaer">D. Gåsvaer</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20St%C3%A5lberg"> L. Stålberg</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Fundin"> A. Fundin</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Jackson"> M. Jackson</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Johansson"> P. Johansson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Exploration and exploitation capabilities are both important within Operations as means for improvement when managed separately, and for establishing dynamic improvement capabilities when combined in balance. However, it is unclear what exploration and exploitation capabilities imply in improvement and development work within an operations context. So in order to better understand how to develop exploration and exploitation capabilities within operations, the main characteristics of these constructs needs to be identified and further understood. Thus, the objective of this research is to increase the understanding about exploitation and exploration characteristics, to concretize what they translates to within the context of improvement and development work in an operations unit, and to identify practical challenges. A literature review and a case study are presented. In the literature review, different interpretations of exploration and exploitation are portrayed, key characteristics have been identified, and a deepened understanding of exploration and exploitation characteristics is described. The case in the study is an operations unit, and the aim is to explore to what extent and in what ways exploration and exploitation activities are part of the improvement structures and processes. The contribution includes an identification of key characteristics of exploitation and exploration, as well as an interpretation of the constructs. Further, some practical challenges are identified. For instance, exploration activities tend to be given low priority, both in daily work as in the manufacturing strategy. Also, the overall understanding about the concepts of exploitation and exploration (or any similar aspect of dynamic improvement capabilities) is very low. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=exploitation" title="exploitation">exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration" title=" exploration"> exploration</a>, <a href="https://publications.waset.org/abstracts/search?q=improvement" title=" improvement"> improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=lean%20production" title=" lean production"> lean production</a>, <a href="https://publications.waset.org/abstracts/search?q=manufacturing" title=" manufacturing"> manufacturing</a> </p> <a href="https://publications.waset.org/abstracts/32306/exploration-and-exploitation-within-operations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32306.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">487</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10162</span> Sustainable Use of Fresh Groundwater Lens of Pleistocene Aquifer in Nam Dinh, Vietnam</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tran%20Thanh%20Le">Tran Thanh Le</a>, <a href="https://publications.waset.org/abstracts/search?q=Pham%20Trong%20Duc"> Pham Trong Duc</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The fresh groundwater lens of the Pleistocene aquifer in Nam Dinh was formed since 12,900 years ago. Currently, the Pleistocene aquifer has been continuously exploited on average of 154,163m3/day, distributed mainly in the districts of Nghia Hung, Hai Hau, a part of Truc Ninh, Y Yen, Nam Truc and Giao Thuy. The groundwater level is still on a declining trend, saltwater intrusion in this freshwater lens can occur if the growth rate in exploitation is maintained. This study focused on groundwater sustainable use by means of 4 groups of criteria including: Groundwater quality and pollution; Aquifers’ productivity and capacity; Environment impacts due to exploitation (groundwater level decline, land subsidence due to water exploitation); Social and economic impacts. Using a combination of methods including field surveys, geophysics, hydrogeochemistry, isotope and numerical models to determine safe groundwater exploitation thresholds for the whole study area has been determined to be 544,314m3/day and the actual exploitation amount is currently about 30% compared to the safe exploitation threshold. However, it should also be noted that the current groundwater exploitation threshold and level of its exploitation compared to the safe exploitation threshold of each locality are not the same. From this result, the groundwater exploitation threshold map of the study area was established to serve the management, licensing and orientation of groundwater exploitation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criteria" title="criteria">criteria</a>, <a href="https://publications.waset.org/abstracts/search?q=groundwater" title=" groundwater"> groundwater</a>, <a href="https://publications.waset.org/abstracts/search?q=fresh%20groundwater%20lens" title=" fresh groundwater lens"> fresh groundwater lens</a>, <a href="https://publications.waset.org/abstracts/search?q=pleistocene" title=" pleistocene"> pleistocene</a>, <a href="https://publications.waset.org/abstracts/search?q=Nam%20Dinh" title=" Nam Dinh"> Nam Dinh</a> </p> <a href="https://publications.waset.org/abstracts/145972/sustainable-use-of-fresh-groundwater-lens-of-pleistocene-aquifer-in-nam-dinh-vietnam" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145972.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">159</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10161</span> Technology Planning with Internal and External Resource for Open Innovation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jeonghwan%20Jeon">Jeonghwan Jeon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Technology planning with both internal capacity and external resource is necessary for successful open innovation. Until now, many types of research have been conducted for this issue. However, technology planning for open innovation at the national level has not been researched sufficiently. This study proposes Open roadmap for open innovation at the national level. The proposed open roadmap can manage the inflow & outflow open innovation systematically. Six types of open roadmap are classified with respect to the innovation direction and characteristics. The proposed open roadmap is applied to the open innovation cases of the Roman period. The proposed open roadmap is expected to be helpful tool for technology policy planning at the national level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=technology%20planning" title="technology planning">technology planning</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20innovation" title=" open innovation"> open innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20resource" title=" internal resource"> internal resource</a>, <a href="https://publications.waset.org/abstracts/search?q=external%20resource" title=" external resource"> external resource</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20management" title=" technology management"> technology management</a> </p> <a href="https://publications.waset.org/abstracts/66834/technology-planning-with-internal-and-external-resource-for-open-innovation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">494</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10160</span> Linking Market Performance to Exploration and Exploitation in The Pharmaceutical Industry </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Johann%20Valentowitsch">Johann Valentowitsch</a>, <a href="https://publications.waset.org/abstracts/search?q=Wolfgang%20Burr"> Wolfgang Burr</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In organizational research, strategies of exploration and exploitation are often considered to be contradictory. Building on the tradeoff argument, many authors have assumed that a company's market performance should be positively dependent on its strategic balance between exploration and exploitation over time. In this study, we apply this reasoning to the pharmaceutical industry. Using exploratory regression analysis we show that the long-term market performance of a pharmaceutical company is linked to both its ability to carry out exploratory projects and its ability to develop exploitative competencies. In particular, our findings demonstrate that, on average, the company's annual sales performance is higher the better the strategic alignment between exploration and exploitation is balanced. The contribution of our research is twofold. On the one hand, we provide empirical evidence for the initial tradeoff hypothesis and thus support the theoretical position of those who understand exploration and exploitation as strategic substitutes. On the other hand, our findings show that a balanced relationship between exploration and exploitation is also important in research-intensive industries, which naturally tend to place more emphasis on exploration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=exploitation" title="exploitation">exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration" title=" exploration"> exploration</a>, <a href="https://publications.waset.org/abstracts/search?q=market%20performance" title=" market performance"> market performance</a>, <a href="https://publications.waset.org/abstracts/search?q=pharmaceutical%20industry" title=" pharmaceutical industry"> pharmaceutical industry</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy "> strategy </a> </p> <a href="https://publications.waset.org/abstracts/128901/linking-market-performance-to-exploration-and-exploitation-in-the-pharmaceutical-industry" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128901.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10159</span> Facilitating Knowledge Transfer for New Product Development in Portfolio Entrepreneurship: A Case Study of a Sodium-Ion Battery Start-up in China</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Guohong%20Wang">Guohong Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Hao%20Huang"> Hao Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Rui%20Xing"> Rui Xing</a>, <a href="https://publications.waset.org/abstracts/search?q=Liyan%20Tang"> Liyan Tang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu%20Wang"> Yu Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Start-ups are consistently under pressure to overcome liabilities of newness and smallness. They must focus on assembling resource and engaging constant renewal and repeated entrepreneurial activities to survive and grow. As an important form of resource, knowledge is constantly vital to start-ups, which will help start-ups with developing new product in hence forming competitive advantage. However, significant knowledge is usually needed to be identified and exploited from external entities, which makes it difficult to achieve knowledge transfer; with limited resources, it can be quite challenging for start-ups balancing the exploration and exploitation of knowledge. The research on knowledge transfer has become a relatively well-developed domain by indicating that knowledge transfer can be achieved through plenty of patterns, yet it is still under-explored that what processes and organizational practices help start-ups facilitating knowledge transfer for new product in the context portfolio entrepreneurship. Resource orchestration theory emphasizes the initiative and active management of company or the manager to explain the fulfillment of resource utility, which will help understand the process of managing knowledge as a certain kind of resource in start-ups. Drawing on the resource orchestration theory, this research aims to explore how knowledge transfer can be facilitated through resource orchestration. A qualitative single-case study of a sodium-ion battery new venture was conducted. The case company is sampled deliberately from representative industrial agglomeration areas in Liaoning Province, China. It is found that distinctive resource orchestration sub-processes are leveraged to facilitate knowledge transfer: (i) resource structuring makes knowledge available across the portfolio; (ii) resource bundling makes combines internal and external knowledge to form new knowledge; and (iii) resource harmonizing balances specific knowledge configurations across the portfolio. Meanwhile, by purposefully reallocating knowledge configurations to new product development in a certain new venture (exploration) and gradually adjusting knowledge configurations to being applied to existing products across the portfolio (exploitation), resource orchestration processes as a whole make exploration and exploitation of knowledge balanced. This study contributes to the knowledge management literature through proposing a resource orchestration view and depicting how knowledge transfer can be facilitated through different resource orchestration processes and mechanisms. In addition, by revealing the balancing process of exploration and exploitation of knowledge, and laying stress on the significance of the idea of making exploration and exploitation of knowledge balanced in the context of portfolio entrepreneurship, this study also adds specific efforts to entrepreneurship and strategy management literature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=exploration%20and%20exploitation" title="exploration and exploitation">exploration and exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20transfer" title=" knowledge transfer"> knowledge transfer</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20product%20development" title=" new product development"> new product development</a>, <a href="https://publications.waset.org/abstracts/search?q=portfolio%20entrepreneur" title=" portfolio entrepreneur"> portfolio entrepreneur</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20orchestration" title=" resource orchestration"> resource orchestration</a> </p> <a href="https://publications.waset.org/abstracts/123826/facilitating-knowledge-transfer-for-new-product-development-in-portfolio-entrepreneurship-a-case-study-of-a-sodium-ion-battery-start-up-in-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123826.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10158</span> Advantages of Neural Network Based Air Data Estimation for Unmanned Aerial Vehicles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Angelo%20Lerro">Angelo Lerro</a>, <a href="https://publications.waset.org/abstracts/search?q=Manuela%20Battipede"> Manuela Battipede</a>, <a href="https://publications.waset.org/abstracts/search?q=Piero%20Gili"> Piero Gili</a>, <a href="https://publications.waset.org/abstracts/search?q=Alberto%20Brandl"> Alberto Brandl</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Redundancy requirements for UAV (Unmanned Aerial Vehicle) are hardly faced due to the generally restricted amount of available space and allowable weight for the aircraft systems, limiting their exploitation. Essential equipment as the Air Data, Attitude and Heading Reference Systems (ADAHRS) require several external probes to measure significant data as the Angle of Attack or the Sideslip Angle. Previous research focused on the analysis of a patented technology named Smart-ADAHRS (Smart Air Data, Attitude and Heading Reference System) as an alternative method to obtain reliable and accurate estimates of the aerodynamic angles. This solution is based on an innovative sensor fusion algorithm implementing soft computing techniques and it allows to obtain a simplified inertial and air data system reducing external devices. In fact, only one external source of dynamic and static pressures is needed. This paper focuses on the benefits which would be gained by the implementation of this system in UAV applications. A simplification of the entire ADAHRS architecture will bring to reduce the overall cost together with improved safety performance. Smart-ADAHRS has currently reached Technology Readiness Level (TRL) 6. Real flight tests took place on ultralight aircraft equipped with a suitable Flight Test Instrumentation (FTI). The output of the algorithm using the flight test measurements demonstrates the capability for this fusion algorithm to embed in a single device multiple physical and virtual sensors. Any source of dynamic and static pressure can be integrated with this system gaining a significant improvement in terms of versatility. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aerodynamic%20angles" title="aerodynamic angles">aerodynamic angles</a>, <a href="https://publications.waset.org/abstracts/search?q=air%20data%20system" title=" air data system"> air data system</a>, <a href="https://publications.waset.org/abstracts/search?q=flight%20test" title=" flight test"> flight test</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network"> neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20aerial%20vehicle" title=" unmanned aerial vehicle"> unmanned aerial vehicle</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20sensor" title=" virtual sensor"> virtual sensor</a> </p> <a href="https://publications.waset.org/abstracts/61870/advantages-of-neural-network-based-air-data-estimation-for-unmanned-aerial-vehicles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61870.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">221</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10157</span> Analyzing the Commercialization of New Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wen-Hsiang%20Lai">Wen-Hsiang Lai</a>, <a href="https://publications.waset.org/abstracts/search?q=Mei-Wen%20Chen"> Mei-Wen Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the face of developing new technologies, identifying potential new technological product and the suitable market is important. Since laser technology is widely applied in many industries, this study explores the technology commercialization of laser technology. According to the literature review and industry analysis, this study discusses the factors influencing the consumer’s purchase intention and tries to find a new market direction to develop the laser technology. This study adopts a new product adoption model as the research framework and uses three variables of ‘Consumer characteristics’, ‘Perception of product attributes’ and ‘External environment’ to discuss the purchase intention of consumers, who are physicians and owners of the medical cosmetics. This study finds that in the major variable of ‘Consumer characteristics’, the sub-variables of ‘Personality’, ‘Knowledge of product’, ‘Perceived risk’ and ‘Motivation’ are significantly related to consumer’s purchase intention. In the major variable of ‘Perception of product attributes’, the sub-variables of ‘Brand’ and ‘Measure of manufacture country’ are the key factors that affect the willingness of consumer’s purchase intention. Finally, in the major variable of ‘External environment’ variable, the sub-variables of ‘Time’ and ‘Price’ have significant impact on consumer’s purchase intention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=technology%20commercialization" title="technology commercialization">technology commercialization</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20product%20adoption" title=" new product adoption"> new product adoption</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%E2%80%99s%20purchase%20intention" title=" consumer’s purchase intention"> consumer’s purchase intention</a>, <a href="https://publications.waset.org/abstracts/search?q=laser%20technology" title=" laser technology"> laser technology</a> </p> <a href="https://publications.waset.org/abstracts/89765/analyzing-the-commercialization-of-new-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89765.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">196</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10156</span> Religious Coercion as Means of Trafficking in Women and Faith Communities’ Role in Ending Such Religious Exploitation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoyu%20Stephanie%20Ren">Xiaoyu Stephanie Ren</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increase of massive migration, economic polarization, as well as increasing awareness and respects for religious freedom in the world, women have become unprecedentedly vulnerable to trafficking involving religious coercion. Such cases can also bring enormous challenges for prosecution in which the prosecutor bears the burden of proving that the victim acted, or not acted in a certain way due to the exploitation of her belief system: (1) Jurors who are nonbelievers tend not to be convinced that something of intangible nature can act as the force to get victim into women trafficking situation; (2) Court more often than not rules in favor of victims in women trafficking cases involving religious exploitation only when there is physical coercion in addition to religious coercion; (3) Female victims are often reluctant to testify at court due to their godly fear and loyalty to trafficker. Using case study methodology, this paper examines the unique characteristics of religious coercion as means of trafficking in women from a legal perspective and proposes multiple ways based on communal beliefs that faith communities, as victims for such crime themselves, can act in order to help to end religious exploitation. The purpose of this paper is threefold: to improve acknowledgment for the role of religious coercion as a sole force for women trafficking situation; to discuss legal hurdles in prosecuting women trafficking cases involving religious coercion; and to propose collaboration across borders among faith communities to end such exploitation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=women%20trafficking" title="women trafficking">women trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=sex%20violence" title=" sex violence"> sex violence</a>, <a href="https://publications.waset.org/abstracts/search?q=religious%20exploitation" title=" religious exploitation"> religious exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=faith%20community" title=" faith community"> faith community</a>, <a href="https://publications.waset.org/abstracts/search?q=prosecution" title=" prosecution"> prosecution</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a> </p> <a href="https://publications.waset.org/abstracts/108292/religious-coercion-as-means-of-trafficking-in-women-and-faith-communities-role-in-ending-such-religious-exploitation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108292.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10155</span> Governing External Innovation: Lessons from Apple’s iOS and Google’s Android</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Mohagheghzadeh">Amir Mohagheghzadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Solaleh%20Salimi"> Solaleh Salimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ramin%20Tafazzoli"> Ramin Tafazzoli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ecosystem and networks plays significant roles in product innovation. External innovation within developing firms can bring a wide range of advantages for a firm in a competitive market. Using external innovation can be mentioned as one of the most significant concepts regarding the firm’s transition phase into openness. Derivative concepts such as open or shared platform and app stores are the main result of this thinking within the firms. However, adopting this concept and leverage the defined advantages of external innovation should be aligned with other strategies and policies of a firm. Consequently, one of the key aspects that have been raised while using external innovation is how to govern external innovation within a developing firm. This paper describes the frameworks that two pioneer companies in mobile operating system development have used in order to control and govern external innovation through platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=external%20innovation" title="external innovation">external innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20innovation" title=" open innovation"> open innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=governance" title=" governance"> governance</a>, <a href="https://publications.waset.org/abstracts/search?q=governance%20mechanisms" title=" governance mechanisms"> governance mechanisms</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=Apple" title=" Apple"> Apple</a>, <a href="https://publications.waset.org/abstracts/search?q=iOS" title=" iOS"> iOS</a>, <a href="https://publications.waset.org/abstracts/search?q=Google" title=" Google"> Google</a>, <a href="https://publications.waset.org/abstracts/search?q=Android" title=" Android"> Android</a> </p> <a href="https://publications.waset.org/abstracts/15277/governing-external-innovation-lessons-from-apples-ios-and-googles-android" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15277.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">516</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10154</span> Social Processes and Organizational Structures for the Management of Exploration and Exploration within and across Organization Boundaries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linda%20O.%20N.%20Nwabunike">Linda O. N. Nwabunike</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The role of internal and external efforts in the management of exploration and exploitation has been highlighted in literature. External ties support ambidexterity at different levels with, for instance: business unit ambidexterity, individual ambidexterity, organizational ambidexterity, and alliance ambidexterity. Recently studies have highlighted the combination of organization, alliance, and acquisition strategies for ambidexterity by conceptualizing ambidexterity across modes of operation. Literature still lacks detailed understanding of how these different processes are combined in the management of ambidexterity across modes of operation. This study plans to propose a conceptual model that illustrates the social processes involved in the management of ambidexterity across modes of operation. Main arguments are integrated from social structures, organizational design, and ambidexterity literature. The framework illustrates that how social capital is promoted by hierarchical relations within the organization and business relations across the boundaries of the organization. Whereby such social relations within and outside the organization are supported by the dual structures of the organization in the coordination of multiple efforts. This paper has potential to contribute to the understanding about how ambidexterity is attained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ambidexterity" title="ambidexterity">ambidexterity</a>, <a href="https://publications.waset.org/abstracts/search?q=coordination" title=" coordination"> coordination</a>, <a href="https://publications.waset.org/abstracts/search?q=external-ties" title=" external-ties"> external-ties</a>, <a href="https://publications.waset.org/abstracts/search?q=social-capital" title=" social-capital"> social-capital</a> </p> <a href="https://publications.waset.org/abstracts/120371/social-processes-and-organizational-structures-for-the-management-of-exploration-and-exploration-within-and-across-organization-boundaries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/120371.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">168</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10153</span> Children Protection in the Digital Space</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Beverly%20Komen">Beverly Komen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=child%20protection" title="child protection">child protection</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20space" title=" digital space"> digital space</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20risks" title=" online risks"> online risks</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20grooming" title=" online grooming"> online grooming</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20bulying" title=" cyber bulying"> cyber bulying</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20child%20sexual%20exploitation" title=" online child sexual exploitation"> online child sexual exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20abuse" title=" and abuse"> and abuse</a> </p> <a href="https://publications.waset.org/abstracts/143939/children-protection-in-the-digital-space" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143939.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">187</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10152</span> Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nirmala%20Gopal">Nirmala Gopal</a>, <a href="https://publications.waset.org/abstracts/search?q=Sheetal%20Bhoola"> Sheetal Bhoola</a>, <a href="https://publications.waset.org/abstracts/search?q=Audecious%20Mugwagwa"> Audecious Mugwagwa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20exploitation" title=" data exploitation"> data exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist%20organizations" title=" terrorist organizations"> terrorist organizations</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20democracy" title=" data democracy"> data democracy</a> </p> <a href="https://publications.waset.org/abstracts/135640/democracy-bytes-interrogating-the-exploitation-of-data-democracy-by-radical-terrorist-organizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135640.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">204</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10151</span> Usage of Military Spending, Debt Servicing and Growth for Dealing with Emergency Plan of Indian External Debt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sahbi%20Farhani">Sahbi Farhani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates the relationship between external debt and military spending in case of India over the period of 1970–2012. In doing so, we have applied the structural break unit root tests to examine stationarity properties of the variables. The Auto-Regressive Distributed Lag (ARDL) bounds testing approach is used to test whether cointegration exists in presence of structural breaks stemming in the series. Our results indicate the cointegration among external debt, military spending, debt servicing, and economic growth. Moreover, military spending and debt servicing add in external debt. Economic growth helps in lowering external debt. The Vector Error Correction Model (VECM) analysis and Granger causality test reveal that military spending and economic growth cause external debt. The feedback effect also exists between external debt and debt servicing in case of India. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=external%20debt" title="external debt">external debt</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20spending" title=" military spending"> military spending</a>, <a href="https://publications.waset.org/abstracts/search?q=ARDL%20approach" title=" ARDL approach"> ARDL approach</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a> </p> <a href="https://publications.waset.org/abstracts/47057/usage-of-military-spending-debt-servicing-and-growth-for-dealing-with-emergency-plan-of-indian-external-debt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47057.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10150</span> Globalisation and the Resulting Labour Exploitation in Business Operations and Supply Chains</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Akilah%20A.%20Jardine">Akilah A. Jardine</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The integration and expansion of the global economy have indeed brought about a number of positive changes such as access to new goods and services and the opportunity for individuals and businesses to migrate, communicate, and work globally. Nevertheless, the interconnectedness of world economies is not without its negative and shameful side effects. The subsequent overabundance of goods and services has resulted in heightened competition among firms and their supply chains, fuelling the exploitation of impoverished and vulnerable individuals who are unable to equally salvage from the benefits of the integrated economy. To maintain their position in a highly competitive arena, the operations of many businesses have adopted unethical and unscrupulous practices to maximise profit, often targeting the most marginalised members of society. Simultaneously, in a consumerist obsessed society preoccupied with the consumption and accumulation of material wealth, the demand for goods and services greatly contributes to the pressure on firms, thus bolstering the exploitation of labour. This paper aims to examine the impact of business operations on the practice of labour exploitation. It explores corrupt business practices that firms adopt and key labour exploitative conditions outlined by the International Labour Organization, particularly, paying workers low wages, forcing individuals to work in abusive and unsafe conditions, and considers the issue regarding individuals’ consent to exploitative environments. Further, it considers the role of consumers in creating the high demand for goods and services, which in turn fosters the exploitation of labour. This paper illustrates that the practice of labour exploitation in the economy is a by-product of both global competitive business operations and heightened consumer consumption. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=globalisation" title="globalisation">globalisation</a>, <a href="https://publications.waset.org/abstracts/search?q=labour%20exploitation" title=" labour exploitation"> labour exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=modern%20slavery" title=" modern slavery"> modern slavery</a>, <a href="https://publications.waset.org/abstracts/search?q=sweatshops" title=" sweatshops"> sweatshops</a>, <a href="https://publications.waset.org/abstracts/search?q=unethical%20business%20practices" title=" unethical business practices"> unethical business practices</a> </p> <a href="https://publications.waset.org/abstracts/91936/globalisation-and-the-resulting-labour-exploitation-in-business-operations-and-supply-chains" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91936.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">143</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10149</span> Microseismics: Application in Hydrocarbon Reservoir Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rahul%20Kumar%20Singh">Rahul Kumar Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Apurva%20Sharma"> Apurva Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Dilip%20Kumar%20Srivastava"> Dilip Kumar Srivastava</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tilting of our interest towards unconventional exploitation of hydrocarbons has raised a serious concern to environmentalists. Emerging technologies like horizontal/multi-lateral drilling with subsequent hydraulic fracturing or fracking etc., for exploitation of different conventional/unconventional hydrocarbon reservoirs, are related to creating micro-level seismic events below the surface of the earth. Monitoring of these micro-level seismic events is not possible by the conventional methodology of the seismic method. So, to tackle this issue, a new technology that is microseismic is very much in discussions around the globe. Multiple researches are being carried out these days around the globe in order to prove microseismic as a new essential in the E & P industry, especially for unconventional reservoir management. Microseismic monitoring is now used for reservoir surveillance, and the best application is checking the integrity of the caprock and containment of fluid in it. In general, in whatever terms we want to use micro-seismic related events monitoring and understanding the effectiveness of stimulation, this technology offers a lot of value in terms of insight into the subsurface characteristics and processes, and this makes it really a good geophysical method to be used in future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=microseismic" title="microseismic">microseismic</a>, <a href="https://publications.waset.org/abstracts/search?q=monitoring" title=" monitoring"> monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=hydraulic%20fracturing%20or%20fracking" title=" hydraulic fracturing or fracking"> hydraulic fracturing or fracking</a>, <a href="https://publications.waset.org/abstracts/search?q=reservoir%20surveillance" title=" reservoir surveillance"> reservoir surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20hazards" title=" seismic hazards"> seismic hazards</a> </p> <a href="https://publications.waset.org/abstracts/140429/microseismics-application-in-hydrocarbon-reservoir-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10148</span> Design and Optimization of a Customized External Fixation Device for Lower Limb Injuries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20S.%20Alqahtani">Mohammed S. Alqahtani</a>, <a href="https://publications.waset.org/abstracts/search?q=Paulo%20J.%20Bartolo"> Paulo J. Bartolo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> External fixation is a common technique for the treatment and stabilization of bone fractures. Different designs have been proposed by companies and research groups, but all of them present limitations such as high weight, not comfortable to use, and not customized to individual patients. This paper proposes a lightweight customized external fixator, overcoming some of these limitations. External fixators are designed using a set of techniques such as medical imaging, CAD modelling, finite element analysis, and full factorial design of experiments. Key design parameters are discussed, and the optimal set of parameters is used to design the final external fixator. Numerical simulations are used to validate design concepts. Results present an optimal external fixation design with weight reduction of 13% without compromising its stiffness and structural integrity. External fixators are also designed to be additively manufactured, allowing to develop a strategy for personalization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer-aided%20design%20modelling" title="computer-aided design modelling">computer-aided design modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=external%20fixation" title=" external fixation"> external fixation</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20analysis" title=" finite element analysis"> finite element analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=full%20factorial" title=" full factorial"> full factorial</a>, <a href="https://publications.waset.org/abstracts/search?q=personalization" title=" personalization"> personalization</a> </p> <a href="https://publications.waset.org/abstracts/132633/design-and-optimization-of-a-customized-external-fixation-device-for-lower-limb-injuries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132633.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10147</span> Internal and External Validity in Experimental Economics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Helena%20Chytilova">Helena Chytilova</a>, <a href="https://publications.waset.org/abstracts/search?q=Robin%20Maialeh"> Robin Maialeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Experimental economics is subject to criticism with regards to frequently discussed trade-off between internal and external validity requirements, which seems to be critically flawed. Incompatibility of trade-off condition and condition of internal validity as a prerequisite for external validity is presented. In addition, the imprecise concept of artificiality found to be rather improving external validity, seems to strengthen illusory status of external versus internal validity tension. Internal validity will be further analysed with regards to Duhem-Quine problem, where unpredictability argument is significantly weakened trough application of inductivism within the illustrative hypothetical-deductive model. Discussion outlined above partially weakens critical arguments related to robustness of results in experimental economics, if perfectly controlled experimental environment is secured. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Duhem-Quine%20problem" title="Duhem-Quine problem">Duhem-Quine problem</a>, <a href="https://publications.waset.org/abstracts/search?q=external%20validity" title=" external validity"> external validity</a>, <a href="https://publications.waset.org/abstracts/search?q=inductivism" title=" inductivism"> inductivism</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20validity" title=" internal validity"> internal validity</a> </p> <a href="https://publications.waset.org/abstracts/31128/internal-and-external-validity-in-experimental-economics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31128.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">286</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10146</span> Reduction of Patient’s Dose of I-131 Therapy by Used Local Diuretic Juice</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mosab%20kh.%20A.%20A.%20Bashir">Mosab kh. A. A. Bashir</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Mohamed-Ahmed"> E. Mohamed-Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the study is to compare the results of the external exposure and the range of the dose spread by the patients, hospitalized in two different groups of 3-5 d receiving radioiodine therapy because of thyroid cancer, and one of group were giving the local diuretic plant (barley) as local juice. The control group was 28 patients they were isolated as international precautions after taken I-131 capsule 100 mCi, and their external exposure was recorded day by day after first 24 hrs. and the distance for external measurement was 1 m at the abdominal level. The mean of external exposure values of patients at fourth day were 30.24±12.92 µSv h−1. The second group after taking I-131 capsule 100 mCi we were given barley juice (250 mL) after every meal three times on day and their external exposure was recorded day by day after first 24 hrs. The mean of external exposure values of patients of this group at third day was 26.92±9.89 (14-55) µSv h−1. It was observed that the external exposure from the second group clearly decreased to low levels which contributed to the decrease in patient dose and also to the decrease in the exposure from the patient to his/her family. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=local%20diuretic%20juice" title="local diuretic juice">local diuretic juice</a>, <a href="https://publications.waset.org/abstracts/search?q=therapy" title=" therapy"> therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=radiation%20medicine" title=" radiation medicine"> radiation medicine</a>, <a href="https://publications.waset.org/abstracts/search?q=diuretic%20plant" title=" diuretic plant"> diuretic plant</a> </p> <a href="https://publications.waset.org/abstracts/4035/reduction-of-patients-dose-of-i-131-therapy-by-used-local-diuretic-juice" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4035.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">316</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10145</span> A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umesh%20Kumar%20Singh">Umesh Kumar Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Chanchala%20Joshi"> Chanchala Joshi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CVSS%20score" title="CVSS score">CVSS score</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20level" title=" risk level"> risk level</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20measurement" title=" security measurement"> security measurement</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability%20category" title=" vulnerability category"> vulnerability category</a> </p> <a href="https://publications.waset.org/abstracts/55675/a-framework-for-security-risk-level-measures-using-cvss-for-vulnerability-categories" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55675.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10144</span> The Exploitation of the MOSES Project Outcomes on Supply Chain Optimisation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reza%20Karimpour">Reza Karimpour</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ports play a decisive role in the EU's external and internal trade, as about 74% of imports and exports and 37% of exchanges go through ports. Although ports, especially Deep Sea Shipping (DSS) ports, are integral nodes within multimodal logistic flows, Short Sea Shipping (SSS) and inland waterways are not so well integrated. The automated vessels and supply chain optimisations for sustainable shortsea shipping (MOSES) project aims to enhance the short sea shipping component of the European supply chain by addressing the vulnerabilities and strains related to the operation of large containerships. The MOSES concept can be shortly described as a large containership (mother-vessel) approaching a DSS port (or a large container terminal). Upon her arrival, a combined intelligent mega-system consisting of the MOSES Autonomous tugboat swarm for manoeuvring and the MOSES adapted AutoMoor system. Then, container handling processes are ready to start moving containers to their destination via hinterland connections (trucks and/or rail) or to be shipped to destinations near small ports (on the mainland or island). For the first case, containers are stored in a dedicated port area (Storage area), waiting to be moved via trucks and/or rail. For the second case, containers are stacked by existing port equipment near-dedicated berths of the DSS port. They then are loaded on the MOSES Innovative Feeder Vessel, equipped with the MOSES Robotic Container-Handling System that provides (semi-) autonomous (un) feeding of the feeder. The Robotic Container-Handling System is remotely monitored through a Shore Control Centre. When the MOSES innovative Feeder vessel approaches the small port, where her docking is achieved without tugboats, she automatically unloads the containers using the Robotic Container-Handling System on the quay or directly on trucks. As a result, ports with minimal or no available infrastructure may be effectively integrated with the container supply chain. Then, the MOSES innovative feeder vessel continues her voyage to the next small port, or she returns to the DSS port. MOSES exploitation activity mainly aims to exploit research outcomes beyond the project, facilitate utilisation of the pilot results by others, and continue the pilot service after the project ends. By the mid-lifetime of the project, the exploitation plan introduces the reader to the MOSES project and its key exploitable results. It provides a plan for delivering the MOSES innovations to the market as part of the overall exploitation plan. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automated%20vessels" title="automated vessels">automated vessels</a>, <a href="https://publications.waset.org/abstracts/search?q=exploitation" title=" exploitation"> exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=shortsea%20shipping" title=" shortsea shipping"> shortsea shipping</a>, <a href="https://publications.waset.org/abstracts/search?q=supply%20chain" title=" supply chain"> supply chain</a> </p> <a href="https://publications.waset.org/abstracts/151033/the-exploitation-of-the-moses-project-outcomes-on-supply-chain-optimisation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151033.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10143</span> The External Debt in the Context of Economic Growth: The Sample of Turkey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ay%C5%9Fen%20Edirneligil">Ayşen Edirneligil</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Mucuk"> Mehmet Mucuk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In developing countries, one of the most important restrictions about the economic growth is the lack of national savings which are supposed to finance the investments. In order to overcome this restriction and achieve the higher rate of economic growth by increasing the level of output, countries choose the external borrowing. However, there is a dispute in the literature over the correlation between external debt and economic growth. The aim of this study is to examine the effects of external debt on Turkish economic growth by using VAR analysis with the quarterly data over the period of 2002:01-2014:04. In this respect, Johansen Cointegration Test, Impulse- Response Function and Variance Decomposition Tests will be used for analyses. Empirical findings show that there is no cointegration in the long run. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=external%20debt" title="external debt">external debt</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20growth" title=" economic growth"> economic growth</a>, <a href="https://publications.waset.org/abstracts/search?q=Turkish%20economy" title=" Turkish economy"> Turkish economy</a>, <a href="https://publications.waset.org/abstracts/search?q=time%20series%20analysis" title=" time series analysis"> time series analysis</a> </p> <a href="https://publications.waset.org/abstracts/29395/the-external-debt-in-the-context-of-economic-growth-the-sample-of-turkey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29395.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">399</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10142</span> Using India’s Traditional Knowledge Digital Library on Traditional Tibetan Medicine</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chimey%20Lhamo">Chimey Lhamo</a>, <a href="https://publications.waset.org/abstracts/search?q=Ngawang%20Tsering"> Ngawang Tsering</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Traditional Tibetan medicine, known as Sowa Rigpa (Science of healing), originated more than 2500 years ago with an insightful background, and it has been growing significant attention in many Asian countries like China, India, Bhutan, and Nepal. Particularly, the Indian government has targeted Traditional Tibetan medicine as its major Indian medical system, including Ayurveda. Although Traditional Tibetan medicine has been growing interest and has a long history, it is not easily recognized worldwide because it exists only in the Tibetan language and it is neither accessible nor understood by patent examiners at the international patent office, data about Traditional Tibetan medicine is not yet broadly exist in the Internet. There has also been the exploitation of traditional Tibetan medicine increasing. The Traditional Knowledge Digital Library is a database aiming to prevent the patenting and misappropriation of India’s traditional medicine knowledge by using India’s Traditional knowledge Digital Library on Sowa Rigpa in order to prevent its exploitation at international patent with the help of information technology tools and an innovative classification systems-traditional knowledge resource classification (TKRC). As of date, more than 3000 Sowa Rigpa formulations have been transcribed into a Traditional Knowledge Digital Library database. In this paper, we are presenting India's Traditional Knowledge Digital Library for Traditional Tibetan medicine, and this database system helps to preserve and prevent the exploitation of Sowa Rigpa. Gradually it will be approved and accepted globally. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=traditional%20Tibetan%20medicine" title="traditional Tibetan medicine">traditional Tibetan medicine</a>, <a href="https://publications.waset.org/abstracts/search?q=India%27s%20traditional%20knowledge%20digital%20library" title=" India&#039;s traditional knowledge digital library"> India&#039;s traditional knowledge digital library</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20knowledge%20resources%20classification" title=" traditional knowledge resources classification"> traditional knowledge resources classification</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20patent%20classification" title=" international patent classification"> international patent classification</a> </p> <a href="https://publications.waset.org/abstracts/151272/using-indias-traditional-knowledge-digital-library-on-traditional-tibetan-medicine" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151272.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">128</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10141</span> The Implementation of Sovereignty over Natural Resources Principle: Case Study Indonesian Forest</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sri%20Wartini">Sri Wartini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Based on the sovereignty over natural resources principle, the Indonesian government has an authority to exploit the natural resources within a national jurisdiction of Indonesia. The forest is one of the natural resources which is very valuable for Indonesia. It becomes the source of raw material for many industrial activities, such as pharmaceutical industry, pulp industry, and household furniture industry. Hence, it contributes to the economic development of Indonesia. However, the exploitation of the forest may cause negative impacts, such as environmental pollution and environmental degradation. The implementation of the sovereignty over natural resources principle in Indonesia may jeopardize the forest and affect the sustainability of the forest if there is no appropriate policy of the government to exploit the forest in a sustainable manner. The exploitation of the forest in Indonesia, in some extent, has caused serious impact to environment and biodiversity. Hence, in order to sustain and to maintain the forest as the valuable resources to the future generation, the government of Indonesia has already adopted many programmes and action plans. The aim of the research is to undertake a critical examination of the issues relating to the the implementation of sovereignty over natural resources to the exploitation of the forest in Indonesia. It is a normative research and the methodology employed in this research is library research. While the approaches employed in the research are conceptual approach., statutory approach, and comparative approach. The research finds that the implementation of sovereignty over natural resources principle in the exploitation of the forest in Indonesia is limited by other principles of international environmental law, such as sustainable development principle, intergenerational principle and common concern principle which have been adopted in the government policy and various regulations regarding the exploitation of the forest in Indonesia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Environmental%20damage" title="Environmental damage">Environmental damage</a>, <a href="https://publications.waset.org/abstracts/search?q=negative%20impacts" title=" negative impacts"> negative impacts</a>, <a href="https://publications.waset.org/abstracts/search?q=pollution" title=" pollution"> pollution</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20sovereignty%20over%20natural%20resources" title=" the sovereignty over natural resources"> the sovereignty over natural resources</a> </p> <a href="https://publications.waset.org/abstracts/61341/the-implementation-of-sovereignty-over-natural-resources-principle-case-study-indonesian-forest" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61341.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">386</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10140</span> The Impacts of Technology on Operations Costs: The Mediating Role of Operation Flexibility</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fazli%20Idris">Fazli Idris</a>, <a href="https://publications.waset.org/abstracts/search?q=Jihad%20Mohammad"> Jihad Mohammad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study aims to determine the impact of technology and service operations flexibility, which is divided into external flexibility and internal robustness, on operations costs. A mediation model is proposed that links technology to operations costs via operation flexibility. Drawing on a sample of 475 of operations managers of various service sectors in Malaysia and South Africa, Structural Equation Modeling (SEM) was employed to test the relationship using Smart-PLS procedures. It was found that a significant relationship was established between technologies to operations costs via both operations flexibility dimensions. Theoretical and managerial implications are offered to explain the results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Operations%20flexibility" title="Operations flexibility">Operations flexibility</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=costs" title=" costs"> costs</a>, <a href="https://publications.waset.org/abstracts/search?q=mediation" title=" mediation"> mediation</a> </p> <a href="https://publications.waset.org/abstracts/18185/the-impacts-of-technology-on-operations-costs-the-mediating-role-of-operation-flexibility" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18185.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">613</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10139</span> Diversity and Intensity of International Technology Transfer and their Impacts on Organizational Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Seongryong%20Kang">Seongryong Kang</a>, <a href="https://publications.waset.org/abstracts/search?q=Woonjin%20Kim"> Woonjin Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Sungjoo%20Lee"> Sungjoo Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Under the environment of fierce competition and globalized economy, international technology collaboration has gained increasing attention as a way to improve innovation efficiency. While international technology transfer helps a firm to acquire necessary technology in a short period of time, it also has a risk; embedding external technology from overseas partners may cause a transaction cost due to the regional, cultural and language barriers, which tend to offset the benefits of such transfer. Though a number of previous studies have focused on the effects of technology in-transfer on firm performance, few have conducted in the context of international technology transfer. To fill this gap, this study aims to investigate the impact of international technology in-transfer on firm performance – both innovation and financial performance, with a particular emphasis on the diversity and intensity of such transfer. To do this, we adopted technology balance payment (TBP) data of Korean firms from 2010 to 2011, where an intermediate regression analysis was used to identify the intermediate effects of absorptive capacity. The analysis results indicate that i) the diversity and intensity of international technology transfer influence innovation performance by improving R&D capability positively; and ii) the diversity has a positive impact but the intensity has a negative impact on financial performance through the intermediation of R&D intensity. The research findings are expected to provide meaningful implications for establishing global technology strategy and developing policy programs to facilitate technology transfer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=diversity" title="diversity">diversity</a>, <a href="https://publications.waset.org/abstracts/search?q=intensity" title=" intensity"> intensity</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20technology%20acquisition" title=" international technology acquisition"> international technology acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20transfer" title=" technology transfer"> technology transfer</a> </p> <a href="https://publications.waset.org/abstracts/71199/diversity-and-intensity-of-international-technology-transfer-and-their-impacts-on-organizational-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71199.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">361</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10138</span> Using the Technology Acceptance Model to Examine Seniors’ Attitudes toward Facebook</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chien-Jen%20Liu">Chien-Jen Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shu%20Ching%20Yang"> Shu Ching Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Using the technology acceptance model (TAM), this study examined the external variables of technological complexity (TC) to acquire a better understanding of the factors that influence the acceptance of computer application courses by learners at Active Aging Universities. After the learners in this study had completed a 27-hour Facebook course, 44 learners responded to a modified TAM survey. Data were collected to examine the path relationships among the variables that influence the acceptance of Facebook-mediated community learning. The partial least squares (PLS) method was used to test the measurement and the structural model. The study results demonstrated that attitudes toward Facebook use directly influence behavioral intentions (BI) with respect to Facebook use, evincing a high prediction rate of 58.3%. In addition to the perceived usefulness (PU) and perceived ease of use (PEOU) measures that are proposed in the TAM, other external variables, such as TC, also indirectly influence BI. These four variables can explain 88% of the variance in BI and demonstrate a high level of predictive ability. Finally, limitations of this investigation and implications for further research are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model%20%28TAM%29" title="technology acceptance model (TAM)">technology acceptance model (TAM)</a>, <a href="https://publications.waset.org/abstracts/search?q=technological%20complexity" title=" technological complexity"> technological complexity</a>, <a href="https://publications.waset.org/abstracts/search?q=partial%20least%20squares%20%28PLS%29" title=" partial least squares (PLS)"> partial least squares (PLS)</a>, <a href="https://publications.waset.org/abstracts/search?q=perceived%20usefulness" title=" perceived usefulness"> perceived usefulness</a> </p> <a href="https://publications.waset.org/abstracts/6249/using-the-technology-acceptance-model-to-examine-seniors-attitudes-toward-facebook" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6249.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">346</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10137</span> The Extent of Big Data Analysis by the External Auditors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iyad%20Ismail">Iyad Ismail</a>, <a href="https://publications.waset.org/abstracts/search?q=Fathilatul%20Abdul%20Hamid"> Fathilatul Abdul Hamid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research was mainly investigated to recognize the extent of big data analysis by external auditors. This paper adopts grounded theory as a framework for conducting a series of semi-structured interviews with eighteen external auditors. The research findings comprised the availability extent of big data and big data analysis usage by the external auditors in Palestine, Gaza Strip. Considering the study's outcomes leads to a series of auditing procedures in order to improve the external auditing techniques, which leads to high-quality audit process. Also, this research is crucial for auditing firms by giving an insight into the mechanisms of auditing firms to identify the most important strategies that help in achieving competitive audit quality. These results are aims to instruct the auditing academic and professional institutions in developing techniques for external auditors in order to the big data analysis. This paper provides appropriate information for the decision-making process and a source of future information which affects technological auditing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data%20analysis" title="big data analysis">big data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=external%20auditors" title=" external auditors"> external auditors</a>, <a href="https://publications.waset.org/abstracts/search?q=audit%20reliance" title=" audit reliance"> audit reliance</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20audit%20function" title=" internal audit function"> internal audit function</a> </p> <a href="https://publications.waset.org/abstracts/169041/the-extent-of-big-data-analysis-by-the-external-auditors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169041.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">70</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10136</span> A Novel Exploration/Exploitation Policy Accelerating Learning In Both Stationary And Non Stationary Environment Navigation Tasks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wiem%20Zemzem">Wiem Zemzem</a>, <a href="https://publications.waset.org/abstracts/search?q=Moncef%20Tagina"> Moncef Tagina</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, we are addressing the problem of an autonomous mobile robot navigating in a large, unknown and dynamic environment using reinforcement learning abilities. This problem is principally related to the exploration/exploitation dilemma, especially the need to find a solution letting the robot detect the environmental change and also learn in order to adapt to the new environmental form without ignoring knowledge already acquired. Firstly, a new action selection strategy, called ε-greedy-MPA (the ε-greedy policy favoring the most promising actions) is proposed. Unlike existing exploration/exploitation policies (EEPs) such as ε-greedy and Boltzmann, the new EEP doesn’t only rely on the information of the actual state but also uses those of the eventual next states. Secondly, as the environment is large, an exploration favoring least recently visited states is added to the proposed EEP in order to accelerate learning. Finally, various simulations with ball-catching problem have been conducted to evaluate the ε-greedy-MPA policy. The results of simulated experiments show that combining this policy with the Qlearning method is more effective and efficient compared with the ε-greedy policy in stationary environments and the utility-based reinforcement learning approach in non stationary environments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=autonomous%20mobile%20robot" title="autonomous mobile robot">autonomous mobile robot</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration%2F%20exploitation%20policy" title=" exploration/ exploitation policy"> exploration/ exploitation policy</a>, <a href="https://publications.waset.org/abstracts/search?q=large" title=" large"> large</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20environment" title=" dynamic environment"> dynamic environment</a>, <a href="https://publications.waset.org/abstracts/search?q=reinforcement%20learning" title=" reinforcement learning"> reinforcement learning</a> </p> <a href="https://publications.waset.org/abstracts/23926/a-novel-explorationexploitation-policy-accelerating-learning-in-both-stationary-and-non-stationary-environment-navigation-tasks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23926.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">418</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=338">338</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=339">339</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=external%20technology%20exploitation&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10