organization networks
Recently Published Documents


TOTAL DOCUMENTS

51
(FIVE YEARS 11)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
Vol 5 (S3) ◽  
pp. 596-604
Author(s):  
Surayuth Suratao ◽  
Wich Maliton ◽  
Kriangsak Soisuwan ◽  
Phromphong Mahapornphong ◽  
Sutipong Sawatta ◽  
...  

This mixed methods research aimed 1. To analyze the operation status and problems of community organization council in the northeast region, 2. To develop a model for potential development of community organization council in the northeast region, 3. To evaluate a model for potential development of community organization council in the northeast region. The sample in the study consisted of 351 persons. The research instrument included a questionnaire, interview, and on-site experiment. Descriptive content analysis was used to analyze data. The findings from the study revealed the following: 1. The operations of community organization council in the northeast region as a whole needed development, PNI modified was 0.31.  2. Operations problems included being unaware of individual role and duty, people’s involvement, application of good governance, and communication between community organization networks. 3. The model for potential development of community organization council in the northeast region consisted of 3 aspects of developing procedures, namely, learning skills and work skills according to roles and duties, participatory planning process, and networks. 4. Seventeen experts gave their opinions that the model for potential development of community organization council in the northeast region was at the highest level with regard to appropriateness and usefulness.


2021 ◽  
Vol 15 (1) ◽  
pp. 19-35
Author(s):  
Luiz Romeu De Freitas Júnior ◽  
Cíntia Rodrigues de Oliveira Medeiros ◽  
Valdir Valadão Júnior ◽  
Mayla Cristina Costa

Our aim was to verify the ‘institutional logics’ of corruption through the discursive patterns of managers. We conducted an exploratory survey using a qualitative-quantitative method. The interviews were submitted to content analysis, using the Atlas.TI software and the questionnaire was applied by SurveyMonkey. As a methodological contribution, four categories and levels for analyzing the logic of corruption were constructed: Individual, Organization, Networks, and Interinstitutional System. We infer that understanding the institutional logic of corruption can promote a transformation of corrupt behavior and an institutional change by individual cognition that can lead to practical change in society.


Author(s):  
N. Raghavendra Rao

Open innovation project is knowledge intensive. It has become an imperative to collaborate in learning and sharing knowledge from inter organization networks. The challenge of these networks is to manage and develop interpretations of the internal and external environments of enterprises. Personal contacts take place in the organizations' networks. Social groups are formed through their interactions. Creative individuals share their knowledge within the group. This leads to open innovation initiatives Three case illustrations are explained.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1453
Author(s):  
Jiwon Lee ◽  
Seunghwa Lee ◽  
Jihye Kim ◽  
Hyunok Oh

Wildcarded identity-based encryption (WIBE) is an encryption system where one can encrypt messages to multiple users by specifying a pattern, which is a set of identity strings or wildcards. It is a useful primitive for practical applications where users are defined with multiple attributes (or affiliations), such as organization networks or IoT firmware updates. However, the ciphertext size in traditional WIBE schemes are linear to the number of wildcards in the pattern; since the ciphertext size determines the payload in network systems, it degrades the practicality when deployed in transmission-sensitive systems. In this paper, we represent scalable wildcarded identity-based encryption (SWIBE), which achieves a constant-size ciphertext regardless of the number of wildcards (or depth of patterns). the SWIBE scheme also allows the wildcard usage key derivation as well as encryption: a user with wildcarded pattern can delegate keys for the fixed pattern. Compared to the existing WIBE schemes, the SWIBE scheme is the first approach to yield constant-size ciphertext. Moreover, SWIBE also improves encryption time and decryption time while maintaining a key size of 2L, comparable to the key size of L in WIBE schemes (where L is a depth of the pattern). The experimental results show that the decryption time is 3 to 10 times faster than the existing WIBE schemes, and 650 times faster than the attribute-based encryption with constant-size ciphertext. For the security, we first propose the selective-CPA-secure SWIBE scheme in a prime order bilinear group and extend it to be selective-CCA-secure. Then we also propose a fully-secure SWIBE scheme which can overcome the selective security.


Author(s):  
Le Tung Son

In the context of the information society and knowledge economy, in order to meet the information access needs of organizations, individuals and businesses, it is essential to formulate policies for establishing scientific and technological information organization networks for scientific research and innovation in Vietnam. Based on the overview of experience in setting up scientific and technological information organization networks in some Asian countries, thereby the study has identified trends in setting up scientific and technological information organization networks and analyze the current situation of policies on establishing scientific and technological information organization networks in Vietnam. The study has identified the basic foundations in policies of setting up scientific and technological information organization networks, then making recommendations for completion the policies.


2020 ◽  
Vol 4 (s1) ◽  
pp. 70-70
Author(s):  
Rosalina Das ◽  
Jessica Diaz ◽  
Patricia Avissar ◽  
Tatjana Rundek ◽  
Gwendolyn B. Scott ◽  
...  

OBJECTIVES/GOALS: The goal of this project was to assess the scientific impact of Miami CTSI’s Mentored Career Development (KL2) Program using bibliometric tools and network visualization in addition to the traditional metrics used to provide a comprehensive evaluation. METHODS/STUDY POPULATION: Scholarly productivity of KL2 scholars were tracked using REDCap. For bibliometric data analysis and visualization, publications were queried using iCite (NIH Office of Portfolio Analysis) and Web of Science database. A total of 173 publications produced by eight KL2 scholars from 2013-2018 were analyzed and categorized into pre-award, during award, and post-award periods. iCite was used to assess scientific influence and translation. Scientific networks and collaboration were visualized using VOSviewer (Centre for Science and Technology Studies, Leiden University). CTSA Common Metrics were tracked using the Results Based Accountability framework. RESULTS/ANTICIPATED RESULTS: Albeit of modest size, the Miami CTSI’s KL2 Program had significant scientific productivity and impact in its first five years. Our KL2 scholars’ publications were cited twice as frequently as other papers in their fields. Further, 48% of publications post KL2 award were above the NIH 50th percentile and had higher citation impact compared to the average NIH-funded paper; 11% were in the top 10% NIH citation ranking. In contrast, only 20% of the publications pre-KL2 award were above the NIH 50th percentile. The program also promoted research collaboration; network visualizations indicate larger co-authorship and organization networks of KL2 scholars post-award. DISCUSSION/SIGNIFICANCE OF IMPACT: Bibliometric and data visualization approaches helped us better identify trends and gauge effectiveness of the KL2 program. These findings provided useful insight into the scientific influence and impact of our scholars’ work.


Ransomware is the word which is very popular nowadays. Ransomware is a malicious program that infects the device once it gets into and cannot decrypt the data until the key is provided by the hacker. Ransomware not only forbids the access but also infect the network, where it is communicating with, by encrypting the content that is located on mapped and unmapped network drives where the whole organization networks falls down. In Ransomware various families exist like Cryptoworm, Raas and many. This Ransomware Target is mainly on corporates for beneficial profits. Cryptocurrency is one of the enabling factors of Ransomware. In 2019 according to research work Ransomware raised because of phishing emails and smshing to 109 percent over 2017. Ransomware detections in the first half of the year were up 77% compared to the latter half of 2018. Around 851 million Ransomware contagious activities happened in 2018. 34% of corporates came across with this malware and took months or more to recover back and to access their own data. The algorithms that are used by the Ransomware is very complex which cannot be understood by the normal users. This article is to share research findings about Ransomware, some unknown facts where exactly how Ransomware is growing, and also Restrict Recognize React concept (RRR concept) of Ransomware which is mainly for avoiding Ransomware. Restricting is the measures that as to be carried out for avoiding the Ransomware, Recognize is for identifying the Ransomware if device is infected with it, React is mainly responding to the attack to get rid of Ransomware.


Author(s):  
D. Yu. Gorelova ◽  

The article focuses on theoretical approaches of modeling of network organization structures. Advantages and disadvantages of network organization structures are given. Network nodes are shown in modeling as graphs and connecting lines as its ribs. Issues of organization networks stability from the model viewpoint were analyzed. Main requirements to geometry configuration of organization networks are stated which must correspond to a practical goal, i.e.: stability, reliability, feasibility or profitability. The term «geometrical stability» was examined and conditions for its achievement. The concept of integrated assessment of network organization structure stability is presented. A set of mathematical features is proposed for construction a mathematical model of organization network stability, divided into two groups of coefficients (geometrical and economic), reflecting the framework of the network structure under study as a geometrical object. A number of coefficients is deduced and studied, which makes it possible to evaluate the organization network on a wider and deeper scale. Concepts of quantitative and structural stability are studied. A principle of equilibrium for the network organization structure as a social and economic system is formulated. Their distinctive feature is found out. Underlying ideas of development of the integrated indicator of stability and methods to determine network organization structure of major company management were grounded. New approaches to calculation of the integrated indicator of network organization structure stability are suggested.


Sign in / Sign up

Export Citation Format

Share Document