410 research outputs found
Public Sector Organizational Culture: Experience from Frontline Bureaucracies
This chapter discusses the practice of organizational culture by the frontline bureaucrats in Bangladesh. Culture scholars argue that organizational cultureâcommonly defined as the beliefs, values, attitudes, and practices of the members of an organizationâis a powerful force in determining the health and well-being of an organization. Scholars also suggest the existence of different dimensions of organizational culture. Although they do not agree in naming these dimensions, commonalities are found in their understanding. How organizational culture is practiced by the frontline bureaucrats in Bangladesh has not been studied much. A study was designed to know how the frontline public bureaucrats practice organizational culture and how they differ in their practices along their service lines. Four dimensions of organizational cultureâpower distance, uncertainty avoidance tendency, participation, and team orientationâwere considered. The chosen culture dimensions impact the overall management of any public sector organization. Three hundred and twenty-six frontline public bureaucrats were studied using a survey questionnaire. Both descriptive and inferential statistics have been used for analyzing the collected data. Findings from independent samples t-tests revealed that the frontline bureaucrats significantly differ along their service lines in practicing the culture dimensions
Enhancing data privacy and security related process through machine learning
In this thesis, we exploit the advantages of Machine learning (ML) in the domains of data security and data privacy. ML is one of the most exciting technologies being developed in the world today.
The major advantages of ML technology are its prediction capability and its ability to reduce the need for human activities to perform tasks. These benefits motivated us to exploit ML to improve users' data privacy and security. Firstly, we use ML technology to try to predict the best privacy settings for users, since ML has a strong prediction ability and the average user might find it difficult to properly set up privacy settings due to a lack of knowledge and subsequent lack of decision-making abilities regarding the privacy of their data. Besides, since the ML approach has the potential to considerably cut down on manual efforts by humans, our second task in this thesis is to exploit ML technology to redesign security mechanisms of social media environments that rely on human participation for providing such services. In particular, we use ML to train spam filters for identifying and removing violent, insulting, aggressive, and harassing content creators (a.k.a. spammers) from a social media platform. It helps to solve violent and aggressive issues that have been growing on social media environments. The experimental results show that our proposals are efficient and effective
Omens and their Impacts in Bangladesh: Remedy from an Islamic Management Perspective
The purpose of this paper is to formulate and develop a policy prescription for Omens in Bangladesh from Islamic management perspective. Although Omens has an overarching influence on Muslim society, but no academic work has undertaken to divulge the prevailing facts and figures of Omens in Bangladesh with validated references from the primary sources of Islam and not reinforced by well-equipped Islamic Management prescriptions which may deal with Omensâ issues effectively and efficiently. This descriptive study will attempt to provide a brief review of prevailing literature of Omens with their impacts and formulate a remedial mechanism of Omens from Islamic Management perspective based on The Holy Quran, Hadith and Islamic Literature. Kew Words: Omen, TawhÄ«d[i], Astrology[ii], Ghaib[iii], Superstition[iv], Islamic Management[v] References : [i]        It means the realizing and maintaining of Allaah's unity in all of man's actions which directly or indirectly relate to Him. It is the belief that Allaah is One, without partner in His dominion and His actions (Ruboobeeyah), One without similitude in His essence and attributes (Asmaa wa Sifaat), and One without rival in His divinity and in worship (Ulooheeyahl `Ebaadah). These three aspects form the basis for the categories into which the science of Tawheed has been traditionally divided. The three overlap and are inseparable to such a degree that whoever omits any one aspect has failed to complete the requirements of Tawheed. See for details: Bilal Philips, Dr. Abu Ameenah, The Fundamentals of Tawheed, (Islamic Monotheism), Dar-Us-Salam publishers & Distributors, Brooklyn, NY 11217, 1999, p. 1-26 [ii] It represents the belief that earthly beings are influenced by heavenly bodies and future events may be forecasted by the observation of the movement of these bodies. See for details: Tayseer al-Azeez al-Hameed, p. 441 [iii] Al-ghayb (commonly, and erroneously, translated as "the Unseen") is used in the Qurâan to denote all those sectors or phases of reality which lie beyond the range of human perception and cannot, therefore, be proved or disproved by scientific observation or even adequately comprised within the accepted categories of speculative thought: as, for instance, the existence of God and of a definite purpose underlying the universe, life after death, the real nature of time, the existence of spiritual forces and their inter-action, and so forth. Only a person who is convinced that the ultimate reality comprises far more than our observable environment can attain to belief in God and, thus, to a belief that life has meaning and purpose. By pointing out that it is "a guidance for those who believe in the existence of that which is beyond human perception", the Qur'an says, in effect, that it will - of necessity - remain a closed book to all whose minds cannot accept this fundamental premise. See Asad, Muhammad, The Message of the Qurâan, [iv] Oxford Dictionary defines as âthe belief that particular events happen in a way that can not be explained by reason of science, the belief that particular event brings good or bad luckâ. Bhusan [Bhusan, B., 1989. Dictionary of Sociology (1st Ed.) New Delhi; Anmol Publication] defined superstition as âa belief about natural phenomena that depends upon a magical or occult interpretation of events and that is widely held to be true in spite of objectively demonstrable facts to the contraryâ. [v] Shaya'a Othman defines it as, âIntegrated activities of thinking, planning, organizing, leading and controlling, interconnected with decisions, involving the use of resources - human, financial, time, information, and physical, with the objectives of attaining the goals of MaqÄsid al-SharÄ«âah, by means of effective and efficient methods.â See: http://islamicstrategymanagement.blogspot.com/p/definition-of-islamic-management.htm
Enhancing data privacy and security related process through machine learning
In this thesis, we exploit the advantages of Machine learning (ML) in the domains of data security and data privacy. ML is one of the most exciting technologies being developed in the world today.
The major advantages of ML technology are its prediction capability and its ability to reduce the need for human activities to perform tasks. These benefits motivated us to exploit ML to improve users' data privacy and security. Firstly, we use ML technology to try to predict the best privacy settings for users, since ML has a strong prediction ability and the average user might find it difficult to properly set up privacy settings due to a lack of knowledge and subsequent lack of decision-making abilities regarding the privacy of their data. Besides, since the ML approach has the potential to considerably cut down on manual efforts by humans, our second task in this thesis is to exploit ML technology to redesign security mechanisms of social media environments that rely on human participation for providing such services. In particular, we use ML to train spam filters for identifying and removing violent, insulting, aggressive, and harassing content creators (a.k.a. spammers) from a social media platform. It helps to solve violent and aggressive issues that have been growing on social media environments. The experimental results show that our proposals are efficient and effective
- âŠ