Green Management and Sustainability in SMEs DOI
Samina Qasim, Muhammad Asif Qureshi,

Sonia Najam Shaikh

et al.

Advances in human resources management and organizational development book series, Journal Year: 2024, Volume and Issue: unknown, P. 115 - 144

Published: Oct. 22, 2024

Small and Medium Enterprises (SMEs) are crucial to the global economy, comprising approximately 90% of businesses employing about 50-60% workforce. However, SMEs often encounter challenges in maintaining sustainability due resources a lack awareness regarding practices.This chapter explore concept management within highlighting its importance advantages. It sets stage for exploring how eco-friendly practices could improve by summarizing hurdles faced SMEs. In addition, it emphasizes role played promoting through Green Human Resource Management (GHRM).This discussion aligns with Development Goals (SDGs) including SDG 8 (Decent Work Economic Growth) 12 (Responsible Consumption Production) 13 (Climate Action). By linking this book's theme, goal is grasp green principles encourage growth.

Language: Английский

Security paradigms for IoT in telecom networks: Conceptual challenges and solution pathways DOI Creative Commons

Godwin Nzeako,

Chukwuekem David Okeke,

Michael Oladipo Akinsanya

et al.

Engineering Science & Technology Journal, Journal Year: 2024, Volume and Issue: 5(5), P. 1606 - 1626

Published: May 5, 2024

The concept paper explores the critical security challenges posed by Internet of Things (IoT) in telecom networks and proposes solution pathways to address them. As IoT devices proliferate networks, they introduce new vulnerabilities threats that must be mitigated ensure integrity, confidentiality, availability network resources data. begins highlighting unique devices, including their large attack surface, resource constraints, diverse communication protocols. These are further exacerbated due scale complexity infrastructure. To these challenges, a multi-faceted approach combines technical, organizational, regulatory measures. Technical solutions include use secure protocols, device authentication mechanisms, encryption techniques protect data transit at rest. Organizational measures focus on improving awareness training among operators ensuring development deployment devices. Regulatory advocate for implementation standards regulations promote privacy deployments. also discusses importance collaboration stakeholders, operators, manufacturers, bodies, effectively. By working together, stakeholders can develop implement best practices enhance networks. In conclusion, highlights urgent need robust paradigms deployments within implementing proposed fostering mitigate risks safe Keywords: IoT, Telecom, Networks, Security.

Language: Английский

Citations

34

REMOTE WORK POLICIES FOR IT PROFESSIONALS: REVIEW OF CURRENT PRACTICES AND FUTURE TRENDS DOI Creative Commons

Olufunke Olawale,

Funmilayo Aribidesi Ajayi,

Chioma Ann Udeh

et al.

International Journal of Management & Entrepreneurship Research, Journal Year: 2024, Volume and Issue: 6(4), P. 1236 - 1258

Published: April 25, 2024

This study investigates the dynamics of remote work in Information Technology (IT) sector, focusing on best practices, challenges, and future implications. Through a systematic literature review content analysis, explores key objectives, methodology, findings, conclusions regarding policies technologies IT industry. The main objectives include synthesizing insights into practices for work, examining landscape providing strategic recommendations enhancing technologies, identifying directions research dynamics. Methodologically, employs approach, utilizing reputable academic databases search strategies to identify relevant literature. Inclusion exclusion criteria are established ensure rigor relevance selected articles, which then subjected data analysis using techniques recurring themes insights. Key findings from highlight importance clear communication, technological support, trust, work-life balance environments. Challenges such as cybersecurity risks, team cohesion, equity concerns also identified. However, emphasizes promises including increased flexibility, productivity, talent retention. Based these provided investing measures, implementing comprehensive training programs, leveraging emerging technologies. concludes by highlighting need continued understanding long-term impacts effectively managing teams foster inclusive sustainable environments digital age. Keywords: Remote Work, Sector, Diversity And Inclusion, Work-Life Balance.

Language: Английский

Citations

24

PREDICTIVE ANALYTICS FOR PROACTIVE SUPPORT IN TRAFFICKING PREVENTION AND VICTIM REINTEGRATION DOI Creative Commons

Ayo Amen Ediae,

Chidinma Favour Chikwe,

Kevin Namiiro Kuteesa

et al.

Engineering Science & Technology Journal, Journal Year: 2024, Volume and Issue: 5(4), P. 1502 - 1523

Published: April 26, 2024

Human trafficking is a pervasive and complex crime that affects millions of people worldwide. In recent years, there has been growing recognition the need for proactive approaches to prevention victim reintegration. Predictive analytics, data-driven technology uses algorithms analyze patterns predict future outcomes, holds great promise in this regard. This review explores application predictive analytics reintegration, highlighting its potential enhance support victims improve overall outcomes. can play crucial role by identifying trends may indicate activities. By analyzing data from various sources, such as social media, financial transactions, law enforcement records, help identify high-risk areas individuals, enabling agencies NGOs take measures prevent trafficking. For example, vulnerable populations, runaway youth or migrants, target efforts accordingly. context outcomes factors influence victim's likelihood successful reintegration into society. on education, employment, support, interventions are most likely rebuild their lives. types services, housing assistance job training, effective helping reintegrate Overall, revolutionize tailored specific needs victims. However, it important recognize not without challenges, including concerns about privacy ethical implications. Therefore, essential ensure used responsibly accordance with guidelines maximize benefits Keywords: Analytics, Trafficking, Prevention, Victim Reintegration, Systematic Review.

Language: Английский

Citations

20

VIRTUAL PRIVATE NETWORKS (VPN): A CONCEPTUAL REVIEW OF SECURITY PROTOCOLS AND THEIR APPLICATION IN MODERN NETWORKS DOI Creative Commons

Michael Oladipo Akinsanya,

Cynthia Chizoba Ekechi,

Chukwuekem David Okeke

et al.

Engineering Science & Technology Journal, Journal Year: 2024, Volume and Issue: 5(4), P. 1452 - 1472

Published: April 26, 2024

Virtual Private Networks (VPNs) play a crucial role in ensuring secure communication over public networks. This concept paper provides comprehensive review of security protocols used VPNs and their application modern The begins by defining explaining importance securing data transmission untrusted It then discusses the evolution VPN technology, highlighting transition from traditional IPSec SSL/TLS to more approaches such as WireGuard QUIC. also examines VPNs, including IPSec, SSL/TLS, newer like Each protocol is analyzed terms its features, performance, suitability for different use cases. Furthermore, explores networks, remote access, site-to-site connectivity, cloud-based services. challenges considerations involved deploying managing today's complex network environments. In conclusion, emphasizes highlights need organizations carefully evaluate requirements choose appropriate technologies protect Keywords: VPN, Security, Applications, Network.

Language: Английский

Citations

19

Developing scalable data solutions for small and medium enterprises: Challenges and best practices DOI Creative Commons

Ebunoluwa Johnson,

Omorinsola Bibire Seyi- Lande,

Gbenga Sheriff Adeleke

et al.

International Journal of Management & Entrepreneurship Research, Journal Year: 2024, Volume and Issue: 6(6), P. 1910 - 1935

Published: June 13, 2024

The rapid digital transformation sweeping across various industries has underscored the critical importance of data solutions for small and medium enterprises (SMEs). Developing scalable SMEs presents a unique set challenges requires adopting best practices tailored to their specific needs constraints. This review outlines aspects creating infrastructures SMEs, focusing on involved. Scalability in refers ability system handle growing amounts an increasing number users without compromising performance. For are vital as they provide flexibility expand operations adapt market changes efficiently. primary components such include storage, processing, analytics, security. Each component must be designed accommodate growth, ensuring remains efficient cost-effective business scales. face several developing solutions. Limited financial resources often restrict invest advanced technologies hire skilled personnel. Additionally, many lack in-house expertise required implement maintain complex systems. Data integration poses another significant challenge, particularly when dealing with disparate sources legacy Security compliance also present considerable hurdles, ensure meet regulatory standards extensive budgets or dedicated teams. Furthermore, scalability involves performance trade-offs, carefully balance cost, efficiency, future growth potential. Lastly, risk vendor lock-in can limit increase long-term costs, making it crucial choose technology partners wisely. To address these challenges, adopt practices. Conducting thorough assessment is essential align goals identify most requirements. Choosing right stack evaluating benefits cloud-based versus on-premises deciding between open-source proprietary software based budget Implementing robust management strategies, including governance quality management, ensures reliability integrity data. Effective techniques seamless accurate analytics. Leveraging cloud services advantageous offering infrastructure lower upfront costs. Selecting suitable service provider clear migration strategy significantly enhance flexibility. Ensuring security paramount; should strong measures, adhere requirements, conduct regular audits. Building team, either by investing training existing staff collaborating external experts, successful implementation Creating data-driven culture within organization drive better decision-making foster innovation. Monitoring optimizing solution continuously that meets evolving business. Utilizing analytics bottlenecks areas improvement help efficiency effectiveness. stay informed about trends solutions, artificial intelligence, machine learning, edge computing, multi-cloud remain competitive prepared growth. While enable them overcome obstacles harness power sustainable advantage. approach not only addresses current operational but positions demands technological advancements. Keywords: Scalable, Solution, Small Medium, Enterprise.

Language: Английский

Citations

18

Financial Technology-Enabled Sustainable Finance for Small- and Medium-Sized Enterprises DOI
Tipon Tanchangya,

Naimul Islam,

Kamrun Naher

et al.

Published: Jan. 1, 2025

This study aims to assess how FinTech facilitates sustainable finance (SF) for small- and medium-sized enterprises (SMEs). Therefore, the identified several solutions, including blockchain, artificial intelligence (AI), digital banking payment systems, crowdfunding peer-to-peer (P2P) lending, that facilitate SF SMEs. The research indicates helps financial institutions provide effectively efficiently Blockchain technology is effective transparent secure transactions because it can narrow credit gaps, lower information asymmetry, increase availability of funds, improve evaluation processes, promote inclusion. AI applied identify fraud, anticipate mitigate environmental, social, governance (ESG)-related events, enhance risk management programs through use different methods such as behavioral modeling, sequential clustering. Crowdfunding connects funders with campaigns. Business owners start-up founders are able communicate investors regarding their companies via crowdsourcing website, which serves a place collect input from other people online. Smart contracts decentralized, verifiable, auto-enforcing features allow encoded business rules be carried out in P2P network without assistance single server or believed authority. successful case studies validate our study. Finally, provides significant policy regulatory implications all stakeholders.

Language: Английский

Citations

2

THEORETICAL UNDERPINNINGS AND PRACTICAL IMPLICATIONS OF SD-WAN TECHNOLOGIES IN TELECOMMUNICATIONS DOI Creative Commons

Michael Oladipo Akinsanya,

Cynthia Chizoba Ekechi,

Chukwuekem David Okeke

et al.

Computer Science & IT Research Journal, Journal Year: 2024, Volume and Issue: 5(4), P. 950 - 971

Published: April 26, 2024

The concept paper explores the transformative impact of Software-Defined Wide Area Network (SD-WAN) technologies on telecommunications industry. SD-WAN has emerged as a game-changer, offering more flexible, agile, and cost-effective alternative to traditional (WAN) solutions. begins by providing theoretical foundation for SD-WAN, discussing its key principles, architectural components, underlying technologies. It how leverages software-defined networking (SDN) principles dynamically manage optimize network traffic across geographically dispersed locations, improving performance reducing costs. practical implications in industry are then examined. discusses enables organizations enhance performance, reduce latency, improve application their networks. also can simplify management, security, support growing demand cloud-based applications services. Furthermore, challenges considerations associated with implementing such ensuring compatibility existing infrastructure, managing security risks, compliance regulatory requirements. potential service providers, highlighting opportunities new revenue streams business models. Overall, this provides comprehensive overview underpinnings telecommunications. aims inform professionals, researchers, policymakers about future Keywords: Technology, Telecom, Security.

Language: Английский

Citations

14

Quantum computing and financial risk management: A theoretical review and implications DOI Creative Commons

Mayokun Daniel Adegbola,

Ayodeji Enoch Adegbola,

Prisca Amajuoyi

et al.

Computer Science & IT Research Journal, Journal Year: 2024, Volume and Issue: 5(6), P. 1210 - 1220

Published: June 7, 2024

This review paper examines the potential implications of quantum computing for financial risk management. It explores fundamental principles computing, including qubits, superposition, and entanglement. discusses its advantages over classical assessment mitigation. The outlines traditional approaches to how algorithms, such as Monte Carlo methods annealing, can enhance these strategies. Challenges barriers adopting in industry are identified, along with future research directions. Ultimately, highlights transformative improving management today's complex markets. Keywords: Quantum Computing, Financial Risk Management, Qubits, Algorithms, Simulations, Portfolio Optimisation.

Language: Английский

Citations

14

Empowering youth through sexuality and leadership education: Approaches and outcomes DOI Creative Commons

Ayo Amen Ediae,

Chidinma Favour Chikwe,

Kevin Namiiro Kuteesa

et al.

World Journal of Advanced Research and Reviews, Journal Year: 2024, Volume and Issue: 22(1), P. 1250 - 1265

Published: April 26, 2024

Empowering youth through sexuality and leadership education is crucial for their holistic development well-being. This paper provides an overview of approaches outcomes related to empowering in these areas. Effective include comprehensive (CSE), youth-friendly services, peer education, training. CSE equips young people with accurate, age-appropriate information about sexuality, relationships, reproductive health, enabling them make informed decisions. Youth-friendly services provide confidential, nonjudgmental health tailored people's needs. Peer involves teaching peers sexual encouraging open dialogue. Leadership training fosters skills such as communication, decision-making, advocacy, become leaders communities. leads various positive outcomes. It improves outcomes, including reduced rates unintended pregnancies, sexually transmitted infections (STIs), HIV/AIDS. also promotes gender equality empowerment, learn rights how challenge harmful norms. Additionally, enhance self-esteem, communication skills, ability decisions, preparing future roles. essential By providing support, we can help navigate challenges, healthy choices, empowered

Language: Английский

Citations

13

Integrated public health and migration policy: Crafting effective responses to migrant crises DOI Creative Commons

Ayo Amen Ediae,

Chidinma Favour Chikwe,

Kevin Namiiro Kuteesa

et al.

World Journal of Advanced Research and Reviews, Journal Year: 2024, Volume and Issue: 22(1), P. 1234 - 1249

Published: April 26, 2024

The intersection of public health and migration policy presents complex challenges in the context migrant crises. This abstract provides an overview analysis on integrated policy, focusing crafting effective responses to By examining key findings implications, it highlights critical importance addressing needs within frameworks. reveals that crises often exacerbate existing vulnerabilities, including limited access healthcare, inadequate sanitation facilities, heightened risks infectious diseases. Integrated approaches prioritize migrants are essential for mitigating these ensuring well-being both populations host communities. Key underscore adopting a comprehensive rights-based approach policy. involves recognizing migrants' right equitable healthcare services, regardless legal status or nationality. Furthermore, requires social determinants health, such as poverty, discrimination, exclusion, which disproportionately affect populations. Implications future research development include need greater collaboration coordination among stakeholders, government agencies, civil society organizations, international partners. Research gaps identified further investigation into specific groups, refugees, asylum seekers, undocumented migrants, well effectiveness different interventions meeting needs. In conclusion, is prioritizing approach, policymakers can mitigate negative impacts promote all individuals affected by urgency frameworks calls commitment equity human rights.

Language: Английский

Citations

13