Search results for: financial security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5341

Search results for: financial security

5071 The Precarious Chinese Ecology of Financial Expertise: Discontent in the Mix

Authors: Giulia Dal Maso

Abstract:

Within the contemporary financial capitalist configuration, the interplay of Chinese statecraft and financialization has shaped a new ‘ecology of financial expertise.’ This indicates the emergence of a new financial technocratic governance; that is increasingly changing the Chinese economy, reducing the state’s administrative and fiscal functions and increasing state assets in accordance with a new shareholder logic. In this shift, the creation of the stock market by the state was conceived not only as a new redistributor of wealth but as a ‘clearing house’ for social discontent resulting from work casualization, wage repression and a lack of social welfare. Since its inception in the wake of Deng Xiaoping’s reforms, the Chinese state has used the stock market as a means of securing social legitimation by providing a prearranged space where the disaggregated and vulnerable subjects left behind by the dismantlement of the collective work units of the Maoist period (danwei) can congregate. However, fieldwork which included both participant observation as well as interviews with investors in brokerage rooms in Shanghai (where one of only two mainland Chinese stock exchanges is situated) reveals that both new formal and informal financial experts—namely the haigui (Chinese returnees with a financial degree abroad) and sanhu (individual Chinese scattered players), are equally dissatisfied with their investing activities. They express discontent with the state, which they hold responsible for the summer 2015 financial crisis and for the financial turmoil that jeopardizes China’s financial and political project. What the investors want is a state that will guarantee the continuation of the current gupiaore ‘stock fever’. This paper holds that, by embracing financialization, the state is undermining the contract at the base of its legitimacy.

Keywords: Chinese state, Deng Xiaoping, financial capitalism, individual investors

Procedia PDF Downloads 442
5070 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 73
5069 Financial Liberalization and Allocation of Bank Credit in Malaysia

Authors: Chow Fah Yee, Eu Chye Tan

Abstract:

The main purpose of developing a modern and sophisticated financial system is to mobilize and allocate the country’s resources for productive uses and in the process contribute to economic growth. Financial liberalization introduced in Malaysia in 1978 was said to be a step towards this goal. According to Mc-Kinnon and Shaw, the deregulation of a country’s financial system will create a more efficient and competitive market driven financial sector; with savings being channelled to the most productive users. This paper aims to assess whether financial liberalization resulted in bank credit being allocated to the more productive users, for the case of Malaysia by: firstly, using Chi-square test to if there exists a relationship between financial liberalization and bank lending in Malaysia. Secondly, to analyze on a comparative basis, the share of loans secured by 9 major economic sectors, using data on bank loans from 1975 to 2003. Lastly, present value analysis and rank correlation was used to determine if the recipients of bigger loans are the more efficient users. Chi-square test confirmed the generally observed trend of an increase in bank credit with the adoption of financial liberalization. While the comparative analysis of loans showed that the bulk of credit were allocated to service sectors, consumer loans and property related sectors, at the expense of industry. Results for rank correlation analysis showed that there is no relationship between the more productive users and amount of loans obtained. This implies that the recipients (sectors) that received more loans were not the more efficient sectors.

Keywords: allocation of resources, bank credit, financial liberalization, economics

Procedia PDF Downloads 430
5068 Bankruptcy Prediction Analysis on Mining Sector Companies in Indonesia

Authors: Devina Aprilia Gunawan, Tasya Aspiranti, Inugrah Ratia Pratiwi

Abstract:

This research aims to classify the mining sector companies based on Altman’s Z-score model, and providing an analysis based on the Altman’s Z-score model’s financial ratios to provide a picture about the financial condition in mining sector companies in Indonesia and their viability in the future, and to find out the partial and simultaneous impact of each of the financial ratio variables in the Altman’s Z-score model, namely (WC/TA), (RE/TA), (EBIT/TA), (MVE/TL), and (S/TA), toward the financial condition represented by the Z-score itself. Among 38 mining sector companies listed in Indonesia Stock Exchange (IDX), 28 companies are selected as research sample according to the purposive sampling criteria.The results of this research showed that during 3 years research period at 2010-2012, the amount of the companies that was predicted to be healthy in each year was less than half of the total sample companies and not even reach up to 50%. The multiple regression analysis result showed that all of the research hypotheses are accepted, which means that (WC/TA), (RE/TA), (EBIT/TA), (MVE/TL), and (S/TA), both partially and simultaneously had an impact towards company’s financial condition.

Keywords: Altman’s Z-score model, financial condition, mining companies, Indonesia

Procedia PDF Downloads 515
5067 Future Outlook and Current Situation for Security of Gas Supply in Eastern Baltic Region

Authors: Ando Leppiman, Kati Kõrbe Kaare, Ott Koppel

Abstract:

The growing demand for gas has rekindled a debate on gas security of supply due to supply interruptions, increasing gas prices, transportation and distribution bottlenecks and a growing reliance on imports over longer distances. Security of supply is defined mostly as an infrastructure package to satisfy N-1 criteria. In case of Estonia, Finland, Latvia, and Lithuania all the gas infrastructure is built to supply natural gas only from one single supplier, Russia. In 2012, almost 100% of natural gas to the Eastern Baltic Region was supplied by Gazprom. under such circumstances infrastructure N-1 criteria does not guarantee security of supply. In the Eastern Baltic Region, the assessment of risk of gas supply disruption has been worked out by applying the method of risk scenarios. There are various risks to be tackled in Eastern Baltic States in terms of improving security of supply, such as single supplier risk, physical infrastructure risk, regulatory gap, fair price, and competition. The objective of this paper is to evaluate the energy security of the Eastern Baltic Region within the framework of the European Union’s policies and to make recommendations on how to better guarantee the energy security of the region.

Keywords: security of supply, supply routes for natural gas, energy balance, diversified supply options, common regulative package

Procedia PDF Downloads 245
5066 Econophysical Approach on Predictability of Financial Crisis: The 2001 Crisis of Turkey and Argentina Case

Authors: Arzu K. Kamberli, Tolga Ulusoy

Abstract:

Technological developments and the resulting global communication have made the 21st century when large capitals are moved from one end to the other via a button. As a result, the flow of capital inflows has accelerated, and capital inflow has brought with it crisis-related infectiousness. Considering the irrational human behavior, the financial crisis in the world under the influence of the whole world has turned into the basic problem of the countries and increased the interest of the researchers in the reasons of the crisis and the period in which they lived. Therefore, the complex nature of the financial crises and its linearly unexplained structure have also been included in the new discipline, econophysics. As it is known, although financial crises have prediction mechanisms, there is no definite information. In this context, in this study, using the concept of electric field from the electrostatic part of physics, an early econophysical approach for global financial crises was studied. The aim is to define a model that can take place before the financial crises, identify financial fragility at an earlier stage and help public and private sector members, policy makers and economists with an econophysical approach. 2001 Turkey crisis has been assessed with data from Turkish Central Bank which is covered between 1992 to 2007, and for 2001 Argentina crisis, data was taken from IMF and the Central Bank of Argentina from 1997 to 2007. As an econophysical method, an analogy is used between the Gauss's law used in the calculation of the electric field and the forecasting of the financial crisis. The concept of Φ (Financial Flux) has been adopted for the pre-warning of the crisis by taking advantage of this analogy, which is based on currency movements and money mobility. For the first time used in this study Φ (Financial Flux) calculations obtained by the formula were analyzed by Matlab software, and in this context, in 2001 Turkey and Argentina Crisis for Φ (Financial Flux) crisis of values has been confirmed to give pre-warning.

Keywords: econophysics, financial crisis, Gauss's Law, physics

Procedia PDF Downloads 144
5065 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 78
5064 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 59
5063 Impact of Sustainability Reporting on the Financial Performance of Deposit Money Banks: Pre-Post Analysis of Integrating Environmental, Social, and Governance Disclosure into Corporate Annual Reports

Authors: A. O. Talabi, F. M. Taib, D. J. Jalaludin

Abstract:

The influence of sustainability reporting on Deposit Money Banks (DMBs)' financial performance both before and after mandated environmental, social, and governance (ESG) disclosure is examined in this article. Using a sample size of the top six strategically important listed banks in Nigeria, the study employed the paired sample t-test to assess the pre-mandatory ESG period (2009-2015) and the post-mandatory ESG period (2016-2022). According to the findings, there was no discernible difference between the performance of DMBs in Nigeria before and after the requirement for ESG disclosure. In the pre-mandatory requirement time, sustainability reporting is a major predictor of financial metrics, but in the post-mandatory requirement period, there was no discernible change in financial performance. Market authorities ought to have unrestricted authority to impose severe fines for noncompliance and bring legal action against corporations that fail to disclose ESG. This work contributes to the literature on ESG disclosure and financial performance by considering two different periods.

Keywords: financial, performance, sustainability, reporting

Procedia PDF Downloads 112
5062 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 343
5061 Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors

Authors: Tizian Matschak, Ilja Nastjuk, Stephan Kühnel, Simon Trang

Abstract:

We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making.

Keywords: business process dimensions, dark side of information security, Delphi study, IT security controls

Procedia PDF Downloads 100
5060 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 283
5059 A Nexus between Financial Development and Its Determinants: A Panel Data Analysis from a Global Perspective

Authors: Bilal Ashraf, Qianxiao Zhang

Abstract:

This study empirically investigated the linkage amid financial development and its important determinants such as information and communication technology, natural resource rents, economic growth, current account balance, and gross savings in 107 economies. This paper preferred to employ the second-generation unit root tests to handle the issues of slope heterogeneity and “cross-sectional dependence” in panel data. The “Kao, Pedroni, and Westerlund tests” confirm the long-lasting connections among the variables under study, while the significant endings of “cross-sectionally augmented autoregressive distributed lag (CS-ARDL)” exposed that NRR, CAB, and S negatively affected the financial development while ICT and EG stimulates the procedure of FD. Further, the robustness analysis's application of FGLS supports the appropriateness and applicability of CS-ARDL. Finally, the findings of “DH causality analysis” endorse the bidirectional causality linkages amongst research factors. Based on the study's outcomes, we suggest some policy suggestions that empower the process of financial development, globally.

Keywords: determinants of financial developments, CS-ARDL, financial development, global sample, causality analysis

Procedia PDF Downloads 43
5058 The Determinants of Financial Ratio Disclosures and Quality: Evidence from an Emerging Market

Authors: Ben Kwame Agyei-Mensah

Abstract:

This study investigated the influence of firm-specific characteristics which include proportion of Non-Executive Directors, ownership concentration, firm size, profitability, debt equity ratio, liquidity and leverage on the extent and quality of financial ratios disclosed by firms listed on the Ghana Stock Exchange. The research was conducted through detailed analysis of the 2012 financial statements of the listed firms. Descriptive analysis was performed to provide the background statistics of the variables examined. This was followed by regression analysis which forms the main data analysis. The results of the extent of financial ratio disclosure level, mean of 62.78%, indicate that most of the firms listed on the Ghana Stock Exchange did not overwhelmingly disclose such ratios in their annual reports. The results of the low quality of financial ratio disclosure mean of 6.64% indicate that the disclosures failed woefully to meet the International Accounting Standards Board's qualitative characteristics of relevance, reliability, comparability and understandability. The results of the multiple regression analysis show that leverage (gearing ratio) and return on investment (dividend per share) are associated on a statistically significant level as far as the extent of financial ratio disclosure is concerned. Board ownership concentration and proportion of (independent) non-executive directors, on the other hand were found to be statistically associated with the quality of financial ratio disclosed. There is a significant negative relationship between ownership concentration and the quality of financial ratio disclosure. This means that under a higher level of ownership concentration less quality financial ratios are disclosed. The findings also show that there is a significant positive relationship between board composition (proportion of non-executive directors) and the quality of financial ratio disclosure.

Keywords: voluntary disclosure, firm-specific characteristics, financial reporting, financial ratio disclosure, Ghana stock exchange

Procedia PDF Downloads 577
5057 The Effect of Critical Audit Matters on Financial Information Quality: The Role of Audit Committee Expertise

Authors: Khawla Hlel

Abstract:

Purpose: This study aims to examine whether critical audit matters (CAM) affect financial information quality. We also investigate the moderating role of the audit committee on the association between CAM and financial information quality. Design/Methodology/Approach: The analysis is based on GLS and GMM regressions explaining the absolute value of discretionary accruals by using 52 Tunisian listed firms on the Tunisia Stock Exchange (TSE) for the period 2017-2020. Findings: We find evidence that managers react to the CAM by increasing the quality of financial disclosures. This study provides insights into how a change in the auditor’s report model might impact the quality of financial information. It suggests that external auditors and audit committees serve as a beneficial mechanism for enhancing financial information quality by reducing information asymmetry. In addition, our results indicate that CAM is an efficient monitoring mechanism that increases financial reporting quality and supervises managers. Originality: This study is important for potential investors who should assess CAM when evaluating firms. Furthermore, the authors expect the findings to be interesting to firms, as this study highlights the effectiveness of the auditor in reducing managerial opportunistic behavior and improving information quality. The results could encourage audit regulators to ameliorate the standards, as this research reinforces the role of the auditor in increasing the quality of financial disclosure by offering the required information for shareholders.

Keywords: critical audit matters, audit committee, information quality, Tunisian firms

Procedia PDF Downloads 77
5056 A Conceptual Framework for Managing Municipal Finances in South Africa

Authors: Abongile Zweni

Abstract:

As a post-apartheid strategy to redress the social imbalances of the past, local governments are tasked with the role of delivering crucial services to their constituents. Apart from political instability, evidence shows that managers in South African municipalities lack effective financial management skills and competencies. This resulted in a failure to fulfill its administrative obligations, particularly municipal financial management. Most municipalities have, however, failed in this role, which has led them to be placed under administration by the provincial government in terms of Section 139 of the constitution of the Republic of South Africa. Thus, this study proposed a leadership conceptual framework for effectively managing ever-eroding municipal finances in South Africa. The study adopted a desktop research approach to explore the key components of leadership and municipal financial management toward the development of the conceptual framework. The study fostered a better understanding of the need for transformation in relation to the current financial management practices and sustainability of a municipality. Moreover, the conceptual framework applies not only to municipalities but also to other government departments and public authorities in the country for financial management.

Keywords: leadership, municipal finance, financial performance, management skills, municipality

Procedia PDF Downloads 296
5055 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 192
5054 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 84
5053 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 316
5052 The Impact of Natural Resources on Financial Development: The Global Perspective

Authors: Remy Jonkam Oben

Abstract:

Using a time series approach, this study investigates how natural resources impact financial development from a global perspective over the 1980-2019 period. Some important determinants of financial development (economic growth, trade openness, population growth, and investment) have been added to the model as control variables. Unit root tests have revealed that all the variables are integrated into order one. Johansen's cointegration test has shown that the variables are in a long-run equilibrium relationship. The vector error correction model (VECM) has estimated the coefficient of the error correction term (ECT), which suggests that the short-run values of natural resources, economic growth, trade openness, population growth, and investment contribute to financial development converging to its long-run equilibrium level by a 23.63% annual speed of adjustment. The estimated coefficients suggest that global natural resource rent has a statistically-significant negative impact on global financial development in the long-run (thereby validating the financial resource curse) but not in the short-run. Causality test results imply that neither global natural resource rent nor global financial development Granger-causes each other.

Keywords: financial development, natural resources, resource curse hypothesis, time series analysis, Granger causality, global perspective

Procedia PDF Downloads 153
5051 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 390
5050 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 453
5049 Impact of Audit Committee on Real Earnings Management: Cases of Netherlands

Authors: Sana Masmoudi Mardassi, Yosra Makni Fourati

Abstract:

Regulators highlight the importance of the Audit Committee (AC) as a key internal corporate governance mechanism. One of the most important roles of this committee is to oversee the financial reporting process. The purpose of this paper is to examine the link between the characteristics of an audit committee and the financial reporting quality by investigating whether the characteristics of audit committees are associated with improved financial reporting quality, especially the Real Earnings Management. In the current study, a panel data from 80 nonfinancial companies listed on the Amsterdam Stock Exchange during the period between 2010 and 2017 were used. To measure audit committee characteristics, four proxies have been used, specifically, audit committee independence, financial expertise, gender diversity and AC meetings. For this research, a linear regression model was used to identify the influence of a set of board characteristics of the audit committee on real earnings management after controlling for firm audit committee size, leverage, size, loss, growth and board size. This research provides empirical evidence of the association between audit committee independence, financial expertise, gender diversity and meetings and Real Earnings Management (REM) as a proxy of financial reporting quality. The study finds that independence and AC Gender diversity are strongly related to financial reporting quality. In fact, these two characteristics constrain REM. The results also suggest that AC- financial expertise reduces to some extent, the likelihood of engaging in REM. These conclusions provide support then to the audit committee requirement under the Dutch Corporate Governance Code rules regarding gender diversity and AC meetings.

Keywords: audit committee, financial expertise, independence, real earnings management

Procedia PDF Downloads 153
5048 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 448
5047 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses

Authors: Pooja Bakshi

Abstract:

In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.

Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia

Procedia PDF Downloads 484
5046 The Voluntary Review Decision of Quarterly Consolidated Financial Statements in Emerging Market: Evidence from Taiwan

Authors: Shuofen Hsu, Ya-Yi Chao, Chao-Wei Li

Abstract:

This paper investigates the factors of whether firms’ quarterly consolidated financial statements to be voluntary reviewed by auditor. To promote the information transparency, the Financial Supervisory Commission of Executive Yuan in Taiwan ruled the Taiwanese listed companies should announce the first and third quarterly consolidated financial statements since 2008 to 2012, while the Commission didn’t require the consolidated financial statements should be reviewed by auditors. This is a very special practice in emerging market, especially in Taiwan. The valuable data of this period is suitable for us to research the determinants of firms’ voluntary review decision in emerging markets. We collected the auditors' report of each company and each year of Taiwanese listed companies since 2008 to 2012 for our research samples. We use probit model to test and analyze the determinants of voluntary review decision of the first and third quarterly consolidated financial statements. Our empirical result shows that the firms whose first and third quarterly consolidated financial statements are voluntary to be reviewed by auditors have better ranking of information transparency, higher audit quality, and better corporate governance, suggesting that voluntary review is a good signal to firms’ better information and corporate governance quality.

Keywords: voluntary review, information transparency, audit quality, quarterly consolidated financial statements

Procedia PDF Downloads 238
5045 An Exploration of Anti-Terrorism Laws in Nigeria

Authors: Sani Mohammed Adam

Abstract:

This work seeks to review the security challenges facing Nigeria and explore the relevance of laws and policies in tackling the menace. The work looks at the adequacy of available legislations and the functionality of relevant institutions such as the Armed Forces, the Nigeria Police Force, the State Security Service, the Defence Intelligence Agency and the Nigerian Intelligence Agency etc. Comparisons would be made with other jurisdictions, such as inter alia, the Homeland Security in the USA and Counter Terrorism Laws of the United Kingdom. Recommendations would be made on how to strengthen both institutions and laws to curtail the growth of Terrorism in Nigeria.

Keywords: legislations, Nigeria, security, terrorism

Procedia PDF Downloads 664
5044 Enhancing Small and Medium Enterprises Access to Finance: The Opportunities and Challenges of Using Intellectual Property Rights as Collateral in Sri Lanka

Authors: Nihal Chandratilaka Matara Arachchige, Nishantha Sampath Punichihewa

Abstract:

Intellectual property (IP) assets are the ‘crown-jewels’ of innovation-driven businesses in the knowledge-based economy. In that sense, IP rights such as patents, trademarks and copyrights afford enormous economic opportunities to an enterprise, especially Small and Medium Enterprise (SME). As can be gleaned from the latest statistics, the domestic industries in Sri Lanka are predominantly represented by SMEs. Undeniably, in terms of economic contribution, the SME sector is considered to be the backbone of the country’s ‘real economy’. However, the SME sector in Sri Lanka faces number of challenges. One of the nearly-insurmountable-hurdles for small businesses is the access to credit facilities, due to the lack of collateral. In the eyes of law, the collateral is something pledged as security for repayment in the event of default. Even though the intellectual property rights are used as collateral in order to facilitate obtaining credit for businesses in number of Asian jurisdictions, financial institutions in Sri Lanka are extremely reluctant to accept IP rights as collateral for granting financial resources to SMEs. Against this backdrop, this research investigates from a legal perspective reasons for not accepting IP rights as collateral when granting loans for SMEs. Drawing emerging examples from other jurisdiction, it further examines the inadequacies of existing legal framework in relation to the use of IP rights as collateral. The methodology followed in this paper is qualitative research. Empirical research and analysis concerning the core research question are carried out by conducting in-depth interviews with stakeholders, including leading financial institutions in Sri Lanka.

Keywords: intellectual property assets, SMEs, collaterals financial facilities, credits

Procedia PDF Downloads 262
5043 Understanding the Complexities of Consumer Financial Spinning

Authors: Olivier Mesly

Abstract:

This research presents a conceptual framework termed “Consumer Financial Spinning” (CFS) to analyze consumer behavior in the financial/economic markets. This phenomenon occurs when consumers of high-stakes financial products accumulate unsustainable debt, leading them to detach from their initial financial hierarchy of needs, wealth-related goals, and preferences regarding their household portfolio of assets. The daring actions of these consumers, forming a dark financial triangle, are characterized by three behaviors: overconfidence, the use of rationed rationality, and deceitfulness. We show that we can incorporate CFS into the traditional CAPM and Markovitz’ portfolio optimization models to create a framework that explains such market phenomena as the global financial crisis, highlighting the antecedents and consequences of ill-conceived speculation. Because this is a conceptual paper, there is no methodology with respect to ground studies. However, we apply modeling principles derived from the data percolation methodology, which contains tenets explicating how to structure concepts. A simulation test of the proposed framework is conducted; it demonstrates the conditions under which the relationship between expected returns and risk may deviate from linearity. The analysis and conceptual findings are particularly relevant both theoretically and pragmatically as they shed light on the psychological conditions that drive intense speculation, which can lead to market turmoil. Armed with such understanding, regulators are better equipped to propose solutions before the economic problems become out of control.

Keywords: consumer financial spinning, rationality, deceitfulness, overconfidence, CAPM

Procedia PDF Downloads 32
5042 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 440