Search results for: financial security
5056 Foreign Artificial Intelligence Investments and National Security Exceptions in International Investment Law
Authors: Ying Zhu
Abstract:
Recent years have witnessed a boom of foreign investments in the field of artificial intelligence (AI). Foreign investments provide critical capital for AI development but also trigger national security concerns of host states. A notable example is an increasing number of cases in which the Committee on Foreign Investment in the United States (CFIUS) has denied Chinese acquisitions of US technology companies on national security grounds. On July 19, 2018, the Congress has reached a deal on the final draft of a new provision to strengthen CFIUS’s authority to review overseas transactions involving sensitive US technology. The question is: how to reconcile the emerging tension between, on the one hand, foreign AI investors’ expectations of a predictable investment environment, and on the other hand, host states’ regulatory power on national security? This paper provides a methodology to reconcile this tension under international investment law. Based on an examination, the national security exception clauses in international investment treaties and the application of national security justification in investor-state arbitration jurisprudence, the paper argues that a traditional interpretation of the national security exception, based on the necessity concept in customary international law, fails to take into account new risks faced by countries, including security concerns over strategic industries such as AI. To overcome this shortage, the paper proposes to incorporate an integrated national security clause in international investment treaties, which includes a two-tier test: a ‘self-judging’ test in the pre-establishment period and a ‘proportionality’ test in the post-establishment period. At the end, the paper drafts a model national security clause for future treaty-drafting practice.Keywords: foreign investment, artificial intelligence, international investment law, national security exception
Procedia PDF Downloads 1525055 Effective Communication with the Czech Customers 50+ in the Financial Market
Authors: K. Matušínská, H. Starzyczná, M. Stoklasa
Abstract:
The paper deals with finding and describing of the effective marketing communication forms relating to the segment 50+ in the financial market in the Czech Republic. The segment 50+ can be seen as a great marketing potential in the future but unfortunately the Czech financial institutions haven´t still reacted enough to this fact and they haven´t prepared appropriate marketing programs for this customers´ segment. Demographic aging is a fundamental characteristic of the current European population evolution but the perspective of further population aging is more noticeable in the Czech Republic. This paper is based on data from one part of primary marketing research. Paper determinates the basic problem areas as well as definition of marketing communication in the financial market, defining the primary research problem, hypothesis and primary research methodology. Finally suitable marketing communication approach to selected sub-segment at age of 50-60 years is proposed according to marketing research findings.Keywords: population aging in the Czech Republic, segment 50+, financial services, marketing communication, marketing research, marketing communication approach
Procedia PDF Downloads 4355054 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4
Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono
Abstract:
Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations
Procedia PDF Downloads 1525053 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 2695052 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes
Authors: Petar Kurecic, Josipa Penic
Abstract:
The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.Keywords: security, security measures in tourism, tourism, tourist destinations
Procedia PDF Downloads 2815051 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes
Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi
Abstract:
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing
Procedia PDF Downloads 3065050 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 3275049 Exploring Coordination between Monetary and Macroprudential Policies Using a Monetary Policy Procyclicality Ratio
Authors: Lukasz Kurowski, Paweł Smaga
Abstract:
We explore the procyclicality of monetary policy decisions towards the financial cycle in the 1995−2015 period on a sample of six central banks. Using interest rate paths and the credit-to-GDP gap to construct a monetary policy procyclicality ratio, we provide evidence that monetary policy procyclicality was high in BoE and CNB and low in Riksbank and ECB. The results support the need for coordination between macroprudential and monetary policies, for example, by including financial stability considerations to the inflation targeting strategy.Keywords: central bank, financial stability, macroprudential policy, monetary policy
Procedia PDF Downloads 3725048 Product Development in Company
Authors: Giorgi Methodishvili, Iuliia Methodishvili
Abstract:
In this paper product development algorithm is used to determine the optimal management of financial resources in company. Aspects of financial management considered include put initial investment, examine all possible ways to solve the problem and the optimal rotation length of profit. The software of given problems is based using greedy algorithm. The obtained model and program maintenance enable us to define the optimal version of management of proper financial flows by using visual diagram on each level of investment.Keywords: management, software, optimal, greedy algorithm, graph-diagram
Procedia PDF Downloads 565047 Financial Assets Return, Economic Factors and Investor's Behavioral Indicators Relationships Modeling: A Bayesian Networks Approach
Authors: Nada Souissi, Mourad Mroua
Abstract:
The main purpose of this study is to examine the interaction between financial asset volatility, economic factors and investor's behavioral indicators related to both the company's and the markets stocks for the period from January 2000 to January2020. Using multiple linear regression and Bayesian Networks modeling, results show a positive and negative relationship between investor's psychology index, economic factors and predicted stock market return. We reveal that the application of the Bayesian Discrete Network contributes to identify the different cause and effect relationships between all economic, financial variables and psychology index.Keywords: Financial asset return predictability, Economic factors, Investor's psychology index, Bayesian approach, Probabilistic networks, Parametric learning
Procedia PDF Downloads 1495046 Foreign Debt and Firm Performance: Evidence from French Non-Financial Firms
Authors: Salma Mefteh-Wali, Marie-Josephe Rigobert
Abstract:
We investigate the impact of foreign currency debt on firm performance for a sample of non-financial French firms studied over the period 2002 to 2012. As foreign currency debt is both a financing and hedging instrument against foreign exchange risk, we mobilize optimal hedging theory and capital structure theory. When we study the impact on firm value, our main results show that before and after the financial crisis of 2008, foreign debt had the same behavior as domestic debt. We find that during the crisis period, foreign debt positively affects firm value. Investors perceive foreign debt as a natural hedging instrument that is likely to reduce the costs of underinvestment, alleviate cash flow volatility, limit the costs of financial distress, and generate tax shield benefits. Also, our results show that foreign leverage negatively affects the firm performance proxied by ROA and ROE, during and after the financial crisis. However, this impact is positive in the pre-crisis period.Keywords: foreign currency derivatives, foreign currency debt, foreign currency hedging, firm performance
Procedia PDF Downloads 3105045 Fintech and Democratization of Finance: Evidence from Sub-Saharan Africa
Authors: Lawrence Ngalim
Abstract:
In this paper, we investigate whether the adoption of recent technological advancements in delivering financial services, such as crowdfunding, assists the financially excluded across twenty-seven Sub Saharan Africa (SSA) through entrepreneurship. Results show that even after addressing potential endogeneity issues as much as possible, crowdfunding and entrepreneurial-ventures are strongly associated i.e., crowdfunding translates a 5 – 9 percentage increase on incumbent/prospective individuals who borrowed to enhance/embark on a venture across SSA economies between 2014 to 2017. The study has some implications for regional financial alliance if economies adopt this recent financial technology which offers another financing opportunity that’s unrestricted by territorial boundaries.Keywords: fintech, finance, entrepreneurship, SSA
Procedia PDF Downloads 765044 Effects of Irregular Migration from Different Aspects of Security
Authors: Muzaffer Topgul, Hasan Atac
Abstract:
In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.Keywords: irregular migration, the changing dimensions of security, human security, social security
Procedia PDF Downloads 3365043 Security Analysis and Implementation of Achterbahn-128 for Images Encryption
Authors: Aissa Belmeguenai, Oulaya Berrak, Khaled Mansouri
Abstract:
In this work, efficiency implementation and security evaluation of the keystream generator of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written with MATLAB.7.5. First of all, two different original images are used to validate the proposed design. The developed program is used to transform the original images data into digital image file. Finally, the proposed program is implemented to encrypt and decrypt images data. Several tests are done to prove the design performance, including visual tests and security evaluation.Keywords: Achterbahn-128, keystream generator, stream cipher, image encryption, security analysis
Procedia PDF Downloads 3145042 Chinese Doctoral Students in Canada: The Influence of Financial Status and Cultural Cognition on Academic Performance
Authors: Xuefan Li
Abstract:
Parts of Chinese doctoral students in Canada are facing significant academic pressure. The factors contributing to such pressure are diverse, including financial conditions and cultural differences. Students from various academic disciplines have been interviewed to investigate the factors that Chinese students consider when selecting Canada as a destination for doctoral studies, as well as to identify the challenges they face during their academic pursuits and the associated factors influencing their performance. The findings indicate that their motivations to pursue doctoral study in Canada are concluded as both push and pull factors. Financial conditions and cultural differences are critical factors affecting academic performance, with disciplinary variations in the degree of influence observed.Keywords: Chinese doctoral students, financial status, cultural cognition, academic performance
Procedia PDF Downloads 705041 Home/Personal Budgeting: Implications for Financial Wellbeing of University Staffers in Ogun State Nigeria
Authors: Ben-Caleb Egbide, Egharevba Mathew, Achugamonu Uzoma, Faboyede Samuel
Abstract:
The importance of budgeting in government and corporate entities as medium for the efficient management of scarce resources is self-evident. But when it comes to home or personal budgeting, there seem to be lingering misconceptions as regards its relevance. While most people view personal budgeting merely as a tool for tracking expenses and schedule for paying bills and indebtedness, very few consider it as one of the most important device for sound financial planning, money management instrument and/or wealth-creation mechanism. This paper is conceptualised to investigate the association between personal budgeting and financial well-being among staffers of tertiary institution in the South West Nigeria. Underpinned by the individualistic/cultural theory of well-being and the adoption of a survey research design, a structured questionnaire was used to gather data from a cross section of staff of tertiary Institutions in Ogun State. A Spearman Rank Correlation was utilised for analysis of data. The result indicates a high positive relationship between personal budgeting and tendencies for enhanced financial well-being among staff. The paper established that a change of value and behavioural pattern by individuals and household, especially in the areas of personal spending and budgeting could drastically reduce the incidence of the severity of financial stress, hence, enhanced wellness among staff.Keywords: personal budgeting, financial well-being, tertiary institutions staffers, Nigeria
Procedia PDF Downloads 2995040 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software
Authors: Carlos Gonzalez
Abstract:
This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.Keywords: internet, secure software, threats, cryptography process
Procedia PDF Downloads 3335039 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective
Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella
Abstract:
Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law
Procedia PDF Downloads 3835038 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security
Authors: Lisdey Espinoza Pedraza
Abstract:
Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States
Procedia PDF Downloads 4175037 Alternative Futures for the Middle East
Authors: Dorsa Bakhshandehgeyazdi
Abstract:
This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group
Procedia PDF Downloads 2945036 Assessing EU-China Security Interests from Contradiction to Convergence
Authors: Julia Gurol
Abstract:
Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security
Procedia PDF Downloads 2855035 The Reflection of Greek Reality Concerning Taxation from the Perspective of Both Tax Payers and Taxmen
Authors: Evagelia Makri, Maria Tsourela, Dimitris Paschaloudis, Dafni M. Nerantzaki
Abstract:
One of the biggest financial and social problems, which at the same time constitute one of the greater challenges that Greek society faces today, is the illegal avoidance of tax payments. Tax evasion may negate financial data and community budgets, as well as breed financial chaos. This research seeks to reflect Greek reality concerning tax measures. Also, there will be an effort to record the factors surrounding tax evasion. Greek tax system’s data will be rendered in financial terms. Questionnaires will be handed out to tax payers, and interviews will be conducted to taxmen. The quantitative analysis of the questionnaire answers will define the tax payers’ opinion towards the existence of tax evasion. The qualitative analysis of the interviews will reveal the main reason that boosts tax evasion. At the end, there will be some realistic proposals about how to better collect taxes, through the creation of a strong regulatory mechanism.Keywords: tax evasion, tax collection measures, insurance recovery measures, Greek tax system
Procedia PDF Downloads 3635034 Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla
Authors: Marco Antonio Lara De la Calleja, María Catalina Ovando Chico, Eduardo Lopez Ruiz
Abstract:
Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security.Keywords: community empowerment, food security, model, systemic approach
Procedia PDF Downloads 3725033 The Structure of Financial Regulation: The Regulators Perspective
Authors: Mohamed Aljarallah, Mohamed Nurullah, George Saridakis
Abstract:
This paper aims and objectives are to investigate how the structural change of the financial regulatory bodies affect the financial supervision and how the regulators can design such a structure with taking into account; the Central Bank, the conduct of business and the prudential regulators, it will also consider looking at the structure of the international regulatory bodies and what barriers are found. There will be five questions to be answered; should conduct of business and prudential regulation be separated? Should the financial supervision and financial stability be separated? Should the financial supervision be under the Central Bank? To what extent the politician should intervene in changing the regulatory and supervisory structure? What should be the regulatory and supervisory structure when there is financial conglomerate? Semi structure interview design will be applied. This research sample selection contains a collective of financial regulators and supervisors from the emerged and emerging countries. Moreover, financial regulators and supervisors must be at a senior level at their organisations. Additionally, senior financial regulators and supervisors would come from different authorities and from around the world. For instance, one of the participants comes from the International Bank Settlements, others come from European Central Bank, and an additional one will come from Hong Kong Monetary Authority and others. Such a variety aims to fulfil the aims and objectives of the research and cover the research questions. The analysis process starts with transcription of the interview, using Nvivo software for coding, applying thematic interview to generate the main themes. The major findings of the study are as follow. First, organisational structure changes quite frequently if the mandates are not clear. Second, measuring structural change is difficult, which makes the whole process unclear. Third, effective coordination and communication are what regulators looking for when they change the structure and that requires; openness, trust, and incentive. In addition to that, issues appear during the event of crisis tend to be the reason why the structure change. Also, the development of the market sometime causes a change in the regulatory structure. And, some structural change occurs simply because of the international trend, fashion, or other countries' experiences. Furthermore, when the top management change the structure tends to change. Moreover, the structure change due to the political change, or politicians try to show they are doing something. Finally, fear of being blamed can be a driver of structural change. In conclusion, this research aims to provide an insight from the senior regulators and supervisors from fifty different countries to have a clear understanding of why the regulatory structure keeps changing from time to time through a qualitative approach, namely, semi-structure interview.Keywords: financial regulation bodies, financial regulatory structure, global financial regulation, financial crisis
Procedia PDF Downloads 1445032 Correlation Analysis between the Corporate Governance and Financial Performance of Banking Sectors Using Parameter Estimation
Authors: Vishwa Nath Maurya, Rama Shanker Sharma, Saad Talib Hasson Aljebori, Avadhesh Kumar Maurya, Diwinder Kaur Arora
Abstract:
Present paper deals with problems of determining the relationship between the variables of corporate governance and financial performance of Islamic banks. Here, we dealt with the corporate governance in the banking sector, where increasing the importance of corporate governance, due to their special nature, as the bankruptcy of banks affects not only the relevant parties from customers, depositors and lenders, but also affect financial stability and then the economy as a whole. Through this paper we dealt to the specificity of governance in Islamic banks, which face double governance: Anglo-Saxon governance system and Islamic governance system. In addition, we focused our attention to measure the impact of corporate governance variables on financial performance through an empirical study on a sample of Islamic banks during the period 2005-2012 in the GCC region. Our present study implies that there is a very strong relationship between the variables of governance and financial performance of Islamic banks, where there is a positive relationship between return on assets and the composition of the Board of Directors, the size of the Board of Directors, the number of committees in the Council, as well as the number of members of the Sharia Supervisory Board, while it is clear that there is a negative relationship between return on assets and concentration ownership.Keywords: correlation analysis, parametric estimation, corporate governance, financial performance, financial stability, conventional banks, bankruptcy, Islamic governance system
Procedia PDF Downloads 5165031 Corporate Social Responsibility and Firm Performance: The Mediating Role of Reputation
Authors: Yosra Makni, Mariam Dammak, Dhouha Abed
Abstract:
Purpose: This paper investigates the mediating role of corporate reputation on the relationship between corporate social responsibility and financial performance. Design/Methodology/Approach: Based on a sample of 4329 drawn from 33 developed and developing countries and over a period of eight-year ranging from 2009 to 2016, we apply an Ordinary Least Squares regression (OLS) regressions to test our hypotheses. Findings: The authors find that there is a positive association between Corporate Social Responsibility (CSR) engagement and the financial performance of a company. They also document that there is a positive association between CSR engagement and a company's reputation and the company's reputation mediates the relationship between engagement in CSR activities and financial performance. Originality Value: This study contributes to the literature in the following ways. First, our research advances the understanding of the link between corporate social responsibility and financial performance by responding to the requests of several researchers to study the mechanisms of mediation between these two concepts given the scarcity relative to currently available research. So we include the most important predicted advantage of CSR, namely reputation, by developing and testing a more complex relationship. Secondly, these relationships have been investigated using an international sample drawn from a large number of countries with a high reputation. Using Judy and Kenny's method, we have confirmed that the company's reputation can play the role of a mediating variable on the relationship between CSR's commitment to operations and the financial performance of the company. More specifically, the more the company is engaged in the activities of CSR, the more it can have a good reputation, more than it has a good financial performance.Keywords: corporate social responsibility, company's reputation, financial performance, mediating variable
Procedia PDF Downloads 1685030 The Changes of the Relationship between Audit Quality and Earnings Management after Financial Crisis
Authors: Chengxuan Geng, Yizhou E
Abstract:
This paper mainly examines the changes in the relationship between earnings management and audit quality before and after financial crisis in the context of American firms from 2005 to 2010. Based on a sample of 3584 firm year observations, we find that there are changes concerning the relation between accrual-based earnings management and audit quality during the pre-crisis and post-crisis periods. However, the results do not provide enough evidence with regard to the variances in the association between real activities earnings management and audit quality during these two periods.Keywords: audit quality, earnings management, financial crisis, relationship
Procedia PDF Downloads 3395029 Non-Standard Monetary Policy Measures and Their Consequences
Authors: Aleksandra Nocoń (Szunke)
Abstract:
The study is a review of the literature concerning the consequences of non-standard monetary policy, which are used by central banks during unconventional periods, threatening instability of the banking sector. In particular, the attention was paid to the effects of non-standard monetary policy tools for financial markets. However, the empirical evidence about their effects and real consequences for the financial markets are still not final. The main aim of the study is to survey the consequences of standard and non-standard monetary policy instruments, implemented during the global financial crisis in the United States, United Kingdom and Euroland, with particular attention to the results for the stabilization of global financial markets. The study analyses the consequences for short and long-term market interest rates, interbank interest rates and LIBOR-OIS spread. The study consists mainly of the empirical review, indicating the impact of the implementation of these tools for the financial markets. The following research methods were used in the study: literature studies, including domestic and foreign literature, cause and effect analysis and statistical analysis.Keywords: asset purchase facility, consequences of monetary policy instruments, non-standard monetary policy, quantitative easing
Procedia PDF Downloads 3315028 Impact of Financial Performance Indicators on Share Price of Listed Pharmaceutical Companies in India
Authors: Amit Das
Abstract:
Background and significance of the study: Generally investors and market forecasters use financial statement for investigation while it awakens contribute to investing. The main vicinity of financial accounting and reporting practices recommends a few basic financial performance indicators, namely, return on capital employed, return on assets and earnings per share, which is associated considerably with share prices. It is principally true in case of Indian pharmaceutical companies also. Share investing is intriguing a financial risk in addition to investors look for those financial evaluations which have noteworthy shock on share price. A crucial intention of financial statement analysis and reporting is to offer information which is helpful predominantly to exterior clients in creating credit as well as investment choices. Sound financial performance attracts the investors automatically and it will increase the share price of the respective companies. Keeping in view of this, this research work investigates the impact of financial performance indicators on share price of pharmaceutical companies in India which is listed in the Bombay Stock Exchange. Methodology: This research work is based on secondary data collected from moneycontrol database on September 28, 2015 of top 101 pharmaceutical companies in India. Since this study selects four financial performance indicators purposively and availability in the database, that is, earnings per share, return on capital employed, return on assets and net profits as independent variables and one dependent variable, share price of 101 pharmaceutical companies. While analysing the data, correlation statistics, multiple regression technique and appropriate test of significance have been used. Major findings: Correlation statistics show that four financial performance indicators of 101 pharmaceutical companies are associated positively and negatively with its share price and it is very much significant that more than 80 companies’ financial performances are related positively. Multiple correlation test results indicate that financial performance indicators are highly related with share prices of the selected pharmaceutical companies. Furthermore, multiple regression test results illustrate that when financial performances are good, share prices have been increased steadily in the Bombay stock exchange and all results are statistically significant. It is more important to note that sensitivity indices were changed slightly through financial performance indicators of selected pharmaceutical companies in India. Concluding statements: The share prices of pharmaceutical companies depend on the sound financial performances. It is very clear that share prices are changed with the movement of two important financial performance indicators, that is, earnings per share and return on assets. Since 101 pharmaceutical companies are listed in the Bombay stock exchange and Sensex are changed with this, it is obvious that Government of India has to take important decisions regarding production and exports of pharmaceutical products so that financial performance of all the pharmaceutical companies are improved and its share price are increased positively.Keywords: financial performance indicators, share prices, pharmaceutical companies, India
Procedia PDF Downloads 3065027 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 307