Search results for: credit card fraud
238 Developing a Cloud Intelligence-Based Energy Management Architecture Facilitated with Embedded Edge Analytics for Energy Conservation in Demand-Side Management
Authors: Yu-Hsiu Lin, Wen-Chun Lin, Yen-Chang Cheng, Chia-Ju Yeh, Yu-Chuan Chen, Tai-You Li
Abstract:
Demand-Side Management (DSM) has the potential to reduce electricity costs and carbon emission, which are associated with electricity used in the modern society. A home Energy Management System (EMS) commonly used by residential consumers in a down-stream sector of a smart grid to monitor, control, and optimize energy efficiency to domestic appliances is a system of computer-aided functionalities as an energy audit for residential DSM. Implementing fault detection and classification to domestic appliances monitored, controlled, and optimized is one of the most important steps to realize preventive maintenance, such as residential air conditioning and heating preventative maintenance in residential/industrial DSM. In this study, a cloud intelligence-based green EMS that comes up with an Internet of Things (IoT) technology stack for residential DSM is developed. In the EMS, Arduino MEGA Ethernet communication-based smart sockets that module a Real Time Clock chip to keep track of current time as timestamps via Network Time Protocol are designed and implemented for readings of load phenomena reflecting on voltage and current signals sensed. Also, a Network-Attached Storage providing data access to a heterogeneous group of IoT clients via Hypertext Transfer Protocol (HTTP) methods is configured to data stores of parsed sensor readings. Lastly, a desktop computer with a WAMP software bundle (the Microsoft® Windows operating system, Apache HTTP Server, MySQL relational database management system, and PHP programming language) serves as a data science analytics engine for dynamic Web APP/REpresentational State Transfer-ful web service of the residential DSM having globally-Advanced Internet of Artificial Intelligence (AI)/Computational Intelligence. Where, an abstract computing machine, Java Virtual Machine, enables the desktop computer to run Java programs, and a mash-up of Java, R language, and Python is well-suited and -configured for AI in this study. Having the ability of sending real-time push notifications to IoT clients, the desktop computer implements Google-maintained Firebase Cloud Messaging to engage IoT clients across Android/iOS devices and provide mobile notification service to residential/industrial DSM. In this study, in order to realize edge intelligence that edge devices avoiding network latency and much-needed connectivity of Internet connections for Internet of Services can support secure access to data stores and provide immediate analytical and real-time actionable insights at the edge of the network, we upgrade the designed and implemented smart sockets to be embedded AI Arduino ones (called embedded AIduino). With the realization of edge analytics by the proposed embedded AIduino for data analytics, an Arduino Ethernet shield WizNet W5100 having a micro SD card connector is conducted and used. The SD library is included for reading parsed data from and writing parsed data to an SD card. And, an Artificial Neural Network library, ArduinoANN, for Arduino MEGA is imported and used for locally-embedded AI implementation. The embedded AIduino in this study can be developed for further applications in manufacturing industry energy management and sustainable energy management, wherein in sustainable energy management rotating machinery diagnostics works to identify energy loss from gross misalignment and unbalance of rotating machines in power plants as an example.Keywords: demand-side management, edge intelligence, energy management system, fault detection and classification
Procedia PDF Downloads 250237 Prioritization of Customer Order Selection Factors by Utilizing Conjoint Analysis: A Case Study for a Structural Steel Firm
Authors: Burcu Akyildiz, Cigdem Kadaifci, Y. Ilker Topcu, Burc Ulengin
Abstract:
In today’s business environment, companies should make strategic decisions to gain sustainable competitive advantage. Order selection is a crucial issue among these decisions especially for steel production industry. When the companies allocate a high proportion of their design and production capacities to their ongoing projects, determining which customer order should be chosen among the potential orders without exceeding the remaining capacity is the major critical problem. In this study, it is aimed to identify and prioritize the evaluation factors for the customer order selection problem. Conjoint analysis is used to examine the importance level of each factor which is determined as the potential profit rate per unit of time, the compatibility of potential order with available capacity, the level of potential future order with higher profit, customer credit of future business opportunity, and the negotiability level of production schedule for the order.Keywords: conjoint analysis, order prioritization, profit management, structural steel firm
Procedia PDF Downloads 384236 Bioethical Standards as a Tool for the Improvement of Human Relations Toward Health, Animals, and Plants: The Example of Three Croatian Mediterranean Local Communities
Authors: Toni Buterin, Robert Doričić
Abstract:
Mainstream bioethics, narrowed down mainly to human medicine and research, can hardly be expected to efficiently face modern challenges related to environmental issues. Departing from the interpretation of "European Bioethics" as a discipline considering ethical duties not only toward fellow humans, but to all living beings, this paper presents the results of a study conducted in three communities in Croatian Northern Adriatic region, selected for their recent experience of ecological threats (Labin – thermo-electric power plant; Bakar – cokery), or representing a highly-valuable and vulnerable natural insular pocket (Mali Lošinj – health tourism, dolphin wildlife refuge, fragrant gardens programme, etc.). After targeted workshops and interviews had been organised in those communities, the results of the obtained insights were combined with experts' opinion and a list of around hundred “bioethical standards” was formed. "Bioethical standards" represent a set of principles and measures of the correct attitude of people towards their own health, animals, plants, and the eco-system as a whole. "Bioethical standards" charter might improve the level of local community environmental consciousness, and provide direct guidance for its sustainable development (including its tourism-advertising ace card). The present paper discusses the standards' potential benefits and some implementational risks.Keywords: bioethical standards, croatia, European bioethics, local communities
Procedia PDF Downloads 151235 Cybersecurity Challenges in Africa
Authors: Chimmoe Fomo Michelle Larissa
Abstract:
The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime
Procedia PDF Downloads 40234 Cash Flow Optimization on Synthetic CDOs
Authors: Timothée Bligny, Clément Codron, Antoine Estruch, Nicolas Girodet, Clément Ginet
Abstract:
Collateralized Debt Obligations are not as widely used nowadays as they were before 2007 Subprime crisis. Nonetheless there remains an enthralling challenge to optimize cash flows associated with synthetic CDOs. A Gaussian-based model is used here in which default correlation and unconditional probabilities of default are highlighted. Then numerous simulations are performed based on this model for different scenarios in order to evaluate the associated cash flows given a specific number of defaults at different periods of time. Cash flows are not solely calculated on a single bought or sold tranche but rather on a combination of bought and sold tranches. With some assumptions, the simplex algorithm gives a way to find the maximum cash flow according to correlation of defaults and maturities. The used Gaussian model is not realistic in crisis situations. Besides present system does not handle buying or selling a portion of a tranche but only the whole tranche. However the work provides the investor with relevant elements on how to know what and when to buy and sell.Keywords: synthetic collateralized debt obligation (CDO), credit default swap (CDS), cash flow optimization, probability of default, default correlation, strategies, simulation, simplex
Procedia PDF Downloads 274233 Factors Influencing the Profitability of the Conventional and Islamic Banks in Four Asian Countries
Authors: Vijay Kumar, Ron Bird
Abstract:
The study investigates the effect of bank-specific, industry-specific and macroeconomic variables on the profitability of conventional and Islamic banks. Our sample comprises 1,781 bank-year observations of 205 banks from four countries in the Asian region for the period 2004-2014. Our results suggest that credit quality, cost management and bank size are the keys factors that contribute positively to bank profitability in Asia. The banks with high non-performing loans and high cost-to-income ratio are more likely to be exposed to losses. The impacts of the bank-specific variables are stronger than are the industry-specific and macroeconomic variables. We find that Malaysian banks are the least profitable compared to the banks in Bangladesh, Indonesia and Pakistan. There is strong evidence to suggest that conventional banks are more profitable than Islamic banks. Our results suggest that the impact of capital adequacy ratio and bank size and loan to deposit ratio vary across Islamic and conventional banks and across different subsamples.Keywords: capital adequacy ratio, Islamic banks, non-performing loan ratio, ownership
Procedia PDF Downloads 160232 The Exploration of Persuasive Skills and Participants Characteristics in Pyramid-Sale: A Qualitative Study
Authors: Xing Yan Fan, Xing Lin Xu, Man Yuan Chen, Pei Tzu Lee, Yu Ting Wang, Yi Xiao Cao, Rui Yao
Abstract:
Pyramid sales have been a widespread issue in China. Victims who are defrauded not only lose money but damage interpersonal relationship. A deeper understanding of pyramid-sale models can be beneficial to prevent potential victims from fraud and improve the property security. The goals of this study were to detect psychological characteristics of pyramid-sale sellers, and analyse persuasive skills in pyramid organizations. A qualitative study was conducted in this study. Participants (n=6) recruited by 'snowball' sampling from present pyramid-sale sellers (n=3) and imprisoned pyramid-sale sellers (n=3). All participants accepted semi-structured interview for collecting data. Content analysis was adopted for data coding and analysis. The results indicate that pyramid organizations are used to utilize their appearance packaging and celebrity effect to strengthen the positions in participants’ mind. The status gap between pyramid-sale sellers in same organization, as well as rewards to increase reputation, are used to motivate participants in pyramid. The most significant common characteristics among all participants are that they tend to possess a high sense of belongingness within the firm. Moreover, the expression of pyramid-sale sellers on gambling mentality is expected to growth as constantly losing money. Findings suggest that the psychological characteristics of pyramid-sale sellers in accordance with Maslow’s hierarchy of needs, persuasive skills of pyramid organization confront to 'attitude-behaviour change model'. These findings have implication on 'immune education' that providing guidance for victims out of stuck and protecting ordinary people from the jeopardizing of pyramid sales.Keywords: pyramid sales, characteristics, persuasive skills, qualitative study
Procedia PDF Downloads 255231 Technical Efficiency and Challenges of Smallholder Horticultural Farmers in Ghana: A Wake-Up Call for Policy Implementers
Authors: Freda E. Asem, R. D. Osei, D. B. Sarpong, J. K. Kuwornu
Abstract:
While market access remains important, Ghana’s major handicap is her inability to sustain export growth on the open market. The causes of these could be attributed to inefficiency, lack of competitiveness and supply-side constraints. This study examined the challenges faced by smallholder horticultural farmers and how it relates to their technical efficiency. The study employed mixed methods to address the problem. Using the Millennium Development Account (MiDA) Farmer Based Organization survey data on farm households in 23 districts in Ghana, the study assessed the technical efficiency of smallholder horticultural farmers (taking into account production risks). Focus group discussions (FGDs) and in-depth interviews were also conducted on smallholder mango, pineapple, and chilli pepper farmers selected districts in Ghana. Results revealed the constraints faced by smallholder horticultural farmers to be marketing, training, funding, accessibility, and affordability of inputs, land, access to credit, and the disconnect between themselves and policy makers and implementers.Keywords: productivity, gender, policy, efficiency, constraints
Procedia PDF Downloads 483230 Anti-Corruption, an Important Challenge for the Construction Industry!
Authors: Ahmed Stifi, Sascha Gentes, Fritz Gehbauer
Abstract:
The construction industry is perhaps one of the oldest industry of the world. The ancient monuments like the egyptian pyramids, the temples of Greeks and Romans like Parthenon and Pantheon, the robust bridges, old Roman theatres, the citadels and many more are the best testament to that. The industry also has a symbiotic relationship with other . Some of the heavy engineering industry provide construction machineries, chemical industry develop innovative construction materials, finance sector provides fund solutions for complex construction projects and many more. Construction Industry is not only mammoth but also very complex in nature. Because of the complexity, construction industry is prone to various tribulations which may have the propensity to hamper its growth. The comparitive study of this industry with other depicts that it is associated with a state of tardiness and delay especially when we focus on the managerial aspects and the study of triple constraint (time, cost and scope). While some institutes says the complexity associated with it as a major reason, others like lean construction, refers to the wastes produced across the construction process as the prime reason. This paper introduces corruption as one of the prime factors for such delays.To support this many international reports and studies are available depicting that construction industry is one of the most corrupt sectors worldwide, and the corruption can take place throught the project cycle comprising project selection, planning, design, funding, pre-qualification, tendering, execution, operation and maintenance, and even through the reconstrction phase. It also happens in many forms such as bribe, fraud, extortion, collusion, embezzlement and conflict of interest and the self-sufficient. As a solution to cope the corruption in construction industry, the paper introduces the integrity as a key factor and build a new integrity framework to develop and implement an integrity management system for construction companies and construction projects.Keywords: corruption, construction industry, integrity, lean construction
Procedia PDF Downloads 377229 Analysis of the Simulation Merger and Economic Benefit of Local Farmers' Associations in Taiwan
Authors: Lu Yung-Hsiang, Chang Kuming, Dai Yi-Fang, Liao Ching-Yi
Abstract:
According to Taiwan’s administrative division of future land planning may lead farmer association and service areas facing recombination or merger. Thus, merger combination and the economic benefit of the farmer association are worth to be discussed. The farmer association in the merger, which may cause some then will not be consolidated, or consolidate two, or ever more to one association. However, under what condition to merge is greatest, as one of observation of this study. In addition, research without using simulation methods and only on the credit department rather whole farmer association. Therefore, this paper will use the simulation approach, and examine both the merge of farmer association and the condition under which the benefits are the greatest. The data of this study set include 266 farmer associations in Taiwan period 2012 to 2013. Empirical results showed that the number of the farmer association optimal simulation combination is 108.After the merger from the first stage can be reduced by 60% of the farmers’ association. The cost saving effects of the post-merger is not different. The cost efficiency of the farmers’ association improved it. The economies of scale and scope would decrease by the merger. The research paper hopes the finding will benefit the future merger of the farmers’ association.Keywords: simulation merger, farmer association, assurance region, data envelopment analysis
Procedia PDF Downloads 350228 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 172227 Semi-Supervised Learning Using Pseudo F Measure
Authors: Mahesh Balan U, Rohith Srinivaas Mohanakrishnan, Venkat Subramanian
Abstract:
Positive and unlabeled learning (PU) has gained more attention in both academic and industry research literature recently because of its relevance to existing business problems today. Yet, there still seems to be some existing challenges in terms of validating the performance of PU learning, as the actual truth of unlabeled data points is still unknown in contrast to a binary classification where we know the truth. In this study, we propose a novel PU learning technique based on the Pseudo-F measure, where we address this research gap. In this approach, we train the PU model to discriminate the probability distribution of the positive and unlabeled in the validation and spy data. The predicted probabilities of the PU model have a two-fold validation – (a) the predicted probabilities of reliable positives and predicted positives should be from the same distribution; (b) the predicted probabilities of predicted positives and predicted unlabeled should be from a different distribution. We experimented with this approach on a credit marketing case study in one of the world’s biggest fintech platforms and found evidence for benchmarking performance and backtested using historical data. This study contributes to the existing literature on semi-supervised learning.Keywords: PU learning, semi-supervised learning, pseudo f measure, classification
Procedia PDF Downloads 235226 The Concept of Accounting in Islamic Transactions
Authors: Ahmad Abdulkadir Ibrahim
Abstract:
The Islamic law of transactions laid down the methods and instruments of accounting and analyzed its basic assumptions in the modern world. There is a need to examine the implications of accounting initiatives in the Muslim world and attempt to outline the important characteristics of Islamic accounting and how Islamic accounting resolves the problem of measuring the cost of Murabaha goods in case of exchange rate variation. The research tends to discuss an analytical approach to the Islamic accounting concept as well as elaborating the jurisprudential matter and practical aspects of accounting in Islamic financial transactions. It also aims to alert the practitioners of accounting in the Islamic world to be aware of the concept of accounting in Islamic jurisprudence and its historical development. The methodology adopted in this research is the qualitative method through the consultation of relevant literature, which focuses on the thematic study of the subject matter. This is followed by an analysis and discussion of the contents of the materials used. It is concluded that Islamic accounting is unique in its norms as it has been characterized by fairness, accuracy in measuring tools, truthfulness, mutual trust, moderation in making a profit, and tolerance. It was also qualified by capacity and flexibility in terms of the tools and terminology used and invented by Islamic jurisprudence in the accounting system, which indicates its validity and consistency anytime and anywhere. An important conclusion of the research also lies in the refutation of the popular idea that an Italian writer known as Luca Pacilio was the first writer who developed the basis of double-entry due to the presented proofs by Muslim scholars of critical accounting developments, which cannot be ignored. It concludes further that Islamic jurisprudence draws the accounting system codified in the foundations of a market that is far from usury, fraud, cheating, and unfair competition in all areas.Keywords: accounting, Islamic accounting, Islamic transactions, Islamic jurisprudence, double entry, murabaha, characteristics
Procedia PDF Downloads 64225 The Quality and Management Development for Traditional Community Retailers in Samut Songkhram Province, Thailand
Authors: Suppara Charoenpoom
Abstract:
The purposes of this research were to investigate the level of consumers’ awareness of the traditional community retailers in terms of location, service quality, risk, shopping enjoyment, value for money, shopping satisfaction and intention to repurchase as well as to investigate the factors influenced the consumers’ repurchase in Samut Sonkhram Province, Thailand. The findings revealed that consumers had a high level of awareness in terms of location, and intention to repurchase. The factors influenced the consumers’ level of satisfaction included value for money, shopping enjoyment, and service quality. The factors of consumers’ level of satisfaction had an influence to the intention to repurchase. Moreover, the findings also revealed that the majority of respondents wanted traditional community retailers to continue to operate because of these reasons: close location, convenience, credit, as well as provide a place and time for community social gathering and activities.Keywords: quality management, service quality, traditional retailer, consumers’ awareness
Procedia PDF Downloads 385224 Determinants of the Welfare of Itinerant Palm Oil Marketers in Akwa Ibom State, Nigeria
Authors: Obasi Igwe Oscar, Udokure Ubong James, Echebiri Raphael Ndubuisi
Abstract:
The study examined the determinants of the welfare of itinerant palm oil marketers in Akwa Ibom State, Nigeria. Multistage sampling techniques were adopted to select 120 itinerant palm oil marketers for the study. Primary data were obtained using a structured questionnaire. Data were analyzed using the cost and returns formula and multiple regression model. Results showed that itinerant palm oil marketing was profitable and 57.39% efficient. The respondents' monthly expenditure of N111,787.90 on food and non-food items indicated that they live above the extreme poverty threshold of $2.15 per person per day, with a daily spending of over $2. Net income (P<0.05), age (P<0.01), educational level (P<0.01), household size (P<0.01), credit amount (P<0.01), market information (P<0.05), amount of tax paid (P<0.01) and the level of market participation (P<0.05) were the significant determinants of the welfare of itinerant traders in the study area. The study recommended that government and non-governmental organizations should make available marketing facilities and enhance transportation networks to reduce inefficiencies and lower transaction costs for itinerant palm oil traders in Akwa Ibom state.Keywords: determinants, welfare, itinerant, palm oil, marketers
Procedia PDF Downloads 30223 Precarious ID Cards - Studying Documentary Practices in India through the Lens of Internal Migration
Authors: Ambuja Raj
Abstract:
This research will attempt to understand how documents are materially indispensable civic artifacts for migrants in their encounters with the state. Documents such as ID cards are sites of mediation and bureaucratic manifestation which reveal the inherent dynamics of power between the state and a delocalized people. While ID cards allow the holder to retain a different identity and articulate their demands as a citizen, they at the same time transform subjects into ‘objects’ in the exercise of governmental power. The research is based on the study of internal migrants in India, who are ‘visible’ to the state through its host of ID documents such as the ‘Aadhaar card’, electoral IDs, Ration cards, and a variety of region-specific documents, without the possession of which, not only are they unable to access jobs, public goods and services, and accommodation, but are liable to exploitation from state forces and mediators. Through semi-structured interviews with social actors in the processes of documentation and welfare of migrants, as well as with settlements of migrants themselves located in the state of Kerala in India, the thesis will attempt to understand the salience of documentary practices in the lives of inter-state migrants who move within Indian states in the hope of bettering their economic conditions. The research will trace the material and evolving significance of ID cards in the tenacity of states dealing with these ‘illegible’ populations. It will try to bring theories of governmentality, biopolitics and Weberian bureaucracy into the migrant issue while critically grounding itself on secondary literature by scholars who have worked on South Asian ‘governments of paper’.Keywords: migration, historiography of documents, anthropology of state, documentary practices
Procedia PDF Downloads 188222 The Reality of E-Commerce in Egypt and Its Role in Enhancing Companies' Competitiveness
Authors: Esam El Gohary
Abstract:
— The companies’ ability to survive and compete in the fierce competition is determined by its competitiveness level. With the spread of information technology use and appearance of online shopping, it became crucial for companies to adopt e-commerce system to increase its competitiveness. This paper was conducted with the purpose of determine how increasing the service value through e-commerce factors (competitive strategy, ICT infrastructures, logistics, security, human resources and innovation) can enhance companies' competitiveness. The problem of this paper is summarized in the absence of the thorough awareness of e-commerce benefits for business owners and customers, as well as how to reduce the intangibility attributes of e-commerce. For this purpose this paper describes the e-commerce in Egypt and its success factors (infrastructures, legal and regulatory environment, human resources and innovation), as well as displays the barriers of such factor, to investigate the significant of these factors on increasing service value and enhance companies' competitiveness. This paper revealed that e-commerce companies have many opportunities to enhance its competitiveness in Egypt, which is enhanced by several factors. The most important factors are “strong ICT infrastructure, qualified and skilled human resources, in addition to the distinctive logistics that distinguish Egypt due to its location, strong legal and regulatory environment and Innovation, as well as the competitive strategy. As well as, companies encounter several threats such as; the lack of infrastructures and logistics in rural areas, the absence of the inclusive understanding and awareness of e-commerce, fear from e-payment transactions and fraud, the ambiguity and burdensome of customs. Through the research findings several recommendations were introduced to both government and companies to overcome threats and exploit opportunities to improve performance and enhance companies' competitiveness.Keywords: e-commerce competitiveness, e-commerce factors, e-commerce in Egypt, information technology
Procedia PDF Downloads 103221 Market Illiquidity and Pricing Errors in the Term Structure of CDS
Authors: Lidia Sanchis-Marco, Antonio Rubia, Pedro Serrano
Abstract:
This paper studies the informational content of pricing errors in the term structure of sovereign CDS spreads. The residuals from a non-arbitrage model are employed to construct a Price discrepancy estimate, or noise measure. The noise estimate is understood as an indicator of market distress and reflects frictions such as illiquidity. Empirically, the noise measure is computed for an extensive panel of CDS spreads. Our results reveal an important fraction of systematic risk is not priced in default swap contracts. When projecting the noise measure onto a set of financial variables, the panel-data estimates show that greater price discrepancies are systematically related to a higher level of offsetting transactions of CDS contracts. This evidence suggests that arbitrage capital flows exit the marketplace during time of distress, and this consistent with a market segmentation among investors and arbitrageurs where professional arbitrageurs are particularly ineffective at bringing prices to their fundamental values during turbulent periods. Our empirical findings are robust for the most common CDS pricing models employed in the industry.Keywords: credit default swaps, noise measure, illiquidity, capital arbitrage
Procedia PDF Downloads 569220 Dental Ethics versus Malpractice, as Phenomenon with a Growing Trend
Authors: Saimir Heta, Kers Kapaj, Rialda Xhizdari, Ilma Robo
Abstract:
Dealing with emerging cases of dental malpractice with justifications that stem from the clear rules of dental ethics is a phenomenon with an increasing trend in today's dental practice. Dentists should clearly understand how far the limit of malpractice goes, with or without minimal or major consequences, for the affected patient, which can be justified as a complication of dental treatment, in support of the rules of dental ethics in the dental office. Indeed, malpractice can occur in cases of lack of professionalism, but it can also come as a consequence of anatomical and physiological limitations in the implementation of the dental protocols, predetermined and indicated by the patient in the paragraph of the treatment plan in his personal card. This study is of the review type with the aim of the latest findings published in the literature about the problem of dealing with these phenomena. The combination of keywords is done in such a way with the aim to give the necessary space for collecting the right information in the networks of publications about this field, always first from the point of view of the dentist and not from that of the lawyer or jurist. From the findings included in this article, it was noticed the diversity of approaches towards the phenomenon depends on the different countries based on the legal basis that these countries have. There is a lack of or a small number of articles that touch on this topic, and these articles are presented with a limited number of data on the same topic. Conclusions: Dental malpractice should not be hidden under the guise of various dental complications that we justify with the strict rules of ethics for patients treated in the dental chair. The individual experience of dental malpractice must be published with the aim of serving as a source of experience for future generations of dentists.Keywords: dental ethics, malpractice, professional protocol, random deviation
Procedia PDF Downloads 96219 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport
Authors: Polychronis Kapalidis
Abstract:
In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.Keywords: cybercrime, cybersecurity, organized crime, risk mitigation
Procedia PDF Downloads 157218 Perceived Effect of Livelihood Diversification on the Welfare of Rural Households in Niger State, Nigeria
Authors: Oladipo Joseph Ajayi, Yakubu Muhammed, Raufu Olusola Sanusi
Abstract:
This study determined the perceived effect of livelihood diversification on welfare of rural household in Niger state, Nigeria. Multi-stage sampling technique was adopted for sampling the respondents. Data used for the study were obtained from primary source. Structured questionnaire with interview schedule was administered to 180 randomly selected rural farmers in the study area. Descriptive statistics analysis and z-test statistics were used to analyse the data collected. The study revealed the mean age of the household to be 43 years, mean years of schooling was 8.5, mean household size was 6 people, mean farming experience of 17.5 years and mean farm size of 1.8 hectares. The effect of livelihood diversification revealed that livelihood diversification had positive and significant effect on food security (65.6%) and income generation (66.8%) in the study area. The major constraints to diversification in the study area were poor infrastructure, unavailability of credit and climatic risk and uncertainty. The study, therefore, recommended that rural household should be sensitised to diversify their income source into non-farm activities.Keywords: income, livelihood diversification , rural household, welfare
Procedia PDF Downloads 415217 Fight against Money Laundering with Optical Character Recognition
Authors: Saikiran Subbagari, Avinash Malladhi
Abstract:
Anti Money Laundering (AML) regulations are designed to prevent money laundering and terrorist financing activities worldwide. Financial institutions around the world are legally obligated to identify, assess and mitigate the risks associated with money laundering and report any suspicious transactions to governing authorities. With increasing volumes of data to analyze, financial institutions seek to automate their AML processes. In the rise of financial crimes, optical character recognition (OCR), in combination with machine learning (ML) algorithms, serves as a crucial tool for automating AML processes by extracting the data from documents and identifying suspicious transactions. In this paper, we examine the utilization of OCR for AML and delve into various OCR techniques employed in AML processes. These techniques encompass template-based, feature-based, neural network-based, natural language processing (NLP), hidden markov models (HMMs), conditional random fields (CRFs), binarizations, pattern matching and stroke width transform (SWT). We evaluate each technique, discussing their strengths and constraints. Also, we emphasize on how OCR can improve the accuracy of customer identity verification by comparing the extracted text with the office of foreign assets control (OFAC) watchlist. We will also discuss how OCR helps to overcome language barriers in AML compliance. We also address the implementation challenges that OCR-based AML systems may face and offer recommendations for financial institutions based on the data from previous research studies, which illustrate the effectiveness of OCR-based AML.Keywords: anti-money laundering, compliance, financial crimes, fraud detection, machine learning, optical character recognition
Procedia PDF Downloads 144216 Transferring Data from Glucometer to Mobile Device via Bluetooth with Arduino Technology
Authors: Tolga Hayit, Ucman Ergun, Ugur Fidan
Abstract:
Being healthy is undoubtedly an indispensable necessity for human life. With technological improvements, in the literature, various health monitoring and imaging systems have been developed to satisfy your health needs. In this context, the work of monitoring and recording the data of individual health monitoring data via wireless technology is also being part of these studies. Nowadays, mobile devices which are located in almost every house and which become indispensable of our life and have wireless technology infrastructure have an important place of making follow-up health everywhere and every time because these devices were using in the health monitoring systems. In this study, Arduino an open-source microcontroller card was used in which a sample sugar measuring device was connected in series. In this way, the glucose data (glucose ratio, time) obtained with the glucometer is transferred to the mobile device based on the Android operating system with the Bluetooth technology channel. A mobile application was developed using the Apache Cordova framework for listing data, presenting graphically and reading data over Arduino. Apache Cordova, HTML, Javascript and CSS are used in coding section. The data received from the glucometer is stored in the local database of the mobile device. It is intended that people can transfer their measurements to their mobile device by using wireless technology and access the graphical representations of their data. In this context, the aim of the study is to be able to perform health monitoring by using different wireless technologies in mobile devices that can respond to different wireless technologies at present. Thus, that will contribute the other works done in this area.Keywords: Arduino, Bluetooth, glucose measurement, mobile health monitoring
Procedia PDF Downloads 322215 Economic and Financial Crime, Forensic Accounting and Sustainable Developments Goals (SDGs). Bibliometric Analysis
Authors: Monica Violeta Achim, Sorin Nicolae Borlea
Abstract:
This aim of this work is to stress the needs for enhancing the role of forensic accounting in fighting economic and financial crime, in the context of the new international regulation movements in this area enhanced by the International Federation of Accountants (IFAC). Corruption, money laundering, tax evasion and other frauds significant hamper the economic growth and human development and, ultimately, the UN Sustainable Development Goals. The present paper also stresses the role of good governance in fighting the frauds, in order to achieve the most suitable sustainable development of the society. In this view, we made a bibliometric systematic review on forensic accounting and its contribution towards fraud detection and prevention and theirs relationship with good governance and Sustainable Developments Goals (SDGs). In this view, two powerful bibliometric visual software tools, VosViewer and CiteSpace are used in order to analyze published papers identifies in Scopus and Web of Science databases over the time. Our findings reveal the main red flags identified in literature as used tools by forensic accounting, the evolution in time of the interest of the topic, the distribution in space among world countries and connectivity with patterns of a good governance. Visual designs and scientific maps are useful to show these findings, in a visual way. Our findings are useful for managers and policy makers to provide important avenues that may help in reaching the 2030 Agenda for Sustainable Development, adopted by all United Nations Member States in 2015, in the area of using forensic accounting in preventing frauds.Keywords: forensic accounting, frauds, red flags, SDGs
Procedia PDF Downloads 139214 Microfinance and Gender Empowerment Discourse: Rethinking Minimalist View of Microcredit Programmes
Authors: Thomas Yeboah
Abstract:
In recent times, micro-finance programmes targeting women have become the central means of donor poverty alleviation strategies. In view of the renewed focus on post-Millennium Development Goals (MDGs) poverty reduction strategies, there is the likelihood that funding might increase in the next coming decades to support different initiatives by donor agencies. In this paper, we critically examine the role of microfinance in shaping gender relations and empowerment outcomes of women. It is widely argued that providing and reaching out to women with credit methodologies serves as a means of increasing women’s bargaining power and challenging existing gender subordination thereby releasing them from power structures which dominate their lives. This paper cautions this view and instead show that the mainstream argument surrounding microfinance and gender empowerment is much complex than what the popular rhetoric preaches. Drawing on empirical cases on microfinance literature, we argue that lack of systematic strategy to incorporate men and the wider socio-cultural dynamics within which women’s lives are embedded radically constraints the empowerment potential of microcredit programmes and in some context may lead to unintended consequences for women.Keywords: microfinance, empowerment, women, men, gender relations
Procedia PDF Downloads 460213 Chance One’s Arm: Critical Evaluation on Laws of Sports Gambling in India
Authors: Archen Sara Vincent
Abstract:
Gambling is the practice or act of betting or wagering on uncertain events with the hope of winning money or any other valuable assets. Nowadays, the practice of gambling can be seen in almost all grounds of events, especially in sports. In sports, this is commonly known among people as sports betting. The history of gambling can be traced about 2,000 years back. It originated from Greeks, from Greeks to the Romans, then to England, where betting on horse races was much popular among the elites. The evolution of gambling in sports has made a greater impact in the modern era. In India, the legality of gambling in sports is regulated by The Public Gambling Act 1867, which prohibits gambling activities in public places. The major draw of this statute is that it does not have specific laws regarding online sports gambling. Section 30 of The Indian Contract Act 1872 considers wagering agreements void. However, there are certain exceptions for this section, that is, (1) state-owned lotteries and (2) wagering on horse races with a sum of Rupees 500 or upward. As per the Indian Constitution, the rules regarding sports gambling are within the powers of the state legislatures. Some of the states have enacted their own laws which explicitly permit or prohibit gambling within their jurisdiction. Recently in Tamilnadu, The Tamilnadu Gaming Act was amended in 2021 to completely ban online gambling and betting. Moreover, the Central Government has introduced the Online Gaming and Prevention of Fraud Bill, 2018, to legalize and regulate sports betting in India. However, this bill has not yet been passed as law. Now as the Indian legal system does not have a specific rule regarding online sports gambling, sports betting companies use this major drawback and attract people to use the gambling and betting apps by advertising with well-known sports players and other celebrities. This paper aims to critically evaluate gambling in sports and the laws relating to it in India.Keywords: history of gambling, The Public Gambling Act 1862, state legislations, gambling in India
Procedia PDF Downloads 79212 Haptic Robotic Glove for Tele-Exploration of Explosive Devices
Authors: Gizem Derya Demir, Ilayda Yankilic, Daglar Karamuftuoglu, Dante Dorantes
Abstract:
ABSTRACT HAPTIC ROBOTIC GLOVE FOR TELE-EXPLORATION OF EXPLOSIVE DEVICES Gizem Derya Demir, İlayda Yankılıç, Dağlar Karamüftüoğlu, Dante J. Dorantes-González Department of Mechanical Engineering, MEF University Ayazağa Cad. No.4, 34396 Maslak, Sarıyer, İstanbul, Turkey Nowadays, terror attacks are, unfortunately, a more common threat around the world. Therefore, safety measures have become much more essential. An alternative to providing safety and saving human lives is done by robots, such as disassembling and liquidation of bombs. In this article, remote exploration and manipulation of potential explosive devices from a safe-distance are addressed by designing a novel, simple and ergonomic haptic robotic glove. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the haptic robotic glove and finger design. Angle controls of servo motors were made using ARDUINO® IDE codes on a Makeblock® MegaPi control card. Simple grasping dexterity solutions for the fingers were obtained using one linear soft and one angle sensors for each finger, and six servo motors are used in total to remotely control a slave multi-tooled robotic hand. This project is still undergoing and presents current results. Future research steps are also presented.Keywords: Dexterity, Exoskeleton, Haptics , Position Control, Robotic Hand , Teleoperation
Procedia PDF Downloads 176211 Film Review of 'Heroic Saviours and Survivors': The Representation of Sex Trafficking in Popular Films in India
Authors: Nisha James, Shubha Ranganathan
Abstract:
One of the most poignant forms of organized crime against women, which has rarely made it to the world of Indian cinema, is that of sex trafficking, i.e. the forcible involvement of women in the sex trade through fraud or coercion (Hughes, 2005). In the space of Indian cinema, much of the spotlight has been on the sensational drug trafficking and gang mafia of Bombay. During our research on sex trafficking, the rehabilitated women interviewed often expressed strong criticism about mass media’s naive portrayal of prostitutes as money-minting, happy and sexually driven women. They argued that this unrealistic portrayal ignored the fact that this was not a reality for the majority of trafficked women. Given the gravity of sex trafficking as a human rights issue, it is, therefore, refreshing to see three recent films on sex trafficking in Indian Languages – Naa Bangaaru Talli (2014, Telugu), Mardaani (2014, Hindi) and Lakshmi (2014, Hindi). This paper reviews these three films to explore the portrayal of the everyday reality of trafficking for women. Film analysis was used to understand the representation of psychological issues in the media. The strength of these movies starts with their inspirations which are of true stories and that they are all aimed at bringing awareness about the issue of sex trafficking, which is a rising social evil in Indian society though none of the three films move to portray the next phase of rehabilitation and reintegration of victims, which is a very complex and important process in the life of a survivor. According to findings, survivors of sex trafficking find the rehabilitation and reintegration into society to be a slow and tough part of their life as they continuously face stigma and social exclusion and have to strive to live against all odds of non-acceptance starting from their family.Keywords: film review, Indian films, sex trafficking, survivors
Procedia PDF Downloads 440210 Board Regulation and Its Impact on Composition and Effects: Evidence from German Cooperative Banks
Authors: Markus Stralla
Abstract:
This study employs a GMM framework to examine the impact of potential regulatory intervention regarding the occupations of supervisory board members in cooperative banking. To achieve insights, the study proceeds in two different ways. First, it investigates the changes in board structure prior and following to the German Act to Strengthen Financial Market and Insurance Supervision (FinVAG). Second, the study estimates the influence of Ph.D.Share, professional concentration and supervisory power on bank-risk changes in consideration of the implementation of FinVAG. Therefore, the study is based on a sample of 246 German cooperative banks from 2006-2011 while applying four different measures of bank risk, namely credit-, equity-, liquidity-risk, and Z-Score, with the former three also being addressed in FinVAG. Results indicate that the implementation of FinVAG results in (most likely unintentional) structural changes, especially at the expense of farmers, and affects all risk measures and relations between risk measures and supervisory board characteristics in a risk-reducing and therefore intended way. To disentangle the complex relationship between board characteristics and risk measures, the study utilizes two-step system GMM estimator to account for unobserved heterogeneity and simultaneity in order to reduce endogeneity problems. The findings may be especially relevant for stakeholders, regulators, supervisors and managers.Keywords: bank governance, bank risk-taking, board of directors, regulation
Procedia PDF Downloads 428209 Strengthening Governance in Public Administration: The Strategic Role of Internal Auditing in Enhancing Accountability and Transparency
Authors: Iulian Clain
Abstract:
In contemporary public administration, the demand for greater accountability, transparency, and efficient governance has intensified, particularly in the face of increasing public scrutiny and fiscal constraints. Internal auditing has emerged as a vital tool in strengthening governance structures, enhancing the effectiveness of public sector institutions, and ensuring compliance with regulatory frameworks. This paper examines the evolving role of internal auditing within public administration, with an emphasis on risk management, regulatory compliance, and fraud prevention. Building on institutional theory and risk management frameworks, this study explores how internal audits contribute to identifying operational inefficiencies, minimizing financial irregularities, and promoting ethical governance practices. Through case studies and comparative analysis of auditing practices across OECD nations, this research provides insights into how strategic internal audits can be harnessed to reinforce public sector governance, thereby improving the delivery of public services. The paper argues that the integration of internal audit findings into decision-making processes enhances not only financial accountability but also policy outcomes, fostering greater public trust in government institutions. Key recommendations are presented on how public institutions can further integrate internal auditing processes to enhance governance outcomes, focusing on best practices for institutionalizing audit functions within public sector governance frameworks. These findings are particularly relevant for policymakers, audit professionals, and public administration leaders striving to achieve better governance, operational efficiency, and integrity in the public sector.Keywords: internal auditing role, public administration sciences, public administration audit, internal auditing in universities
Procedia PDF Downloads 21