Search results for: soft fraud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1098

Search results for: soft fraud

1068 Optimize Data Evaluation Metrics for Fraud Detection Using Machine Learning

Authors: Jennifer Leach, Umashanger Thayasivam

Abstract:

The use of technology has benefited society in more ways than one ever thought possible. Unfortunately, though, as society’s knowledge of technology has advanced, so has its knowledge of ways to use technology to manipulate people. This has led to a simultaneous advancement in the world of fraud. Machine learning techniques can offer a possible solution to help decrease this advancement. This research explores how the use of various machine learning techniques can aid in detecting fraudulent activity across two different types of fraudulent data, and the accuracy, precision, recall, and F1 were recorded for each method. Each machine learning model was also tested across five different training and testing splits in order to discover which testing split and technique would lead to the most optimal results.

Keywords: data science, fraud detection, machine learning, supervised learning

Procedia PDF Downloads 163
1067 The Role of the Internal Audit Unit in Detecting and Preventing Fraud at Public Universities in West Java, Indonesia

Authors: Fury Khristianty Fitriyah

Abstract:

This study aims to identify the extent of the role of the Satuan Pengawas Intern (Internal Audit Unit) in detecting and preventing fraud in public universities in West Java under the Ministry of Research, Technology and Higher Education. The research method applied was a qualitative case study approach, while the unit of analysis for this study is the Internal Audit Unit at each public university. Results of this study indicate that the Internal Audit Unit is able to detect and prevent fraud within a public university environment by means of red flags to mark accounting anomalies. These stem from inaccurate budget planning that prompts inappropriate use of funds, exacerbated by late disbursements of funds, which potentially lead to fictitious transactions, and discrepancies in recording state-owned assets into a state property management system (SIMAK BMN), which, if not conducted properly, potentially causes loss to the state.

Keywords: governance, internal control, fraud, public university

Procedia PDF Downloads 254
1066 Soft Power in International Politics: Defense and Continued Relevance

Authors: Shivani Yadav

Abstract:

The paper will first elaborate on the concept of soft power as formulated by Joseph Nye, who argues that soft power is as important as hard power in international politics as it replaces coercion with non-coercive forms of co-optation and attraction. The central tenet of the paper is to extrapolate the continued relevance of soft power in international relations in the 21st century. It is argued that the relevance of soft power, in concurrence with hard power, is on the rise in the international system. This is found to be emanating out of two factors. First, the state-centric practice of international relations has expanded to allow other actors to participate in policymaking. This has led to the resources for power generation to become varied, largely move away from the control of governments, and to produce both hard and soft power attributes. Second, as the currency of coercive power seems to be devaluing in global politics, the role of intangible factors like soft power is getting more important in policymaking. The paper will then go on to elaborate on the critiques of the formulation of soft power from various perspectives, as well as the defenses to these critiques presented by soft power proponents. The paper will reflect on the continued relevance of soft power in international politics by giving the example of India, and how soft power has continued to serve its policy objectives over the years. It is observed that even as India is recognized as a rising superpower today, yet it has made a continuous effort in cultivating its soft power resources, which have proven to be its assets in furthering its foreign policy interests. In conclusion, the paper makes the point that soft power, in conjunction with hard power, will shape international politics in the coming times.

Keywords: foreign policy, India’s soft power, international politics, smart power, soft power

Procedia PDF Downloads 233
1065 Financial Statement Fraud: The Need for a Paradigm Shift to Forensic Accounting

Authors: Ifedapo Francis Awolowo

Abstract:

The unrelenting series of embarrassing audit failures should stimulate a paradigm shift in accounting. And in this age of information revolution, there is need for a constant improvement on the products or services one offers to the market in order to be relevant. This study explores the perceptions of external auditors, forensic accountants and accounting academics on whether a paradigm shift to forensic accounting can reduce financial statement frauds. Through Neo-empiricism/inductive analytical approach, findings reveal that a paradigm shift to forensic accounting might be the right step in the right direction in order to increase the chances of fraud prevention and detection in the financial statement. This research has implication on accounting education on the need to incorporate forensic accounting into present day accounting curriculum. Accounting professional bodies, accounting standard setters and accounting firms all have roles to play in incorporating forensic accounting education into accounting curriculum. Particularly, there is need to alter the ISA 240 to make the prevention and detection of frauds the responsibilities of bot those charged with the management and governance of companies and statutory auditors.

Keywords: financial statement fraud, forensic accounting, fraud prevention and detection, auditing, audit expectation gap, corporate governance

Procedia PDF Downloads 333
1064 Profit-Based Artificial Neural Network (ANN) Trained by Migrating Birds Optimization: A Case Study in Credit Card Fraud Detection

Authors: Ashkan Zakaryazad, Ekrem Duman

Abstract:

A typical classification technique ranks the instances in a data set according to the likelihood of belonging to one (positive) class. A credit card (CC) fraud detection model ranks the transactions in terms of probability of being fraud. In fact, this approach is often criticized, because firms do not care about fraud probability but about the profitability or costliness of detecting a fraudulent transaction. The key contribution in this study is to focus on the profit maximization in the model building step. The artificial neural network proposed in this study works based on profit maximization instead of minimizing the error of prediction. Moreover, some studies have shown that the back propagation algorithm, similar to other gradient–based algorithms, usually gets trapped in local optima and swarm-based algorithms are more successful in this respect. In this study, we train our profit maximization ANN using the Migrating Birds optimization (MBO) which is introduced to literature recently.

Keywords: neural network, profit-based neural network, sum of squared errors (SSE), MBO, gradient descent

Procedia PDF Downloads 447
1063 Recruitment Model (FSRM) for Faculty Selection Based on Fuzzy Soft

Authors: G. S. Thakur

Abstract:

This paper presents a Fuzzy Soft Recruitment Model (FSRM) for faculty selection of MHRD technical institutions. The selection criteria are based on 4-tier flexible structure in the institutions. The Advisory Committee on Faculty Recruitment (ACoFAR) suggested nine criteria for faculty in the proposed FSRM. The model Fuzzy Soft is proposed with consultation of ACoFAR based on selection criteria. The Fuzzy Soft distance similarity measures are applied for finding best faculty from the applicant pool.

Keywords: fuzzy soft set, fuzzy sets, fuzzy soft distance, fuzzy soft similarity measures, ACoFAR

Procedia PDF Downloads 319
1062 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 269
1061 A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection

Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay

Abstract:

With the increase of credit card usage, the volume of credit card misuse also has significantly increased, which may cause appreciable financial losses for both credit card holders and financial organizations issuing credit cards. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and their customers. Compounding on the complex nature of such adverse strategies, credit card fraudulent activities are rare events compared to the number of legitimate transactions. Hence, the challenge to develop fraud detection that are accurate and efficient is substantially intensified and, as a consequence, credit card fraud detection has lately become a very active area of research. In this work, we provide a survey of current techniques most relevant to the problem of credit card fraud detection. We carry out our survey in two main parts. In the first part, we focus on studies utilizing classical machine learning models, which mostly employ traditional transnational features to make fraud predictions. These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting with his/her electronic devices. These approaches rely on how people behave (instead of what they do), which cannot be easily forged. By providing an overview of current approaches and the results reported in the literature, this survey aims to drive the future research agenda for the community in order to develop more accurate, reliable and scalable models of credit card fraud detection.

Keywords: Credit Card Fraud Detection, User Authentication, Behavioral Biometrics, Machine Learning, Literature Survey

Procedia PDF Downloads 89
1060 Basics for Corruption Reduction and Fraud Prevention in Industrial/Humanitarian Organizations through Supplier Management in Supply Chain Systems

Authors: Ibrahim Burki

Abstract:

Unfortunately, all organizations (Industrial and Humanitarian/ Non-governmental organizations) are prone to fraud and corruption in their supply chain management routines. The reputational and financial fallout can be disastrous. With the growing number of companies using suppliers based in the local market has certainly increased the threat of fraud as well as corruption. There are various potential threats like, poor or non-existent record keeping, purchasing of lower quality goods at higher price, excessive entertainment of staff by suppliers, deviations in communications between procurement staff and suppliers, such as calls or text messaging to mobile phones, staff demanding extended periods of notice before they allow an audit to take place, inexperienced buyers and more. But despite all the above-mentioned threats, this research paper emphasize upon the effectiveness of well-maintained vendor/s records and sorting/filtration of vendor/s to cut down the possible threats of corruption and fraud. This exercise is applied in a humanitarian organization of Pakistan but it is applicable to whole South Asia region due to the similarity of culture and contexts. In that firm, there were more than 550 (five hundred and fifty) registered vendors. As during the disasters or emergency phases requirements are met on urgent basis thus, providing golden opportunities for the fake companies or for the brother/sister companies of the already registered companies to be involved in the tendering process without declaration or even under some different (new) company’s name. Therefore, a list of required documents (along with checklist) was developed and sent to all of the vendor(s) in the current database and based upon the receipt of the requested documents vendors were sorted out. Furthermore, these vendors were divided into active (meeting the entire set criterion) and non-active groups. This initial filtration stage allowed the firm to continue its work without a complete shutdown that is only vendors falling in the active group shall be allowed to participate in the tenders by the time whole process is completed. Likewise only those companies or firms meeting the set criterion (active category) shall be allowed to get registered in the future along with a dedicated filing system (soft and hard shall be maintained), and all of the companies/firms in the active group shall be physically verified (visited) by the Committee comprising of senior members of at least Finance department, Supply Chain (other than procurement) and Security department.

Keywords: corruption reduction, fraud prevention, supplier management, industrial/humanitarian organizations

Procedia PDF Downloads 520
1059 Variation in the Morphology of Soft Palate

Authors: Hema Lattupalli

Abstract:

Introduction: The palate forms a partition between the oral cavity and nasal cavity. The palate is made up of two parts hard palate and soft palate. The Hard palate forms the anterior part of the palate, the soft palate forms a movable muscular fold covered by mucous membrane that is suspended from the posterior border of a hard palate. Aim and Objectives: Soft palate morphological variations have a great paucity in the literature. It’s also believed that the soft palate has no such important anatomical variations. There is a variable presentation of the soft palate morphology in the lateral cephalograms. The aim of this study is to identify the velar morphology. Materials and Methods: 100 normal subjects between the age group of 20 – 35 were taken for the study. Method: Lateral Cephalogram (radiologic study). Results: Different shapes of the soft palate were observed in the lateral cephalograms. The morphology of soft palate was classified into six types 1.Leaf like (50 cases) most common type, 2.Straight line (20 cases), 3.S shaped (4 cases) very rare, 4.Butt like (10 cases), 5. Rat tail (6 cases), 6. Hook shaped (10 cases). Conclusion: This classification helps us to understand the better diversity of the velar morphology in mid-sagittal plane. These findings help us to understand the etiology of OSAS.

Keywords: soft palate, cephalometric radiographs, morphology, cleft palate, obstructive sleep apnoea syndrome

Procedia PDF Downloads 340
1058 Enhanced Automated Teller Machine Using Short Message Service Authentication Verification

Authors: Rasheed Gbenga Jimoh, Akinbowale Nathaniel Babatunde

Abstract:

The use of Automated Teller Machine (ATM) has become an important tool among commercial banks, customers of banks have come to depend on and trust the ATM conveniently meet their banking needs. Although the overwhelming advantages of ATM cannot be over-emphasized, its alarming fraud rate has become a bottleneck in it’s full adoption in Nigeria. This study examined the menace of ATM in the society another cost of running ATM services by banks in the country. The researcher developed a prototype of an enhanced Automated Teller Machine Authentication using Short Message Service (SMS) Verification. The developed prototype was tested by Ten (10) respondents who are users of ATM cards in the country and the data collected was analyzed using Statistical Package for Social Science (SPSS). Based on the results of the analysis, it is being envisaged that the developed prototype will go a long way in reducing the alarming rate of ATM fraud in Nigeria.

Keywords: ATM, ATM fraud, e-banking, prototyping

Procedia PDF Downloads 284
1057 A Qualitative Research of Online Fraud Decision-Making Process

Authors: Semire Yekta

Abstract:

Many online retailers set up manual review teams to overcome the limitations of automated online fraud detection systems. This study critically examines the strategies they adapt in their decision-making process to set apart fraudulent individuals from non-fraudulent online shoppers. The study uses a mix method research approach. 32 in-depth interviews have been conducted alongside with participant observation and auto-ethnography. The study found out that all steps of the decision-making process are significantly affected by a level of subjectivity, personal understandings of online fraud, preferences and judgments and not necessarily by objectively identifiable facts. Rather clearly knowing who the fraudulent individuals are, the team members have to predict whether they think the customer might be a fraudster. Common strategies used are relying on the classification and fraud scorings in the automated fraud detection systems, weighing up arguments for and against the customer and making a decision, using cancellation to test customers’ reaction and making use of personal experiences and “the sixth sense”. The interaction in the team also plays a significant role given that some decisions turn into a group discussion. While customer data represent the basis for the decision-making, fraud management teams frequently make use of Google search and Google Maps to find out additional information about the customer and verify whether the customer is the person they claim to be. While this, on the one hand, raises ethical concerns, on the other hand, Google Street View on the address and area of the customer puts customers living in less privileged housing and areas at a higher risk of being classified as fraudsters. Phone validation is used as a final measurement to make decisions for or against the customer when previous strategies and Google Search do not suffice. However, phone validation is also characterized by individuals’ subjectivity, personal views and judgment on customer’s reaction on the phone that results in a final classification as genuine or fraudulent.

Keywords: online fraud, data mining, manual review, social construction

Procedia PDF Downloads 322
1056 Improvement of Bearing Capacity of Soft Clay Using Geo-Cells

Authors: Siddhartha Paul, Aman Harlalka, Ashim K. Dey

Abstract:

Soft clayey soil possesses poor bearing capacity and high compressibility because of which foundations cannot be directly placed over soft clay. Normally pile foundations are constructed to carry the load through the soft soil up to the hard stratum below. Pile construction is costly and time consuming. In order to increase the properties of soft clay, many ground improvement techniques like stone column, preloading with and without sand drains/band drains, etc. are in vogue. Time is a constraint for successful application of these improvement techniques. Another way to improve the bearing capacity of soft clay and to reduce the settlement possibility is to apply geocells below the foundation. The geocells impart rigidity to the foundation soil, reduce the net load intensity on soil and thus reduce the compressibility. A well designed geocell reinforced soil may replace the pile foundation. The present paper deals with the applicability of geocells on improvement of the bearing capacity. It is observed that a properly designed geocell may increase the bearing capacity of soft clay up to two and a half times.

Keywords: bearing capacity, geo-cell, ground improvement, soft clay

Procedia PDF Downloads 294
1055 Application All Digits Number Benford Law in Financial Statement

Authors: Teguh Sugiarto

Abstract:

Background: The research aims to explore if there is fraud in a financial statement, use the Act stated that Benford's distribution all digits must compare the number will follow the trend of lower number. Research methods: This research uses all the analysis number being in Benford's law. After receiving the results of the analysis of all the digits, the author makes a distinction between implementation using the scale above and below 5%, the rate of occurrence of difference. With the number which have differences in the range of 5%, then can do the follow-up and the detection of the onset of fraud against the financial statements. The findings: From the research that has been done can be drawn the conclusion that the average of all numbers appear in the financial statements, and compare the rates of occurrence of numbers according to the characteristics of Benford's law. About the existence of errors and fraud in the financial statements of PT medco Energy Tbk did not occur. Conclusions: The study concludes that Benford's law can serve as indicator tool in detecting the possibility of in financial statements to case studies of PT Medco Energy Tbk for the fiscal year 2000-2010.

Keywords: Benford law, first digits, all digits number Benford law, financial statement

Procedia PDF Downloads 215
1054 The Behavior of Ordinary and Encased Stone Columns in Soft Clay Soil of Egypt: A Finite Element Study

Authors: Mahmoud F. Awad-Allah, Mohammed Rabeih, Eman Abdel Baseer

Abstract:

Soft to very soft soil deposits are widely speared in some areas of Egypt such as East Port Said, Damietta, Kafr El-Sheik, Alexandria, etc. The construction projects in these areas have faced the challenge of the presence of extended deep layers of soft and very soft clays which reach to depths of 40 to 60 m from the ground level. Stone columns are commonly used to support structures overlying soft ground soils and surcharged by embankment type loading. Therefore, this paper introduces a wide comparison numerical study between the ordinary stone columns (OSC) versus the geosynthetic encased stone columns (ESC) installed in soft clay soil deposit using finite element method (FEM). Parametric study of an embankment on soft soils reinforced with stone columns is performed using commercial computer program based on the finite element technique (PLAXIS 2D). The investigation will present the influence of the following parameters: diameter of stone columns, stiffness of geosynthetic encasement, embedded depth of stone column from ground level, and the length encasement of the stone column on the consolidation time, vertical settlement, and lateral displacement of soft clay soil formations.

Keywords: finite element method, geosynthetic, lateral displacement, settlement, soft clay

Procedia PDF Downloads 181
1053 The Effects of 2016 Rio Olympics as Nation's Soft Power Strategy

Authors: Keunsu Han

Abstract:

Sports has been used as a valuable tool for countries to enhance brand image and to pursue higher political interests. Olympic games are one of the best examples as a mega sport event to achieve such nations’ purposes. The term, “soft power,” coined by Nye, refers to country’s ability to persuade and attract foreign audiences through non-coercive ways such as cultural, diplomatic, and economic means. This concept of soft power provides significant answers about why countries are willing to host a mega sport event such as Olympics. This paper reviews the concept of soft power by Nye as a theoretical framework of this study to understand critical motivation for countries to host Olympics and examines the effects of 2016 Rio Olympics as the state’s soft power strategy. Thorough data analysis including media, government and private-sector documents, this research analyzes both negative and positive aspects of the nation’s image created during Rio Olympics and discusses the effects of Rio Olympics as Brazil’s chance to showcase its soft power by highlighting the best the state has to present.

Keywords: country brand, olympics, soft power, sport diplomacy, mega sport event

Procedia PDF Downloads 430
1052 Entropy Measures on Neutrosophic Soft Sets and Its Application in Multi Attribute Decision Making

Authors: I. Arockiarani

Abstract:

The focus of the paper is to furnish the entropy measure for a neutrosophic set and neutrosophic soft set which is a measure of uncertainty and it permeates discourse and system. Various characterization of entropy measures are derived. Further we exemplify this concept by applying entropy in various real time decision making problems.

Keywords: entropy measure, Hausdorff distance, neutrosophic set, soft set

Procedia PDF Downloads 233
1051 Numerical Investigation of Embankment Settlement Improved by Method of Preloading by Vertical Drains

Authors: Seyed Abolhasan Naeini, Saeideh Mohammadi

Abstract:

Time dependent settlement due to loading on soft saturated soils produces many problems such as high consolidation settlements and low consolidation rates. Also, long term consolidation settlement of soft soil underlying the embankment leads to unpredicted settlements and cracks on soil surface. Preloading method is an effective improvement method to solve this problem. Using vertical drains in preloading method is an effective method for improving soft soils. Applying deep soil mixing method on soft soils is another effective method for improving soft soils. There are little studies on using two methods of preloading and deep soil mixing simultaneously. In this paper, the concurrent effect of preloading with deep soil mixing by vertical drains is investigated through a finite element code, Plaxis2D. The influence of parameters such as deep soil mixing columns spacing, existence of vertical drains and distance between them, on settlement and stability factor of safety of embankment embedded on soft soil is investigated in this research.

Keywords: preloading, soft soil, vertical drains, deep soil mixing, consolidation settlement

Procedia PDF Downloads 194
1050 Assessing Soft Skills In Accounting Programmes: Insights From South African University Lecturers

Authors: Dolly Nyaguthii Wanjau

Abstract:

This study contributes to our understanding of how lecturers assess soft skills in accounting programmes, with the intention of producing graduates that are better prepared for the world of work. Insights were obtained through semi-structured interviews with twelve South African universities that offer chartered accountant training and accredited by SAICA. It was found that the lecturers assessed soft skills using traditional methods of assessments such as tests, assignments, and examinations. However, there were missed opportunities to embrace ICT tools in the assessment process, and this could be attributed to a lack of resources within the participating universities. Given the increasing use of digital tools for business activities, it is important that ICT tools be embraced as an inseparable part of soft skills because employers are increasingly looking for accounting graduates with digital skills.

Keywords: accounting, assessment, ICT skills, SAICA, soft skills

Procedia PDF Downloads 98
1049 Single Event Transient Tolerance Analysis in 8051 Microprocessor Using Scan Chain

Authors: Jun Sung Go, Jong Kang Park, Jong Tae Kim

Abstract:

As semi-conductor manufacturing technology evolves; the single event transient problem becomes more significant issue. Single event transient has a critical impact on both combinational and sequential logic circuits, so it is important to evaluate the soft error tolerance of the circuits at the design stage. In this paper, we present a soft error detecting simulation using scan chain. The simulation model generates a single event transient randomly in the circuit, and detects the soft error during the execution of the test patterns. We verified this model by inserting a scan chain in an 8051 microprocessor using 65 nm CMOS technology. While the test patterns generated by ATPG program are passing through the scan chain, we insert a single event transient and detect the number of soft errors per sub-module. The experiments show that the soft error rates per cell area of the SFR module is 277% larger than other modules.

Keywords: scan chain, single event transient, soft error, 8051 processor

Procedia PDF Downloads 320
1048 The Impacts of Soft and Hard Enterprise Resource Planning to the Corporate Business Performance through the Enterprise Resource Planning Integrated System

Authors: Sautma Ronni Basana, Zeplin Jiwa Husada Tarigan, Widjojo Suprapto

Abstract:

Companies have already implemented the Enterprise Resource Planning (ERP) system to increase the data integration so that they can improve their business performance. Although some companies have managed to implement the ERP well, they still need to improve gradually so that the ERP functions can be optimized. To obtain a faster and more accurate data, the key users and IT department have to customize the process to suit the needs of the company. In reality, sustaining the ERP technology system requires soft and hard ERP so it enables to improve the business performance of the company. Soft and hard ERP are needed to build a tough system to ensure the integration among departments running smoothly. This research has three questions. First, is the soft ERP bringing impacts to the hard ERP and system integration. Then, is the hard ERP having impacts to the system integration. Finally, is the business performance of the manufacturing companies is affected by the soft ERP, hard ERP, and system integration. The questionnaires are distributed to 100 manufacturing companies in East Java, and are collected from 90 companies which have implemented the ERP, with the response rate of 90%. From the data analysis using PLS program, it is obtained that the soft ERP brings positive impacts to the hard ERP and system integration for the companies. Then, the hard ERP brings also positive impacts to the system integration. Finally, the business process performance of the manufacturing companies is affected by the system integration, soft ERP, and hard ERP simultaneously.

Keywords: soft ERP, hard ERP, system integration, business performance

Procedia PDF Downloads 380
1047 3D Modeling of Tunis Soft Soil Settlement Reinforced with Plastic Wastes

Authors: Aya Rezgui, Lasaad Ajam, Belgacem Jalleli

Abstract:

The Tunis soft soils present a difficult challenge as construction sites and for Geotechnical works. Currently, different techniques are used to improve such soil properties taking into account the environmental considerations. One of the recent methods is involving plastic wastes as a reinforcing materials. The present study pertains to the development of a numerical model for predicting the behavior of Tunis Soft soil (TSS) improved with recycled Monobloc chair wastes.3D numerical models for unreinforced TSS and reinforced TSS aims to evaluate settlement reduction and the values of consolidation times in oedometer conditions.

Keywords: Tunis soft soil, settlement, plastic wastes, finte -difference, FLAC3D modeling

Procedia PDF Downloads 104
1046 The Complementary Effect of Internal Control System and Whistleblowing Policy on Prevention and Detection of Fraud in Nigerian Deposit Money Banks

Authors: Dada Durojaye Joshua

Abstract:

The study examined the combined effect of internal control system and whistle blowing policy while it pursues the following specific objectives, which are to: examine the relationship between monitoring activities and fraud’s detection and prevention; investigate the effect of control activities on fraud’s detection and prevention in Nigerian Deposit Money Banks (DMBs). The population of the study comprises the 89,275 members of staff in the 20 DMBs in Nigeria as at June 2019. Purposive and convenient sampling techniques were used in the selection of the 80 members of staff at the supervisory level of the Internal Audit Departments of the head offices of the sampled banks, that is, selecting 4 respondents (Audit Executive/Head, Internal Control; Manager, Operation Risk Management; Head, Financial Crime Control; the Chief Compliance Officer) from each of the 20 DMBs in Nigeria. A standard questionnaire was adapted from 2017/2018 Internal Control Questionnaire and Assessment, Bureau of Financial Monitoring and Accountability Florida Department of Economic Opportunity. It was modified to serve the purpose for which it was meant to serve. It was self-administered to gather data from the 80 respondents at the respective headquarters of the sampled banks at their respective locations across Nigeria. Two likert-scales was used in achieving the stated objectives. A logit regression was used in analysing the stated hypotheses. It was found that effect of monitoring activities using the construct of conduct of ongoing or separate evaluation (COSE), evaluation and communication of deficiencies (ECD) revealed that monitoring activities is significant and positively related to fraud’s detection and prevention in Nigerian DMBS. So also, it was found that control activities using selection and development of control activities (SDCA), selection and development of general controls over technology to prevent financial fraud (SDGCTF), development of control activities that gives room for transparency through procedures that put policies into actions (DCATPPA) contributed to influence fraud detection and prevention in the Nigerian DMBs. In addition, it was found that transparency, accountability, reliability, independence and value relevance have significant effect on fraud detection and prevention ibn Nigerian DMBs. The study concluded that the board of directors demonstrated independence from management and exercises oversight of the development and performance of internal control. Part of the conclusion was that there was accountability on the part of the owners and preparers of the financial reports and that the system gives room for the members of staff to account for their responsibilities. Among the recommendations was that the management of Nigerian DMBs should create and establish a standard Internal Control System strong enough to deter fraud in order to encourage continuity of operations by ensuring liquidity, solvency and going concern of the banks. It was also recommended that the banks create a structure that encourages whistleblowing to complement the internal control system.

Keywords: internal control, whistleblowing, deposit money banks, fraud prevention, fraud detection

Procedia PDF Downloads 50
1045 Complementary Effect of Wistleblowing Policy and Internal Control System on Prevention and Detection of Fraud in Nigerian Deposit Money Banks

Authors: Dada Durojaye Joshua

Abstract:

The study examined the combined effect of internal control system and whistle blowing policy while it pursues the following specific objectives, which are to: examine the relationship between monitoring activities and fraud’s detection and prevention; investigate the effect of control activities on fraud’s detection and prevention in Nigerian Deposit Money Banks (DMBs). The population of the study comprises the 89,275 members of staff in the 20 DMBs in Nigeria as at June 2019. Purposive and convenient sampling techniques were used in the selection of the 80 members of staff at the supervisory level of the Internal Audit Departments of the head offices of the sampled banks, that is, selecting 4 respondents (Audit Executive/Head, Internal Control; Manager, Operation Risk Management; Head, Financial Crime Control; the Chief Compliance Officer) from each of the 20 DMBs in Nigeria. A standard questionnaire was adapted from 2017/2018 Internal Control Questionnaire and Assessment, Bureau of Financial Monitoring and Accountability Florida Department of Economic Opportunity. It was modified to serve the purpose for which it was meant to serve. It was self-administered to gather data from the 80 respondents at the respective headquarters of the sampled banks at their respective locations across Nigeria. Two likert-scales was used in achieving the stated objectives. A logit regression was used in analysing the stated hypotheses. It was found that effect of monitoring activities using the construct of conduct of ongoing or separate evaluation (COSE), evaluation and communication of deficiencies (ECD) revealed that monitoring activities is significant and positively related to fraud’s detection and prevention in Nigerian DMBS. So also, it was found that control activities using selection and development of control activities (SDCA), selection and development of general controls over technology to prevent financial fraud (SDGCTF), development of control activities that gives room for transparency through procedures that put policies into actions (DCATPPA) contributed to influence fraud detection and prevention in the Nigerian DMBs. In addition, it was found that transparency, accountability, reliability, independence and value relevance have significant effect on fraud detection and prevention ibn Nigerian DMBs. The study concluded that the board of directors demonstrated independence from management and exercises oversight of the development and performance of internal control. Part of the conclusion was that there was accountability on the part of the owners and preparers of the financial reports and that the system gives room for the members of staff to account for their responsibilities. Among the recommendations was that the management of Nigerian DMBs should create and establish a standard Internal Control System strong enough to deter fraud in order to encourage continuity of operations by ensuring liquidity, solvency and going concern of the banks. It was also recommended that the banks create a structure that encourages whistleblowing to complement the internal control system.

Keywords: internal control, whistleblowing, deposit money banks, fraud prevention, fraud detection

Procedia PDF Downloads 43
1044 Forensic Investigation: The Impact of Biometric-Based Solution in Combatting Mobile Fraud

Authors: Mokopane Charles Marakalala

Abstract:

Research shows that mobile fraud has grown exponentially in South Africa during the lockdown caused by the COVID-19 pandemic. According to the South African Banking Risk Information Centre (SABRIC), fraudulent online banking and transactions resulted in a sharp increase in cybercrime since the beginning of the lockdown, resulting in a huge loss to the banking industry in South Africa. While the Financial Intelligence Centre Act, 38 of 2001, regulate financial transactions, it is evident that criminals are making use of technology to their advantage. Money-laundering ranks among the major crimes, not only in South Africa but worldwide. This paper focuses on the impact of biometric-based solutions in combatting mobile fraud at the South African Risk Information. SABRIC had the challenges of a successful mobile fraud; cybercriminals could hijack a mobile device and use it to gain access to sensitive personal data and accounts. Cybercriminals are constantly looting the depths of cyberspace in search of victims to attack. Millions of people worldwide use online banking to do their regular bank-related transactions quickly and conveniently. This was supported by the SABRIC, who regularly highlighted incidents of mobile fraud, corruption, and maladministration in SABRIC, resulting in a lack of secure their banking online; they are vulnerable to falling prey to fraud scams such as mobile fraud. Criminals have made use of digital platforms since the development of technology. In 2017, 13 438 instances involving banking apps, internet banking, and mobile banking caused the sector to suffer gross losses of more than R250,000,000. The final three parties are forced to point fingers at one another while the fraudster makes off with the money. A non-probability sampling (purposive sampling) was used in selecting these participants. These included telephone calls and virtual interviews. The results indicate that there is a relationship between remote online banking and the increase in money-laundering as the system allows transactions to take place with limited verification processes. This paper highlights the significance of considering the development of prevention mechanisms, capacity development, and strategies for both financial institutions as well as law enforcement agencies in South Africa to reduce crime such as money-laundering. The researcher recommends that strategies to increase awareness for bank staff must be harnessed through the provision of requisite training and to be provided adequate training.

Keywords: biometric-based solution, investigation, cybercrime, forensic investigation, fraud, combatting

Procedia PDF Downloads 71
1043 The Advantages of Using DNA-Barcoding for Determining the Fraud in Seafood

Authors: Elif Tugce Aksun Tumerkan

Abstract:

Although seafood is an important part of human diet and categorized highly traded food industry internationally, it is remain overlooked generally in the global food security aspect. Food product authentication is the main interest in the aim of both avoids commercial fraud and to consider the risks that might be harmful to human health safety. In recent years, with increasing consumer demand for regarding food content and it's transparency, there are some instrumental analyses emerging for determining food fraud depend on some analytical methodologies such as proteomic and metabolomics. While, fish and seafood consumed as fresh previously, within advanced technology, processed or packaged seafood consumption have increased. After processing or packaging seafood, morphological identification is impossible when some of the external features have been removed. The main fish and seafood quality-related issues are the authentications of seafood contents such as mislabelling products which may be contaminated and replacement partly or completely, by lower quality or cheaper ones. For all mentioned reasons, truthful consistent and easily applicable analytical methods are needed for assurance the correct labelling and verifying of seafood products. DNA-barcoding methods become popular robust that used in taxonomic research for endangered or cryptic species in recent years; they are used for determining food traceability also. In this review, when comparing the other proteomic and metabolic analysis, DNA-based methods are allowing a chance to identification all type of food even as raw, spiced and processed products. This privilege caused by DNA is a comparatively stable molecule than protein and other molecules. Furthermore showing variations in sequence based on different species and founding in all organisms, make DNA-based analysis more preferable. This review was performed to clarify the main advantages of using DNA-barcoding for determining seafood fraud among other techniques.

Keywords: DNA-barcoding, genetic analysis, food fraud, mislabelling, packaged seafood

Procedia PDF Downloads 143
1042 Electrokinetic Application for the Improvement of Soft Clays

Authors: Abiola Ayopo Abiodun, Zalihe Nalbantoglu

Abstract:

The electrokinetic application (EKA), a relatively modern chemical treatment has a potential for in-situ ground improvement in an open field or under existing structures. It utilizes a low electrical gradient to transport electrolytic chemical ions between bespoke electrodes inserted in the fine-grained, low permeable soft soils. The paper investigates the efficacy of the EKA as a mitigation technique for the soft clay beds. The laboratory model of the EKA comprises of rectangular plexiglass test tank, electrolytes compartments, geosynthetic electrodes and direct electric current supply. Within this setup, the EK effects resulted from the exchange of ions between anolyte (anodic) and catholyte (cathodic) ends through the tested soil were examined by basic experimental laboratory testing methods. As such, the treated soft soil properties were investigated as a function of the anode-to-cathode distances and curing periods. The test results showed that there have been some changes in the physical and engineering properties of the treated soft soils. The significant changes in the physicochemical and electrical properties suggested that their corresponding changes can be utilized as a monitoring technique to evaluate the improvement in the engineering properties EK treated soft clay soils.

Keywords: electrokinetic, electrolytes, exchange ions, geosynthetic electrodes, soft soils

Procedia PDF Downloads 287
1041 Quality Assessment of Some Selected Locally Produced and Marketed Soft Drinks

Authors: Gerardette Darkwah, Gloria Ankar Brewoo, John Barimah, Gilbert Owiah Sampson, Vincent Abe-Inge

Abstract:

Soft drinks which are widely consumed in Ghana have been reported in other countries to contain toxic heavy metals beyond the acceptable limits in other countries. Therefore, the objective of this study was to assess the quality characteristics of selected locally produced and marketed soft drinks. Three (3) different batches of 23 soft drinks were sampled from the Takoradi markets. The samples were prescreened for the presence of reducing sugars, phosphates, alcohol and carbon dioxide. The heavy metal contents and physicochemical properties were also determined with AOAC methods. The results indicated the presence of reducing sugars, carbon dioxide and the absence of alcohol in all the selected soft drink samples. The pH, total sugars, moisture, total soluble solids (TSS) and titratable acidity ranged from 2.42 – 3.44, 3.30 – 10.44%, 85.63 – 94.85%, 5.00 – 13.33°Brix, and 0.21 – 1.99% respectively. The concentration of heavy metals were also below detection limits in all samples. The quality of the selected were within specifications prescribed by regulatory bodies.

Keywords: heavy metal contamination, locally manufactured, quality, soft drinks

Procedia PDF Downloads 122
1040 China's Soft Power and Its Strategy in West Asia

Authors: Iman Shabanzadeh

Abstract:

The economic growth and the special model of development in China have caused sensitivity in the public opinion of the world regarding the nature of this growth and development. In this regard, the Chinese have tried to put an end to such alarming procedures by using all the tools at their disposal and seek to present a peaceful and cooperative image of themselves. In this way, one of the most important diplomatic tools that Beijing has used to reduce the concerns caused by the Threat Theory has been the use of soft power resources and its tools in its development policies. This article begins by analyzing the concept of soft power and examining its foundations in international relations, and continues to examine the components of soft power in its Chinese version. The main purpose of the article is to figure out about the position of West Asia in China's soft power strategy and resources China use to achieve its goals in this region. In response to the main question, the paper's hypothesis is that soft power in its Chinese version had significant differences from Joseph Nye's original idea. In fact, the Chinese have imported the American version of soft power and adjusted, strengthened and, in other words, internalized it with their abilities, capacities and political philosophy. Based on this, China's software presence in West Asia can be traced in three areas. The first source of China's soft power in this region of West Asia is cultural in nature and is realized through strategies such as "use of educational tools and methods", "media methods" and "tourism industry". The second source is related to political soft power, which is applied through the policy of "balance of influence" and the policy of "mediation" and relying on the "ideological foundations of Confucianism". The third source also refers to China's economic soft power and is realized through three tools: "energy exchanges", "foreign investments" and "Belt-Road initiative". The research method of this article is descriptive-analytical.

Keywords: soft power, cooperative power, china, west asia

Procedia PDF Downloads 26
1039 Comparative Study on Manet Using Soft Computing Techniques

Authors: Amarjit Singh, Tripatdeep Singh Dua, Vikas Attri

Abstract:

Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics.

Keywords: mobile ad-hoc network, fuzzy improved genetic approach, neural network, routing protocol, wireless mesh network

Procedia PDF Downloads 316