Search results for: internet financial reporting
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5004

Search results for: internet financial reporting

4164 Financial Audit Planning: Its Importance in Kosovo Entrepreneurship

Authors: Shpetim Rezniqi

Abstract:

Over the years has increased, and increasingly has become necessary to make audit of financial statements. An auditor to perform an audit, should plan its audit in order to provide a high-quality audit and to be performed in an economic, efficient, effective and timely. This phase of the audit is also important stages of reach to the final goal of an audit to be professional and based in Kosovo and International Standards on Auditing. Always considering Kosovo as a new state and once out of war, where everything in its entrepreneurship started from the lowest stage of economic development and aim at development and regional and European integration, planning and performing audit becomes even more important.

Keywords: control, accounting, planning, analysis

Procedia PDF Downloads 509
4163 Climate Related Financial Risk on Automobile Industry and the Impact to the Financial Institutions

Authors: Mahalakshmi Vivekanandan S.

Abstract:

As per the recent changes happening in the global policies, climate-related changes and the impact it causes across every sector are viewed as green swan events – in essence, climate-related changes can often happen and lead to risk and a lot of uncertainty, but needs to be mitigated instead of considering them as black swan events. This brings about a question on how this risk can be computed so that the financial institutions can plan to mitigate it. Climate-related changes impact all risk types – credit risk, market risk, operational risk, liquidity risk, reputational risk and other risk types. And the models required to compute this has to consider the different industrial needs of the counterparty, as well as the factors that are contributing to this – be it in the form of different risk drivers, or the different transmission channels or the different approaches and the granular form of data availability. This brings out the suggestion that the climate-related changes, though it affects Pillar I risks, will be a Pillar II risk. This has to be modeled specifically based on the financial institution’s actual exposure to different industries instead of generalizing the risk charge. And this will have to be considered as the additional capital to be met by the financial institution in addition to their Pillar I risks, as well as the existing Pillar II risks. In this paper, the author presents a risk assessment framework to model and assess climate change risks - for both credit and market risks. This framework helps in assessing the different scenarios and how the different transition risks affect the risk associated with the different parties. This research paper delves into the topic of the increase in the concentration of greenhouse gases that in turn cause global warming. It then considers the various scenarios of having the different risk drivers impacting the Credit and market risk of an institution by understanding the transmission channels and also considering the transition risk. The paper then focuses on the industry that’s fast seeing a disruption: the automobile industry. The paper uses the framework to show how the climate changes and the change to the relevant policies have impacted the entire financial institution. Appropriate statistical models for forecasting, anomaly detection and scenario modeling are built to demonstrate how the framework can be used by the relevant agencies to understand their financial risks. The paper also focuses on the climate risk calculation for the Pillar II Capital calculations and how it will make sense for the bank to maintain this in addition to their regular Pillar I and Pillar II capital.

Keywords: capital calculation, climate risk, credit risk, pillar ii risk, scenario modeling

Procedia PDF Downloads 133
4162 Simulation of Government Management Model to Increase Financial Productivity System Using Govpilot

Authors: Arezou Javadi

Abstract:

The use of algorithmic models dependent on software calculations and simulation of new government management assays with the help of specialized software had increased the productivity and efficiency of the government management system recently. This has caused the management approach to change from the old bitch & fix model, which has low efficiency and less usefulness, to the capable management model with higher efficiency called the partnership with resident model. By using Govpilot TM software, the relationship between people in a system and the government was examined. The method of two tailed interaction was the outsourcing of a goal in a system, which is formed in the order of goals, qualified executive people, optimal executive model, and finally, summarizing additional activities at the different statistical levels. The results showed that the participation of people in a financial implementation system with a statistical potential of P≥5% caused a significant increase in investment and initial capital in the government system with maximum implement project in a smart government.

Keywords: machine learning, financial income, statistical potential, govpilot

Procedia PDF Downloads 85
4161 Simulation of Government Management Model to Increase Financial Productivity System Using Govpilot

Authors: Arezou Javadi

Abstract:

The use of algorithmic models dependent on software calculations and simulation of new government management assays with the help of specialized software had increased the productivity and efficiency of the government management system recently. This has caused the management approach to change from the old bitch & fix model, which has low efficiency and less usefulness, to the capable management model with higher efficiency called the partnership with resident model. By using Govpilot TM software, the relationship between people in a system and the government was examined. The method of two tailed interaction was the outsourcing of a goal in a system, which is formed in the order of goals, qualified executive people, optimal executive model, and finally, summarizing additional activities at the different statistical levels. The results showed that the participation of people in a financial implementation system with a statistical potential of P≥5% caused a significant increase in investment and initial capital in the government system with maximum implement project in a smart government.

Keywords: machine learning, financial income, statistical potential, govpilot

Procedia PDF Downloads 67
4160 Accountants and Anti-Money Laundering Compliance in the Real Estate Sector

Authors: Mark E. Lokanan, Liz Lee

Abstract:

This paper aims to examine the role of accountants as gatekeepers in anti-money laundering compliance in real estate transactions. The paper seeks to answer questions on ways in which accountants are involved in real estate transactions and mandatory compliance with regulatory authorities in Canada. The data for the study came from semi-structured interviews with accountants, lawyers, and government officials. Preliminary results reveal that there is a conflict between accountants’ obligation to disclose and loyalty to their clients. Accountants often do not see why they are obligated to disclose their clients' information to government agencies. The importance of the client in terms of the amount of revenue contributed to the accounting firm also plays a significant role in accountants' reporting decision-making process. Although the involvement of accountants in real estate purchase and sale transactions is limited to lawyers or notaries, they are often involved in designing financing schemes, which may involve money laundering activities. The paper is of wider public policy interests to both accountants and regulators. It is hard not to see Chartered Professional Accountant (CPA) Canada and government regulators using the findings to better understand the decision-making processes of accountants in their reporting practices to regulatory authorities.

Keywords: money laundering, real estate, disclosure, legislation, compliance

Procedia PDF Downloads 226
4159 System for Monitoring Marine Turtles Using Unstructured Supplementary Service Data

Authors: Luís Pina

Abstract:

The conservation of marine biodiversity keeps ecosystems in balance and ensures the sustainable use of resources. In this context, technological resources have been used for monitoring marine species to allow biologists to obtain data in real-time. There are different mobile applications developed for data collection for monitoring purposes, but these systems are designed to be utilized only on third-generation (3G) phones or smartphones with Internet access and in rural parts of the developing countries, Internet services and smartphones are scarce. Thus, the objective of this work is to develop a system to monitor marine turtles using Unstructured Supplementary Service Data (USSD), which users can access through basic mobile phones. The system aims to improve the data collection mechanism and enhance the effectiveness of current systems in monitoring sea turtles using any type of mobile device without Internet access. The system will be able to report information related to the biological activities of marine turtles. Also, it will be used as a platform to assist marine conservation entities to receive reports of illegal sales of sea turtles. The system can also be utilized as an educational tool for communities, providing knowledge and allowing the inclusion of communities in the process of monitoring marine turtles. Therefore, this work may contribute with information to decision-making and implementation of contingency plans for marine conservation programs.

Keywords: GSM, marine biology, marine turtles, unstructured supplementary service data (USSD)

Procedia PDF Downloads 202
4158 Heritage and Tourism in the Era of Big Data: Analysis of Chinese Cultural Tourism in Catalonia

Authors: Xinge Liao, Francesc Xavier Roige Ventura, Dolores Sanchez Aguilera

Abstract:

With the development of the Internet, the study of tourism behavior has rapidly expanded from the traditional physical market to the online market. Data on the Internet is characterized by dynamic changes, and new data appear all the time. In recent years the generation of a large volume of data was characterized, such as forums, blogs, and other sources, which have expanded over time and space, together they constitute large-scale Internet data, known as Big Data. This data of technological origin that derives from the use of devices and the activity of multiple users is becoming a source of great importance for the study of geography and the behavior of tourists. The study will focus on cultural heritage tourist practices in the context of Big Data. The research will focus on exploring the characteristics and behavior of Chinese tourists in relation to the cultural heritage of Catalonia. Geographical information, target image, perceptions in user-generated content will be studied through data analysis from Weibo -the largest social networks of blogs in China. Through the analysis of the behavior of heritage tourists in the Big Data environment, this study will understand the practices (activities, motivations, perceptions) of cultural tourists and then understand the needs and preferences of tourists in order to better guide the sustainable development of tourism in heritage sites.

Keywords: Barcelona, Big Data, Catalonia, cultural heritage, Chinese tourism market, tourists’ behavior

Procedia PDF Downloads 136
4157 The Perspectives of Adult Learners Towards Online Learning

Authors: Jacqueline Żammit

Abstract:

Online learning has become more popular as a substitute for traditional classroom instruction because of the COVID-19 epidemic. The study aimed to investigate how adult Maltese language learners evaluated the benefits and drawbacks of online instruction. 35 adult participants provided data through semi-structured interviews with open-ended questions. NVivo software was used to analyze the interview data using the thematic analysis method in order to find themes and group the data based on common responses. The advantages of online learning that the participants mentioned included accessing subject content even without live learning sessions, balancing learning with household duties, and lessening vulnerability to problems like fatigue, time-wasting traffic, school preparation, and parking space constraints. Conversely, inadequate Internet access, inadequate IT expertise, a shortage of personal computers, and domestic distractions adversely affected virtual learning. Lack of an Internet connection, IT expertise, a personal computer, or a phone with Internet access caused inequality in access to online learning sessions. Participants thought online learning was a way to resume academic activity, albeit with drawbacks. In order to address the challenges posed by online learning, several solutions are proposed in the research's conclusion.

Keywords: adult learners, online education, e-learning, challenges of online learning, benefits ofonline learning

Procedia PDF Downloads 60
4156 Cybersecurity Challenges in the Era of Open Banking

Authors: Krish Batra

Abstract:

The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.

Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices

Procedia PDF Downloads 54
4155 Reclaiming the House with Use of Web 2.0 Tools: Democratic Candidates and Social Media during Midterm Elections in 2018

Authors: Norbert Tomaszewski

Abstract:

Modern politicians tend to resign from the traditional media as Web 2.0 tools allow them to interact with a much bigger audience while spending less money on their campaign. Current studies on this subject prove that in order to win the elections, the candidate needs to show his personal side during the campaign to appeal to the voter as an average citizen. Because of that, the internet user may engage in the politician's campaign by spreading his message along with his followers. The aim of the study is to determine how did the Democratic candidates use the Web 2.0 tools during the 2018 midterm elections campaign and whether they managed to succeed. Taking into consideration the fact that the United States as a country, has always set important milestones for the political marketing as a field of science, the result of the research can set some examples on how to manage the modern internet campaign in less developed countries.

Keywords: political campaign, midterm elections, social media, Web 2.0

Procedia PDF Downloads 148
4154 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study

Authors: Rabih Joseph Nabhan

Abstract:

This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.

Keywords: analysis, awareness, dyslexic, software

Procedia PDF Downloads 220
4153 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 442
4152 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks

Authors: Jameelah O. Yaqub

Abstract:

The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.

Keywords: banks, e-products, innovation, Nigeria

Procedia PDF Downloads 333
4151 Financial Intermediation: A Transaction Two-Sided Market Model Approach

Authors: Carlo Gozzelino

Abstract:

Since the early 2000s, the phenomenon of the two-sided markets has been of growing interest in academic literature as such kind of markets differs by having cross-side network effects and same-side network effects characterizing the transactions, which make the analysis different when compared to traditional seller-buyer concept. Due to such externalities, pricing strategies can be based on subsidizing the participation of one side (i.e. considered key for the platform to attract the other side) while recovering the loss on the other side. In recent years, several players of the Italian financial intermediation industry moved from an integrated landscape (i.e. selling their own products) to an open one (i.e. intermediating third party products). According to academic literature such behavior can be interpreted as a merchant move towards a platform, operating in a two-sided market environment. While several application of two-sided market framework are available in academic literature, purpose of this paper is to use a two-sided market concept to suggest a new framework applied to financial intermediation. To this extent, a model is developed to show how competitors behave when vertically integrated and how the peculiarities of a two-sided market act as an incentive to disintegrate. Additionally, we show that when all players act as a platform, the dynamics of a two-sided markets can allow at least a Nash equilibrium to exist, in which platform of different sizes enjoy positive profit. Finally, empirical evidences from Italian market are given to sustain – and to challenge – this interpretation.

Keywords: financial intermediation, network externalities, two-sided markets, vertical differentiation

Procedia PDF Downloads 156
4150 Automated Manual Handling Risk Assessments: Practitioner Experienced Determinants of Automated Risk Analysis and Reporting Being a Benefit or Distraction

Authors: S. Cowley, M. Lawrance, D. Bick, R. McCord

Abstract:

Technology that automates manual handling (musculoskeletal disorder or MSD) risk assessments is increasingly available to ergonomists, engineers, generalist health and safety practitioners alike. The risk assessment process is generally based on the use of wearable motion sensors that capture information about worker movements for real-time or for posthoc analysis. Traditionally, MSD risk assessment is undertaken with the assistance of a checklist such as that from the SafeWork Australia code of practice, the expert assessor observing the task and ideally engaging with the worker in a discussion about the detail. Automation enables the non-expert to complete assessments and does not always require the assessor to be there. This clearly has cost and time benefits for the practitioner but is it an improvement on the assessment by the human. Human risk assessments draw on the knowledge and expertise of the assessor but, like all risk assessments, are highly subjective. The complexity of the checklists and models used in the process can be off-putting and sometimes will lead to the assessment becoming the focus and the end rather than a means to an end; the focus on risk control is lost. Automated risk assessment handles the complexity of the assessment for the assessor and delivers a simple risk score that enables decision-making regarding risk control. Being machine-based, they are objective and will deliver the same each time they assess an identical task. However, the WHS professional needs to know that this emergent technology asks the right questions and delivers the right answers. Whether it improves the risk assessment process and results or simply distances the professional from the task and the worker. They need clarity as to whether automation of manual task risk analysis and reporting leads to risk control or to a focus on the worker. Critically, they need evidence as to whether automation in this area of hazard management leads to better risk control or just a bigger collection of assessments. Practitioner experienced determinants of this automated manual task risk analysis and reporting being a benefit or distraction will address an understanding of emergent risk assessment technology, its use and things to consider when making decisions about adopting and applying these technologies.

Keywords: automated, manual-handling, risk-assessment, machine-based

Procedia PDF Downloads 117
4149 The Environmental Impact of Wireless Technologies in Nigeria: An Overview of the IoT and 5G Network

Authors: Powei Happiness Kerry

Abstract:

Introducing wireless technologies in Nigeria have improved the quality of lives of Nigerians, however, not everyone sees it in that light. The paper on the environmental impact of wireless technologies in Nigeria summarizes the scholarly views on the impact of wireless technologies on the environment, beaming its searchlight on 5G and internet of things in Nigeria while also exploring the theory of the Technology Acceptance Model (TAM). The study used a qualitative research method to gather important data from relevant sources and contextually draws inference from the derived data. The study concludes that the Federal Government of Nigeria, before agreeing to any latest development in the world of wireless technologies, should weigh the implications and deliberate extensively with all stalk holders putting into consideration the confirmation it will receive from the National Assembly.  

Keywords: Internet of Things, radiofrequency, electromagnetic radiation, information and communications technology, ICT, 5G

Procedia PDF Downloads 129
4148 Forensic Investigation: The Impact of Biometric-Based Solution in Combatting Mobile Fraud

Authors: Mokopane Charles Marakalala

Abstract:

Research shows that mobile fraud has grown exponentially in South Africa during the lockdown caused by the COVID-19 pandemic. According to the South African Banking Risk Information Centre (SABRIC), fraudulent online banking and transactions resulted in a sharp increase in cybercrime since the beginning of the lockdown, resulting in a huge loss to the banking industry in South Africa. While the Financial Intelligence Centre Act, 38 of 2001, regulate financial transactions, it is evident that criminals are making use of technology to their advantage. Money-laundering ranks among the major crimes, not only in South Africa but worldwide. This paper focuses on the impact of biometric-based solutions in combatting mobile fraud at the South African Risk Information. SABRIC had the challenges of a successful mobile fraud; cybercriminals could hijack a mobile device and use it to gain access to sensitive personal data and accounts. Cybercriminals are constantly looting the depths of cyberspace in search of victims to attack. Millions of people worldwide use online banking to do their regular bank-related transactions quickly and conveniently. This was supported by the SABRIC, who regularly highlighted incidents of mobile fraud, corruption, and maladministration in SABRIC, resulting in a lack of secure their banking online; they are vulnerable to falling prey to fraud scams such as mobile fraud. Criminals have made use of digital platforms since the development of technology. In 2017, 13 438 instances involving banking apps, internet banking, and mobile banking caused the sector to suffer gross losses of more than R250,000,000. The final three parties are forced to point fingers at one another while the fraudster makes off with the money. A non-probability sampling (purposive sampling) was used in selecting these participants. These included telephone calls and virtual interviews. The results indicate that there is a relationship between remote online banking and the increase in money-laundering as the system allows transactions to take place with limited verification processes. This paper highlights the significance of considering the development of prevention mechanisms, capacity development, and strategies for both financial institutions as well as law enforcement agencies in South Africa to reduce crime such as money-laundering. The researcher recommends that strategies to increase awareness for bank staff must be harnessed through the provision of requisite training and to be provided adequate training.

Keywords: biometric-based solution, investigation, cybercrime, forensic investigation, fraud, combatting

Procedia PDF Downloads 95
4147 The Analysis of the Blockchain Technology and Challenges Hampering Its Adoption

Authors: Sthembile Mthethwa

Abstract:

With the rise in the usage of internet in the past decades, this presented an opportunity for users to transact with each other over the use of internet. Cryptocurrencies have been introduced, which allows users to transact with each other without the involvement of a third party i.e. the bank. These systems are widely known as cryptocurrencies or digital currencies and the first system to be introduced was Bitcoin which has been receiving a lot of attention. Bitcoin introduced a new technology known as the blockchain technology. In the past years, blockchain has been getting attention; whereby new applications are introduced that utilize blockchain. Yet, most people are still hesitant about the adoption of blockchain and the adoption of cryptocurrencies at large. Some people still do not understand the technology. Thus, it leads to the slow adoption of this technology. In this paper, a review of the blockchain is provided, whereby the different types of blockchain are discussed in details. Details of the things that contribute to the hindrance of the process of adoption are discussed.

Keywords: bitcoin, blockchain, cryptocurrency, payment system

Procedia PDF Downloads 284
4146 The Impact of HRM Practices and Brand Performance on Financial Institution Performance: An Empirical Study

Authors: M. Khasro Miah, Chowdhury Hossan Golam, Muhammed Siddique Hossain

Abstract:

Recently, financial institution brand image is turning out to be pretty weak due to the presence of strong local competitors and this in term is affecting their firm performance also. In this study, four major HR practices, namely employee commitment, empowerment, loyalty, and engagement are considered in order to measure its effects on the brand and financial performance of banking organization. This study finds that the banking institutions of Bangladesh are more customer oriented rather than internal employee oriented, which makes it quite obvious that the internal HR practices will have little or no effect on the banks brand performance. Employee Commitment has emerged out to be the most important predictor, followed by employee loyalty and empowerment. The employees are well-empowered, engaged, and shows loyalty towards the organization, but their activities are not well linked with the brand. Firms should concentrate to create a congenial working atmosphere and employees should feel like a part of the organization.

Keywords: HR in bank, employee commitment, empowerment, finance, employee commitment, loyalty and engagement

Procedia PDF Downloads 477
4145 Urgency of Islamic Economic System Implementation in Indonesian Banking

Authors: Muhammad Rifqi Hafizhudin Arif, Mukhamad Zulfal Faradis, Ahmad Hidayatullah

Abstract:

Indonesia is the country that uses conventional financial system adopted from European countries as a form of finance in the national banking system. Many of the derivative products of conventional banks either investment, buy and sell, saving and loan, which is not in accordance with Islamic Ethics. While the majority population in Indonesia are belief in Islam, which Islam has had financial management guide is written in the Quran, the Hadith, as well as the opinions of experts who strongly prohibits the use of interest in each transaction activities. Many different expert opinions on the application of the Islamic financial system in Indonesia. However, as the majority of the population of Indonesia, Islamic community have not been able to get the opportunities to choose the Islamic financial system that has mutual benefit between consumers and banks, particularly fairness in transactions, ethical investment, uphold the values of solidarity and brotherhood in every transaction activities, and avoid speculation. In this paper, we will discuss the reasons for the importance of providing an option for Islamic community as the majority of the population of Indonesia to use the banking system which adopted the Islamic ethical values that have been much discussed by other researchers in various countries. The existence of this research is expected to Government, academia and the general public aware of the urgency of Islamic economic system implementation in Indonesian banking as the solution and justice especially for the Islamic community to use the values which they held.

Keywords: Islamic economic system, conventional system, Islamic value, banking

Procedia PDF Downloads 360
4144 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 285
4143 Distributed Perceptually Important Point Identification for Time Series Data Mining

Authors: Tak-Chung Fu, Ying-Kit Hung, Fu-Lai Chung

Abstract:

In the field of time series data mining, the concept of the Perceptually Important Point (PIP) identification process is first introduced in 2001. This process originally works for financial time series pattern matching and it is then found suitable for time series dimensionality reduction and representation. Its strength is on preserving the overall shape of the time series by identifying the salient points in it. With the rise of Big Data, time series data contributes a major proportion, especially on the data which generates by sensors in the Internet of Things (IoT) environment. According to the nature of PIP identification and the successful cases, it is worth to further explore the opportunity to apply PIP in time series ‘Big Data’. However, the performance of PIP identification is always considered as the limitation when dealing with ‘Big’ time series data. In this paper, two distributed versions of PIP identification based on the Specialized Binary (SB) Tree are proposed. The proposed approaches solve the bottleneck when running the PIP identification process in a standalone computer. Improvement in term of speed is obtained by the distributed versions.

Keywords: distributed computing, performance analysis, Perceptually Important Point identification, time series data mining

Procedia PDF Downloads 429
4142 Small Micro and Medium Enterprises Perception-Based Framework to Access Financial Support

Authors: Melvin Mothoa

Abstract:

Small Micro and Medium Enterprises are very significant for the development of their market economies. They are the main creators of the new working places, and they present a vital core of the market economy in countries across the globe. Access to finance is identified as crucial for small, micro, and medium-sized enterprises for their growth and innovation. This paper is conceived to propose a perception-based SMME framework to aid in access to financial support. Furthermore, the study will address issues that impede SMMEs in South Africa from obtaining finance from financial institutions. The framework will be tested against data collected from 200 Small Micro & Medium Enterprises in the Gauteng province of South Africa. The study adopts a quantitative method, and the delivery of self-administered questionnaires to SMMEs will be the primary data collection tool. Structural equation modeling will be used to further analyse the data collected.

Keywords: finance, small business, growth, development

Procedia PDF Downloads 108
4141 A Content Analysis of Corporate Sustainability Performance and Business Excellence Models

Authors: Kari M. Solomon

Abstract:

Companies with a culture accepting of change management and performance excellence are better suited to determine their sustainability performance and impacts. A mature corporate culture supportive of performance excellence is better positioned to integrate sustainability management tools into their standard business strategy. Companies use various sustainability management tools and reporting standards to communicate levels of sustainability performance to their stakeholders, more often focusing on shareholders and investors. A research gap remains in understanding how companies adapt business excellence models to define corporate sustainability performance. A content analysis of medium-sized enterprises using corporate sustainability reports and business excellence models reveals the challenges and opportunities of reporting sustainability performance in the context of organizational excellence. The outcomes of this content analysis contribute knowledge on the resources needed for companies to build sustainability performance management systems integral to existing management systems. The findings of this research inform academic research areas of corporate sustainability performance, the business community contributing to sustainable development initiatives, and integrating sustainable development issues into business excellence models. There are potential research links between sustainability performance management and the alignment of the United Nations Sustainable Development Goals (UN SDGs) when organizations promote a culture of performance or business excellence.

Keywords: business excellence, corporate sustainability, performance excellence, sustainability performance

Procedia PDF Downloads 173
4140 Specialised Financial Institutions and its Role in the Promotion of Small and Medium Enterprises in Kerala, India

Authors: K. V. Venugopalan

Abstract:

Micro, Small and Medium Enterprises (MSMEs) have been accepted as the engine of economic growth and for promoting equitable development. The major advantage of the sector is its employment potential at low capital cost. The labour intensity of the MSME sector is much higher than that of the large enterprises. The MSMEs constitute over 90% of total enterprises in most of the economies and are credited with generating the highest rates of employment growth and account for a major share of industrial production and exports. Kerala is a small state in India with the limited land area with high potential in educated human resources need micro, small and medium enterprises for development. Kerala has the highest Physical Quality of Life Index (PQLI) in India and the highest Human Development Index (HDI) at par with the developed countries SME play an important role in alleviating poverty and contribute significantly towards the growth of developing economies. Financial institutions can play a vital role for the promotion of micro, small and medium enterprises in Kerala. The study entitled “Financial Institutions and its role in the promotion of Small and Medium Enterprises in Kerala “examine the progress of MSME in Kerala and India and also the role of financial institutions and the problems faced by entrepreneurs for getting advances with reference to ‘Kerala Financial Corporation’-an agency set up by the government for promoting small and medium enterprises in the state. This study is based on both secondary and primary data. Primary data for the study was collected from those entrepreneurs who availed advances from financial institutions. The secondary data include the investment made, goods and services provided, the employment generated and the number of units registered in MSME sector for the last 10 years in Kerala. The study concluded that financial institutions providing finance with simple procedures and charging smaller interest rates will increase the number of MSME's and also contribute gross state domestic product and reduce the unemployment problem and poverty in the economy.

Keywords: gross state domestic product, human development index, micro, small and medium enterprises

Procedia PDF Downloads 406
4139 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 534
4138 Caregiver Training Results in Accurate Reporting of Stool Frequency

Authors: Matthew Heidman, Susan Dallabrida, Analice Costa

Abstract:

Background:Accuracy of caregiver reported outcomes is essential for infant growth and tolerability study success. Crying/fussiness, stool consistencies, and other gastrointestinal characteristics are important parameters regarding tolerability, and inter-caregiver reporting can see a significant amount of subjectivity and vary greatly within a study, compromising data. This study sought to elucidate how caregiver reported questions related to stool frequency are answered before and after a short amount of training and how training impacts caregivers’ understanding, and how they would answer the question. Methods:A digital survey was issued for 90 daysin the US (n=121) and 30 days in Mexico (n=88), targeting respondents with children ≤4 years of age. Respondents were asked a question in two formats, first without a line of training text and second with a line of training text. The question set was as follows, “If your baby had stool in his/her diaper and you changed the diaper and 10 min later there was more stool in the diaper, how many stools would you report this as?” followed by the same question beginning with “If you were given the instruction that IF there are at least 5 minutes in between stools, then it counts as two (2) stools…”.Four response items were provided for both questions, 1) 2 stools, 2) 1stool, 3) it depends on how much stool was in the first versus the second diaper, 4) There is not enough information to be able to answer the question. Response frequencies between questions were compared. Results: Responses to the question without training saw some variability in the US, with 69% selecting “2 stools”,11% selecting “1 stool”, 14% selecting “it depends on how much stool was in the first versus the second diaper”, and 7% selecting “There is not enough information to be able to answer the question” and in Mexico respondents selected 9%, 78%, 13%, and 0% respectively. However, responses to the question after training saw more consolidation in the US, with 85% of respondents selecting“2 stools,” representing an increase in those selecting the correct answer. Additionally in Mexico, with 84% of respondents selecting “1 episode” representing an increase in the those selecting the correct response. Conclusions: Caregiver reported outcomes are critical for infant growth and tolerability studies, however, they can be highly subjective and see a high variability of responses without guidance. Training is critical to standardize all caregivers’ perspective regarding how to answer questions accurately in order to provide an accurate dataset.

Keywords: infant nutrition, clinical trial optimization, stool reporting, decentralized clinical trials

Procedia PDF Downloads 90
4137 The Trumping of Science: Exploratory Study into Discrepancy between Politician and Scientist Sources in American Covid-19 News Coverage

Authors: Wafa Unus

Abstract:

Science journalism has been vanishing from America’s national newspapers for decades. Reportage on scientific topics is limited to only a handful of newspapers and of those, few employ dedicated science journalists to cover stories that require this specialized expertise. News organizations' lack of readiness to convey complex scientific concepts to a mass populace becomes particularly problematic when events like the Covid-19 pandemic occur. The lack of coverage of Covid-19 prior to its onset in the United States, suggests something more troubling - that the deprioritization of reporting on hard science as an educational tool in favor of political frames of coverage, places dangerous blinders on the American public. This research looks at the disparity between voices of health and science experts in news articles and the voices of political figures, in order to better understand the approach of American newspapers in conveying expert opinion on Covid-19. A content analysis of 300 articles on Covid-19 by major newspapers in the United States between January 1st, 2020 and April 30th, 2020 illuminates this investigation. The Boston Globe, the New York Times, and the Los Angeles Times are included in the content analysis. Initial findings reveal a significant disparity in the number of articles that mention Anthony Fauci, the director of the National Institute Allergy and Infectious Disease, and the number that make reference to political figures. Covid-related articles in the New York Times that focused on health topics (as opposed to economic or social issues) contained the voices of 54 different politicians who were mentioned a total of 608 times. Only five members of the scientific community were mentioned a total of 24 times (out of 674 articles). In the Boston Globe, 36 different politicians were mentioned a total of 147 times, and only two members of the scientific community, one being Anthony Fauci, were mentioned a total of nine times (out of 423 articles). In the Los Angeles Times, 52 different politicians were mentioned a total of 600 times, and only six members of the scientific community were included and were mentioned a total of 82 times with Fauci being mentioned 48 times (out of 851 articles). Results provide a better understanding of the frames in which American journalists in Covid hotspots conveyed information of expert analysis on Covid-19 during one of the most pressing news events of the century. Ultimately, the objective of this study is to utilize the exploratory data to evaluate the nature, extent and impact of Covid-19 reporting in the context of trustworthiness and scientific expertise. Secondarily, this data will illuminate the degree to which Covid-19 reporting focused on politics over science.

Keywords: science reporting, science journalism, covid, misinformation, news

Procedia PDF Downloads 212
4136 Sleep Paralysis: Its Genesis and Qualitative Analysis of Case Histories

Authors: Nandita Chaube, S. S. Nathawat

Abstract:

Sleep paralysis is a state of sleep disturbance in which people experience hypnogogic or hypnopompic hallucinations marked by an inability to move their bodies or speak out while reporting the consciousness about their surroundings. Philosophical explanation of sleep paralysis has been quoted in the ancient texts in terms of incubus and succubus. However, pathologically, it has been linked to several disorders including narcolepsy, migraines, anxiety disorders, and obstructive sleep apnea but it can also occur in isolation. Some other significant factors may include perceived stress, spiritual and paranormal beliefs, etc. Hence, a qualitative analysis of five such cases reporting symptoms of sleep disturbances with the criterion of sleep paralysis has been reported here. The study considered various psychological factors like stressful life events, feelings of inadequacy, spirituality, and paranormal beliefs. Results disclosed that four of the five cases were inclined towards the paranormal beliefs and the entire sample indicated a noticeably augmented level of spirituality and feelings of inadequacy. Furthermore, three cases reported experiencing greater stress following life events. Among other factors, all the cases were characterized with sleeping in the supine position, sleeping alone, an experience of fear, a sense of pressure on their chest, a presence of someone in the room and increased level of feelings of inadequacy.

Keywords: genesis, inadequacy, paranormal, sleep-paralysis, spiritual, stress

Procedia PDF Downloads 242
4135 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 77