Search results for: Credit Card Fraud Detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3962

Search results for: Credit Card Fraud Detection

3902 A Comparative Study on Occupational Fraud and Prosecution

Authors: Michelle Odudu

Abstract:

Ghana and Nigeria are known for their high levels of Occupational Fraud in public offices. The governments of both countries have emphasised their commitment to reducing the losses caused to the state by pledging their allegiance to the counter-fraud agencies to help tackle Occupational Fraud. Yet it seems that the prosecution of such cases is ineffective as high-profile fraudsters can operate with immunity and their cases remain unprosecuted. This research project was based on in-depth examinations of 50 occupational fraud cases involving high-profile individuals in both countries. In doing so, it established the characteristics of those who were prosecuted; the extent to which prosecutions were effectively managed; the barriers to effective prosecutions; and the similarities or differences between the occurrences in both countries. The aim of the project is to examine the practice of and barriers to prosecution of large-scale occupational fraud of those in senior public positions in Ghana and Nigeria. The study drew on the experiences of stakeholders such as defence and prosecution barristers, academics, and fraud analysts via semi-structured interviews and questionnaires. 13 interviews were conducted in Ghana and in Nigeria, where respondents were recruited using a snowball approach. Questionnaires were physically distributed: 20 of the staff at EOCO and 10 to NGO staff in Ghana; 6 and 5 came back, respectively. The empirical data collected suggests that there is no lack of will on the agencies’ part to at least commence proceedings. However, various impediments hamper a successful completion of prosecution. Challenges were more evident in Nigeria, where agencies are less effective at retrieving stolen assets and changing social norms. This is further compounded by several cultural and political factors, which create limitations leaving many cases ‘still pending’.

Keywords: comparative, prosecution, punishment, international, whitecollar, fraud

Procedia PDF Downloads 104
3901 Socio-Economic Effects of Micro-Credit on Small-Scale Poultry Farmers’ Livelihood in Ado Odo-Ota Local Government Area of Ogun State, Nigeria

Authors: E. O. Fakoya, B. G. Abiona, W. O. Oyediran, A. M. Omoare

Abstract:

This study examined the socio-economic effects of micro-credit on small scale poultry farmers’ livelihood in Ado Odo-Ota Local Government area of Ogun State. Purposive sampling method was used to select eighty (80) small scale poultry farmers that benefited in micro credit. Interview guide was used to obtain information on the respondents’ socio-economic characteristic, sources of micro-credit and the effects of micro-credit on their livelihood. The results revealed that most of the respondents (77.50 %) were males while half (40.00%) of the respondents were between the ages of 31-40 years. A high proportion (72.50%) of the respondents had formal education. The major sources of micro credit to small scale poultry farmers were cooperative society (47.50%) and personal savings (20.00%). The findings also revealed that micro-credit had positive effect on the assets and livelihoods of small scale poultry farmers’ livelihood. Results of t-test analysis showed a significant difference between the effects before and after micro-credit on small-scale poultry farmers’ Livelihood at p < 0.05. The study recommends that formal lending institution should be given necessary support by government to enable poultry farmers have access to credit facilities in the study area.

Keywords: micro-credit, effects, livelihood, poultry farmers, socio-economic, small scale

Procedia PDF Downloads 413
3900 Modeling Activity Pattern Using XGBoost for Mining Smart Card Data

Authors: Eui-Jin Kim, Hasik Lee, Su-Jin Park, Dong-Kyu Kim

Abstract:

Smart-card data are expected to provide information on activity pattern as an alternative to conventional person trip surveys. The focus of this study is to propose a method for training the person trip surveys to supplement the smart-card data that does not contain the purpose of each trip. We selected only available features from smart card data such as spatiotemporal information on the trip and geographic information system (GIS) data near the stations to train the survey data. XGboost, which is state-of-the-art tree-based ensemble classifier, was used to train data from multiple sources. This classifier uses a more regularized model formalization to control the over-fitting and show very fast execution time with well-performance. The validation results showed that proposed method efficiently estimated the trip purpose. GIS data of station and duration of stay at the destination were significant features in modeling trip purpose.

Keywords: activity pattern, data fusion, smart-card, XGboost

Procedia PDF Downloads 220
3899 Development and Performance Analysis of Multifunctional City Smart Card System

Authors: Vedat Coskun, Fahri Soylemezgiller, Busra Ozdenizci, Kerem Ok

Abstract:

In recent years, several smart card solutions for transportation services of cities with different technical infrastructures and business models has emerged considerably, which triggers new business and technical opportunities. In order to create a unique system, we present a novel, promising system called Multifunctional City Smart Card System to be used in all cities that provides transportation and loyalty services based on the MasterCard M/Chip Advance standards. The proposed system provides a unique solution for transportation services of large cities over the world, aiming to answer all transportation needs of citizens. In this paper, development of the Multifunctional City Smart Card System and system requirements are briefly described. Moreover, performance analysis results of M/Chip Advance Compatible Validators which is the system's most important component are presented.

Keywords: smart card, m/chip advance standard, city transportation, performance analysis

Procedia PDF Downloads 455
3898 Determinants of Pastoral Women's Demand for Credit: Evidence from Northern Kenya

Authors: Anne Gesare Timu, Megan Sheahan, Andrew Gache Mude, Rupsha Banerjee

Abstract:

Women headed households are among the most vulnerable to negative climatic shocks and are often left poorer as a result. Credit provision has been recognized as one way of alleviating rural poverty and developing poor rural households’ resilience to shocks. Much has been documented about credit demand in small-holder agriculture settings in Kenya. However, little is known about demand for credit among pastoral women. This paper analyzes the determinants of demand for credit in the pastoral regions of Marsabit District of Northern Kenya. Using a five wave balanced panel data set of 820 households, a double hurdle model is employed to analyze if shocks, financial literacy and risk aversion affect credit demand among female and male headed households differently. The results show that borrowing goods on credit and monetary credit from informal market segments are the most common sources of credit in the study area. The impact of livestock loss and financial literacy on the decision to borrow and how much to borrow vary with gender. While the paper suggests that provision of credit is particularly valuable in the aftermath of a negative shock and more so for female-headed households, it also explores alternatives to the provision of credit where credit access is a constraint. It recommends further understanding of systems and institutions which could enhance access to credit, and particularly during times of stress, to enable households in the study area in particular and Northern Kenya in general to invest, engage in meaningful development and growth, and be resilient to persistent shocks.

Keywords: female headed households, pastoralism, rural financing, double hurdle model

Procedia PDF Downloads 250
3897 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 74
3896 Financial Fraud Prediction for Russian Non-Public Firms Using Relational Data

Authors: Natalia Feruleva

Abstract:

The goal of this paper is to develop the fraud risk assessment model basing on both relational and financial data and test the impact of the relationships between Russian non-public companies on the likelihood of financial fraud commitment. Relationships mean various linkages between companies such as parent-subsidiary relationship and person-related relationships. These linkages may provide additional opportunities for committing fraud. Person-related relationships appear when firms share a director, or the director owns another firm. The number of companies belongs to CEO and managed by CEO, the number of subsidiaries was calculated to measure the relationships. Moreover, the dummy variable describing the existence of parent company was also included in model. Control variables such as financial leverage and return on assets were also implemented because they describe the motivating factors of fraud. To check the hypotheses about the influence of the chosen parameters on the likelihood of financial fraud, information about person-related relationships between companies, existence of parent company and subsidiaries, profitability and the level of debt was collected. The resulting sample consists of 160 Russian non-public firms. The sample includes 80 fraudsters and 80 non-fraudsters operating in 2006-2017. The dependent variable is dichotomous, and it takes the value 1 if the firm is engaged in financial crime, otherwise 0. Employing probit model, it was revealed that the number of companies which belong to CEO of the firm or managed by CEO has significant impact on the likelihood of financial fraud. The results obtained indicate that the more companies are affiliated with the CEO, the higher the likelihood that the company will be involved in financial crime. The forecast accuracy of the model is about is 80%. Thus, the model basing on both relational and financial data gives high level of forecast accuracy.

Keywords: financial fraud, fraud prediction, non-public companies, regression analysis, relational data

Procedia PDF Downloads 101
3895 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.

Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19

Procedia PDF Downloads 46
3894 The Need for Selective Credit Policy Implementation: Case of Croatia

Authors: Drago Jakovcevic, Mihovil Andelinovic, Igor Husak

Abstract:

The aim of this paper is to explore the economic circumstances in which the selective credit policy, the least used instrument of four types of instruments on disposal to central banks, should be used. The most significant example includes the use of selective credit policies in response to the emergence of the global financial crisis by the FED. Specifics of the potential use of selective credit policies as the instigator of economic growth in Croatia, a small open economy, are determined by high euroization of financial system, fixed exchange rate and long-term trend growth of external debt that is related to the need to maintain high levels of foreign reserves. In such conditions, the classic forms of selective credit policies are unsuitable for the introduction. Several alternative approaches to implement selective credit policies are examined in this paper. Also, thorough analysis of distribution of selective monetary policy loans among economic sectors in Croatia is conducted in order to minimize the risk of investing funds and maximize the return, in order to influence the GDP growth.

Keywords: global crisis, selective credit policy, small open economy, Croatia

Procedia PDF Downloads 416
3893 Accessibility of Institutional Credit and Its Impact on Agricultural Output: A Case Study

Authors: Showkat Ahmad Bhat, M. S. Bhatt

Abstract:

The study evaluates the ex-post impact of institutional credit on agricultural output. It first examines the key factors that influence the accessibility of institutional credit by farm households. For quantitative analysis both program participant and non-participant respondents were drawn and cross-sectional survey data were collected from 412 households in Pulwama District of Jammu & Kashmir (India). Propensity Score Matching Method was employed to analyze the impact of the institutional credit on agricultural output. Results show that institutional credit has a positive and significant impact on the agricultural output measured in terms of farm income and crop productivity. To estimate the accessibility of credit, an examination of both demand side and supply side factors were carried out. The demand for credit was measured with respect to respondents who applied for credit. Supply side credit allocation measured in terms of the proportion of ‘credit amount’ farmers obtained. Logit and Two-limit Tobit Regression Models were used to investigate the determinants that influence the accessibility of formal credit for Demand for and supply of credit respectively. The estimated results suggested that the demand for credit is positively and significantly affected by the factors such as: age of the household head, formal education, membership, cash crop grown, farm size and saving account. All the variables were found significantly increasing the household’s likelihood to demand for and supply of credit from banks. However, the impact of these factors varies considerably across the credit markets. Factors which were found negatively and significantly influencing the accessibility of credit were: ‘square of the age’, household assets and rate of interest. The credit constraints analysis suggested that square of the age; household assets and rate of interest were the three most important factors that increased the probability of being constrained. The study finally discusses these results in detail and draws some recommendations.

Keywords: institutional credit, agriculture, propensity score matching logit model, Tobit model

Procedia PDF Downloads 286
3892 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 47
3891 Relationship between Growth of Non-Performing Assets and Credit Risk Management Practices in Indian Banks

Authors: Sirus Sharifi, Arunima Haldar, S. V. D. Nageswara Rao

Abstract:

The study attempts to analyze the impact of credit risk management practices of Indian scheduled commercial banks on their non-performing assets (NPAs). The data on credit risk practices was collected by administering a questionnaire to risk managers/executives at different banks. The data on NPAs (from 2012 to 2016) is sourced from Prowess, a database compiled by the Centre for Monitoring Indian Economy (CMIE). The model was estimated using cross-sectional regression method. As expected, the findings suggest that there is a negative relationship between credit risk management and NPA growth in Indian banks. The study has implications for Indian banks given the high level of losses, and the implementation of Basel III norms by the central bank, i.e. Reserve Bank of India (RBI). Evidence on credit risk management in Indian banks, and their relationship with non-performing assets held by them.

Keywords: credit risk, identification, Indian Banks, NPAs, ownership

Procedia PDF Downloads 361
3890 A General Framework for Measuring the Internal Fraud Risk of an Enterprise Resource Planning System

Authors: Imran Dayan, Ashiqul Khan

Abstract:

Internal corporate fraud, which is fraud carried out by internal stakeholders of a company, affects the well-being of the organisation just like its external counterpart. Even if such an act is carried out for the short-term benefit of a corporation, the act is ultimately harmful to the entity in the long run. Internal fraud is often carried out by relying upon aberrations from usual business processes. Business processes are the lifeblood of a company in modern managerial context. Such processes are developed and fine-tuned over time as a corporation grows through its life stages. Modern corporations have embraced technological innovations into their business processes, and Enterprise Resource Planning (ERP) systems being at the heart of such business processes is a testimony to that. Since ERP systems record a huge amount of data in their event logs, the logs are a treasure trove for anyone trying to detect any sort of fraudulent activities hidden within the day-to-day business operations and processes. This research utilises the ERP systems in place within corporations to assess the likelihood of prospective internal fraud through developing a framework for measuring the risks of fraud through Process Mining techniques and hence finds risky designs and loose ends within these business processes. This framework helps not only in identifying existing cases of fraud in the records of the event log, but also signals the overall riskiness of certain business processes, and hence draws attention for carrying out a redesign of such processes to reduce the chance of future internal fraud while improving internal control within the organisation. The research adds value by applying the concepts of Process Mining into the analysis of data from modern day applications of business process records, which is the ERP event logs, and develops a framework that should be useful to internal stakeholders for strengthening internal control as well as provide external auditors with a tool of use in case of suspicion. The research proves its usefulness through a few case studies conducted with respect to big corporations with complex business processes and an ERP in place.

Keywords: enterprise resource planning, fraud risk framework, internal corporate fraud, process mining

Procedia PDF Downloads 311
3889 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 289
3888 First Digit Lucas, Fibonacci and Benford Number in Financial Statement

Authors: Teguh Sugiarto, Amir Mohamadian Amiri

Abstract:

Background: This study aims to explore if there is fraud in the company's financial report distribution using the number first digit Lucas, Fibonacci and Benford. Research methods: In this study, the author uses a number model contained in the first digit of the model Lucas, Fibonacci and Benford, to make a distinction between implementation by using the scale above and below 5%, the rate of occurrence of a difference against the digit number contained on Lucas, Fibonacci and Benford. If there is a significant difference above and below 5%, then the process of follow-up and detection of occurrence of fraud against the financial statements can be made. Findings: From research that has been done can be concluded that the number of frequency levels contained in the financial statements of PT Bank BRI Tbk in a year in the same conscientious results for model Lucas, Fibonacci and Benford.

Keywords: Lucas, Fibonacci, Benford, first digit

Procedia PDF Downloads 249
3887 Credit Risk Assessment Using Rule Based Classifiers: A Comparative Study

Authors: Salima Smiti, Ines Gasmi, Makram Soui

Abstract:

Credit risk is the most important issue for financial institutions. Its assessment becomes an important task used to predict defaulter customers and classify customers as good or bad payers. To this objective, numerous techniques have been applied for credit risk assessment. However, to our knowledge, several evaluation techniques are black-box models such as neural networks, SVM, etc. They generate applicants’ classes without any explanation. In this paper, we propose to assess credit risk using rules classification method. Our output is a set of rules which describe and explain the decision. To this end, we will compare seven classification algorithms (JRip, Decision Table, OneR, ZeroR, Fuzzy Rule, PART and Genetic programming (GP)) where the goal is to find the best rules satisfying many criteria: accuracy, sensitivity, and specificity. The obtained results confirm the efficiency of the GP algorithm for German and Australian datasets compared to other rule-based techniques to predict the credit risk.

Keywords: credit risk assessment, classification algorithms, data mining, rule extraction

Procedia PDF Downloads 154
3886 Developing a Smart Card Using Internet of Things-Uni-C

Authors: Enji E. Alzamzami, Kholod A. Almwallad, Rahaf J. Alwafi, Roaa H. Alansari, Shatha S. Alshehri, Aeshah A. Alsiyami

Abstract:

This paper demonstrates a system that helps solve the congestion problem at the entrance gates and limits the spread of viruses among people in crowded environments, such as COVID-19, using the IoT (Internet of Things). This system may assist in organizing the campus entry process efficiently by developing a smart card application supported by NFC (Near Field Communication) technology through which users' information could be sent to a reader to share it with the server and allow the server to perform its tasks and send a confirmation response for the request either by acceptance or rejection.

Keywords: COVID-19, IoT, NFC technology, smart card

Procedia PDF Downloads 113
3885 Modelling the Dynamics of Corporate Bonds Spreads with Asymmetric GARCH Models

Authors: Sélima Baccar, Ephraim Clark

Abstract:

This paper can be considered as a new perspective to analyse credit spreads. A comprehensive empirical analysis of conditional variance of credit spreads indices is performed using various GARCH models. Based on a comparison between traditional and asymmetric GARCH models with alternative functional forms of the conditional density, we intend to identify what macroeconomic and financial factors have driven daily changes in the US Dollar credit spreads in the period from January 2011 through January 2013. The results provide a strong interdependence between credit spreads and the explanatory factors related to the conditions of interest rates, the state of the stock market, the bond market liquidity and the exchange risk. The empirical findings support the use of asymmetric GARCH models. The AGARCH and GJR models outperform the traditional GARCH in credit spreads modelling. We show, also, that the leptokurtic Student-t assumption is better than the Gaussian distribution and improves the quality of the estimates, whatever the rating or maturity.

Keywords: corporate bonds, default risk, credit spreads, asymmetric garch models, student-t distribution

Procedia PDF Downloads 452
3884 The Role of the Internal Audit Unit in Detecting and Preventing Fraud at Public Universities in West Java, Indonesia

Authors: Fury Khristianty Fitriyah

Abstract:

This study aims to identify the extent of the role of the Satuan Pengawas Intern (Internal Audit Unit) in detecting and preventing fraud in public universities in West Java under the Ministry of Research, Technology and Higher Education. The research method applied was a qualitative case study approach, while the unit of analysis for this study is the Internal Audit Unit at each public university. Results of this study indicate that the Internal Audit Unit is able to detect and prevent fraud within a public university environment by means of red flags to mark accounting anomalies. These stem from inaccurate budget planning that prompts inappropriate use of funds, exacerbated by late disbursements of funds, which potentially lead to fictitious transactions, and discrepancies in recording state-owned assets into a state property management system (SIMAK BMN), which, if not conducted properly, potentially causes loss to the state.

Keywords: governance, internal control, fraud, public university

Procedia PDF Downloads 256
3883 Machine Learning Facing Behavioral Noise Problem in an Imbalanced Data Using One Side Behavioral Noise Reduction: Application to a Fraud Detection

Authors: Salma El Hajjami, Jamal Malki, Alain Bouju, Mohammed Berrada

Abstract:

With the expansion of machine learning and data mining in the context of Big Data analytics, the common problem that affects data is class imbalance. It refers to an imbalanced distribution of instances belonging to each class. This problem is present in many real world applications such as fraud detection, network intrusion detection, medical diagnostics, etc. In these cases, data instances labeled negatively are significantly more numerous than the instances labeled positively. When this difference is too large, the learning system may face difficulty when tackling this problem, since it is initially designed to work in relatively balanced class distribution scenarios. Another important problem, which usually accompanies these imbalanced data, is the overlapping instances between the two classes. It is commonly referred to as noise or overlapping data. In this article, we propose an approach called: One Side Behavioral Noise Reduction (OSBNR). This approach presents a way to deal with the problem of class imbalance in the presence of a high noise level. OSBNR is based on two steps. Firstly, a cluster analysis is applied to groups similar instances from the minority class into several behavior clusters. Secondly, we select and eliminate the instances of the majority class, considered as behavioral noise, which overlap with behavior clusters of the minority class. The results of experiments carried out on a representative public dataset confirm that the proposed approach is efficient for the treatment of class imbalances in the presence of noise.

Keywords: machine learning, imbalanced data, data mining, big data

Procedia PDF Downloads 109
3882 Smart Card Technology Adaption in a Hospital Setting

Authors: H. K. V. Narayan

Abstract:

This study was conducted at Tata Memorial Hospital (TMH), Mumbai, India. The study was to evaluate the impact of adapting Smart Card (SC) for clinical and business transactions in order to reduce Lead times and to enforce business rules of the hospital. The objective for implementing the Smart Card was to improve the patient perception of quality in terms of structures process and outcomes and also to improve the productivity of the Institution. The Smart Card was implemented in phases from 2011 and integrated with the Hospital Information System (HIS/EMR). The implementation was a learning curve for all the stake holders as software obviated the need to use hardcopies of transactions. The acceptability to the stake holders was challenge in change management. The study assessed the impact 3 years into the implementation and the observed trends have suggested that it has decreased the lead times for services and increased the no of transactions and thereby the productivity. Patients who used to complain of multiple queues and cumbersome transactions now compliment the administration for effective use of Information and Communication Technology.

Keywords: smart card, high availability of health care information, reduction in potential medical errors due to elimination of transcription errors, reduction in no of queues, increased transactions, augmentation of revenue

Procedia PDF Downloads 262
3881 IEP Curriculum to Include For-Credit University English Classes

Authors: Cheyne Kirkpatrick

Abstract:

In an attempt to make the university intensive English program more worthwhile for students, many English language programs are redesigning curriculum to offer for-credit English for Academic Purposes classes, sometimes marketed as “bridge” courses. These programs are designed to be accredited to national language standards, provide communicative language learning, and give students the opportunity to simultaneously earn university language credit while becoming proficient in academic English. This presentation will discuss the curriculum design of one such program in the United States at a large private university that created its own for-credit “bridge” program. The planning, development, piloting, teaching, and challenges of designing this type of curriculum will be presented along with the aspects of accreditation, communicative language learning, and integration within various university programs. Attendees will learn about how such programs are created and what types of objectives and outcomes are included in American EAP classes.

Keywords: IEP, AEP, Curriculum, CEFR, University Credit, Bridge

Procedia PDF Downloads 463
3880 The Effect of Environmental, Social, and Governance (ESG) Disclosure on Firms’ Credit Rating and Capital Structure

Authors: Heba Abdelmotaal

Abstract:

This paper explores the impact of the extent of a company's environmental, social, and governance (ESG) disclosure on credit rating and capital structure. The analysis is based on a sample of 202 firms from the 350 FTSE firms over the period of 2008-2013. ESG disclosure score is measured using Proprietary Bloomberg score based on the extent of a company's Environmental, Social, and Governance (ESG) disclosure. The credit rating is measured by The QuiScore, which is a measure of the likelihood that a company will become bankrupt in the twelve months following the date of calculation. The Capital Structure is measured by long term debt ratio. Two hypotheses are test using panel data regression. The results suggested that the higher degree of ESG disclosure leads to better credit rating. There is significant negative relationship between ESG disclosure and the long term debit percentage. The paper includes implications for the transparency which is resulting of the ESG disclosure could support the Monitoring Function. The monitoring role of disclosure is the increasing in the transparency of the credit rating agencies, also it could affect on managers’ actions. This study provides empirical evidence on the material of ESG disclosure on credit ratings changes and the firms’ capital decision making.

Keywords: capital structure, credit rating agencies, ESG disclosure, panel data regression

Procedia PDF Downloads 337
3879 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 273
3878 Non-Performing Assets and Credit Risk Performance: An Evidence of Commercial Banks in India

Authors: Sirus Sharifi, Arunima Haldar, S. V. D. Nageswara Rao

Abstract:

This research analyzes the effect of credit risk management practices of commercial banks in India and the relationship with their non-performing assets (NPAs). Required data on credit risk performance was collected through a survey questionnaire from top risk officers of 38 Indian banks. NPA data (period from 2012 to 2016) was collected from Prowess database compiled by the Centre for Monitoring Indian Economy (CMIE). The model was assessed utilizing cross sectional regression method. As expected, the results indicate a negative significant relationship between credit risk management in India banks and their NPA growth. The research has implications for banks given the high level of losses in India and other economies as well, and the implementation of Basel III standards by the central banks. This research would be an evidence on credit risk performance and its relationship with the level of non-performing assets (NPAs) in Indian banks.

Keywords: risk management, risk identification, banks, Non-Performing Assets (NPAs)

Procedia PDF Downloads 242
3877 Islamic Credit Risk Management in Murabahah Financing: The Study of Islamic Banking in Malaysia

Authors: Siti Nor Amira Bt. Mohamad, Mohamad Yazis B. Ali Basah, Muhammad Ridhwan B. Ab. Aziz, Khairil Faizal B. Khairi, Mazlynda Bt. Md. Yusuf, Hisham B. Sabri

Abstract:

The understanding of risk and the concept of it occurs associated in Islamic financing was well-known in the financial industry by the using of Profit-and-Loss Sharing (PLS). It was presently in any Islamic financial transactions in order to comply with shariah rules. However, the existence of risk in Murabahah contract of financing is an ability that the counterparty is unable to complete its obligations within the agreed terms. Therefore, it is called as credit or default risk. Credit risk occurs when the client fails to make timely payment after the bank makes complete delivery of assets. Thus, it affects the growth of the bank as the banking business is in no position to have appropriate measures to cover the risk. Therefore, the bank may impose penalty on the outstanding balance. This paper aims to highlight the credit risk determinant and issues surrounding in Islamic bank in Malaysia in terms of Murabahah financing and how to manage it by using the proper techniques. Finally, it explores the credit risk management concept that might solve the problems arise. The study found that the credit risk can be managed properly by improving the use of comprehensive reference checklist of business partners on their character and past performance as well as their comprehensive database. Besides that, prevention of credit risk can be done by using collateral as security against the risk and we also argue on the Shariah guidelines and procedures should be implement coherently by the banking business because so that the risk would be control by having an effective instrument for Islamic modes of financing.

Keywords: Islamic banking, credit risk, Murabahah financing, risk mitigation

Procedia PDF Downloads 427
3876 Analysis of Access to Credit among Rural Farmers in Giwa Local Government Area of Kaduna State, Nigeria

Authors: S. Ibrahim, Bashir Umar

Abstract:

Agricultural credit is very important for sustainable agricultural development to be achieved in any country of the world. Rural credit has proven to be a powerful instrument against poverty reduction and development in rural area. Agricultural credit enhances productivity and promotes standard of living by breaking vicious cycle of poverty of small scale farmers. This study examined access to credit among rural farmers in Giwa local government area of Kaduna state. Two stages sampling procedure was employed to select forty-two (42) respondents for the study. Primary data were collected using structured questionnaire with the help of well-trained enumerators. Data were analyzed using simple descriptive statistics. The results revealed that farmers were predominantly male (57.1%) and most (54.7%), were married with one level of education or another (66.5.%). Majority of the households’ head were between the ages of 31 to 50. majority of the farmers (68.2%) had more than 2ha of farmlands with at least 5 years of farming experience and an annual farm income of N 61,000 to 100,000 (61.9%). The Various sources of credit by the farmers in the study area were commercial banks (38.1%), Co-operative banks (47.6%), Development banks (14.2%) (formal) and Relatives (26.1%), Personal Savings (Adashi scheme) (52.3%), Moneylenders (21.4%) (informal). As regard to the amount of credit obtained by the farmers 38.1% received N 50,000-100,000, 50 % obtained N 100,001-500,000 while 11.9% obtained N 500,001-1,000,000. High interest Inadequate collateral, Complicated Procedures, lack of guarantor were the major constrains encountered by the farmers in accessing loans. The study therefore recommends that Rural farmers should be encouraged to form credit and thrift cooperative societies from which they can access much cheaper credits, Moreover, to ensure that any credit obtained may be manageable for the farmers, financial institutions should provide loans with low interest rates and government and non-governmental organizations should simplify procedures associated with accessing loans.

Keywords: analysis, access, credit, farmers

Procedia PDF Downloads 36
3875 The Role and Effectiveness of Audit Committee in Corporate Governance of Credit Institutions

Authors: Tina Vuko, Marija Maretić, Marko Čular

Abstract:

The aim of this study is to analyze the role and effectiveness of internal mechanism (audit committee) of corporate governance on credit institutions performance in Croatia. Based on research objective, sample of 78 credit institutions listed on Zagreb Stock Exchange, from 2007 to 2012, has been collected and efficiency index of audit committee (EIAC) has been created. Based on the sample and created EIAC, conclusions are as follows: audit committees of credit institutions have medium efficiency, based on EIAC measurement; there is a significant difference in audit committee effectiveness, in observed period; there is no positive relationship between audit committee effectiveness and credit institution performance; there is a significant difference between level of audit committee effectiveness and audit firm type. Future research should contain increased number of elements in EIAC creation and increased sample, for all obligators who need to establish audit committee.

Keywords: corporate governance, audit committee, financial institutions, efficiency index of audit committee

Procedia PDF Downloads 292
3874 Comparison between XGBoost, LightGBM and CatBoost Using a Home Credit Dataset

Authors: Essam Al Daoud

Abstract:

Gradient boosting methods have been proven to be a very important strategy. Many successful machine learning solutions were developed using the XGBoost and its derivatives. The aim of this study is to investigate and compare the efficiency of three gradient methods. Home credit dataset is used in this work which contains 219 features and 356251 records. However, new features are generated and several techniques are used to rank and select the best features. The implementation indicates that the LightGBM is faster and more accurate than CatBoost and XGBoost using variant number of features and records.

Keywords: gradient boosting, XGBoost, LightGBM, CatBoost, home credit

Procedia PDF Downloads 142
3873 QR Technology to Automate Health Condition Detection in Payment System: A Case Study in the Kingdom of Saudi Arabia’s Schools

Authors: Amjad Alsulami, Farah Albishri, Kholod Alzubidi, Lama Almehemadi, Salma Elhag

Abstract:

Food allergy is a common and rising problem among children. Many students have their first allergic reaction at school, one of these is anaphylaxis, which can be fatal. This study discovered that several schools' processes lacked safety regulations and information on how to handle allergy issues and chronic diseases like diabetes where students were not supervised or monitored during the cafeteria purchasing process. There is no obvious prevention or effort in academic institutions when purchasing food containing allergens or negatively impacting the health status of students who suffer from chronic diseases. Students must always be stable to reflect positively on their educational development process. To address this issue, this paper uses a business reengineering process to propose the automation of the whole food-purchasing process, which will aid in detecting and avoiding allergic occurrences and preventing any side effects from eating foods that are conflicting with students' health. This may be achieved by designing a smart card with an embedded QR code that reveals which foods cause an allergic reaction in a student. A survey was distributed to determine and examine how the cafeteria will handle allergic children and whether any management or policy is applied in the school. Also, the survey findings indicate that the integration of QR technology into the food purchasing process would improve health condition detection. The suggested system would be beneficial to all parties, the family agreed, as they would ensure that their children didn't eat foods that were bad for their health. Moreover, by analyzing and simulating the as-is process and the suggested process the results demonstrate that there is an improvement in quality and time.

Keywords: QR code, smart card, food allergies, business process reengineering, health condition detection

Procedia PDF Downloads 49