Search results for: financial security
4455 Risk Management in an Islamic Framework
Authors: Magid Maatallah
Abstract:
The problem is, investment management in modern conditions boils down to risk management which is very underdeveloped in Islamic financial theory and practice. Add to this the fact that, in Islamic perception, this is one of the areas of conventional finance in need of drastic reforms. This need was recently underlined by the story of Long Term Capital Management (LTCM ), ( told by Roger Lowenstein in his book, When Genius Failed, Random House, 2000 ). So we face a double challenge, to develop Islamic techniques of risk management and to see that these new techniques are free from the ills with which conventional methods are suffering. This is different from the challenge faced in the middle of twentieth century, to develop a method of financial intermediation free of interest.Risk was always there, especially in business. But industrialization brought risks unknown in trade and agriculture. Industrial production often involves long periods of time .The longer the period of production the more the uncertainty. The scope of the market has expanded to cover the whole world, introducing new kinds of risk. More than a thousand years ago, when Islamic laws were being written, the nature and scope of risk and uncertainty was different. However, something can still be learnt which, in combination with the modern experience, should enable us to realize the Shariah objectives of justice, fairness and efficiency.Keywords: financial markets, Islamic framework, risk management, investment
Procedia PDF Downloads 5524454 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 3814453 Addressing Urban Security Challenges in Nigeria through Neighborhood Renewal: A Reflection of Mokola World Bank Slum Upgrading Pilot Project
Authors: Tabiti S. Tabiti, A. M. Jinadu, Daramola Japheth
Abstract:
Urban insecurity is among the challenges militating against sustainable urban governance; in the first place it distorts the peace of urban areas making them unsafe. On the other hand it hinders the effective performance of urban functions. Urban security challenges manifest in different forms such as, street violence, theft and robbery, accidents of different types kidnapping, killings etc.. Efforts to address urban security challenges in Nigeria have been concentrated in legislative, law enforcement and the use of community vigilante groups. However in this study, the place of physical planning strategy through effective neighbourhood renewal as practiced in Mokola is presented as an effective complementary approach for addressing urban insecurity. On this backdrop, the paper recommends the need for gradual rehabilitation of urban slum neighborhoods by the state government in collaboration with World Bank and other development financiers. The local governments should be made autonomy in Nigeria so as to make them more responsible to the people. Other recommendations suggested in the paper include creating enabling environment that will promote economic empowerment and public enlightment on personal and community sanitation. It is certain that if these recommendations are adopted the challenge of urban insecurity will reduce significantly in Nigerian cities.Keywords: neighbourhood renewal, pilot project, slum upgrading, urban security
Procedia PDF Downloads 4374452 Mobile Payment over NFC: The M-Check System Case
Authors: Karima Maazouz, Habib Benlahmer, Naceur Achtaich
Abstract:
The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants.Keywords: M-payment, NFC, M-check, M-commerce, security
Procedia PDF Downloads 5974451 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions
Authors: Siddharth Krishnaswamy
Abstract:
Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.Keywords: analysis, food security indicators, response, resilience analysis
Procedia PDF Downloads 3314450 Financial Feasibility of Clean Development Mechanism (CDM) Projects in India
Authors: Renuka H. Deshmukh, Snehal Nifadkar, Anil P. Dongre
Abstract:
The research study aims to analyze the financial performance of the companies associated with CDM projects implemented in India from 2001 to 2014 by calculating net profit with and without CDM revenue. Further the study also highlights the Year-wise and sector-wise lending to CDM projects in India as well as in the state of Maharashtra. The study further aims to examine the year-wise trend of Certified Emission Reductions (CER) issued by the CDM projects implemented in Maharashtra from 2001-2014. The study as well analyses the responses of selected corporate with respect to the challenges in implementing and obtaining finance from commercial banks.Keywords: adaptation costs, internal rate of return, mitigation, vulnerability, CER
Procedia PDF Downloads 3474449 Measurement of Intellectual Capital in an Algerian Company
Authors: S. Brahmi, S. Aitouche, M. D. Mouss
Abstract:
Every modern company should measure the value of its intellectual capital and to report to complement the traditional annual balance sheets. The purpose of this work is to measure the intellectual capital in an Algerian company (or production system) using the Weightless Wealth Tool Kit (WWTK). The results of the measurement of intellectual capital are supplemented by traditional financial ratios. The measurement was applied to the National Company of Wells Services (ENSP) in Hassi Messaoud city, in the south of Algeria. We calculated the intellectual capital (intangible resources) of the ENSP to help the organization to better capitalize on its potential of workers and their know-how. The intangible value of the ENSP is evaluated at 16,936,173,345 DA in 2015.Keywords: financial valuation, intangible capital, intellectual capital, intellectual capital measurement
Procedia PDF Downloads 2864448 Inclusive Business and Its Contribution to Farmers Wellbeing in Arsi Ethiopia: Empirical Evidence
Authors: Senait G. Worku, Ellen Mangnus
Abstract:
Inclusive business models which integrates low-income people with companies value chain in a commercially viable way has gained momentum for the perceived potential to contribute to poverty alleviation and food security in developing countries. This article investigates the impact of Community Revenue Enhancement through Technology Extension (CREATE) project of Heineken brewery on smallholder farmers’ wellbeing in Arsi zone Oromia regional state of Ethiopia. CREATE is a Public-Private Partnership (PPP) between Ministry of Foreign Affairs of the Netherlands and Heineken N.V. which source malt barely from smallholder farmers in three zones of Oromia. The study assessed the impact of CREATE on malt barley productivity, food security and new asset purchase in Arsi zone by comparing households that participate in the project with non-participating households using propensity score matching method. The finding indicated that households that participated in the CREATE project had higher malt barley productivity and purchased more new assets than non-participating households. However, there is no significant difference on food security status of participating and non-participating households indicating that the project has a profound impact on asset accumulation than on food security improvement.Keywords: inclusive business, malt barley, propensity score matching, wellbeing
Procedia PDF Downloads 1564447 Organizational Efficiency in the Age of the Current Financial Crisis Strategies and Tracks Progress
Authors: Aharouay Soumaya
Abstract:
Efficiency is a relative concept. It is measured by comparing the productivity obtained in what is intended as standard or objective criteria. The quantity and quality of output achieved and the level of service are also compared to targets or standards, to determine to what extent they could cause changes in efficiency. Efficiency improves when more outputs of a specified quality are produced with the same resource inputs or less, or when the same amount of output is produced with fewer resources. This article proposes a review of the literature on strategies adopted by firms in the age of the financial crisis to overcome these negative effects, and tracks progress chosen by the organization to remain successful despite the plight of firms.Keywords: effectiveness, efficiency, organizational capacity, strategy, management tool, progress, performance
Procedia PDF Downloads 3464446 Password Cracking on Graphics Processing Unit Based Systems
Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik
Abstract:
Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.Keywords: GPGPU, password cracking, secret key, user authentication
Procedia PDF Downloads 2904445 The Superior Performance of Investment Bank-Affiliated Mutual Funds
Authors: Michelo Obrey
Abstract:
Traditionally, mutual funds have long been esteemed as stand-alone entities in the U.S. However, the prevalence of the fund families’ affiliation to financial conglomerates is eroding this striking feature. Mutual fund families' affiliation with financial conglomerates can potentially be an important source of superior performance or cost to the affiliated mutual fund investors. On the one hand, financial conglomerates affiliation offers the mutual funds access to abundant resources, better research quality, private material information, and business connections within the financial group. On the other hand, conflict of interest is bound to arise between the financial conglomerate relationship and fund management. Using a sample of U.S. domestic equity mutual funds from 1994 to 2017, this paper examines whether fund family affiliation to an investment bank help the affiliated mutual funds deliver superior performance through private material information advantage possessed by the investment banks or it costs affiliated mutual fund shareholders due to the conflict of interest. Robust to alternative risk adjustments and cross-section regression methodologies, this paper finds that the investment bank-affiliated mutual funds significantly outperform those of the mutual funds that are not affiliated with an investment bank. Interestingly the paper finds that the outperformance is confined to holding return, a return measure that captures the investment talent that is uninfluenced by transaction costs, fees, and other expenses. Further analysis shows that the investment bank-affiliated mutual funds specialize in hard-to-value stocks, which are not more likely to be held by unaffiliated funds. Consistent with the information advantage hypothesis, the paper finds that affiliated funds holding covered stocks outperform affiliated funds without covered stocks lending no support to the hypothesis that affiliated mutual funds attract superior stock-picking talent. Overall, the paper findings are consistent with the idea that investment banks maximize fee income by monopolistically exploiting their private information, thus strategically transferring performance to their affiliated mutual funds. This paper contributes to the extant literature on the agency problem in mutual fund families. It adds to this stream of research by showing that the agency problem is not only prevalent in fund families but also in financial organizations such as investment banks that have affiliated mutual fund families. The results show evidence of exploitation of synergies such as private material information sharing that benefit mutual fund investors due to affiliation with a financial conglomerate. However, this research has a normative dimension, allowing such incestuous behavior of insider trading and exploitation of superior information not only negatively affect the unaffiliated fund investors but also led to an unfair and unleveled playing field in the financial market.Keywords: mutual fund performance, conflicts of interest, informational advantage, investment bank
Procedia PDF Downloads 1884444 Urban Security through Urban Transformation: Case of Saraycik District
Authors: Emir Sunguroglu, Merve Sunguroglu, Yesim Aliefendioglu, Harun Tanrivermis
Abstract:
Basic human needs range from physiological needs such as food, water and shelter to safety needs such as security, protection from natural disasters and even urban terrorism which are extant and not fulfilled even in urban areas where people live civilly in large communities. These basic needs when arose in urban life lead to a different kind of crime set defined as urban crimes. Urban crimes mostly result from differences between socioeconomic conditions in society. Income inequality increases tendency towards urban crimes. Especially in slum areas and suburbs, urban crimes not only threaten public security but they also affect deliverance of public services. It is highlighted that, construction of urban security against problems caused by urban crimes is not only achieved by involvement of urban security in security of the community but also comprises juridical development and staying above a level of legal standards concurrently. The idea of urban transformation emerged as interventions to demolishment and rebuilding of built environment to solve the unhealthy urban environment, inadequate infrastructure and socioeconomic problems came up during the industrialization process. Considering the probability of urbanization process driving citizens to commit crimes, The United Nations Commission on Human Security’s focus on this theme is conferred to be a proper approach. In this study, the analysis and change in security before, through and after urban transformation, which is one of the tools related to urbanization process, is strived to be discussed through the case of Sincan County Saraycik District. The study also aims to suggest improvements to current legislation on public safety, urban resilience, and urban transformation. In spite of Saraycik District residing in a developing County in Ankara, Turkey, from urbanization perspective as well as socioeconomic and demographic indicators the District exhibits a negative view throughout the County and the country. When related to the county, rates of intentional harm reports, burglary reports, the offense of libel and threat reports and narcotic crime reports are higher. The District is defined as ‘crime hotspot’. Interviews with residents of Saraycik claim that the greatest issue of the neighborhood is Public Order and Security (82.44 %). The District becomes prominent with negative aspects, especially with the presence of unlicensed constructions, occurrence of important social issues such as crime and insecurity and complicated lives of inhabitants from poverty and low standard conditions of living. Additionally, the social structure and demographic properties and crime and insecurity of the field have been addressed in this study. Consequently, it is claimed that urban crime rates were related to level of education, employment and household income, poverty trap, physical condition of housing and structuration, accessibility of public services, security, migration, safety in terms of disasters and emphasized that urban transformation is one of the most important tools in order to provide urban security.Keywords: urban security, urban crimes, urban transformation, Saraycik district
Procedia PDF Downloads 3044443 Structural Vulnerability of Banking Network – Systemic Risk Approach
Authors: Farhad Reyazat, Richard Werner
Abstract:
This paper contributes to the existent literature by developing a framework that explains how to monitor potential threats to banking sector stability. The study explores structural vulnerabilities at the country level, but also look at bilateral exposures within a network context. The study contributes in analysing of the European banking systemic risk at aggregated level, which integrates the characteristics of bank size, and interconnectedness relative to the size of the economy which ultimate risk belong to, taking to account the concentration ratio of the banking industry within the whole economy. The nature of the systemic risk depends on the interplay of the network topology with the nature of financial transactions over the network, assets and buffer stemming from bank size, correlations, and the nature of the shocks to the financial system. The study’s results illustrate the contribution of banks’ size, size of economy and concentration of counterparty exposures to a given country’s banks in explaining its systemic importance, how much the banking network depends on a few traditional hubs activities and the changes of this dependencies over the last 9 years. The role of few of traditional hubs such as Swiss banks and British Banks and also Irish banks- where the financial sector is fairly new and grew strongly between 1990s till 2008- take the fourth position on 2014 reducing the relative size since 2006 where they had the first position. In-degree concentration index analysis in the study shows concentration index of banking network was not changed since financial crisis 2007-8. In-degree concentration index on first quarter of 2014 indicates that US, UK and Germany together, getting over 70% of the network exposures. The result of comparing the in-degree concentration index with 2007-4Q, shows the same group having over 70% of the network exposure, however the UK getting more important role in the hub and the market share of US and Germany are slightly diminished.Keywords: systemic risk, counterparty risk, financial stability, interconnectedness, banking concentration, european banks risk, network effect on systemic risk, concentration risk
Procedia PDF Downloads 4904442 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks
Authors: Mehmet Karaata
Abstract:
Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security
Procedia PDF Downloads 4424441 Static Analysis of Security Issues of the Python Packages Ecosystem
Authors: Adam Gorine, Faten Spondon
Abstract:
Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks
Procedia PDF Downloads 1394440 Statistical Inferences for GQARCH-It\^{o} - Jumps Model Based on The Realized Range Volatility
Authors: Fu Jinyu, Lin Jinguan
Abstract:
This paper introduces a novel approach that unifies two types of models: one is the continuous-time jump-diffusion used to model high-frequency data, and the other is discrete-time GQARCH employed to model low-frequency financial data by embedding the discrete GQARCH structure with jumps in the instantaneous volatility process. This model is named “GQARCH-It\^{o} -Jumps mode.” We adopt the realized range-based threshold estimation for high-frequency financial data rather than the realized return-based volatility estimators, which entail the loss of intra-day information of the price movement. Meanwhile, a quasi-likelihood function for the low-frequency GQARCH structure with jumps is developed for the parametric estimate. The asymptotic theories are mainly established for the proposed estimators in the case of finite activity jumps. Moreover, simulation studies are implemented to check the finite sample performance of the proposed methodology. Specifically, it is demonstrated that how our proposed approaches can be practically used on some financial data.Keywords: It\^{o} process, GQARCH, leverage effects, threshold, realized range-based volatility estimator, quasi-maximum likelihood estimate
Procedia PDF Downloads 1564439 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service
Authors: Mabrouka Algherinai, Fatma Karkouri
Abstract:
Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.Keywords: SMS, RSA, McEliece, RABIN
Procedia PDF Downloads 1634438 Realizing the Full Potential of Islamic Banking System: Proposed Suitable Legal Framework for Islamic Banking System in Tanzania
Authors: Maulana Ayoub Ali, Pradeep Kulshrestha
Abstract:
Laws of any given secular state have a huge contribution in the growth of the Islamic banking system because the system uses conventional laws to govern its activities. Therefore, the former should be ready to accommodate the latter in order to make the Islamic banking system work properly without affecting the current conventional banking system and therefore without affecting its system. Islamic financial rules have been practiced since the birth of Islam. Following the recent world economic challenges in the financial sector, a quick rebirth of the contemporary Islamic ethical banking system took place. The coming of the Islamic banking system is due to various reasons including but not limited to the failure of the interest based economy in solving financial problems around the globe. Therefore, the Islamic banking system has been adopted as an alternative banking system in order to recover the highly damaged global financial sector. But the Islamic banking system has been facing a number of challenges which hinder its smooth operation in different parts of the world. It has not been the aim of this paper to discuss other challenges rather than the legal ones, but the same was partly discussed when it was justified that it was proper to do so. Generally, there are so many things which have been discovered in the course of writing this paper. The most important part is the issue of the regulatory and supervisory framework for the Islamic banking system in Tanzania and in other nations is considered to be a crucial part for the development of the Islamic banking industry. This paper analyses what has been observed in the study on that area and recommends for necessary actions to be taken on board in a bid to make Islamic banking system reach its climax of serving the larger community by providing ethical, equitable, affordable, interest-free and society cantered banking system around the globe.Keywords: Islamic banking, interest free banking, ethical banking, legal framework
Procedia PDF Downloads 1494437 Financial Assessment of the Hard Coal Mining in the Chosen Region in the Czech Republic: Real Options Methodology Application
Authors: Miroslav Čulík, Petr Gurný
Abstract:
This paper is aimed at the financial assessment of the hard coal mining in a given region by real option methodology application. Hard coal mining in this mine makes net loss for the owner during the last years due to the long-term unfavourable mining conditions and significant drop in the coal prices during the last years. Management is going to shut down the operation and abandon the project to reduce the loss of the company. The goal is to assess whether the shutting down the operation is the only and correct solution of the problem. Due to the uncertainty in the future hard coal price evolution, the production might be again restarted if the price raises enough to cover the cost of the production. For the assessment, real option methodology is applied, which captures two important aspect of the financial decision-making: risk and flexibility. The paper is structured as follows: first, current state is described and problem is analysed. Next, methodology of real options is described. At last, project is evaluated by applying real option methodology. The results are commented and recommendations are provided.Keywords: real option, investment, option to abandon, option to shut down and restart, risk, flexibility
Procedia PDF Downloads 5484436 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics
Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova
Abstract:
We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.Keywords: cybersecurity, epidemiology, cyber epidemiology, malware
Procedia PDF Downloads 1074435 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services
Authors: Rachna Jain, Sushila Madan, Bindu Garg
Abstract:
Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service
Procedia PDF Downloads 3344434 Parabolic Impact Law of High Frequency Exchanges on Price Formation in Commodities Market
Authors: L. Maiza, A. Cantagrel, M. Forestier, G. Laucoin, T. Regali
Abstract:
Evaluation of High Frequency Trading (HFT) impact on financial markets is very important for traders who use market analysis to detect winning transaction opportunity. Analysis of HFT data on tobacco commodity market is discussed here and interesting linear relationship has been shown between trading frequency and difference between averaged trading prices above and below considered trading frequency. This may open new perspectives on markets data understanding and could provide possible interpretation of Adam Smith invisible hand.Keywords: financial market, high frequency trading, analysis, impacts, Adam Smith invisible hand
Procedia PDF Downloads 3594433 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana
Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.
Abstract:
Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security
Procedia PDF Downloads 1064432 Artificial Intelligence Methods for Returns Expectations in Financial Markets
Authors: Yosra Mefteh Rekik, Younes Boujelbene
Abstract:
We introduce in this paper a new conceptual model representing the stock market dynamics. This model is essentially based on cognitive behavior of the intelligence investors. In order to validate our model, we build an artificial stock market simulation based on agent-oriented methodologies. The proposed simulator is composed of market supervisor agent essentially responsible for executing transactions via an order book and various kinds of investor agents depending to their profile. The purpose of this simulation is to understand the influence of psychological character of an investor and its neighborhood on its decision-making and their impact on the market in terms of price fluctuations. Therefore, the difficulty of the prediction is due to several features: the complexity, the non-linearity and the dynamism of the financial market system, as well as the investor psychology. The Artificial Neural Networks learning mechanism take on the role of traders, who from their futures return expectations and place orders based on their expectations. The results of intensive analysis indicate that the existence of agents having heterogeneous beliefs and preferences has provided a better understanding of price dynamics in the financial market.Keywords: artificial intelligence methods, artificial stock market, behavioral modeling, multi-agent based simulation
Procedia PDF Downloads 4454431 Finding the Right Regulatory Path for Islamic Banking
Authors: Meysam Saidi
Abstract:
While the specific externalities and required regulatory measures in relation to Islamic banking are fairly uncertain, the business is growing across the world. Unofficial data indicate that the Islamic Finance market is growing with annual rate of 15% and it has reached 1.3 $ trillion size. This trend is associated with inherent systematic connection of Islamic financial institutions to other entities and different sectors of economies. Islamic banking has been subject of market development policies in major economies, most notably the UK. This trend highlights the need for identification of distinct risk features of Islamic banking and crafting customized regulatory measures. So far there has not been a significant systemic crisis in this market which can be attributed to its distinct nature. However, the significant growth and spread of its products worldwide necessitate an in depth study of its nature for customized congruent regulatory measures. In the post financial crisis era some market analysis and reports suggested that the Islamic banks fairly weathered the crisis. As far as heavily blamed conventional financial products such as subprime mortgage backed securities and speculative credit default swaps were concerned the immunity claim can be considered true, as Islamic financial institutions were not directly exposed to such products. Nevertheless, similar to the experience of the conventional banking industry, it can be only a matter of time for Islamic banks to face failures that can be specific to the nature of their business. Using the experience of conventional banking regulations and identifying those peculiarities of Islamic banking that need customized regulatory approach can aid to prevent major failures. Frank Knight has stated that “We perceive the world before we react to it, and we react not to what we perceive, but always to what we infer”. The debate over congruent Islamic banking regulations might not be an exception to Frank Knight’s statement but I will try to base my discussion on concrete evidences. This paper first analyzes both theoretical and actual features of Islamic banking in order to ascertain to its peculiarities in terms of market stability and other externalities. Next, the paper discusses distinct features of Islamic financial transactions and banking which might require customized regulatory measures. Finally, the paper explores how a more transparent path for the Islamic banking regulations can be drawn.Keywords: Islamic banking, regulation, risks, capital requirements, customer protection, financial stability
Procedia PDF Downloads 4094430 Feasibility Study of Iraq' Decomposition and Its Effects on the Region
Authors: Ebrahim Rahmani, Siyamak Moazeni
Abstract:
According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan
Procedia PDF Downloads 3284429 Value Creation of Public Financial Management Reforms through Their Long-Term Impacts
Authors: Christoph Schuler, Oriana Ponta
Abstract:
Public Financial Management (PFM) reforms are promoted by various international organizations such as the International Monetary Fund (IMF) or the World Bank, local development banks and the donor country community to strengthen governance and accountability in developing countries across the world. Reform efforts undertaken are often systematically measured against international best practice by the application of standardized analytical instruments such as the Public Expenditure and Financial Accountability Framework (PEFA) or the Poverty Reduction Action Plan (PARP). While those instruments analyze direct achievements of PFM reforms, the long-term benefits of such reforms for society remain untapped. This gives rise to the question why the concept of impact evaluation with its experimental or quasi-experimental settings in the form of randomized control trials has rarely been applied in the context of PFM reforms. To close this gap, this study provides examples where the concept of impact evaluation can be applied to PFM reforms and thereby shifting the focus from outcome towards a long-term impact. As it is a new approach, this study does not attempt to conduct a fully flagged impact evaluation of a certain PFM reform. However, it will outline, as a form of pre-test the applicability of the impact evaluation methodology in this context, for example, by more closely analyzing the commonly used indicators (for example within PEFA or PARP). This would mean to scrutinize these indicators as to how they were designed and how they are related to the long-term impact, they should be producing. The analysis of PFM reform indicators and their relation to long-term impacts should provide practitioners and scholars alike with new insights on how to strengthen the accountability of public service delivery through successful and sustainable PFM reforms.Keywords: accountability, impact evaluation, PFM reforms, public financial management
Procedia PDF Downloads 3254428 The Finance of Happiness: Thinking Finance from the Science of Happiness Perspective
Authors: Renaud Gaucher
Abstract:
Research on happiness has developed significantly in the past fifty years and economics and the political science are starting to be influenced by advances in the field. Until recently, finance has stayed outside this movement. The goal of our research is to integrate finance into this movement conceptually. We explain the why, the what and the how of the finance of happiness. We then study the relationship between corporate finance and happiness. We discuss the optimization of the relationship between the financial performance of a firm and the happiness at work of its employees, and the reduction of financial risk by developing goods that foster the happiness of their users. Finally we look at the development of happiness investment funds, that is investment funds founded on happiness research, and the best ways to share risks and earnings to build a happier society.Keywords: finance, happiness, investment fund, risk
Procedia PDF Downloads 1884427 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures
Authors: Mastoor Qubra
Abstract:
Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation
Procedia PDF Downloads 2694426 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 547