Search results for: authenticity of transactions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 452

Search results for: authenticity of transactions

362 Making Meaning, Authenticity, and Redefining a Future in Former Refugees and Asylum Seekers Detained in Australia

Authors: Lynne McCormack, Andrew Digges

Abstract:

Since 2013, the Australian government has enforced mandatory detention of anyone arriving in Australia without a valid visa, including those subsequently identified as a refugee or seeking asylum. While consistent with the increased use of immigration detention internationally, Australia’s use of offshore processing facilities both during and subsequent to refugee status determination processing has until recently remained a unique feature of Australia’s program of deterrence. The commonplace detention of refugees and asylum seekers following displacement is a significant and independent source of trauma and a contributory factor in adverse psychological outcomes. Officially, these individuals have no prospect of resettlement in Australia, are barred from applying for substantive visas, and are frequently and indefinitely detained in closed facilities such as immigration detention centres, or alternative places of detention, including hotels. It is also important to note that the limited access to Australia’s immigration detention population made available to researchers often means that data available for secondary analysis may be incomplete or delayed in its release. Further, studies into the lived experience of refugees and asylum seekers are typically cross-sectional and convenience sampled, employing a variety of designs and research methodologies that limit comparability and focused on the immediacy of the individual’s experience. Consequently, how former detainees make sense of their experience, redefine their future trajectory upon release, and recover a sense of authenticity and purpose, is unknown. As such, the present study sought the positive and negative subjective interpretations of 6 participants in Australia regarding their lived experiences as refugees and asylum seekers within Australia’s immigration detention system and its impact on their future sense of self. It made use of interpretative phenomenological analysis (IPA), a qualitative research methodology that is interested in how individuals make sense of, and ascribe meaning to, their unique lived experiences of phenomena. Underpinned by phenomenology, hermeneutics, and critical realism, this idiographic study aimed to explore both positive and negative subjective interpretations of former refugees and asylum seekers held in detention in Australia. It sought to understand how they make sense of their experiences, how detention has impacted their overall journey as displaced persons, and how they have moved forward in the aftermath of protracted detention in Australia. Examining the unique lived experiences of previously detained refugees and asylum seekers may inform the future development of theoretical models of posttraumatic growth among this vulnerable population, thereby informing the delivery of future mental health and resettlement services.

Keywords: mandatory detention, refugee, asylum seeker, authenticity, Interpretative phenomenological analysis

Procedia PDF Downloads 95
361 Gc-ms Data Integrated Chemometrics for the Authentication of Vegetable Oil Brands in Minna, Niger State, Nigeria

Authors: Rasaq Bolakale Salau, Maimuna Muhammad Abubakar, Jonathan Yisa, Muhammad Tauheed Bisiriyu, Jimoh Oladejo Tijani, Alexander Ifeanyi Ajai

Abstract:

Vegetables oils are widely consumed in Nigeria. This has led to competitive manufacture of various oil brands. This leads increasing tendencies for fraud, labelling misinformation and other unwholesome practices. A total of thirty samples including raw and corresponding branded samples of vegetable oils were collected. The Oils were extracted from raw ground nut, soya bean and oil palm fruits. The GC-MS data was subjected to chemometric techniques of PCA and HCA. The SOLO 8.7 version of the standalone chemometrics software developed by Eigenvector research incorporated and powered by PLS Toolbox was used. The GCMS fingerprint gave basis for discrimination as it reveals four predominant but unevenly distributed fatty acids: Hexadecanoic acid methyl ester (10.27- 45.21% PA), 9,12-octadecadienoic acid methyl ester (10.9 - 45.94% PA), 9-octadecenoic acid methyl ester (18.75 - 45.65%PA), and Eicosanoic acid methyl ester (1.19% - 6.29%PA). In PCA modelling, two PCs are retained at cumulative variance captured at 73.15%. The score plots indicated that palm oil brands are most aligned with raw palm oil. PCA loading plot reveals the signature retention times between 4.0 and 6.0 needed for quality assurance and authentication of the oils samples. They are of aromatic hydrocarbons, alcohols and aldehydes functional groups. HCA dendrogram which was modeled using Euclidian distance through Wards method, indicated co-equivalent samples. HCA revealed the pair of raw palm oil brand and palm oil brand in the closest neighbourhood (± 1.62 % A difference) based on variance weighted distance. It showed Palm olein brand to be most authentic. In conclusion, based on the GCMS data with chemometrics, the authenticity of the branded samples is ranked as: Palm oil > Soya oil > groundnut oil.

Keywords: vegetable oil, authenticity, chemometrics, PCA, HCA, GC-MS

Procedia PDF Downloads 31
360 A Multi-Agent Smart E-Market Design at Work for Shariah Compliant Islamic Banking

Authors: Wafa Ghonaim

Abstract:

Though quite fast on growth, Islamic financing at large, and its diverse instruments, is a controversial matter among scholars. This is evident from the ongoing debates on its Shariah compliance. Arguments, however, are inciting doubts and concerns among clients about its credibility, which is harming this lucrative sector. The work here investigates, particularly, some issues related to the Tawarruq instrument. The work examines the issues of linking Murabaha and Wakala contracts, the reselling of commodities to same traders, and the transfer of ownerships. The work affirms that a multi-agent smart electronic market design would facilitate Shariah compliance. The smart market exploits the rational decision-making capabilities of autonomous proxy agents that enable the clients, traders, brokers, and the bank buy and sell commodities, and manage transactions and cash flow. The smart electronic market design delivers desirable qualities that terminate the need for Wakala contracts and the reselling of commodities to the same traders. It also resolves the ownership transfer issues by allowing stakeholders to trade independently. The bank administers the smart electronic market and assures reliability of trades, transactions and cash flow. A multi-agent simulation is presented to validate the concept and processes. We anticipate that the multi-agent smart electronic market design would deliver Shariah compliance of personal financing to the aspiration of scholars, banks, traders and potential clients.

Keywords: Islamic finance, share'ah compliance, smart electronic markets design, multiagent systems

Procedia PDF Downloads 317
359 Blockchain Technology Applications in Patient Tracking Systems Regarding Privacy-Preserving Concerns and COVID-19 Pandemic

Authors: Farbod Behnaminia, Saeed Samet

Abstract:

The COVID-19 pandemic has paralyzed many lives until a vaccine was available, which caused the so-called “new normal.” According to the World Health Organization (WHO), COVID-19 is an infectious disease. It can cause significant illness or death in anyone. Governments and health officials tried to impose rules and regulations to avoid and slow down transmission. Therefore, software engineers worldwide developed applications to trace and track patients’ movements and notify others, mainly using Bluetooth. In this way, everyone could be informed whether they come in close contact with someone who has COVID-19 and takes proper safety precautions. Because most of the applications use technologies that can potentially reveal the user’s identity and location, researchers have debated privacy preservation and how to improve user privacy during such pandemics. Thanks to Distributed Ledger Technology (DLT), there have been some proposed methods to develop privacy-preserving Patient Tracking Systems in the last two years. As an instance of the DLT, Blockchain is like a decentralized peer-to-peer database that maintains a record of transactions. Transactions are immutable, transparent, and anonymous in this system. We conducted a comprehensive evaluation of the literature by looking for papers in the relevant field and dividing them into pre- and post-pandemic systems. Additionally, we discussed the many uses of blockchain technology in pandemic control. We found that two major obstacles facing blockchain implementation across many healthcare systems are scalability and privacy. The Polkadot platform is presented, along with a review of its efficacy in tackling current concerns. A more scalable healthcare system is achievable in the near future using Polkadot as well as a much more privacy-preserving environment.

Keywords: blockchain, electronic record management, EHR, privacy-preserving, patient tracking, COVID-19, trust and confidence, Polkadot

Procedia PDF Downloads 101
358 Employing Artificial Intelligence Tools in Making Clothing Designs Inspired by the Najdi Art of Sadu

Authors: Basma Abdel Mohsen Al-Sheikh

Abstract:

This study aimed to create textile designs inspired by Najdi Al-Sadu art, with the objective of highlighting Saudi identity and heritage. The research proposed clothing designs for women and children, utilizing textiles inspired by Najdi Al-Sadu art, and incorporated artificial intelligence techniques in the design process. The study employed a descriptive-analytical approach to describe Najdi Al-Sadu, and an experimental method involving the creation of textile designs inspired by Al-Sadu. The study sample consisted of 33 participants, including experts in the fashion and textile industry, fashion designers, lecturers, professors, and postgraduate students from King Abdulaziz University. A questionnaire was used as a tool to gather opinions regarding the proposed designs. The results demonstrated a clear acceptance of the designs inspired by Najdi Al-Sadu and incorporating artificial intelligence, with approval rates ranging from 22% to 81% across different designs. The study concluded that artificial intelligence applications have a significant impact on fashion design, particularly in the integration of Al-Sadu art. The findings also indicated a positive reception of the designs in terms of their aesthetic and functional aspects, although individual preferences led to some variations in opinions. The results highlighted a demand for designs that combine heritage and modern fashion, striking a balance between authenticity and contemporary style. The study recommended that designers continue to explore ways to integrate cultural heritage, such as Al-Sadu art, with contemporary design elements to achieve this balance. Furthermore, it emphasized the importance of enhancing the aesthetic and functional aspects of designs, taking into consideration the preferences of the target market and customer expectations. The effective utilization of artificial intelligence was also emphasized to improve design processes, expand creative possibilities, and foster innovation and authenticity.

Keywords: Najdi Al-Sadu art, artificial intelligence, women's and children's fashion, clothing designs

Procedia PDF Downloads 75
357 Planning and Strategies for Risks Prevention, Mitigating, and Recovery of Ancient Theatres Heritage: Investigation and Recommendations

Authors: Naif A. Haddad

Abstract:

Greek, Hellenistic and Roman theatre heritage are exposed to multiple risks at varied times or simultaneously. There is no single reason why a theatre building becomes ‘at risk’, as each case has different circumstances which have led to the theatre building decay. There are complicated processes of destruction and distress that show divergence in theatre building materials' decay. Theatre modern use for cultural performances causes much of the risks concerning the physical structure and authenticity of theatre sites. In addition, there are some deterioration and deformations due to previous poor quality restorations and interventions through related excavation and conservation programmes as also risks to authenticity due to new additions. For preventive conservation, theatre natural and anthropogenic risks management can provide a framework for decision making. These risks to ancient theatre heritage may stem from exposure to one or more risk or synergy of many factors. We, therefore, need to link the theatre natural risks to the risks that come from anthropogenic factors associated with social and economic development. However, this requires a holistic approach, and systematic methodology for understanding these risks from various sources while incorporating specific actions, planning and strategies for each specific risk. Elaborating on recent relevant studies, and ERATO and ATHENA EU projects for ancient theaters and odea and general surveys, this paper attempts to discuss the main aspects of the ancient Greek, Hellenistic and Roman theatres risk related issues. Relevant case studies shall also be discussed and investigated to examine frameworks for risk mitigation, and related guidelines and recommendations that provide a systematic approach for sustainable management and planning in relation mainly to ‘compatible use’ of theatre sites.

Keywords: cultural heritage management, European ancient theatres projects, Anthropogenic risks mitigation, sustainable management and planning, preventive conservation, modern use, compatible use

Procedia PDF Downloads 298
356 Fight against Money Laundering with Optical Character Recognition

Authors: Saikiran Subbagari, Avinash Malladhi

Abstract:

Anti Money Laundering (AML) regulations are designed to prevent money laundering and terrorist financing activities worldwide. Financial institutions around the world are legally obligated to identify, assess and mitigate the risks associated with money laundering and report any suspicious transactions to governing authorities. With increasing volumes of data to analyze, financial institutions seek to automate their AML processes. In the rise of financial crimes, optical character recognition (OCR), in combination with machine learning (ML) algorithms, serves as a crucial tool for automating AML processes by extracting the data from documents and identifying suspicious transactions. In this paper, we examine the utilization of OCR for AML and delve into various OCR techniques employed in AML processes. These techniques encompass template-based, feature-based, neural network-based, natural language processing (NLP), hidden markov models (HMMs), conditional random fields (CRFs), binarizations, pattern matching and stroke width transform (SWT). We evaluate each technique, discussing their strengths and constraints. Also, we emphasize on how OCR can improve the accuracy of customer identity verification by comparing the extracted text with the office of foreign assets control (OFAC) watchlist. We will also discuss how OCR helps to overcome language barriers in AML compliance. We also address the implementation challenges that OCR-based AML systems may face and offer recommendations for financial institutions based on the data from previous research studies, which illustrate the effectiveness of OCR-based AML.

Keywords: anti-money laundering, compliance, financial crimes, fraud detection, machine learning, optical character recognition

Procedia PDF Downloads 144
355 Teaching Method for a Classroom of Students at Different Language Proficiency Levels: Content and Language Integrated Learning in a Japanese Culture Classroom

Authors: Yukiko Fujiwara

Abstract:

As a language learning methodology, Content and Language Integrated Learning (CLIL) has become increasingly prevalent in Japan. Most CLIL classroom practice and its research are conducted in EFL fields. However, much less research has been done in the Japanese language learning setting. Therefore, there are still many issues to work out using CLIL in the Japanese language teaching (JLT) setting. it is expected that more research will be conducted on both authentically and academically. Under such circumstances, this is one of the few classroom-based CLIL researches experiments in JLT and aims to find an effective course design for a class with students at different proficiency levels. The class was called ‘Japanese culture A’. This class was offered as one of the elective classes for International exchange students at a Japanese university. The Japanese proficiency level of the class was above the Japanese Language Proficiency Test Level N3. Since the CLIL approach places importance on ‘authenticity’, the class was designed with materials and activities; such as books, magazines, a film and TV show and a field trip to Kyoto. On the field trip, students experienced making traditional Japanese desserts, by receiving guidance directly from a Japanese artisan. Through the course, designated task sheets were used so the teacher could get feedback from each student to grasp what the class proficiency gap was. After reading an article on Japanese culture, students were asked to write down the words they did not understand and what they thought they needed to learn. It helped both students and teachers to set learning goals and work together for it. Using questionnaires and interviews with students, this research examined whether the attempt was effective or not. Essays they wrote in class were also analyzed. The results from the students were positive. They were motivated by learning authentic, natural Japanese, and they thrived setting their own personal goals. Some students were motivated to learn Japanese by studying the language and others were motivated by studying the cultural context. Most of them said they learned better this way; by setting their own Japanese language and culture goals. These results will provide teachers with new insight towards designing class materials and activities that support students in a multilevel CLIL class.

Keywords: authenticity, CLIL, Japanese language and culture, multilevel class

Procedia PDF Downloads 252
354 A Predictive Model of Supply and Demand in the State of Jalisco, Mexico

Authors: M. Gil, R. Montalvo

Abstract:

Business Intelligence (BI) has become a major source of competitive advantages for firms around the world. BI has been defined as the process of data visualization and reporting for understanding what happened and what is happening. Moreover, BI has been studied for its predictive capabilities in the context of trade and financial transactions. The current literature has identified that BI permits managers to identify market trends, understand customer relations, and predict demand for their products and services. This last capability of BI has been of special concern to academics. Specifically, due to its power to build predictive models adaptable to specific time horizons and geographical regions. However, the current literature of BI focuses on predicting specific markets and industries because the impact of such predictive models was relevant to specific industries or organizations. Currently, the existing literature has not developed a predictive model of BI that takes into consideration the whole economy of a geographical area. This paper seeks to create a predictive model of BI that would show the bigger picture of a geographical area. This paper uses a data set from the Secretary of Economic Development of the state of Jalisco, Mexico. Such data set includes data from all the commercial transactions that occurred in the state in the last years. By analyzing such data set, it will be possible to generate a BI model that predicts supply and demand from specific industries around the state of Jalisco. This research has at least three contributions. Firstly, a methodological contribution to the BI literature by generating the predictive supply and demand model. Secondly, a theoretical contribution to BI current understanding. The model presented in this paper incorporates the whole picture of the economic field instead of focusing on a specific industry. Lastly, a practical contribution might be relevant to local governments that seek to improve their economic performance by implementing BI in their policy planning.

Keywords: business intelligence, predictive model, supply and demand, Mexico

Procedia PDF Downloads 123
353 Purpose in Procurement: Much Discussed, Less Conceptualized – An Exploratory Study of CPO Perceptions Based on the Gioia Methodology

Authors: Laurin Zemmrich, Nicolai Stickler

Abstract:

With the ongoing debate over how to incorporate sustainability, resilience, and value creation into business strategies, many procurement departments are put under pressure by governments, consumers, non-governmental organizations, and other stakeholders to disclose more information about their supply chains. According to practitioners and experts, procurement benefits the supply chain by increasing transparency and accountability, recruiting new suppliers, and supporting sustainable and ethical sourcing strategies. While most procurement departments establish these objectives, the bulk of activities are not carried out or are not regularly monitored. With the full potential of targeted sourcing still to be realized, procurement executives, in particular, are seeking for short-term cost-cutting impacts to appease external shareholders. We overcome this limitation by using an abductive approach to research and integrating empirical data from a Gioia methodology study design with relevant literature. Our analysis demonstrates that the procurement department has six essential levers aligned with sustainability, resilience, and value creation objectives and contributes to developing a new intra- and interorganizational purpose within the supply chain. Three enablers are identified as having a value-creating effect on supply chain interactions. Additionally, we discovered two impacts that alter the power balance between buyers and suppliers during transactions and have a cost-cutting or cost-avoiding effect. While cost-cutting, cost-avoidance, and dependency-reduction impacts are desirable, redistributing power may also have negative consequences. The article establishes a first strategy framework for evaluating the influence of the procurement department on supply chain transactions, allowing managers to understand better and apply the sourcing function inside a supply chain and embed it throughout the business.

Keywords: supply chain management, resilience, sustainability, value creation, purpose

Procedia PDF Downloads 118
352 Impact of Social Crisis on Property Market Performance and Evolving Strategy for Improved Property Transactions in Crisis Prone Environment: A Case Study of North Eastern Nigeria

Authors: A. Yakub AbdurRaheem

Abstract:

Urban violence in the form of ethnic and religious conflicts have been on the increase in many African cities in the recent years of which most of them are the result of intense and bitter competition for political power, the control of limited economic, social and environmental resources. In Nigeria, the emergence of the Boko Haram insurgency in most parts of the northeastern parts have ignited violence, bloodshed, refugee exodus and internal migration. Not only do the persistent attacks of the sect create widespread insecurity and fear, but it has also stifled normal processes of trade and investments most especially real property investment which is acclaimed to accelerate the economic cycle, thus the need to evolve strategies for an improved property market in such areas. This paper, therefore, examines the impact of this social crisis on effective and efficient utilization of real properties as a resource towards the development of the economy, using a descriptive analysis approach where particular emphasis was based on trends in residential housing values; volume of estimated property transactions and real estate investment decisions by affected individuals. Findings indicate that social crisis in the affected areas have been a clog on the wheels of property development and investment as properties worth hundreds of millions have been destroyed thereby having great impact on property values. Based on these findings, recommendations were made to include the need to strategically continue investing in property during such times, the need for Nigerian government to establish an active conflict monitoring and management unit for the prompt response, encourage community and neighborhood policing to ameliorate security challenges in Nigeria.

Keywords: social crisis, economy, resources, property market

Procedia PDF Downloads 237
351 The Challenges of Digital Crime Nowadays

Authors: Bendes Ákos

Abstract:

Digital evidence will be the most widely used type of evidence in the future. With the development of the modern world, more and more new types of crimes have evolved and transformed. For this reason, it is extremely important to examine these types of crimes in order to get a comprehensive picture of them, with which we can help the authorities work. In 1865, with early technologies, people were able to forge a picture of a quality that is not even recognized today. With the help of today's technology, authorities receive a lot of false evidence. Officials are not able to process such a large amount of data, nor do they have the necessary technical knowledge to get a real picture of the authenticity of the given evidence. The digital world has many dangers. Unfortunately, we live in an age where we must protect everything digitally: our phones, our computers, our cars, and all the smart devices that are present in our personal lives and this is not only a burden on us, since companies, state and public utilities institutions are also forced to do so. The training of specialists and experts is essential so that the authorities can manage the incoming digital evidence at some level. When analyzing evidence, it is important to be able to examine it from the moment it is created. Establishing authenticity is a very important issue during official procedures. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. Otherwise, they will not have sufficient probative value and in case of doubt, the court will always decide in favor of the defendant. One of the most common problems in the world of digital data and evidence is doubt, which is why it is extremely important to examine the above-mentioned problems. The most effective way to avoid digital crimes is to prevent them, for which proper education and knowledge are essential. The aim is to present the dangers inherent in the digital world and the new types of digital crimes. After the comparison of the Hungarian investigative techniques with international practice, modernizing proposals will be given. A sufficiently stable yet flexible legislation is needed that can monitor the rapid changes in the world and not regulate afterward but rather provide an appropriate framework. It is also important to be able to distinguish between digital and digitalized evidence, as the degree of probative force differs greatly. The aim of the research is to promote effective international cooperation and uniform legal regulation in the world of digital crimes.

Keywords: digital crime, digital law, cyber crime, international cooperation, new crimes, skepticism

Procedia PDF Downloads 63
350 Use of Personal Rhythm to Authenticate Encrypted Messages

Authors: Carlos Gonzalez

Abstract:

When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).

Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption

Procedia PDF Downloads 304
349 Full Disclosure Policy: Transparency in Fiscal Administration

Authors: Joyly Jill Apud

Abstract:

Corruption is an all-encompassing issue worldwide. Many attempts have been done to address such cases especially by the government through increasing transparency. The Philippine government increased the mechanism of transparency by opening to public its financial transactions through Full Disclosure Policy – mandating all local governments to post in their websites all financial transactions (Philippine Public Transparency Reporting Project, 2011). For transparency to be fully realized, the challenge lies in creating a mechanism where the constituents are encouraged to engage as social auditors. In line of the said challenge, the study focused in Davao City, Philippines measuring the respondent’s awareness, access and utilization of Full Disclosure Policy (FDP). Particularly, this study determined the significant difference on the awareness, access and utilization of respondents when grouped according to sector and the significant relationship between respondents’ awareness and in the access and utilization of FDP reports. The study used descriptive-correlation, Mean, Anova and Pearson R as statistical treatment. The 120 respondents are from the different sectors of Davao City. These are the Academe, Youth, LGUs, NGOs, Business, and Church groups. The awareness of the respondents was measured in three main categories: Existence of the Policy, Content of the Policy and the Manner of Publication. Access and Utilization of the FDP reports is divided into three: Budget Reports, Procurement Reports and Special Purpose Fund Reports. Results showed that the respondents are moderately aware of the Policy. Though it manifested that the respondents are aware of the disclosure, they are unaware of the Full Disclosure Policy and Full Disclosure Policy Portal. Moreover, the respondents seldom access and utilize all the FDP reports. Further results revealed that there is a significant difference in the awareness and the access and utilization of FDP when grouped according to sector. Moreover, significant relationship in the awareness and the access and utilization of the FDP is evident. It showed that the higher the awareness on FDP, the higher the level of access and utilization on the FDP reports.

Keywords: corruption, e-governance, budget transparency, participation

Procedia PDF Downloads 392
348 Static Application Security Testing Approach for Non-Standard Smart Contracts

Authors: Antonio Horta, Renato Marinho, Raimir Holanda

Abstract:

Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses.

Keywords: blockchain, reentrancy, static application security testing, smart contracts

Procedia PDF Downloads 88
347 Implementation of Proof of Work Using Ganache

Authors: Sakshi Singh, Shampa Chakraverty

Abstract:

One of the essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the Blockchain. Moreover, one of the essential consensus algorithms, Proof of Work, performs this job. In this work, we implemented the Proof of Work consensus method on the block formed by performing the transaction using Ganache. The primary goal of this implementation is to understand the process and record how Proof of Work works in reality on newly created blocks.

Keywords: proof of work, blockchain, ganache, smart contract

Procedia PDF Downloads 165
346 Factors of Divergence of Shari’Ah Supervisory Opinions and Its Effects on the Harmonization of Islamic Banking Products and Services

Authors: Dlir Abdullah Ahmed

Abstract:

Overall aims of this study are to investigate the effects of differences of opinions among Shari’ah supervisory bodies on standardization and internationalization of Islamic banking products and services. The study has used semi-structured in-depth interview where five respondents from both the Middle East and Malaysia Shari’ah advisors participated in the interview sessions. The data were analyzed by both manual and software techniques. The findings reveal that indeed there are differences of opinions among Shari’ah advisors in different jurisdictions. These differences are due to differences in educational background, schools of thoughts, environment in which they operate, and legal requirements. Moreover, the findings also reveal that these differences in opinions among Shari’ah bodies create confusions among public and bankers, and negatively affect standardization of Islamic banking transactions. In addition, the study has explored the possibility to develop Islamic-based products. However, the finding shows that it is difficult for the industry to have Islamic-based products due to high competition from conventional counterpart, legal constraints and moral hazard. Furthermore, the findings indicate that lack of political will and unity, lack of technology are the main constraints to internationalization of Islamic banking products. Last but not least, the study found that there are possibility of convergence of opinions, standardization of Islamic banking products and services if there are unified international Shari’ah h advisory council, international basic requirements for Islamic Shari’ah h advisors, and increase training and educations of Islamic bankers. This study has several implications to the bankers, policymakers and researchers. The policymakers should be able to resolve their political differences and set up unified international advisory council and international research and development center. The bankers should increase training and educations of the workforce as well improve on their banking infrastructure to facility cross-border transactions.

Keywords: Shari’ah h views, Islamic banking, products & services, standardization.

Procedia PDF Downloads 69
345 The Growth of E-Commerce and Online Dispute Resolution in Developing Nations: An Analysis

Authors: Robin V. Cupido

Abstract:

Online dispute resolution has been identified in many countries as a viable alternative for resolving conflicts which have arisen in the so-called digital age. This system of dispute resolution is developing alongside the Internet, and as new types of transactions are made possible by our increased connectivity, new ways of resolving disputes must be explored. Developed nations, such as the United States of America and the European Union, have been involved in creating these online dispute resolution mechanisms from the outset, and currently have sophisticated systems in place to deal with conflicts arising in a number of different fields, such as e-commerce, domain name disputes, labour disputes and conflicts arising from family law. Specifically, in the field of e-commerce, the Internet’s borderless nature has served as a way to promote cross-border trade, and has created a global marketplace. Participation in this marketplace boosts a country’s economy, as new markets are now available, and consumers can transact from anywhere in the world. It would be especially advantageous for developing nations to be a part of this global marketplace, as it could stimulate much-needed investment in these nations, and encourage international co-operation and trade. However, for these types of transactions to proliferate, an effective system for resolving the inevitable disputes arising from such an increase in e-commerce is needed. Online dispute resolution scholarship and practice is flourishing in developed nations, and it is clear that the gap is widening between developed and developing nations in this regard. The potential for implementing online dispute resolution in developing countries has been discussed, but there are a number of obstacles that have thus far prevented its continued development. This paper aims to evaluate the various political, infrastructural and socio-economic challenges faced in developing nations, and to question how these have impacted the acceptance and development of online dispute resolution, scholarship and training of online dispute resolution practitioners and, ultimately, developing nations’ readiness to participate in cross-border e-commerce.

Keywords: developing countries, feasibility, online dispute resolution, progress

Procedia PDF Downloads 302
344 An Attentional Bi-Stream Sequence Learner (AttBiSeL) for Credit Card Fraud Detection

Authors: Amir Shahab Shahabi, Mohsen Hasirian

Abstract:

Modern societies, marked by expansive Internet connectivity and the rise of e-commerce, are now integrated with digital platforms at an unprecedented level. The efficiency, speed, and accessibility of e-commerce have garnered a substantial consumer base. Against this backdrop, electronic banking has undergone rapid proliferation within the realm of online activities. However, this growth has inadvertently given rise to an environment conducive to illicit activities, notably electronic payment fraud, posing a formidable challenge to the domain of electronic banking. A pivotal role in upholding the integrity of electronic commerce and business transactions is played by electronic fraud detection, particularly in the context of credit cards which underscores the imperative of comprehensive research in this field. To this end, our study introduces an Attentional Bi-Stream Sequence Learner (AttBiSeL) framework that leverages attention mechanisms and recurrent networks. By incorporating bidirectional recurrent layers, specifically bidirectional Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) layers, the proposed model adeptly extracts past and future transaction sequences while accounting for the temporal flow of information in both directions. Moreover, the integration of an attention mechanism accentuates specific transactions to varying degrees, as manifested in the output of the recurrent networks. The effectiveness of the proposed approach in automatic credit card fraud classification is evaluated on the European Cardholders' Fraud Dataset. Empirical results validate that the hybrid architectural paradigm presented in this study yields enhanced accuracy compared to previous studies.

Keywords: credit card fraud, deep learning, attention mechanism, recurrent neural networks

Procedia PDF Downloads 13
343 Impact of Social Crisis on Property Market Performance and Evolving Strategy for Improved Property Transactions in Crisis Prone Environment: A Case Study of North Eastern Nigeria

Authors: Abdur Raheem, Ado Yakub

Abstract:

Urban violence in the form of ethnic and religious conflicts have been on the increase in many African cities in the recent years of which most of them are the result of intense and bitter competition for political power, the control of limited economic, social and environmental resources. In Nigeria, the emergence of the Boko Haram insurgency in most parts of the north eastern parts have ignited violence, bloodshed, refuge exodus and internal migration. Not only do the persistent attacks of the sect create widespread insecurity and fear, it has also stifled normal processes of trade and investments most especially real property investment which is acclaimed to accelerate the economic cycle, thus the need to evolve strategies for an improved property market in such areas. This paper, therefore, examines the impact of these social crisis on effective and efficient utilization of real properties as a resource towards the development of the economy, using a descriptive analysis approach where particular emphasis was based on trends in residential housing values; volume of estimated property transactions and real estate investment decisions by affected individuals. Findings indicate that social crisis in the affected areas have been a clog on the wheels of property development and investment as properties worth hundreds of millions have been destroyed thereby having great impact on property values. Based on these findings, recommendations were made to include the need to strategically continue investing in property during such times, the need for Nigerian government to establish an active conflict monitoring and management unit for prompt response, encourage community and neighbourhood policing to ameliorate security challenges in Nigeria.

Keywords: social crisis, property market, economy, resources, north-eastern Nigeria

Procedia PDF Downloads 321
342 Model of Application of Blockchain Technology in Public Finances

Authors: M. Vlahovic

Abstract:

This paper presents a model of public finances, which combines three concepts: participatory budgeting, crowdfunding and blockchain technology. Participatory budgeting is defined as a process in which community members decide how to spend a part of community’s budget. Crowdfunding is a practice of funding a project by collecting small monetary contributions from a large number of people via an Internet platform. Blockchain technology is a distributed ledger that enables efficient and reliable transactions that are secure and transparent. In this hypothetical model, the government or authorities on local/regional level would set up a platform where they would propose public projects to citizens. Citizens would browse through projects and support or vote for those which they consider justified and necessary. In return, they would be entitled to a tax relief in the amount of their monetary contribution. Since the blockchain technology enables tracking of transactions, it can be used to mitigate corruption, money laundering and lack of transparency in public finances. Models of its application have already been created for e-voting, health records or land registries. By presenting a model of application of blockchain technology in public finances, this paper takes into consideration the potential of blockchain technology to disrupt governments and make processes more democratic, secure, transparent and efficient. The framework for this paper consists of multiple streams of research, including key concepts of direct democracy, public finance (especially the voluntary theory of public finance), information and communication technology, especially blockchain technology and crowdfunding. The framework defines rules of the game, basic conditions for the implementation of the model, benefits, potential problems and development perspectives. As an oversimplified map of a new form of public finances, the proposed model identifies primary factors, that influence the possibility of implementation of the model, and that could be tracked, measured and controlled in case of experimentation with the model.

Keywords: blockchain technology, distributed ledger, participatory budgeting, crowdfunding, direct democracy, internet platform, e-government, public finance

Procedia PDF Downloads 149
341 Understanding the Relationship between Community and the Preservation of Cultural Landscape - Focusing on Organically Evolved Landscapes

Authors: Adhithy Menon E., Biju C. A.

Abstract:

Heritage monuments were first introduced to the public in the 1960s when the concept of preserving them was introduced. As a result of the 1990s, the concept of cultural landscapes gained importance, emphasizing the importance of culture and heritage in the context of the landscape. It is important to note that this paper is primarily concerned with the second category of ecological landscapes, which is organically evolving landscapes, as they represent a complex network of tangible, intangible, and environment, and the connections they share with the communities in which they are situated. The United Nations Educational, Scientific, and Cultural Organization has identified 39 cultural sites as being in danger, including the Iranian city of Bam and the historic city of Zabid in Yemen. To ensure its protection in the future, it is necessary to conduct a detailed analysis of the factors contributing to this degradation. An analysis of selected cultural landscapes from around the world is conducted to determine which parameters cause their degradation. The paper follows the objectives of understanding cultural landscapes and their importance for development, followed by examining various criteria for identifying cultural landscapes, their various classifications, as well as agencies that focus on their protection. To identify and analyze the parameters contributing to the deterioration of cultural landscapes based on literature and case studies (cultural landscape of Sintra, Rio de Janeiro, and Varanasi). As a final step, strategies should be developed to enhance deteriorating cultural landscapes based on these parameters. The major findings of the study are the impact of community in the parameters derived - integrity (natural factors, natural disasters, demolition of structures, deterioration of materials), authenticity (living elements, sense of place, building techniques, religious context, artistic expression) public participation (revenue, dependence on locale), awareness (demolition of structures, resource management) disaster management, environmental impact, maintenance of cultural landscape (linkages with other sites, dependence on locale, revenue, resource management). The parameters of authenticity, public participation, awareness, and maintenance of the cultural landscape are directly related to the community in which the cultural landscape is located. Therefore, by focusing on the community and addressing the parameters identified, the deterioration curve of cultural landscapes can be altered.

Keywords: community, cultural landscapes, heritage, organically evolved, public participation

Procedia PDF Downloads 87
340 Digital Image Forensics: Discovering the History of Digital Images

Authors: Gurinder Singh, Kulbir Singh

Abstract:

Digital multimedia contents such as image, video, and audio can be tampered easily due to the availability of powerful editing softwares. Multimedia forensics is devoted to analyze these contents by using various digital forensic techniques in order to validate their authenticity. Digital image forensics is dedicated to investigate the reliability of digital images by analyzing the integrity of data and by reconstructing the historical information of an image related to its acquisition phase. In this paper, a survey is carried out on the forgery detection by considering the most recent and promising digital image forensic techniques.

Keywords: Computer Forensics, Multimedia Forensics, Image Ballistics, Camera Source Identification, Forgery Detection

Procedia PDF Downloads 247
339 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 593
338 A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection

Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay

Abstract:

With the increase of credit card usage, the volume of credit card misuse also has significantly increased, which may cause appreciable financial losses for both credit card holders and financial organizations issuing credit cards. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and their customers. Compounding on the complex nature of such adverse strategies, credit card fraudulent activities are rare events compared to the number of legitimate transactions. Hence, the challenge to develop fraud detection that are accurate and efficient is substantially intensified and, as a consequence, credit card fraud detection has lately become a very active area of research. In this work, we provide a survey of current techniques most relevant to the problem of credit card fraud detection. We carry out our survey in two main parts. In the first part, we focus on studies utilizing classical machine learning models, which mostly employ traditional transnational features to make fraud predictions. These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting with his/her electronic devices. These approaches rely on how people behave (instead of what they do), which cannot be easily forged. By providing an overview of current approaches and the results reported in the literature, this survey aims to drive the future research agenda for the community in order to develop more accurate, reliable and scalable models of credit card fraud detection.

Keywords: Credit Card Fraud Detection, User Authentication, Behavioral Biometrics, Machine Learning, Literature Survey

Procedia PDF Downloads 121
337 An Investigation into the Impact of Brexit on Consumer Perception of Trust in the Food Industry

Authors: Babatope David Omoniyi, Fiona Lalor, Sinead Furey

Abstract:

This ongoing project investigates the impact of Brexit on consumer perceptions of trust in the food industry. Brexit has significantly impacted the food industry, triggering a paradigm shift in the movement of food/agricultural produce, regulations, and cross-border collaborations between Great Britain, Northern Ireland, and the Republic of Ireland. In a world where the dynamics have shifted because of regulatory changes that impact trade and the free movement of foods and agricultural produce between these three countries, monitoring and controlling every stage of the food supply chain have become challenging, increasing the potential for food fraud and food safety incidents. As consumers play a pivotal role in shaping the market, understanding any shifts in trust post-Brexit enables them to navigate the market with confidence and awareness. This study aims to explore the complexities of consumer perceptions, focusing on trust as a cornerstone of consumer confidence in the post-Brexit food landscape. The objectives include comparing trust in official controls pre- and post-Brexit, determining consumer awareness of food fraud, and devising recommendations that reflect the evidence from this primary research regarding consumer trust in food authenticity post-Brexit. The research design follows an exploratory sequential mixed methods approach, incorporating qualitative methods such as focus groups and structured interviews, along with quantitative research through a large-scale survey. Participants from UCD and Ulster University campuses, comprising academic and non-academic staff, students, and researchers, will provide insights into the impact of Brexit on consumer trust. Preliminary findings from focus groups and interviews highlight changes in labelling, reduced quantity and quality of foods in both Northern Ireland and the Republic of Ireland, fewer food choices, and increased food prices since Brexit. The study aims to further investigate and quantify these impacts through a comprehensive large-scale survey involving participants from Northern Ireland and the Republic of Ireland. The results will inform official controls and consumer-facing messaging contributing valuable insights to navigate the evolving post-Brexit food landscape.

Keywords: Brexit, consumer trust, food fraud, food authenticity, food safety, food industry

Procedia PDF Downloads 47
336 Application of Signature Verification Models for Document Recognition

Authors: Boris M. Fedorov, Liudmila P. Goncharenko, Sergey A. Sybachin, Natalia A. Mamedova, Ekaterina V. Makarenkova, Saule Rakhimova

Abstract:

In modern economic conditions, the question of the possibility of correct recognition of a signature on digital documents in order to verify the expression of will or confirm a certain operation is relevant. The additional complexity of processing lies in the dynamic variability of the signature for each individual, as well as in the way information is processed because the signature refers to biometric data. The article discusses the issues of using artificial intelligence models in order to improve the quality of signature confirmation in document recognition. The analysis of several possible options for using the model is carried out. The results of the study are given, in which it is possible to correctly determine the authenticity of the signature on small samples.

Keywords: signature recognition, biometric data, artificial intelligence, neural networks

Procedia PDF Downloads 148
335 Building a Blockchain-based Internet of Things

Authors: Rob van den Dam

Abstract:

Today’s Internet of Things (IoT) comprises more than a billion intelligent devices, connected via wired/wireless communications. The expected proliferation of hundreds of billions more places us at the threshold of a transformation sweeping across the communications industry. Yet, we found that the IoT architecture and solutions that currently work for billions of devices won’t necessarily scale to tomorrow’s hundreds of billions of devices because of high cost, lack of privacy, not future-proof, lack of functional value and broken business models. As the IoT scales exponentially, decentralized networks have the potential to reduce infrastructure and maintenance costs to manufacturers. Decentralization also promises increased robustness by removing single points of failure that could exist in traditional centralized networks. By shifting the power in the network from the center to the edges, devices gain greater autonomy and can become points of transactions and economic value creation for owners and users. To validate the underlying technology vision, IBM jointly developed with Samsung Electronics the autonomous decentralized peer-to- peer proof-of-concept (PoC). The primary objective of this PoC was to establish a foundation on which to demonstrate several capabilities that are fundamental to building a decentralized IoT. Though many commercial systems in the future will exist as hybrid centralized-decentralized models, the PoC demonstrated a fully distributed proof. The PoC (a) validated the future vision for decentralized systems to extensively augment today’s centralized solutions, (b) demonstrated foundational IoT tasks without the use of centralized control, (c) proved that empowered devices can engage autonomously in marketplace transactions. The PoC opens the door for the communications and electronics industry to further explore the challenges and opportunities of potential hybrid models that can address the complexity and variety of requirements posed by the internet that continues to scale. Contents: (a) The new approach for an IoT that will be secure and scalable, (b) The three foundational technologies that are key for the future IoT, (c) The related business models and user experiences, (d) How such an IoT will create an 'Economy of Things', (e) The role of users, devices, and industries in the IoT future, (f) The winners in the IoT economy.

Keywords: IoT, internet, wired, wireless

Procedia PDF Downloads 335
334 Russian Invasion of Ukraine-An analysis of Coverage in Indian Media

Authors: Dr.Prabhat Dixit Dr.Sanjay Pandey

Abstract:

Russian invasion of Ukraine has hogged the limelight in both national and international media. It is expected that the news about the war, which had affected the entire world, especially its economy, will continue to dominate the coverage on TV and newspapers in the next few days, at least until the hostilities come to an end. Although the war still continues, and it is hard to predict its ending, its coverage by the Indian media has raised eyebrows, and it has been observed that the coverage lacks depth, authenticity and a majority of information was sought to be presented in a sensational manner only to attract more number of viewers. It is said that Truth is the first casualty of war. The media should, especially while airing or publishing news about the wars, exercise caution so as not to inflame the already volatile situation in the warring countries. It was also observed that there were differences in the facts and figures presented by different media outlets in the country about the war.

Keywords: economy, media, russia, ukraine, war

Procedia PDF Downloads 119
333 Evaluating Problems Arose Due to Adoption of Dual Legal Framework in Regulating the Transactions under Islamic Capital Market with Special Reference to Malaysia

Authors: Rafikoddin Kazi

Abstract:

Almost all the major religions of the world condemn the transactions based on interest which promotes self-centered and materialistic thinking. Still, it is amazing to note that it has become the tradition of transaction at world level hence it is called traditional financial system. The main feature of this system is that it considers economic aspects of the transaction only. This system supports the economic development and not the welfare of humankind. However, it is worth mentioning the fact that, except Islamic financial system no other financial system stood in front of it as a viable alternative system. Although many countries have tried to create financial infrastructure and system, still the Malaysian Islamic financial system has got its own peculiarity. It has made tremendous progress in creating sound Islamic Financial system. However, the historical aspect of this country which has passed through Islamic and traditional financial system has got its own advantages and disadvantages. The advantageous factor is that, despite having mix and heterogeneous culture, it has succeeded in creating Islamic Financial System based on the dual legal system to satisfy the needs of multi-cultural factors. This fact has proved that Islamic Financial System does not need purely Muslim population. However, due to adoption of the dual legal system, several legal issues have been taken place. According to this system, the application of Islamic Law has been limited only up to some family and religious matters. The rest of the matters are being dealt with under the traditional laws, the principles and practices of which are different from that of the Islamic Legal System. The matter becomes all the more complicated when the cases are partially or simultaneously concerned with traditional vis-à-vis Islamic Laws as it requires expertise in both the legal systems. However, the educational principles and systems are different in respect of both the systems. To face this problem, Shariah Advisory Council has been established. But the Multiplicity of Shariah authorities without judicial power has created confusion at various levels. Therefore, some experts have stressed the need for improving, empowering the Islamic financial, legal system to make it more integrated and holistic. In view of the above, an endeavor has been made in this paper to throw some light on the matters related to the adoption of the dual legal system. The paper is conceptual in nature and the method adopted is the intensive survey of literature thereby all the information has been gathered from the secondary sources.

Keywords: Islamic financial system, Islamic legal system, Islamic capital market (ICM) , traditional financial system

Procedia PDF Downloads 199