Search results for: financial security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5341

Search results for: financial security

5251 Islamic Banking: An Ultimate Source of Financial Inclusion

Authors: Tasawar Nawaz

Abstract:

Promotion of socioeconomic justice through redistribution of wealth is one of the most salient features of Islamic economic system. Islamic financial institutions known as Islamic banks are used to implement this in practice under the guidelines of Islamic Shariah law. Islamic banking systems strive to promote and achieve financial inclusion among the society by offering interest-free banking and risk-sharing financing solutions. Shariah-compliant micro finance is one of the most popular financial instruments used by Islamic banks to enhance access to finance. Benevolent loan (or Qard-al-Hassanah) is one of the popular financial tools used by the Islamic banks to promote financial inclusion. This aspect of Islamic banking is empirically examined in this paper with specific reference to firm’s resources, largely defined here as intellectual capital. The paper finds that Islamic banks promote financial inclusion by exploiting available resources especially, the human intellectual capital.

Keywords: financial inclusion, intellectual capital, Qard-al-Hassanah, Islamic banking

Procedia PDF Downloads 296
5250 The Role of the Rate of Profit Concept in Creating Economic Stability in Islamic Financial Market

Authors: Trisiladi Supriyanto

Abstract:

This study aims to establish a concept of rate of profit on Islamic banking that can create economic justice and stability in the Islamic Financial Market (Banking and Capital Markets). A rate of profit that creates economic justice and stability can be achieved through its role in maintaining the stability of the financial system in which there is an equitable distribution of income and wealth. To determine the role of the rate of profit as the basis of the profit sharing system implemented in the Islamic financial system, we can see the connection of rate of profit in creating financial stability, especially in the asset-liability management of financial institutions that generate a stable net margin or the rate of profit that is not affected by the ups and downs of the market risk factors, including indirect effect on interest rates. Furthermore, Islamic financial stability can be seen from the role of the rate of profit on the stability of the Islamic financial assets value that are measured from the Islamic financial asset price volatility in the Islamic Bond Market in the Capital Market.

Keywords: economic justice, equitable distribution of income, equitable distribution of wealth, rate of profit, stability in the financial system

Procedia PDF Downloads 300
5249 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 508
5248 The Valuation of Equity Book Value and Net Income of Financial Firms in Times of Financial Crisis

Authors: Sami Adwan, Alaa Alhaj Ismail, Claudia Girardone

Abstract:

This paper examines the changes in the value relevance of book value of equity and net income of financial firms over the crisis period. It also examines how these changes vary with three variables, namely, fair value exposure, ownership concentration, and regulatory capital ratios. Using a sample of financial firms operating in the European Economic Area over 2005-2011, our findings suggest that the value relevance of book value of equity increases while that of net income decreases during the financial crisis. We find that more exposure to fair value accounting mitigates the impact of the crisis on the value relevance of book value of equity and net income. We also find that more concentrated ownership appears to have a mitigating impact on the changes in the value relevance of both book value of equity and net income in times of financial crisis. Finally, we find evidence that the level of regulatory capital ratios tends to have an attenuating effect on the changes in the value relevance of net income (but not book value of equity) in times of financial crisis.

Keywords: value relevance, financial crisis, financial firms, fair value, ownership concentration, regulatory capital

Procedia PDF Downloads 167
5247 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 404
5246 The Impact of Financial Literacy to the Retirement Planning on Malaysian Household

Authors: Stanley Yap, Patrick Kee Peng Kong, Chong Wei Ying, Leow Hon Wei

Abstract:

Purpose: This study examines the comprehensive household retirement planning based on the level of financial literacy in Malaysia. Sufficient financial literacy is essential to make financial decision on Malaysian household retirement planning. Design/Methodology/Approach: Numerous measurements consist of present value of total retirement fund needed, future value of the expenses and inflation-adjusted interest rate are used in this paper. Therefore, we are able to identify the retirement gap that needs to be considered immediately. Findings: Our results show, firstly, adequate financial literacy is vital to achieve long term household retirement planning. Secondly, there is no retirement gap where the future value of the existing financial assets is greater than the lump sum needs during retirement phase. Thirdly, financial assets should be prepared in early age to accumulate substantial funding to support household retirement life. Practical Implications: The outcomes benefit to retiree and working adults. It highlights the importance of financial literacy to retirement planning. It is also a milestone for Malaysian to achieve developed country if Malaysian has sufficient retirement funding. Originality/Value: There is currently lack of in-depth research on financial literacy related to household retirement planning. Further, the paper also focusses on financial literacy, as a means to assist those in funding retirement resources, in order to fulfil the retirement gap.

Keywords: financial literacy, retirement planning, retirement resources, retirement gap, Malaysian household

Procedia PDF Downloads 451
5245 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 75
5244 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 110
5243 The Application and Applicability of Computer System to Financial Management: A Case Study of College of Education, Oju, Benue State, Nigeria

Authors: Agih Ukuru Agih

Abstract:

This work is an appraisal of the application and applicability of computer system to financial management in improving the speed, performance, accuracy, and efficiency of the College of Education, Oju. The computerization of financial management, which is a recent development that has authentic and dedicated balancing of accounting records, would be of enormous benefits to the college. The core objective of this project is to recommend the software that typically matches a computerized institution, making for improved service, reduced fraud, mishandled funds, and financial records in the College of Education, Oju. Considering major globalization impacts in computerized financial management of the college, the study recommends among other things that the College of Education, Oju should endeavor to be positive towards computerized financial management in the institution.

Keywords: computer system, balancing, accounting records, computerized financial management

Procedia PDF Downloads 373
5242 Critical Accounting Estimates and Transparency in Financial Reporting: An Observation Financial Reporting under US GAAP

Authors: Ahmed Shaik

Abstract:

Estimates are very critical in accounting and Financial Reporting cannot be complete without these estimates. There is a long list of accounting estimates that are required to be made to compute Net Income and to determine the value of assets and liabilities. To name a few, valuation of inventory, depreciation, valuation of goodwill, provision for bad debts and estimated warranties, etc. require the use of different valuation models and forecasts. Different business entities under the same industry may use different approaches to measure the value of financial items being reported in Income Statement and Balance Sheet. The disclosure notes do not provide enough details of the approach used by a business entity to arrive at the value of a financial item. Lack of details in the disclosure notes makes it difficult to compare the financial performance of one business entity with the other in the same industry. This paper is an attempt to identify the lack of enough information about accounting estimates in disclosure notes, the impact of the absence of details of accounting estimates on the comparability of financial data and financial analysis. An attempt is made to suggest the detailed disclosure while taking care of the cost and benefit of making such disclosure.

Keywords: accounting estimates, disclosure notes, financial reporting, transparency

Procedia PDF Downloads 187
5241 Financial Development and Economic Growth of Sub-Saharan Africa Using System GMM Analysis

Authors: Temesgen Yaekob Ergano, Sure Pulla Rao

Abstract:

The study on financial development and economic growth in Sub-Saharan Africa utilizes System GMM analysis to investigate the relationship between financial development indicators and economic performance in the region. The research findings reveal significant impacts of various financial indicators on economic growth, such as the positive influence of bank liquid reserves to bank assets ratio (R/A), trade openness, and the broad money to total reserves ratio (M/R) on the economic growth of Sub-Saharan Africa. Additionally, the study highlights the negative impact of domestic credit provided to the private sector by banks (D_bank) on economic growth, emphasizing the importance of prudent credit allocation to avoid over-indebtedness and financial crises. These results provide valuable insights for policymakers aiming to foster sustainable economic growth in the region by leveraging financial development effectively.

Keywords: financial development, economic growth, Sub-Saharan Africa, system GMM analysis, financial indicators.

Procedia PDF Downloads 36
5240 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 525
5239 Financial Inclusion in Indonesia and Its Challenges

Authors: Yen Sun, Pariang Siagian

Abstract:

The aim of this paper is to examine the progress of financial inclusion in Indonesia. The object of this paper is Micro Enterprises (MEs) and methodology used will be qualitative method by using surveys and questionnaires. The results show that there are still 20% MEs have no banking facilities at all and about 78% MEs still use their own capital to run their business. Furthermore, personal characteristics such as gender and education are factors that can explain financial inclusion. It is also said that in general MEs need banking product and services. However, there are still barriers that hinder them to be financially included. The most barriers they have to face are marketing exclusion. It shows that they have lack information about banking product and services since marketing strategy from bank is not disseminated clearly through various media.

Keywords: financial inclusion, financial exclusion, micro enterprises, Indonesia

Procedia PDF Downloads 385
5238 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 86
5237 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 73
5236 A Literature Review on the Effect of Financial Knowledge toward Corporate Growth: The Important Role of Financial Risk Attitude

Authors: Risna Wijayanti, Sumiati, Hanif Iswari

Abstract:

This study aims to analyze the role of financial risk attitude as a mediation between financial knowledge and business growth. The ability of human resources in managing capital (financial literacy) can be a major milestone for a company's business to grow and build its competitive advantage. This study analyzed the important role of financial risk attitude in bringing about financial knowledge on corporate growth. There have been many discussions arguing that financial knowledge is one of the main abilities of corporate managers in determining the success of managing a company. However, a contrary argument of other scholars also enlightened that financial knowledge did not have a significant influence on corporate growth. This study used literatures' review to analyze whether there is another variable that can mediate the effect of financial knowledge toward corporate growth. Research mapping was conducted to analyze the concept of risk tolerance. This concept was related to people's risk aversion effects when making a decision under risk and the role of financial knowledge on changes in financial income. Understanding and managing risks and investments are complicated, in particular for corporate managers, who are always demanded to maintain their corporate growth. Substantial financial knowledge is extremely needed to identify and take accurate information for corporate financial decision-making. By reviewing several literature, this study hypothesized that financial knowledge of corporate managers would be meaningless without manager's courage to bear risks for taking favorable business opportunities. Therefore, the level of risk aversion from corporate managers will determine corporate action, which is a reflection of corporate-level investment behavior leading to attain corporate success or failure for achieving the company's expected growth rate.

Keywords: financial knowledge, financial risk attitude, corporate growth, risk tolerance

Procedia PDF Downloads 123
5235 Information on Financial Statements for Loan Decision-Making of Commercial Banks in Vietnam

Authors: Mai Hoang Minh

Abstract:

Financial statements (FS) are tools which provide information to users for making business decisions. This article is going to present the survey which clarifies the role of financial statement to Commercial Banks’ loan decisions in Vietnam. Moreover, this also discusses about financial statement’s quality currently, thereby making suggestions for enterprises to enhance the usefulness of accounting information in borrowing activities.

Keywords: usefulness of financial statement, accounting information quality, loan decisions

Procedia PDF Downloads 263
5234 Environmental Sustainability and Energy Consumption: The Role of Financial Development in OPEC-1 Countries

Authors: Isah Wada

Abstract:

The current research investigates the role of financial development in an environmental sustainability-energy consumption nexus for OPEC-1 member countries. The empirical findings suggest that financial development increases environmental sustainability but energy consumption and real output expansion diminishes environmental sustainability, generally. Thus, whilst real output and financial development accelerates energy consumption, environmental sustainability quality diminishes clean energy initiatives. Even more so, energy consumption and financial development stimulates real output growth. The result empirically demonstrates that policy advocates must address broader issues relating to financial development whilst seeking to achieve environmental sustainability due largely to energy consumption.

Keywords: energy consumption, environmental sustainability, financial development, OPEC, real output

Procedia PDF Downloads 172
5233 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 531
5232 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 419
5231 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 486
5230 Financial Regulation and the Twin Peaks Model in a Developing and Developed Country Contexts: An Institutional Theory Perspective

Authors: Pumela Msweli, Dexter L. Ryneveldt

Abstract:

This paper seeks to shed light on institutional logics and institutionalization processes that influence the successful implementation of financial sector regulations. We use the neo-institutional theory lens to interrogate how the newly promulgated Financial Sector Regulations Act (FSRA) provides for the institutionalisation of the Twin Peaks Model. With the enactment of FSRA, previous financial regulatory institutions were dismantled, and new financial regulators established. In point, the Financial Services Conduct Authority (FSCA) replaced the Financial Services Board (FSB), and accordingly, the Prudential Authority (PA) was established. FSRA is layered with complexities that make it mandatory to co-exist, cooperate, and collaborate with other institutions to fulfill FSRA’s overall financial stability objective. We use content analysis of the financial regulations that established the Twin Peaks Models (TPM) in South Africa and in the Netherlands, to map out the three-stage institutionalization processes: (1) habitualisation, (2) objectification and (3) sedimentation. This allowed for a comparison of how South Africa, as a developing country and Netherlands as a developed country, have institutionalized the Twin Peak model. We provide valuable insights into how differences in the institutional and societal logics of the developing and developed contexts shape the institutionalization of financial regulations.

Keywords: financial industry, financial regulation, financial stability, institutionalisation, habitualization, objectification, sedimentation, twin peaks model

Procedia PDF Downloads 146
5229 Actual and Perceived Financial Sophistication and Wealth Accumulation: The Role of Education and Gender

Authors: Christina E. Bannier, Milena Neubert

Abstract:

This study examines the role of actual and perceived financial sophistication (i.e., financial literacy and confidence) for individuals’ wealth accumulation. Using survey data from the German SAVE initiative, we find strong gender- and education-related differences in the distribution of the two variables: Whereas financial literacy rises in formal education, confidence increases in education for men but decreases for women. As a consequence, highly-educated women become strongly underconfident, while men remain overconfident. We show that these differences influence wealth accumulation: The positive effect of financial literacy is stronger for women than for men and is increasing in women’s education but decreasing in men’s. For highly-educated men, however, overconfidence closes this gap by increasing wealth via stronger financial engagement. Interestingly, female underconfidence does not reduce current wealth levels though it weakens future-oriented financial engagement and may thus impair future wealth accumulation.

Keywords: financial literacy, financial sophistication, confidence, wealth, household finance, behavioral finance, gender, formal education

Procedia PDF Downloads 257
5228 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 745
5227 Chern-Simons Equation in Financial Theory and Time-Series Analysis

Authors: Ognjen Vukovic

Abstract:

Chern-Simons equation represents the cornerstone of quantum physics. The question that is often asked is if the aforementioned equation can be successfully applied to the interaction in international financial markets. By analysing the time series in financial theory, it is proved that Chern-Simons equation can be successfully applied to financial time-series. The aforementioned statement is based on one important premise and that is that the financial time series follow the fractional Brownian motion. All variants of Chern-Simons equation and theory are applied and analysed. Financial theory time series movement is, firstly, topologically analysed. The main idea is that exchange rate represents two-dimensional projections of three-dimensional Brownian motion movement. Main principles of knot theory and topology are applied to financial time series and setting is created so the Chern-Simons equation can be applied. As Chern-Simons equation is based on small particles, it is multiplied by the magnifying factor to mimic the real world movement. Afterwards, the following equation is optimised using Solver. The equation is applied to n financial time series in order to see if it can capture the interaction between financial time series and consequently explain it. The aforementioned equation represents a novel approach to financial time series analysis and hopefully it will direct further research.

Keywords: Brownian motion, Chern-Simons theory, financial time series, econophysics

Procedia PDF Downloads 461
5226 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 457
5225 Developing a HSE-Finacial Indicator Model in Oil Industry

Authors: Reza Safari, Ali Rajabzadeh Ghatari, Raheleh Hossseinzadeh Mahabadi

Abstract:

In the present world, there are different pressures on firms such as competition, legislations, social etc. these pressures force the firms to follow “survival” as their primary goal and then growth. One of the main factors that helps firms to reach their goals is proper financial performance. To find out about the financial performance, a firm should monitors its financial performance. Financial performance affected by many factors. This research seeks to clear which financial performance indicators are most important according to Environmental situation of a firm and what are their priorities. To do so, environmental indicators specified as presented on OECD Key Environmental Indicators 2008 and so the financial performance indicators such as Profitability, Liquidity, Gearing, Investor ratios, and etc. At this stage, the affections questioned through questionnaires. After gaining the results, data analyzed using Promethee technique. By using decision matrixes extracted from those techniques an expert system designed. This expert system suggests the suitable financial performance indicators and their ranking by receiving the environment situation given environment indicators weight.

Keywords: environment indicators, financial performance indicators, promethee, expert system

Procedia PDF Downloads 424
5224 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 218
5223 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 723
5222 Security Features for Remote Healthcare System: A Feasibility Study

Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin

Abstract:

Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.

Keywords: remote healthcare, IT security, security features, wireless sensor application

Procedia PDF Downloads 292