Search results for: financial security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5341

Search results for: financial security

4111 Customer Adoption and Attitudes in Mobile Banking in Sri Lanka

Authors: Prasansha Kumari

Abstract:

This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking.

Keywords: compatibility, complexity, mobile banking, observability, risk

Procedia PDF Downloads 188
4110 Empirical Investigation into Climate Change and Climate-Smart Agriculture for Food Security in Nigeria

Authors: J. Julius Adebayo

Abstract:

The objective of this paper is to assess the agro-climatic condition of Ibadan in the rain forest ecological zone of Nigeria, using rainfall pattern and temperature between 1978-2018. Data on rainfall and temperature in Ibadan, Oyo State for a period of 40 years were obtained from Meteorological Section of Forestry Research Institute of Nigeria, Ibadan and Oyo State Meteorology Centre. Time series analysis was employed to analyze the data. The trend revealed that rainfall is decreasing slowly and temperature is averagely increasing year after year. The model for rainfall and temperature are Yₜ = 1454.11-8*t and Yₜ = 31.5995 + 2.54 E-02*t respectively, where t is the time. On this basis, a forecast of 20 years (2019-2038) was generated, and the results showed a further downward trend on rainfall and upward trend in temperature, this indicates persistence rainfall shortage and very hot weather for agricultural practices in the southwest rain forest ecological zone. Suggestions on possible solutions to avert climate change crisis and also promote climate-smart agriculture for sustainable food and nutrition security were also discussed.

Keywords: climate change, rainfall pattern, temperature, time series analysis, food and nutrition security

Procedia PDF Downloads 127
4109 Impact of Organic Farming on Soil Fertility and Microbial Activity

Authors: Menuka Maharjan

Abstract:

In the name of food security, agriculture intensification through conventional farming is being implemented in Nepal. Government focus on increasing agriculture production completely ignores soil as well human health. This leads to create serious soil degradation, i.e., reduction of soil fertility and microbial activity and health hazard in the country. On this note, organic farming is sustainable agriculture approach which can address challenge of sustaining food security while protecting the environment. This creates a win-win situation both for people and the environment. However, people have limited knowledge on significance of organic farming for environment conservation and food security especially developing countries like Nepal. Thus, the objective of the study was to assess the impacts of organic farming on soil fertility and microbial activity compared to conventional farming and forest in Chitwan, Nepal. Total soil organic carbon (C) was highest in organic farming (24 mg C g⁻¹ soil) followed by conventional farming (15 mg C g⁻¹ soil) and forest (9 mg C g⁻¹ soil) in the topsoil layer (0-10 cm depth). A similar trend was found for total nitrogen (N) content in all three land uses with organic farming soil possessing the highest total N content in both 0-10 cm and 10-20 cm depth. Microbial biomass C and N were also highest under organic farming, especially in the topsoil layer (350 and 46 mg g⁻¹ soil, respectively). Similarly, microbial biomass phosphorus (P) was higher (3.6 and 1.0 mg P kg⁻¹ at 0-10 and 10-20 cm depth, respectively) in organic farming compared to conventional farming and forest at both depths. However, conventional farming and forest soils had similar microbial biomass (C, N, and P) content. After conversion of forest, the P stock significantly increased by 373% and 170% in soil under organic farming at 0-10 and 10-20 cm depth, respectively. In conventional farming, the P stock increased by 64% and 36% at 0-10 cm and 10-20 cm depth, respectively, compared to forest. Overall, organic farming practices, i.e., crop rotation, residue input and farmyard manure application, significantly alters soil fertility and microbial activity. Organic farming system is emerging as a sustainable land use system which can address the issues of food security and environment conservation by increasing sustainable agriculture production and carbon sequestration, respectively, supporting to achieve goals of sustainable development.

Keywords: organic farming, soil fertility, micobial biomas, food security

Procedia PDF Downloads 163
4108 Solving 94-Bit ECDLP with 70 Computers in Parallel

Authors: Shunsuke Miyoshi, Yasuyuki Nogami, Takuya Kusaka, Nariyoshi Yamai

Abstract:

Elliptic curve discrete logarithm problem (ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard's rho method to evaluate the security of ECDLP on Barreto-Naehrig (BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially, the group structure on BN curve, distinguished point method, and Montgomery trick are well-known techniques. This paper applies these techniques and shows its optimization. According to the experimental results for which a large-scale parallel system with MySQL is applied, 94-bit ECDLP was solved about 28 hours by parallelizing 71 computers.

Keywords: Pollard's rho method, BN curve, Montgomery multiplication

Procedia PDF Downloads 253
4107 The Invisible Asset Influence on Corporate Performance: A Case Study

Authors: Hassan Medaghri Alaoui

Abstract:

The accounting and financial reporting system in use today is over 500 years old and has failed to capture the new knowledge and innovation economy in which intangible assets are becoming increasingly valuable. Yet, there has been a growing acknowledgment among the research community as to the relevance of intellectual capital as a major enhancer of an organization’s well-being. Much of the research provides great support for how the IC is instrumental in determining financial and stock performances. As far as we know, this article is one of the earliest exploratory attempts to examine the intellectual capital impact on the corporate performance of the IT sector in Morocco. The purpose of this study is to verify empirically the influence of intellectual capital on firm performance. We have undertaken, over a fifteen-year period, a longitudinal (2005–2019) case study of a prominent payment-solutions company based in a developing economy with global operations.

Keywords: intellectual capital, IT sector, measuring intellectual capital, modified value added intellectual capital coefficient, Morocco

Procedia PDF Downloads 103
4106 Data Mining Techniques for Anti-Money Laundering

Authors: M. Sai Veerendra

Abstract:

Today, money laundering (ML) poses a serious threat not only to financial institutions but also to the nation. This criminal activity is becoming more and more sophisticated and seems to have moved from the cliché of drug trafficking to financing terrorism and surely not forgetting personal gain. Most of the financial institutions internationally have been implementing anti-money laundering solutions (AML) to fight investment fraud activities. However, traditional investigative techniques consume numerous man-hours. Recently, data mining approaches have been developed and are considered as well-suited techniques for detecting ML activities. Within the scope of a collaboration project on developing a new data mining solution for AML Units in an international investment bank in Ireland, we survey recent data mining approaches for AML. In this paper, we present not only these approaches but also give an overview on the important factors in building data mining solutions for AML activities.

Keywords: data mining, clustering, money laundering, anti-money laundering solutions

Procedia PDF Downloads 527
4105 Transparency of Audit Firms in Croatia

Authors: Marko Čular

Abstract:

The aim of this paper is to raise general awareness of transparency importance for audit firms and for audit services’ users. This paper analyses transparency of audit firms that audited financial statements of listed companies, for year 2011 and 2012. We use this two years because in the meantime Code of Ethics for Professional Accountants has been adopted. This paper investigates whether transparency reports of audit firms are in accordance with the Croatian Audit Act and whether there is a difference on transparency in observed years. For this paper, quality index of transparency report and financial indicators of audit firms are used to get conclusion about condition of audit firms transparency reporting. Results of our study indicate that audit firms are not fully transparent, looking for both years. Transparency of audit firms in 2012 has improved significantly, compared with transparency in 2011.

Keywords: transparency report, index quality of transparency report, Croatian audit act, code of ethics for professional accountants

Procedia PDF Downloads 282
4104 Who Save for Children’s Future Education in China: A Research Note

Authors: Jin Huang

Abstract:

Research shows that asset-building policies have positive financial and non-financial impacts on children and families. To promote the development of asset-building policies for children in China, it is important to understand the current status of family savings for children. We use the data from the 2016 China Family Panel Studies and show only 16% of families have savings designated for children’s future education. Families with advantaged socioeconomic backgrounds are more likely to save and also save more for their children than their counterparts with disadvantaged backgrounds. Without large-scale and progressive policy interventions, families with disadvantaged backgrounds are less likely to build assets for children. Policy and practice implications for family social workers are discussed.

Keywords: assets, asset building, child, china, education, family, savings

Procedia PDF Downloads 75
4103 Security in Resource Constraints: Network Energy Efficient Encryption

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.

Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC

Procedia PDF Downloads 136
4102 Banking Union: A New Step towards Completing the Economic and Monetary Union

Authors: Marijana Ivanov, Roman Šubić

Abstract:

The single rulebook together with the Single Supervisory Mechanism and the Single Resolution Mechanism - as two main pillars of the banking union, represent important steps towards completing the Economic and Monetary Union. It should provide a consistent application of common rules and administrative standards for supervision, recovery and resolution of banks – with the final aim that a former practice of the bail-out is replaced with the bail-in system through which bank failures will be resolved by their own funds, i.e. with minimal costs for taxpayers and real economy. It has to reduce the financial fragmentation recorded in the years of crisis as the result of divergent behaviors in risk premium, lending activities, and interest rates between the core and the periphery. In addition, it should strengthen the effectiveness of monetary transmission channels, in particular the credit channels and overflows of liquidity on the single interbank money market. However, contrary to all the positive expectations related to the future functioning of the banking union, low and unbalanced economic growth rates remain a challenge for the maintenance of financial stability in the euro area, and this problem cannot be resolved just by a single supervision. In many countries bank assets exceed their GDP by several times, and large banks are still a matter of concern because of their systemic importance for individual countries and the euro zone as a whole. The creation of the SSM and the SRM should increase transparency of the banking system in the euro area and restore confidence that have been disturbed during the depression. It would provide a new opportunity to strengthen economic and financial systems in the peripheral countries. On the other hand, there is a potential threat that future focus of the ECB, resolution mechanism and other relevant institutions will be extremely oriented to the large and significant banks (whereby one half of them operate in the core and most important euro area countries), while it is questionable to what extent the common resolution funds will be used for rescue of less important institutions.

Keywords: banking union, financial integration, single supervision mechanism (SSM)

Procedia PDF Downloads 462
4101 Corporate Collapses and (Legal) Ethics

Authors: Elizabeth Snyman-Van Deventer

Abstract:

Numerous corporate scandals, which included investment scams, corporate malfeasance, unethical conduct and conflicts of interest, contributed to the collapse of WorldCom, Global Crossing, Xerox, Tyco, Enron, Sprint, AbbVie and Imclone and led to alarmed investors abandoning public securities markets and the tumbling of U.S stock markets. These companies suffered significant financial losses due to substantial and fraudulent misstatements and other illegal, corrupt or unethical practices. Executives were convicted of fraud and sentenced to prison. The corporate financial scandals, governance failures, and the ensuing public outcries led to mandatory legislation, e.g. the Sarbanes-Oxley Act in the USA. In European corporate scandals such as Parmalat, Royal Dutch Ahold, Vivendi, Adecco and Elan, the boards missed financial misrepresentations. In South Africa, Steinhoff is the most well-known example of corporate collapse, but now we can also add Tongaat Hulett. It seems as if fraud and corruption may be the major sources of these corporate collapses. In most instances, there is either the active involvement of the directors and managers in these fraudulent or corrupt practices, or there is a negligent or even intentional failure to act by directors to prevent these activities. However, besides directors and managers, auditors and lawyers failed in most of these companies to fulfil their professional duties. In most of these major collapses, the ethics of especially auditors and directors could be questioned. This paper will first provide a brief overview of corporate collapses. Secondly, the reasons for these collapses, with a focus on unethical conduct, will be discussed.

Keywords: professional duties, corporate collapses, ethical conduct, legal ethics, directors, auditors

Procedia PDF Downloads 47
4100 Family Firms and Investment–Cash Flow Sensitivity: Empirical Evidence from Canada

Authors: Imen Latrous

Abstract:

Family firm is the most common form of business organization in the world. Many family businesses rely heavily on their own capital to finance their expansion. This dependence on internal funds for their investment may be deliberate to maintain the family dominant position or involuntary as family firms have limited access to external funds. Our understanding of family firm’s choice to fund their own growth using existing capital is somewhat limited. The aim of this paper is to study whether the presence of a controlling family in the company either mitigates or exacerbates external financing constraints. The impact of family ownership on investment–cash flow sensitivity is ultimately an empirical question. We use a sample of 406 Canadian firms listed in Toronto Stock exchange (TSX) over the period 2005–2014 in order to explore this relationship. We distinguish between three elements in the definition of family firms, specifically ownership, control and management, to explore the issue whether family firms are more efficient organisational form. Our research contributes to the extant literature on family ownership in several ways. First, as our understanding of family firm’s investment cash flow sensitivity is somewhat limited in recession times, we explore the effect of family firms on the relation between investment and cash flow during the recent 2007-2009 financial crisis. We also analyse this relationship difference between family firms and non family firms before and during financial crisis. Finally, our paper addresses the endogeneity problem of family ownership and investment-cash flow sensitivity.

Keywords: family firms, investment–cash flow sensitivity, financial crisis, corporate governance

Procedia PDF Downloads 315
4099 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 105
4098 Islamic Banking and Finance in Theory and Practice: The Experience of Malaysia and Algeria

Authors: Zidane Abderrezaq

Abstract:

This paper’s primary objective is to identify the relative importance of various Islamic financial products, in theory and in practice, by examining the financing records of the Bank Islam Malaysia (Berhad) and the Algeria Islamic Bank. Currently, seven available Islamic financing products are considered viable alternatives to interest-based conventional contracts: mudarabah (trust financing), musharakah (equity financing), ijarah (lease financing), murabahah (trade financing), qard al-hassan (welfare loan), bay` bi al-thaman al-ajil (deferred payment financing), and istisna` (progressive payments). Among these financial products, mudarabah and musharakah are the most distinct. Their unique characteristics (at least in theory) make Islamic banks and Islamic financing viable alternatives to the conventional interest-based financial system. The question before us is to determine the extent of mudarabah and musharakah in Islamic financing in practice. The data are as follows: the average mudarabah is 5% of total financing, and the average musharakah is less than 3%. The combined average of mudarabah and musharakah for the two Islamic banks is less than 4% of the total finance and advances. The average qard al-hassan is about 4%, while istisna` does not yet exist in practice. Murabahah is the most popular and dominates all other modes of Islamic financing. The average use of murabahah is over 54%. When the bay` bi al-thaman al-ajil is added to the murabahah, the percentage of total financing is shown to be 82.68%. This paper also explores some possible reasons why these two Islamic banks appear to prefer murabahah to mudarabah and musharakah.

Keywords: Islamic banking, Islamic finance, Islamic banking rofitability, investment banking

Procedia PDF Downloads 468
4097 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 337
4096 Constraining Bank Risk: International Evidence on the Role of Bank Capital and Charter Value

Authors: Mamiza Haq

Abstract:

This paper examines the relevance of bank capital and charter value on bank insolvency and liquidity risks. Using an unbalanced panel of 2,111 unique local banks across 22 countries over 1998-2012, we find that both bank capital and charter value lower insolvency and liquidity risks, but this effect varies among conventional, Islamic, and Islamic-window banks. The risk constraining effect of bank capital becomes more prominent in the post 2007-2008 global financial crisis. Moreover, the relationships vary when conditioned upon other key bank-specific characteristics. For instance, the effect of capital on risk-reduction diminishes in the presence of high charter value for conventional-G7 and Islamic-window banks, during-GFC and pre-GFC period; respectively. Our findings have important policy implications related to bank safety. The results are robust to a range of robustness tests.

Keywords: bank capital, charter value, risk, financial crisis

Procedia PDF Downloads 263
4095 Growing Pains and Organizational Development in Growing Enterprises: Conceptual Model and Its Empirical Examination

Authors: Maciej Czarnecki

Abstract:

Even though growth is one of the most important strategic objectives for many enterprises, we know relatively little about this phenomenon. This research contributes to broaden our knowledge of managerial consequences of growth. Scales for measuring organizational development and growing pains were developed. Conceptual model of connections among growth, organizational development, growing pains, selected development factors and financial performance were examined. The research process contained literature review, 20 interviews with managers, examination of 12 raters’ opinions, pilot research and 7 point Likert scale questionnaire research on 138 Polish enterprises employing 50-249 people which increased their employment at least by 50% within last three years. Factor analysis, Pearson product-moment correlation coefficient, student’s t-test and chi-squared test were used to develop scales. High Cronbach’s alpha coefficients were obtained. The verification of correlations among the constructs was carried out with factor correlations, multiple regressions and path analysis. When the enterprise grows, it is necessary to implement changes in its structure, management practices etc. (organizational development) to meet challenges of growing complexity. In this paper, organizational development was defined as internal changes aiming to improve the quality of existing or to introduce new elements in the areas of processes, organizational structure and culture, operational and management systems. Thus; H1: Growth has positive effects on organizational development. The main thesis of the research is that if organizational development does not catch up with growing complexity of growing enterprise, growing pains will arise (lower work comfort, conflicts, lack of control etc.). They will exert a negative influence on the financial performance and may result in serious organizational crisis or even bankruptcy. Thus; H2: Growth has positive effects on growing pains, H3: Organizational development has negative effects on growing pains, H4: Growing pains have negative effects on financial performance, H5: Organizational development has positive effects on financial performance. Scholars considered long lists of factors having potential influence on organizational development. The development of comprehensive model taking into account all possible variables may be beyond the capacity of any researcher or even statistical software used. After literature review, it was decided to increase the level of abstraction and to include following constructs in the conceptual model: organizational learning (OL), positive organization (PO) and high performance factors (HPF). H1a/b/c: OL/PO/HPF has positive effect on organizational development, H2a/b/c: OL/PO/HPF has negative effect on growing pains. The results of hypothesis testing: H1: partly supported, H1a/b/c: supported/not supported/supported, H2: not supported, H2a/b/c: not supported/partly supported/not supported, H3: supported, H4: partly supported, H5: supported. The research seems to be of a great value for both scholars and practitioners. It proved that OL and HPO matter for organizational development. Scales for measuring organizational development and growing pains were developed. Its main finding, though, is that organizational development is a good way of improving financial performance.

Keywords: organizational development, growth, growing pains, financial performance

Procedia PDF Downloads 200
4094 The Applicability of General Catholic Canon Law during the Ongoing Migration Crisis in Hungary

Authors: Lorand Ujhazi

Abstract:

The vast majority of existing canonical studies about migration are focused on examining the general pastoral and legal regulations of the Catholic Church. The weakness of this approach is that it ignores a number of important factors; like the financial, legal and personal circumstances of a particular church or the canonical position of certain organizations which actually look after the immigrants. This paper is a case study, which analyses the current and historical migration related policies and activities of the Catholic Church in Hungary. To achieve this goal the study uses canon law, historical publications, various instructions and communications issued by church superiors, Hungarian and foreign media reports and the relevant Hungarian legislation. The paper first examines how the Hungarian Catholic Church assisted migrants like Armenians fleeing from the Ottoman Empire, Poles escaping during the Second World War, East German and Romanian citizens in the 1980s and refugees from the former Yugoslavia in the 1990s. These events underline the importance of past historical experience in the development of contemporary pastoral and humanitarian policy of the Catholic Church in Hungary. Then the paper turns to the events of the ongoing crisis by describing the unique challenges faced by churches in transit countries like Hungary. Then the research contrasts these findings with the typical responsibilities of churches in countries which are popular destinations for immigrants. The next part of the case study focuses on the changes to the pre-crisis legal and canonical framework which influenced the actions of hierarchical and charity organizations in Hungary. Afterwards, the paper illustrates the dangers of operating in an unclear legal environment, where some charitable activities of the church like a fundraising campaign may be interpreted as a national security risk by state authorities. Then the paper presents the reactions of Hungarian academics to the current migration crisis and finally it offers some proposals how to improve parts of Canon Law which govern immigration. The conclusion of the paper is that during the formulation of the central refugee policy of the Catholic Church decision makers must take into consideration the peculiar circumstances of its particular churches. This approach may prevent disharmony between the existing central regulations, the policy of the Vatican and the operations of the local church organizations.

Keywords: canon law, Catholic Church, civil law, Hungary, immigration, national security

Procedia PDF Downloads 296
4093 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 385
4092 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 99
4091 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies

Authors: Arun Prabhakar

Abstract:

Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.

Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling

Procedia PDF Downloads 128
4090 Financial Markets Performance: From COVID-19 Crisis to Hopes of Recovery with the Containment Polices

Authors: Engy Eissa, Dina M. Yousri

Abstract:

COVID-19 has hit massively the world economy, financial markets and even societies’ livelihood. The infectious disease caused by the most recently discovered coronavirus was claimed responsible for a shrink in the global economy by 4.4% in 2020. Shortly after the first case in Wuhan was identified, a quick surge in the number of confirmed cases in China was evident and a vast spread worldwide is recorded with cases surpassing the 500,000 cases. Irrespective of the disease’s trajectory in each country, a call for immediate action and prompt government intervention was needed. Given that there is no one-size-fits-all approach across the world, a number of containment and adoption policies were embraced. It was starting by enforcing complete lockdown like China to even stricter policies targeted containing the spread of the virus, augmenting the efficiency of health systems, and controlling the economic outcomes arising from this crisis. Hence, this paper has three folds; first, it examines the impact of containment policies taken by governments on controlling the number of cases and deaths in the given countries. Second, to assess the ramifications of COVID-19 on financial markets measured by stock returns. Third, to study the impact of containment policies measured by the government response index, the stringency index, the containment health index, and the economic support index on financial markets performance. Using a sample of daily data covering the period 31st of January 2020 to 15th of April 2021 for the 10 most hit countries in wave one by COVID-19 namely; Brazil, India, Turkey, Russia, UK, USA, France, Germany, Spain, and Italy. The aforementioned relationships were tested using Panel VAR Regression. The preliminary results showed that the number of daily deaths had an impact on the stock returns; moreover, the health containment policies and the economic support provided by the governments had a significant effect on lowering the impact of COVID-19 on stock returns.

Keywords: COVID-19, government policies, stock returns, VAR

Procedia PDF Downloads 172
4089 Climate Policy Actions for Sustaining International Agricultural Development Projects: The Role of Non-State, Sub-National Stakeholder Engagements, and Monitoring and Evaluation

Authors: EMMANUEL DWAMENA SASU

Abstract:

International climate policy actions require countries under Paris Agreement to design instruments, provide support (financial and technical), and strengthen institutional capacity with tendency to transcending policy formulation to implementation and sustainability. Changes associated with moisture depletion has been a growing phenomenon; especially in developing countries with projected global GDP drop from 7% to 2% between 2005 and 2050. These developments have potential to adversely affect food production in feeding the growing world population, with corresponding rise in global hunger. Incongruously, there is global absence of a harmonized policy direction; capable of providing the required indicators on climate policies for monitoring sustainability of international agricultural development projects. We conduct extensive review and synthesis on existing limitations on global climate policy governance, agricultural food security and sustainability of international agricultural development projects, and conjecture the role of non-state and sub-national climate stakeholder engagements, and monitoring and evaluation strategies for improved climate policy action for sustaining international agricultural development projects.

Keywords: climate policy, agriculture, development projects, sustainability

Procedia PDF Downloads 115
4088 How to Enhance Performance of Universities by Implementing Balanced Scorecard with Using FDM and ANP

Authors: Neda Jalaliyoon, Nooh Abu Bakar, Hamed Taherdoost

Abstract:

The present research recommended balanced scorecard (BSC) framework to appraise the performance of the universities. As the original model of balanced scorecard has four perspectives in order to implement BSC in present research the same model with “financial perspective”, “customer”,” internal process” and “learning and growth” is used as well. With applying fuzzy Delphi method (FDM) and questionnaire sixteen measures of performance were identified. Moreover, with using the analytic network process (ANP) the weights of the selected indicators were determined. Results indicated that the most important BSC’s aspect were Internal Process (0.3149), Customer (0.2769), Learning and Growth (0.2049), and Financial (0.2033) respectively. The proposed BSC framework can help universities to enhance their efficiency in competitive environment.

Keywords: balanced scorecard, higher education, fuzzy delphi method, analytic network process (ANP)

Procedia PDF Downloads 413
4087 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices

Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman

Abstract:

The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.

Keywords: hospital, light fidelity, Li-Fi, medical devices, security

Procedia PDF Downloads 88
4086 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 333
4085 World on the Edge: Migration and Cross Border Crimes in West Africa

Authors: Adeyemi Kamil Hamzah

Abstract:

The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.

Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation

Procedia PDF Downloads 212
4084 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 163
4083 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security

Authors: Carmen J. Savelli, Romy Conzade

Abstract:

Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.

Keywords: food safety, food security, nutrition, policy

Procedia PDF Downloads 400
4082 The Use of Creativity to Nudge Students Into Heutagogy: An Implementation in Graduate Business Education

Authors: Ricardo Bragança, Tom Vinaimont

Abstract:

This paper discusses the introduction of processes of self-determined learning (heutagogy) into a graduate course on financial modeling, using elements of entangled pedagogy and Biggs’ constructive alignment. To encourage learners to take control of their own learning journey and develop critical thinking and problem-solving skills, each session in the course receives tailor-made media-enhanced pedagogical assets. The design of those assets specifically supports entangled pedagogy, which opposes technological or pedagogical determinism in support of the collaborative integration of pedagogy and technology. Media assets for each of the ten sessions in this course consist of three components. The first component in this three-pronged approach is a game-cut-like cinematographic representation that introduces the context of the session. The second component represents a character from an open-source-styled community that encourages self-determined learning. The third component consists of a character, which refers to the in-person instructor and also aligns learning outcomes and assessment tasks, using Biggs’ constructive alignment, to the cinematographic and open-source-styled component. In essence, the course's metamorphosis helps students apply the concepts they've studied to actual financial modeling issues. The audio-visual media assets create a storyline throughout the course based on gamified and real-world applications, thus encouraging student engagement and interaction. The structured entanglement of pedagogy and technology also guides the instructor in the design of the in-class interactions and directs the focus on outcomes and assessments. The transformation process of this graduate course in financial modeling led to an institutional teaching award in 2021. The transformation of this course may be used as a model for other courses and programs in many disciplines to help with intended learning outcomes integration, constructive alignment, and Assurance of Learning.

Keywords: innovative education, active learning, entangled pedagogy, heutagogy, constructive alignment, project based learning, financial modeling, graduate business education

Procedia PDF Downloads 65