Search results for: financial security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5341

Search results for: financial security

3991 Analysing the Behaviour of Local Hurst Exponent and Lyapunov Exponent for Prediction of Market Crashes

Authors: Shreemoyee Sarkar, Vikhyat Chadha

Abstract:

In this paper, the local fractal properties and chaotic properties of financial time series are investigated by calculating two exponents, the Local Hurst Exponent: LHE and Lyapunov Exponent in a moving time window of a financial series.y. For the purpose of this paper, the Dow Jones Industrial Average (DIJA) and S&P 500, two of the major indices of United States have been considered. The behaviour of the above-mentioned exponents prior to some major crashes (1998 and 2008 crashes in S&P 500 and 2002 and 2008 crashes in DIJA) is discussed. Also, the optimal length of the window for obtaining the best possible results is decided. Based on the outcomes of the above, an attempt is made to predict the crashes and accuracy of such an algorithm is decided.

Keywords: local hurst exponent, lyapunov exponent, market crash prediction, time series chaos, time series local fractal properties

Procedia PDF Downloads 137
3990 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 435
3989 Self-Organizing Maps for Credit Card Fraud Detection and Visualization

Authors: Peng Chun-Yi, Chen Wei-Hsuan, Ueng Shyh-Kuang

Abstract:

This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.

Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies

Procedia PDF Downloads 46
3988 Testing the Life Cycle Theory on the Capital Structure Dynamics of Trade-Off and Pecking Order Theories: A Case of Retail, Industrial and Mining Sectors

Authors: Freddy Munzhelele

Abstract:

Setting: the empirical research has shown that the life cycle theory has an impact on the firms’ financing decisions, particularly the dividend pay-outs. Accordingly, the life cycle theory posits that as a firm matures, it gets to a level and capacity where it distributes more cash as dividends. On the other hand, the young firms prioritise investment opportunities sets and their financing; thus, they pay little or no dividends. The research on firms’ financing decisions also demonstrated, among others, the adoption of trade-off and pecking order theories on the dynamics of firms capital structure. The trade-off theory talks to firms holding a favourable position regarding debt structures particularly as to the cost and benefits thereof; and pecking order is concerned with firms preferring a hierarchical order as to choosing financing sources. The case of life cycle hypothesis explaining the financial managers’ decisions as regards the firms’ capital structure dynamics appears to be an interesting link, yet this link has been neglected in corporate finance research. If this link is to be explored as an empirical research, the financial decision-making alternatives will be enhanced immensely, since no conclusive evidence has been found yet as to the dynamics of capital structure. Aim: the aim of this study is to examine the impact of life cycle theory on the capital structure dynamics trade-off and pecking order theories of firms listed in retail, industrial and mining sectors of the JSE. These sectors are among the key contributors to the GDP in the South African economy. Design and methodology: following the postpositivist research paradigm, the study is quantitative in nature and utilises secondary data obtainable from the financial statements of sampled firm for the period 2010 – 2022. The firms’ financial statements will be extracted from the IRESS database. Since the data will be in panel form, a combination of the static and dynamic panel data estimators will used to analyse data. The overall data analyses will be done using STATA program. Value add: this study directly investigates the link between the life cycle theory and the dynamics of capital structure decisions, particularly the trade-off and pecking order theories.

Keywords: life cycle theory, trade-off theory, pecking order theory, capital structure, JSE listed firms

Procedia PDF Downloads 48
3987 Assessment of the Level of Awareness and Adoption of International Public Sector Accounting Standards (IPSAS) in the Curriculum of Accounting Education in Selected Tertiary Institutions in Ondo and Ekiti States Nigeria

Authors: Olurankinse Felix, Fatukasi Bayo

Abstract:

Over the years, the medium through which government financial statements are prepared has been on cash basis of accounting. This basis was characterised with some shortcomings ranging from non- disclosure of quality and detail information relating to government financial transactions, ill informed assessment of government resource allocation, weak internal control system that inhibits accountability and transparency and non- standardisation of reporting ethics for the purpose of comparability. The emergence of international public sector accounting standards (IPSAS) is therefore seen as leverage as it aims at improving the quality of general purpose financial reporting by public sector entities thereby increasing transparency and accountability. IPSAS is a new concept that all institutions must fully adopts. The crux of this paper is to find out to what extent is the awareness and adoption of IPSAS to both students and lecturers interms of teaching, learning and inclusion in the curriculum of accounting education. The methodology involved the use of well designed questionnaires to obtain information from some selected institutions and the analysis was done with the use of maximum likelihood ordered probit regression. The result of the analysis shows that despite a high level of sensitisation/awareness of IPSAS, the degree of adoption is still low due to low level of desirability by students and lecturers. The paper recommend the need for the government to enact an enabling law to back up the adoption and more importantly to institute appropriate sanctions to ensure full compliance.

Keywords: assessment, awareness, adoption, IPSAS, cash basis

Procedia PDF Downloads 470
3986 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 459
3985 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 144
3984 Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank

Authors: Aarohi Surya

Abstract:

The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking.

Keywords: customer satisfaction, service quality, responsiveness, online banking

Procedia PDF Downloads 258
3983 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks

Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos

Abstract:

Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.

Keywords: in-house networks, fiber optics, security risk, money

Procedia PDF Downloads 410
3982 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon

Authors: Forbah Julius Ajamah

Abstract:

The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.

Keywords: justice, security, human rights abuses, conflicts, crisis

Procedia PDF Downloads 71
3981 The Tracking and Hedging Performances of Gold ETF Relative to Some Other Instruments in the UK

Authors: Abimbola Adedeji, Ahmad Shauqi Zubir

Abstract:

This paper examines the profitability and risk between investing in gold exchange traded funds (ETFs) and gold mutual funds compares to gold prices. The main focus in determining whether there are similarities or differences between those financial products is the tracking error. The importance of understanding the similarities or differences between the gold ETFs, gold mutual funds and gold prices is derived from the fact that gold ETFs and gold mutual funds are used as substitutions for investors who are looking to profit from gold prices although they are short in capital. 10 hypotheses were tested. There are 3 types of tracking error used. Tracking error 1 and 3 gives results that differentiate between types of ETFs and mutual funds, hence yielding the answers in answering the hypotheses that were developed. However, tracking error 2 failed to give the answer that could shed light on the questions raised in this study. All of the results in tracking error 2 technique only telling us that the difference between the ups and downs of the financial instruments are similar, statistically to the physical gold prices movement.

Keywords: gold etf, gold mutual funds, tracking error

Procedia PDF Downloads 408
3980 Modalmetric Fiber Sensor and Its Applications

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.

Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing

Procedia PDF Downloads 607
3979 Analyzing Brand Related Information Disclosure and Brand Value: Further Empirical Evidence

Authors: Yves Alain Ach, Sandra Rmadi Said

Abstract:

An extensive review of literature in relation to brands has shown that little research has focused on the nature and determinants of the information disclosed by companies with respect to the brands they own and use. The objective of this paper is to address this issue. More specifically, the aim is to characterize the nature of the information disclosed by companies in terms of estimating the value of brands and to identify the determinants of that information according to the company’s characteristics most frequently tested by previous studies on the disclosure of information on intangible capital, by studying the practices of a sample of 37 French companies. Our findings suggest that companies prefer to communicate accounting, economic and strategic information in relation to their brands instead of providing financial information. The analysis of the determinants of the information disclosed on brands leads to the conclusion that the groups which operate internationally and have chosen a category 1 auditing firm to communicate more information to investors in their annual report. Our study points out that the sector is not an explanatory variable for voluntary brand disclosure, unlike previous studies on intangible capital. Our study is distinguished by the study of an element that has been little studied in the financial literature, namely the determinants of brand-related information. With regard to the effect of size on brand-related information disclosure, our research does not confirm this link. Many authors point out that large companies tend to publish more voluntary information in order to respond to stakeholder pressure. Our study also establishes that the relationship between brand information supply and performance is insignificant. This relationship is already controversial by previous research, and it shows that higher profitability motivates managers to provide more information, as this strengthens investor confidence and may increase managers' compensation. Our main contribution focuses on the nature of the inherent characteristics of the companies that disclose the most information about brands. Our results show the absence of a link between size and industry on the one hand and the supply of brand information on the other, contrary to previous research. Our analysis highlights three types of information disclosed about brands: accounting, economics and strategy. We, therefore, question the reasons that may lead companies to voluntarily communicate mainly accounting, economic and strategic information in relation to our study from one year to the next and not to communicate detailed information that would allow them to reconstitute the financial value of their brands. Our results can be useful for companies and investors. Our results highlight, to our surprise, the lack of financial information that would allow investors to understand a better valuation of brands. We believe that additional information is needed to improve the quality of accounting and financial information related to brands. The additional information provided in the special report that we recommend could be called a "report on intangible assets”.

Keywords: brand related information, brand value, information disclosure, determinants

Procedia PDF Downloads 69
3978 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 461
3977 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia

Authors: Logan Carmichael

Abstract:

As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.

Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis

Procedia PDF Downloads 99
3976 The Determinants of Customer’s Purchase Intention of Islamic Credit Card: Evidence from Pakistan

Authors: Nasir Mehmood, Muhammad Yar Khan, Anam Javeed

Abstract:

This study aims to scrutinize the dynamics which tend to impact customer’s purchasing intention of Islamic credit card and nexus of product’s knowledge and religiosity with the attitude of potential Islamic credit card’s customer. The theory of reasoned action strengthened the idea that intentions due to its proven predictive power are most likely to instigate intended consumer behavior. Particularly, the study examines the relationships of perceived financial cost (PFC), subjective norms (SN), and attitude (ATT) with the intention to purchase Islamic credit cards. Using a convenience sampling approach, data have been collected from 450 customers of banks located in Rawalpindi and Islamabad. A five-point Likert scale self-administered questionnaire was used to collect the data. The data were analyzed using the Statistical Package of Social Sciences (SPSS) through the procedures of principal component and multiple regression analysis. The results suggested that customer’s religiosity and product knowledge are strong indicators of attitude towards buying Islamic credit cards. Likewise, subjective norms, attitude, and perceived financial cost have a significant positive impact on customers’ purchase intent of Islamic bank’s credit cards. This study models a useful path for future researchers to further investigate the underlined phenomenon along with a variety of psychodynamic factors which are still in its infancy, at least in the Pakistani banking sector. The study also provides an insight to the practitioners and Islamic bank managers for directing their efforts toward educating customers regarding the use of Islamic credit cards and other financial products.

Keywords: attitude, Islamic credit card, religiosity, subjective norms

Procedia PDF Downloads 129
3975 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand

Authors: Pichamon Chansuchai

Abstract:

The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.

Keywords: audit, best practice, internet, payment

Procedia PDF Downloads 485
3974 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 223
3973 Investor’s Psychology in Investment Decision Making in Context of Behavioural Finance

Authors: Jhansi Rani Boda, G. Sunitha

Abstract:

Worldwide, the financial markets are influenced by several factors such as the changes in economic and political processes that occur in the country and the globe, information diffusion and approachability and so on. Yet, the foremost important factor is the investor’s reaction and perception. For an individual investor, decision-making process can be perceived as a continuous process that has significant impact of their psychology while making investment decisions. Behavioral finance relies on research of human and social recognition and emotional tolerance studies to identify and understand the investment decisions. This article aims to report the research of individual investor’s financial behavior in a historical perspective. This article uncovers the investor’s psychology in investment decision making focusing on the investor’s rationality with an explanation of psychological and emotional factors that affect investing. The results of the study are revealed by means of Graphical visualization.

Keywords: behavioral finance, psychology, investor’s behavior, psychological and emotional factors

Procedia PDF Downloads 284
3972 Corporate Governance and Firm Performance in the UAE

Authors: Bakr Ali Al-Gamrh, Ku Nor Izah B. Ku Ismail

Abstract:

We investigate the relationship between corporate governance, leverage, risk, and firm performance. We use a firm level panel that spans the period 2008 to 2012 of all listed firms on Abu Dhabi Stock Exchange and Dubai Financial Market. After constructing an index of corporate governance strength, we find a negative effect of corporate governance on firm performance. We, however, discover that corporate governance strength indirectly improves the negative influence of leverage on firm performance in normal times. On the contrary, the results completely reversed when there is a black swan event. Corporate governance strength plays a significantly negative role in moderating the relationship between leverage and firm performance during the financial crisis. We also reveal that corporate governance strength increases firms’ risk and deteriorates performance during crisis. Results provide evidence that corporate governance indirectly plays a completely different role in different time periods.

Keywords: corporate governance, firm performance, risk, leverage, the UAE

Procedia PDF Downloads 533
3971 An Exploration of Why Insider Fraud Is the Biggest Threat to Your Business

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, otherwise known as occupational, employee, or internal fraud, is a financial crime threat. Perpetrated by defrauding (or attempting to defraud) one’s current, prospective, or past employer, an ‘employee’ covers anyone employed by the company, including board members and contractors. The Coronavirus pandemic has forced insider fraud into the spotlight, and it isn’t dimming. As the focus of most academics and practitioners has historically been on that of ‘external fraud’, insider fraud is often overlooked or not considered to be a real threat. However, since COVID-19 changed the working world, pushing most of us into remote or hybrid working, employers cannot easily keep an eye on what their staff are doing, which has led to reliance on trust and transparency. This, therefore, brings about an increased risk of insider fraud perpetration. The objective of this paper is to explore why insider fraud is, therefore, now the biggest threat to a business. To achieve the research objective, participating individuals within the financial crime sector (either as a practitioner or consultants) attended semi-structured interviews with the researcher. The principal recruitment strategy for these individuals was via the researcher’s LinkedIn network. The main findings in the research suggest that insider fraud has been ignored and rejected as a threat to a business, owing to a reluctance to admit that a colleague may perpetrate. A positive of the Coronavirus pandemic is that it has forced insider fraud into a more prominent position and giving it more importance on a business’ agenda and risk register. Despite insider fraud always having been a possibility (and therefore a risk) within any business, it is very rare that a business has given it the attention it requires until now, if at all. The research concludes that insider fraud needs to prioritised by all businesses, and even ahead of external fraud. The research also provides advice on how a business can add new or enhance existing controls to mitigate the risk.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 53
3970 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 280
3969 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 321
3968 Decoding Wallstreetbets: Daily Disagreements Among Retail Investors Echo in Trading Volumes

Authors: Farzaneh Ghandehari, Helen Lu, Lina El-Jahel, Dulani Jayasuriya

Abstract:

Disagreement among investors is a fundamental aspect of financial markets, significantly influencing market dynamics. Previous research highlights the challenges of effectively measuring investor disagreement, often relying on traditional proxies like analyst forecast dispersion, which are limited by biases and infrequent updates. Recent movements in social media indicate that retail investors actively seek financial advice online and can influence the stock market. The evolution of the investing landscape, particularly the rise of social media as a hub for financial advice, provides a novel avenue for real-time measurement of investor sentiment and disagreement. Platforms like Reddit offer rich, community-driven discussions that reflect genuine investor opinions. This research explores how social media empowers retail investors and the potential of leveraging textual analysis of social media content to capture daily fluctuations in investor disagreement. This study investigates the relationship between daily investor disagreement and trading volume, focusing on the role of social media platforms in shaping market dynamics, specifically using data from WallStreetBets (WSB) on Reddit. This paper uses data from 2020 to 2023 from WSB and analyses 4,896 firms with enough social media activity in WSB to define stock-day level disagreement measures. Consistent with traditional theories that disagreement induces trading volume, the results show significant evidence supporting this claim through different disagreement measures derived from WSB discussions.

Keywords: retail investor, social media, disagreement, social finance, reddit, fintech

Procedia PDF Downloads 6
3967 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 298
3966 Effect of Migrant Influx toward Betterment of Aging and Low Fertility Rate: Statistical Analyses in Japan

Authors: Sari K. Ishii

Abstract:

This study considers a wider viewpoint to connect migration studies with questions about financial capitalism, which seeks cheap, disposable labour transnationally. This study offers insight into whether the current state of immigration acceptance contributes to stabilizing the aging society of the nation in the long term or merely fulfills the ephemeral requirements of industries. The analyses in this study focused on three aspects. First, it examined how many migrants in Japan joined the labour market. Second, it analyzed the number of migrants that are aging. Third, it determined the number of dependent migrants accepted through labour migrants. The study findings raise further questions for future empirical studies to verify the schema of financial capitalism through the lens of migration. The scheme of seeking cheap, disposable labour transnationally may result in the descendants of both locals and mobilized labour becoming more unstable than the prior generations.

Keywords: migration, aging society, low fertility rate, Japan

Procedia PDF Downloads 14
3965 Corporate Social Responsibility: A Comparative Study of Two Largest Banks in India

Authors: Navdeep Kaur

Abstract:

Corporate Social Responsibility is the process through which the organizations execute their philanthropic visions for social welfare. This paper considers the data of one Public Sector Bank–State Bank of India (SBI) and one Private Sector Bank-Industrial Credit and Investment Corporation of India (ICICI) from the year 2008 to 2016. The study is based on descriptive research design, and secondary data collected from the annual report of respective bank from website and different literature are reviewed. Least Square Method is used for estimating CSR spending for the financial year 2017-18. The analysis shows that these banks are making efforts for the implementation of CSR, but are not spending their 2% share of profits on CSR. There is a need for better CSR activities by the banks, which is possible by concentrating more on the prevailing social issues. The finding reveals that the percentage of profit after tax spends for CSR by SBI is more compare to ICICI. The estimated Spending for CSR for 2017-18 is also more in SBI as compared to ICICI.

Keywords: banking sector, corporate social responsibility in India, financial institution, public sector banks, SBI, ICICI

Procedia PDF Downloads 179
3964 The Impact of India’s Centre-State Relations on its Maritime Counter-Terrorism Strategy

Authors: Riddhi Shah

Abstract:

Centre-state relations in India are a fascinating area of studies. The structure of the relationship has an effect on every single aspect of life as we know it in India. This paper is an attempt to study centre-state relations in the context of India’s maritime counter-terrorism strategy. Although the Government of India has not publicly stated its counter-terrorism strategy on the sea; intelligence, information sharing, crisis response, finances for internal security and the nation’s legislation for battling terrorism together comprise of India’s maritime-terrorism strategy. Through study of these areas, the paper argues that the centre-state divide has had systemic implications on India’s maritime security and has largely done more harm than good to collective initiatives that aspire to prevent future risk of terrorism from the sea or on the sea.

Keywords: counter-terrorism, maritime terrorism, India, federalism, centre-state relations

Procedia PDF Downloads 589
3963 Time Series Modelling for Forecasting Wheat Production and Consumption of South Africa in Time of War

Authors: Yiseyon Hosu, Joseph Akande

Abstract:

Wheat is one of the most important staple food grains of human for centuries and is largely consumed in South Africa. It has a special place in the South African economy because of its significance in food security, trade, and industry. This paper modelled and forecast the production and consumption of wheat in South Africa in the time covid-19 and the ongoing Russia-Ukraine war by using annual time series data from 1940–2021 based on the ARIMA models. Both the averaging forecast and selected models forecast indicate that there is the possibility of an increase with respect to production. The minimum and maximum growth in production is projected to be between 3million and 10 million tons, respectively. However, the model also forecast a possibility of depression with respect to consumption in South Africa. Although Covid-19 and the war between Ukraine and Russia, two major producers and exporters of global wheat, are having an effect on the volatility of the prices currently, the wheat production in South African is expected to increase and meat the consumption demand and provided an opportunity for increase export with respect to domestic consumption. The forecasting of production and consumption behaviours of major crops play an important role towards food and nutrition security, these findings can assist policymakers and will provide them with insights into the production and pricing policy of wheat in South Africa.

Keywords: ARIMA, food security, price volatility, staple food, South Africa

Procedia PDF Downloads 83
3962 A Multicopy Strategy for Improved Security Wireless Sensor Network

Authors: Tuğçe Yücel

Abstract:

A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.

Keywords: MIP, sensor, telecommunications, WSN

Procedia PDF Downloads 494