Search results for: Credit Card Fraud Detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3955

Search results for: Credit Card Fraud Detection

3835 Automatic Checkpoint System Using Face and Card Information

Authors: Kriddikorn Kaewwongsri, Nikom Suvonvorn

Abstract:

In the deep south of Thailand, checkpoints for people verification are necessary for the security management of risk zones, such as official buildings in the conflict area. In this paper, we propose an automatic checkpoint system that verifies persons using information from ID cards and facial features. The methods for a person’s information abstraction and verification are introduced based on useful information such as ID number and name, extracted from official cards, and facial images from videos. The proposed system shows promising results and has a real impact on the local society.

Keywords: face comparison, card recognition, OCR, checkpoint system, authentication

Procedia PDF Downloads 302
3834 Mothers and Moneymakers: A Case Study of How Citizen-Women Shape U.S. Marriage Migration Politics Online

Authors: Gina Longo

Abstract:

Social media, internet technology, and affordable travel have created avenues like tourism and internet chatrooms for Western women to meet foreign partners without paid, third-party intermediaries in regions like the Middle East/North Africa (MENA) and Sub-Saharan Africa (SSA), where men from mid-level developing countries meet and marry Western women and try to relocate. Foreign nationals who marry U.S. citizens have an expedited track to naturalization. U.S. immigration officials require that “green card” petitioning couples demonstrate that their relationships are “valid and subsisting” (i.e., for love) and not fraudulent (i.e., for immigration papers). These requirements are ostensibly gender- and racially-neutral, but migration itself is not; black and white women petitioners who seek partners from these regions and solicit advice from similar others about the potential obstacles to their petitions’ success online. Using an online ethnography and textual analysis of conversation threads on a large on-line immigration forum where U.S. petitioners exchange such information, this study examines how gendered and racialized standards of legitimacy are applied to family and sexuality and used discursively online among women petitioners differently to achieve “genuineness” and define “red flags” indicating potential marriage fraud. This paper argues that forum-women members police immigration requests even before cases reach an immigration officer, and use this social media platform to reconstruct gendered and racialized hierarchies of U.S. citizenship. Women petitioners use the formal criteria of U.S. immigration in ways that reveal gender and racial ideologies, expectations for conformity to a gendered hegemonic family ideal, and policing of women’s sexual agency, fertility, and desirability. These intersectional norms shape their online discussions about the suitability of marriages and of the migration of non-citizen male partners of color to the United States.

Keywords: marriage fraud, migration, online forums, women

Procedia PDF Downloads 101
3833 Fintech Credit and Bank Efficiency Two-way Relationship: A Comparison Study Across Country Groupings

Authors: Tan Swee Liang

Abstract:

This paper studies the two-way relationship between fintech credit and banking efficiency using the Generalized panel Method of Moment (GMM) estimation in structural equation modeling (SEM). Banking system efficiency, defined as its ability to produce the existing level of outputs with minimal inputs, is measured using input-oriented data envelopment analysis (DEA), where the whole banking system of an economy is treated as a single DMU. Banks are considered an intermediary between depositors and borrowers, utilizing inputs (deposits and overhead costs) to provide outputs (increase credits to the private sector and its earnings). Analysis of the interrelationship between fintech credit and bank efficiency is conducted to determine the impact in different country groupings (ASEAN, Asia and OECD), in particular the banking system response to fintech credit platforms. Our preliminary results show that banks do respond to the greater pressure caused by fintech platforms to enhance their efficiency, but differently across the different groups. The author’s earlier research on ASEAN-5 high bank overhead costs (as a share of total assets) as the determinant of economic growth suggests that expenses may not have been channeled efficiently to income-generating activities. One practical implication of the findings is that policymakers should enable alternative financing, such as fintech credit, as a warning or encouragement for banks to improve their efficiency.

Keywords: fintech lending, banking efficiency, data envelopment analysis, structural equation modeling

Procedia PDF Downloads 64
3832 Descriptive Study of Adverse Drug Reactions in a Paediatric Hospital in Mongolia from 2015 to 2019

Authors: Khaliun Nyambayar, Nomindari Azzaya, Batkhuyag Purevjav

Abstract:

Pharmacovigilance was officially introduced in Mongolia in 2003, in accordance with the Health Minister Order 183 for the registry of adverse drug reactions (ADR), approved in 2006 and was reviewed in 2010. This study was designed to evaluate the incidence and common types of adverse drug reactions among hospitalized children, the frequency of adverse drug reaction reported by health care providers, and the follow-up processes resulting from adverse drug reactions. A retrospective study of paediatric patients who experienced an adverse drug reaction from 2015 to 2019, extracted from the “yellow” card at the State Research Center for Maternal and Child Health, (city). A total of 417 adverse drug reactions were reported with an overall incidence was 80 (21.5%). Adverse reactions resulting from the use of antibiotics (particularly gentamycin, cephalosporins, and vancomycin) were usually mild. ADR’s were reported by physicians and nurses (93.8%), pharmacists (6.25%). Although documentation of physician notification occurred for 93% of adverse drug reactions, only 29% of cases were documented in the patient's medical chart, 13% included follow-up education for individuals involved, and 10% were updated in the allergy profile of the hospital computer system. Measures to improve the detection and reporting of adverse drug reactions by all health care professionals should be improved, to enhance our understanding of the nature and impact of these reactions in children.

Keywords: adverse drug reaction, pediatric, yellow card, Mongolia

Procedia PDF Downloads 92
3831 Use of Visual, Animating Narrative in an Entrepreneurial Storytelling: A Case Study of Greenesignit! Card Game, Educational and Brainstorming Tool for Development of Sustainable Products

Authors: Maja S. Todorovic

Abstract:

This paper aims to promote entrepreneurial storytelling by exploring new ideas and learning practices. An entrepreneur needs to be a ‘storyteller’, an ‘epic hero’, capable of offering an emotional connection to his audience, a character with whom audience can identify with, rejoice, suffer, celebrate, fail – simply experience everything. In other words, a successful entrepreneur is giving tangible experience through his business story and that’s what makes his story and business alive. Use of mythology, eulogy, metaphor, epic, fairytales and cartoons, permeated with humor and sudden twists is a winning recipe for a business story that captures attention. In the business case of the Greenesignit! Card game, (educational and brainstorming tool for development of sustainable products) we will demonstrate how an entrepreneur successfully used visual narrative to communicate his story and at the same time as a vehicle to transmute his message in learning tool and product development.

Keywords: animating narrative, entrepreneur, Greeneisgnit! card game, visual storytelling

Procedia PDF Downloads 374
3830 Financial Liberalization and Allocation of Bank Credit in Malaysia

Authors: Chow Fah Yee, Eu Chye Tan

Abstract:

The main purpose of developing a modern and sophisticated financial system is to mobilize and allocate the country’s resources for productive uses and in the process contribute to economic growth. Financial liberalization introduced in Malaysia in 1978 was said to be a step towards this goal. According to Mc-Kinnon and Shaw, the deregulation of a country’s financial system will create a more efficient and competitive market driven financial sector; with savings being channelled to the most productive users. This paper aims to assess whether financial liberalization resulted in bank credit being allocated to the more productive users, for the case of Malaysia by: firstly, using Chi-square test to if there exists a relationship between financial liberalization and bank lending in Malaysia. Secondly, to analyze on a comparative basis, the share of loans secured by 9 major economic sectors, using data on bank loans from 1975 to 2003. Lastly, present value analysis and rank correlation was used to determine if the recipients of bigger loans are the more efficient users. Chi-square test confirmed the generally observed trend of an increase in bank credit with the adoption of financial liberalization. While the comparative analysis of loans showed that the bulk of credit were allocated to service sectors, consumer loans and property related sectors, at the expense of industry. Results for rank correlation analysis showed that there is no relationship between the more productive users and amount of loans obtained. This implies that the recipients (sectors) that received more loans were not the more efficient sectors.

Keywords: allocation of resources, bank credit, financial liberalization, economics

Procedia PDF Downloads 419
3829 Developing Cucurbitacin a Minimum Inhibition Concentration of Meloidogyne Incognita Using a Computer-Based Model

Authors: Zakheleni P. Dube, Phatu W. Mashela

Abstract:

Minimum inhibition concentration (MIC) is the lowest concentration of a chemical that brings about significant inhibition of target organism. The conventional method for establishing the MIC for phytonematicides is tedious. The objective of this study was to use the Curve-fitting Allelochemical Response Data (CARD) to determine the MIC for pure cucurbitacin A on Meloidogyne incognita second-stage juveniles (J2) hatch, immobility and mortality. Meloidogyne incognita eggs and freshly hatched J2 were separately exposed to a series of pure cucurbitacin A concentrations of 0.00, 0.25, 0.50, 0.75, 1.00, 1.25, 1.50, 1.75, 2.00, 2.25 and 2.50 μg.mL⁻¹for 12, 24, 48 and 72 h in an incubator set at 25 ± 2°C. Meloidogyne incognita J2 hatch, immobility and mortality counts were determined using a stereomicroscope and the significant means were subjected to the CARD model. The model exhibited density-dependent growth (DDG) patterns of J2 hatch, immobility and mortality to increasing concentrations of cucurbitacin A. The average MIC for cucurbitacin A on M. incognita J2 hatch, immobility and mortality were 2.2, 0.58 and 0.63 µg.mL⁻¹, respectively. Meloidogyne incognita J2 hatch had the highest average MIC value followed by mortality and immobility had the least. In conclusion, the CARD model was able to generate MIC for cucurbitacin A, hence it could serve as a valuable tool in the chemical-nematode bioassay studies.

Keywords: inhibition concentration, phytonematicide, sensitivity index, threshold stimulation, triterpenoids.

Procedia PDF Downloads 170
3828 An Alternative Credit Scoring System in China’s Consumer Lendingmarket: A System Based on Digital Footprint Data

Authors: Minjuan Sun

Abstract:

Ever since the late 1990s, China has experienced explosive growth in consumer lending, especially in short-term consumer loans, among which, the growth rate of non-bank lending has surpassed bank lending due to the development in financial technology. On the other hand, China does not have a universal credit scoring and registration system that can guide lenders during the processes of credit evaluation and risk control, for example, an individual’s bank credit records are not available for online lenders to see and vice versa. Given this context, the purpose of this paper is three-fold. First, we explore if and how alternative digital footprint data can be utilized to assess borrower’s creditworthiness. Then, we perform a comparative analysis of machine learning methods for the canonical problem of credit default prediction. Finally, we analyze, from an institutional point of view, the necessity of establishing a viable and nationally universal credit registration and scoring system utilizing online digital footprints, so that more people in China can have better access to the consumption loan market. Two different types of digital footprint data are utilized to match with bank’s loan default records. Each separately captures distinct dimensions of a person’s characteristics, such as his shopping patterns and certain aspects of his personality or inferred demographics revealed by social media features like profile image and nickname. We find both datasets can generate either acceptable or excellent prediction results, and different types of data tend to complement each other to get better performances. Typically, the traditional types of data banks normally use like income, occupation, and credit history, update over longer cycles, hence they can’t reflect more immediate changes, like the financial status changes caused by the business crisis; whereas digital footprints can update daily, weekly, or monthly, thus capable of providing a more comprehensive profile of the borrower’s credit capabilities and risks. From the empirical and quantitative examination, we believe digital footprints can become an alternative information source for creditworthiness assessment, because of their near-universal data coverage, and because they can by and large resolve the "thin-file" issue, due to the fact that digital footprints come in much larger volume and higher frequency.

Keywords: credit score, digital footprint, Fintech, machine learning

Procedia PDF Downloads 137
3827 To Determine the Effects of Regulatory Food Safety Inspections on the Grades of Different Categories of Retail Food Establishments across the Dubai Region

Authors: Shugufta Mohammad Zubair

Abstract:

This study explores the Effect of the new food System Inspection system also called the new inspection color card scheme on reduction of critical & major food safety violations in Dubai. Data was collected from all retail food service establishments located in two zones in the city. Each establishment was visited twice, once before the launch of the new system and one after the launch of the system. In each visit, the Inspection checklist was used as the evaluation tool for observation of the critical and major violations. The old format of the inspection checklist was concerned with scores based on the violations; but the new format of the checklist for the new inspection color card scheme is divided into administrative, general major and critical which gives a better classification for the inspectors to identify the critical and major violations of concerned. The study found that there has been a better and clear marking of violations after the launch of new inspection system wherein the inspectors are able to mark and categories the violations effectively. There had been a 10% decrease in the number of food establishment that was previously given A grade. The B & C grading were also considerably dropped by 5%.

Keywords: food inspection, risk assessment, color card scheme, violations

Procedia PDF Downloads 303
3826 Cigarette Smoke Detection Based on YOLOV3

Authors: Wei Li, Tuo Yang

Abstract:

In order to satisfy the real-time and accurate requirements of cigarette smoke detection in complex scenes, a cigarette smoke detection technology based on the combination of deep learning and color features was proposed. Firstly, based on the color features of cigarette smoke, the suspicious cigarette smoke area in the image is extracted. Secondly, combined with the efficiency of cigarette smoke detection and the problem of network overfitting, a network model for cigarette smoke detection was designed according to YOLOV3 algorithm to reduce the false detection rate. The experimental results show that the method is feasible and effective, and the accuracy of cigarette smoke detection is up to 99.13%, which satisfies the requirements of real-time cigarette smoke detection in complex scenes.

Keywords: deep learning, computer vision, cigarette smoke detection, YOLOV3, color feature extraction

Procedia PDF Downloads 62
3825 Countercyclical Capital Buffer in the Polish Banking System

Authors: Mateusz Mokrogulski, Piotr Śliwka

Abstract:

The aim of this paper is the identification of periods of excessive credit growth in the Polish banking sector in years 2007-2014 using different methodologies. Due to the lack of precise guidance in CRD IV regarding methods of calculating the credit gap and related deviations from the long-term trends, a few filtering methods are applied, e.g. Hodrick-Prescott and Baxter-King. The solutions based on the switching model are also proposed. The next step represent computations of both the credit gap, and the counter cyclical capital buffer (CCB) rates on a quarterly basis. The calculations are carried out for the entire banking sector in Poland, as well as for its components (commercial and co-operative banks), and different types of loans. The calculations show vividly that in the analysed period there were the times of excessive credit growth. However, the results are different for the above mentioned sub-sectors. Of paramount importance here are mortgage loans, where the outcomes are distorted by high exchange rate fluctuations. The research on the CCB is now going to gain popularity as the buffer will soon become one of the tools of the macro prudential policy under CRD IV. Although the presented method is focused on the Polish banking sector, it can also be applied to other member states. Especially to the Central and Eastern European countries, that are usually characterized by smaller banking sectors compared to EU-15.

Keywords: countercyclical capital buffer, CRD IV, filtering methods, mortgage loans

Procedia PDF Downloads 294
3824 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection

Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman

Abstract:

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.

Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture

Procedia PDF Downloads 552
3823 Climate Related Financial Risk on Automobile Industry and the Impact to the Financial Institutions

Authors: Mahalakshmi Vivekanandan S.

Abstract:

As per the recent changes happening in the global policies, climate-related changes and the impact it causes across every sector are viewed as green swan events – in essence, climate-related changes can often happen and lead to risk and a lot of uncertainty, but needs to be mitigated instead of considering them as black swan events. This brings about a question on how this risk can be computed so that the financial institutions can plan to mitigate it. Climate-related changes impact all risk types – credit risk, market risk, operational risk, liquidity risk, reputational risk and other risk types. And the models required to compute this has to consider the different industrial needs of the counterparty, as well as the factors that are contributing to this – be it in the form of different risk drivers, or the different transmission channels or the different approaches and the granular form of data availability. This brings out the suggestion that the climate-related changes, though it affects Pillar I risks, will be a Pillar II risk. This has to be modeled specifically based on the financial institution’s actual exposure to different industries instead of generalizing the risk charge. And this will have to be considered as the additional capital to be met by the financial institution in addition to their Pillar I risks, as well as the existing Pillar II risks. In this paper, the author presents a risk assessment framework to model and assess climate change risks - for both credit and market risks. This framework helps in assessing the different scenarios and how the different transition risks affect the risk associated with the different parties. This research paper delves into the topic of the increase in the concentration of greenhouse gases that in turn cause global warming. It then considers the various scenarios of having the different risk drivers impacting the Credit and market risk of an institution by understanding the transmission channels and also considering the transition risk. The paper then focuses on the industry that’s fast seeing a disruption: the automobile industry. The paper uses the framework to show how the climate changes and the change to the relevant policies have impacted the entire financial institution. Appropriate statistical models for forecasting, anomaly detection and scenario modeling are built to demonstrate how the framework can be used by the relevant agencies to understand their financial risks. The paper also focuses on the climate risk calculation for the Pillar II Capital calculations and how it will make sense for the bank to maintain this in addition to their regular Pillar I and Pillar II capital.

Keywords: capital calculation, climate risk, credit risk, pillar ii risk, scenario modeling

Procedia PDF Downloads 114
3822 Competition between Regression Technique and Statistical Learning Models for Predicting Credit Risk Management

Authors: Chokri Slim

Abstract:

The objective of this research is attempting to respond to this question: Is there a significant difference between the regression model and statistical learning models in predicting credit risk management? A Multiple Linear Regression (MLR) model was compared with neural networks including Multi-Layer Perceptron (MLP), and a Support vector regression (SVR). The population of this study includes 50 listed Banks in Tunis Stock Exchange (TSE) market from 2000 to 2016. Firstly, we show the factors that have significant effect on the quality of loan portfolios of banks in Tunisia. Secondly, it attempts to establish that the systematic use of objective techniques and methods designed to apprehend and assess risk when considering applications for granting credit, has a positive effect on the quality of loan portfolios of banks and their future collectability. Finally, we will try to show that the bank governance has an impact on the choice of methods and techniques for analyzing and measuring the risks inherent in the banking business, including the risk of non-repayment. The results of empirical tests confirm our claims.

Keywords: credit risk management, multiple linear regression, principal components analysis, artificial neural networks, support vector machines

Procedia PDF Downloads 125
3821 Effectiveness of Micro-Credit Scheme of Community Women and Development (COWAD) in Enhancing Living Standards of Women in Oyo State, Nigeria

Authors: Olufunmilayo Folaranmi

Abstract:

The study aimed at assessing the effectiveness of micro-credit scheme of (COWAD) in enhancing the living standard of women in selected local government areas of Oyo State. A survey research design was adopted for the study. A sample of 250 respondents was purposively selected for the study while a structured questionnaire tagged Effectiveness of Micro-Credit Scheme of Community Women and Development and Living Standards of Women Questionnaire (EMCSCWDQ) was designed to collect data for the study. Data collected was analyzed using frequency distribution, tables, percentages and chi-square statistics. Three hypotheses were tested for the study at 0.05 level of significance. Findings from the study indicated that loan provided by COWAD for women in selected local government areas towards improving their economic conditions has improved the living conditions of the women, promoted their general welfare, and reduced their poverty level. Findings also showed that some beneficiaries were not able to pay back, therefore reducing the effectiveness for future beneficiaries. Based on the findings, it was recommended that the providers of various micro-credit schemes of the state should design a convenient pattern of payment which will provide enough time for the beneficiaries of the loan to sell their goods or work for proper and timely payment. Also, the problem of collateral should be reviewed as the majority of women involved are poor. Other recommendations include replication of COWAD facilities in other NGOs as well as sustainability of the facility.

Keywords: micro-credit scheme, welfare, women, development, poverty

Procedia PDF Downloads 141
3820 Video Based Ambient Smoke Detection By Detecting Directional Contrast Decrease

Authors: Omair Ghori, Anton Stadler, Stefan Wilk, Wolfgang Effelsberg

Abstract:

Fire-related incidents account for extensive loss of life and material damage. Quick and reliable detection of occurring fires has high real world implications. Whereas a major research focus lies on the detection of outdoor fires, indoor camera-based fire detection is still an open issue. Cameras in combination with computer vision helps to detect flames and smoke more quickly than conventional fire detectors. In this work, we present a computer vision-based smoke detection algorithm based on contrast changes and a multi-step classification. This work accelerates computer vision-based fire detection considerably in comparison with classical indoor-fire detection.

Keywords: contrast analysis, early fire detection, video smoke detection, video surveillance

Procedia PDF Downloads 413
3819 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria

Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba

Abstract:

As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.

Keywords: food, accessibility, availability, security

Procedia PDF Downloads 344
3818 Intrusion Detection Techniques in NaaS in the Cloud: A Review

Authors: Rashid Mahmood

Abstract:

The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.

Keywords: IDS, cloud, naas, detection

Procedia PDF Downloads 289
3817 Duplex Real-Time Loop-Mediated Isothermal Amplification Assay for Simultaneous Detection of Beef and Pork

Authors: Mi-Ju Kim, Hae-Yeong Kim

Abstract:

Product mislabeling and adulteration have been increasing the concerns in processed meat products. Relatively inexpensive pork meat compared to meat such as beef was adulterated for economic benefit. These food fraud incidents related to pork were concerned due to economic, religious and health reasons. In this study, a rapid on-site detection method using loop-mediated isothermal amplification (LAMP) was developed for the simultaneous identification of beef and pork. Each specific LAMP primer for beef and pork was designed targeting on mitochondrial D-loop region. The LAMP assay reaction was performed at 65 ℃ for 40 min. The specificity of each primer for beef and pork was evaluated using DNAs extracted from 13 animal species including beef and pork. The sensitivity of duplex LAMP assay was examined by serial dilution of beef and pork DNAs, and reference binary mixtures. This assay was applied to processed meat products including beef and pork meat for monitoring. Each set of primers amplified only the targeted species with no cross-reactivity with animal species. The limit of detection of duplex real-time LAMP was 1 pg for each DNA of beef and pork and 1% pork in a beef-meat mixture. Commercial meat products that declared the presence of beef and/or pork meat on the label showed positive results for those species. This method was successfully applied to detect simultaneous beef and pork meats in processed meat products. The optimized duplex LAMP assay can identify simultaneously beef and pork meat within less than 40 min. A portable real-time fluorescence device used in this study is applicable for on-site detection of beef and pork in processed meat products. Thus, this developed assay was considered to be an efficient tool for monitoring meat products.

Keywords: beef, duplex real-time LAMP, meat identification, pork

Procedia PDF Downloads 200
3816 Best Option for Countercyclical Capital Buffer Implementation: Scenarios for Baltic States

Authors: Ģirts Brasliņš, Ilja Arefjevs, Nadežda Tarakanova

Abstract:

The objective of countercyclical capital buffer is to encourage banks to build up buffers in good times that can be drawn down in bad times. The aim of the report is to assess such decisions by banks derived from three approaches. The approaches are the aggregate credit-to-GDP ratio, credit growth as well as banking sector profits. The approaches are implemented for Estonia, Latvia and Lithuania for the time period 2000-2012. The report compares three approaches and analyses their relevance to the Baltic states by testing the correlation between a growth in studied variables and a growth of corresponding gaps. Methods used in the empirical part of the report are econometric analysis as well as economic analysis, development indicators, relative and absolute indicators and other methods. The research outcome is a cross-Baltic comparison of two alternative approaches to establish or release a countercyclical capital buffer by banks and their implications for each Baltic country.

Keywords: basel III, countercyclical capital buffer, banks, credit growth, baltic states

Procedia PDF Downloads 371
3815 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 392
3814 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 360
3813 Loan Supply and Asset Price Volatility: An Experimental Study

Authors: Gabriele Iannotta

Abstract:

This paper investigates credit cycles by means of an experiment based on a Kiyotaki & Moore (1997) model with heterogeneous expectations. The aim is to examine how a credit squeeze caused by high lender-level risk perceptions affects the real prices of a collateralised asset, with a special focus on the macroeconomic implications of rising price volatility in terms of total welfare and the number of bankruptcies that occur. To do that, a learning-to-forecast experiment (LtFE) has been run where participants are asked to predict the future price of land and then rewarded based on the accuracy of their forecasts. The setting includes one lender and five borrowers in each of the twelve sessions split between six control groups (G1) and six treatment groups (G2). The only difference is that while in G1 the lender always satisfies borrowers’ loan demand (bankruptcies permitting), in G2 he/she closes the entire credit market in case three or more bankruptcies occur in the previous round. Experimental results show that negative risk-driven supply shocks amplify the volatility of collateral prices. This uncertainty worsens the agents’ ability to predict the future value of land and, as a consequence, the number of defaults increases and the total welfare deteriorates.

Keywords: Behavioural Macroeconomics, Credit Cycle, Experimental Economics, Heterogeneous Expectations, Learning-to-Forecast Experiment

Procedia PDF Downloads 110
3812 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: unified theory of acceptance and use of technology (UTAUT) model, UTAUT2 model, smart national identity card (SNIC), health information application, privacy calculus model (PCM)

Procedia PDF Downloads 444
3811 Borrower Discouragement in Spain: An Empirical Analysis Using a Survey Data Set

Authors: Ginés Hernández-Cánovas, Mª Camino Ramón-Llorens, Johanna Koëter-Kant

Abstract:

This paper uses a survey data-set of 837 Spanish SMEs to analyze the association between borrower discouragement and prior firm´s strategic decisions, while controlling for firm and owner characteristics. While existing literature has neglected factors limiting the demand for resources by an overreliance on arguments which attempt to explain the existence of discouraged borrowers solely in terms of lack of access to supply of credit. The objective of this paper is to show that factors limiting the demand for resources and, therefore, reducing the availability of funds, can be traced back to the firm manager´s decision. Our hypothesis is that managers that undertake strategic decisions seeking growth or improvement in their business performance participate more in the banking market than those showing contentment with their current business situation. Our results shows that SMEs that undertake an active role in research and development activities and that achieve improvements in the operating performance of their business are less likely to be discouraged from applying for a loan. Who needs credit and who applies for credit is important for firms, prospective lenders and policymakers interested in the financial health of these firms. Credit constrained firms are less likely to invest in R&D and to introduce new products, possibly harming long-term economic growth. Knowing how important borrower discouragement is in Europe, is important for judging the priority which should be attached to government policies aimed at reducing its effects. For example, policy makers could encourage the transparency about credit eligibility and conditions in order to reduce discouragement.

Keywords: discouragement, financial constraints, SMEs financing

Procedia PDF Downloads 335
3810 Relationship Financing: A Process of Interpretative Phenomenological Analysis

Authors: Y. Fandja, O. Colot, M. Croquet

Abstract:

Small and medium-sized firms (SMEs) face difficulties in accessing bank credit. Bank credit is actually the main source of external financing for SMEs. In general, SMEs are risky businesses because of the potential opacity maintained by the leader in the management of affairs, the agency conflicts between business owners and third-party funders and the potential opportunism of the leader due to the incompleteness of the contracts. These elements accentuate the problems of information asymmetries between SMEs and bankers leading to capital rationing. Moreover, the last economic crisis reinforced this rationing of capital. However, a long-term relationship between SMEs and their bank would enable the latter to accumulate a set of relevant information allowing the reduction of information asymmetry and, consequently, the reduction of credit rationing. The objective of this research is to investigate the lived experience of SMEs loan officers in their relationships with their clients in order to understand how these relationships can affect the financing structure of these SMEs. To carry out this research, an Interpretative Phenomenological Analysis is implemented. This approach is part of the constructivist paradigm and refers to the subjective narratives of the individual rather than to an objective description of the facts. The role of the researcher is to explore the lived experience of the interviewees and to try to understand the meaning they give to this experience. Currently, several sixty-minute semi-structured interviews with loan officers for SMEs have been conducted. The analysis of the content of these interviews brought out three main themes. First, the relationship between the credit officer and the company manager is complex because the credit officer is not aware of establishing a personal relationship with his client. Second; the emotional involvement in the bank financing decision is present and third, the trust in the relationship between the credit officer and his client is very important. The originality of this research is to use the interpretative phenomenological analysis more specific to psychology and sociology in order to approach in a different way the problem of the financing of SMEs through their particular relations with the bankers.

Keywords: financing structure, interpretative phenomenological analysis, relationship financing, SME

Procedia PDF Downloads 133
3809 The Women Entrepreneur Support Fund in Bangladesh: Challenges and Prospects

Authors: Chowdhury Dilruba Shoma

Abstract:

Gender is about equal rights that both males and females having access to responsibilities and opportunities in decision making is a fundamental human right. It is also a precondition for, and a mark of, sustainable people-oriented development. In Bangladesh, women have fewer opportunities than men do to access credit from banks and financial institutions. Entrenched patriarchal attitudes, unequal inheritance rights, and male-dominated hierarchies in the financial system, plus high interest rates and a lack of security/collateral, make it harder for women to obtain bank loans. Limited access to institutional credit is a serious restraint on the productivity and income of women entrepreneurs, (and the wider economy). These gender-biased and structural barriers inhibit women’s access to fundamental economic rights. Using a liberal feminist theoretical lens, this study provides some useful insights into the relationship between gender inequality and entrepreneurship, leading to a better understanding of women’s entrepreneurship development in Bangladesh. Recently, the Bangladesh Government, the United Nations Capital Development Fund, and Bangladesh Bank opened up the Women Entrepreneur Support Fund (WESF) ‒ Credit Guarantee Scheme (CGS) pilot project to cover collateral shortfalls for women entrepreneurs in the small and medium enterprise sector. The aim is to improve gender equality and advance women’s rights in relation to receiving credit. This article examines the challenges and prospects of the WESF-CGS, and suggests that implementation of measures in WESF-CGS policymaking, coupled with a combination of legislatory and regulatory reforms that implement the fundamental tenets of liberal feminism, can lead to a comprehensive and effective credit policy to boost women’s agency and economic empowerment. This may ultimately lead to more sustainable development in Bangladesh.

Keywords: Bangladesh, credit guarantee scheme, liberal feminist theory, women entrepreneur support fund

Procedia PDF Downloads 116
3808 Design of a Low Cost Motion Data Acquisition Setup for Mechatronic Systems

Authors: Baris Can Yalcin

Abstract:

Motion sensors have been commonly used as a valuable component in mechatronic systems, however, many mechatronic designs and applications that need motion sensors cost enormous amount of money, especially high-tech systems. Design of a software for communication protocol between data acquisition card and motion sensor is another issue that has to be solved. This study presents how to design a low cost motion data acquisition setup consisting of MPU 6050 motion sensor (gyro and accelerometer in 3 axes) and Arduino Mega2560 microcontroller. Design parameters are calibration of the sensor, identification and communication between sensor and data acquisition card, interpretation of data collected by the sensor.

Keywords: design, mechatronics, motion sensor, data acquisition

Procedia PDF Downloads 561
3807 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 408
3806 Fraud in the Higher Educational Institutions in Assam, India: Issues and Challenges

Authors: Kalidas Sarma

Abstract:

Fraud is a social problem changing with social change and it has a regional and global impact. Introduction of private domain in higher education along with public institutions has led to commercialization of higher education which encourages unprecedented mushrooming of private institutions resulting in fraudulent activities in higher educational institutions in Assam, India. Presently, fraud has been noticed in in-service promotion, fake entry qualification by teachers in different levels of work-place by using fake master degrees, master of philosophy and doctor of philosophy degree certificates. The aim and objective of the study are to identify grey areas in maintenance of quality in higher educational institutions in Assam and also to draw the contour for planning and implementation. This study is based on both primary and secondary data collected through questionnaire and seeking information through Right to Information Act 2005. In Assam, there are 301 undergraduate and graduate colleges distributed in 27 (Twenty seven) administrative districts with 11000 (Eleven thousand) college teachers. Total 421 (Four hundred twenty one) college teachers from the 14 respondent colleges have been taken for analysis. Data collected has been analyzed by using 'Hypertext Pre-processor' (PhP) application with My Sequel Structure Query Language (MySQL) and Google Map Application Programming Interface (APIs). Graph has been generated by using open source tool Chart.js. Spatial distribution maps have been generated with the help of geo-references of the colleges. The result shows: (i) the violation of University Grants Commission's (UGCs) Regulation for the awards of M. Phil/Ph.D. clearly exhibits. (ii) There is a gap between apex regulatory bodies of higher education at national and as well as state level to check fraud. (iii) Mala fide 'No Objection Certificate' (NOC) issued by the Government of Assam have played pivotal role in the occurrence of fraudulent practices in higher educational institutions of Assam. (iv) Violation of verdict of the Hon'ble Supreme Court of India regarding territorial jurisdiction of Universities for the awards of Ph.D. and M. Phil degrees in distance mode/study centre is also a responsible factor for the spread of these academic frauds in Assam and other states. The challenges and mitigation of these issues have been discussed.

Keywords: Assam, fraud, higher education, mitigation

Procedia PDF Downloads 145