Search results for: access to credit
3500 Bank Internal Controls and Credit Risk in Europe: A Quantitative Measurement Approach
Authors: Ellis Kofi Akwaa-Sekyi, Jordi Moreno Gené
Abstract:
Managerial actions which negatively profile banks and impair corporate reputation are addressed through effective internal control systems. Disregard for acceptable standards and procedures for granting credit have affected bank loan portfolios and could be cited for the crises in some European countries. The study intends to determine the effectiveness of internal control systems, investigate whether perceived agency problems exist on the part of board members and to establish the relationship between internal controls and credit risk among listed banks in the European Union. Drawing theoretical support from the behavioural compliance and agency theories, about seventeen internal control variables (drawn from the revised COSO framework), bank-specific, country, stock market and macro-economic variables will be involved in the study. A purely quantitative approach will be employed to model internal control variables covering the control environment, risk management, control activities, information and communication and monitoring. Panel data from 2005-2014 on listed banks from 28 European Union countries will be used for the study. Hypotheses will be tested and the Generalized Least Squares (GLS) regression will be run to establish the relationship between dependent and independent variables. The Hausman test will be used to select whether random or fixed effect model will be used. It is expected that listed banks will have sound internal control systems but their effectiveness cannot be confirmed. A perceived agency problem on the part of the board of directors is expected to be confirmed. The study expects significant effect of internal controls on credit risk. The study will uncover another perspective of internal controls as not only an operational risk issue but credit risk too. Banks will be cautious that observing effective internal control systems is an ethical and socially responsible act since the collapse (crisis) of financial institutions as a result of excessive default is a major contagion. This study deviates from the usual primary data approach to measuring internal control variables and rather models internal control variables in a quantitative approach for the panel data. Thus a grey area in approaching the revised COSO framework for internal controls is opened for further research. Most bank failures and crises could be averted if effective internal control systems are religiously adhered to.Keywords: agency theory, credit risk, internal controls, revised COSO framework
Procedia PDF Downloads 3163499 Evolving Credit Scoring Models using Genetic Programming and Language Integrated Query Expression Trees
Authors: Alexandru-Ion Marinescu
Abstract:
There exist a plethora of methods in the scientific literature which tackle the well-established task of credit score evaluation. In its most abstract form, a credit scoring algorithm takes as input several credit applicant properties, such as age, marital status, employment status, loan duration, etc. and must output a binary response variable (i.e. “GOOD” or “BAD”) stating whether the client is susceptible to payment return delays. Data imbalance is a common occurrence among financial institution databases, with the majority being classified as “GOOD” clients (clients that respect the loan return calendar) alongside a small percentage of “BAD” clients. But it is the “BAD” clients we are interested in since accurately predicting their behavior is crucial in preventing unwanted loss for loan providers. We add to this whole context the constraint that the algorithm must yield an actual, tractable mathematical formula, which is friendlier towards financial analysts. To this end, we have turned to genetic algorithms and genetic programming, aiming to evolve actual mathematical expressions using specially tailored mutation and crossover operators. As far as data representation is concerned, we employ a very flexible mechanism – LINQ expression trees, readily available in the C# programming language, enabling us to construct executable pieces of code at runtime. As the title implies, they model trees, with intermediate nodes being operators (addition, subtraction, multiplication, division) or mathematical functions (sin, cos, abs, round, etc.) and leaf nodes storing either constants or variables. There is a one-to-one correspondence between the client properties and the formula variables. The mutation and crossover operators work on a flattened version of the tree, obtained via a pre-order traversal. A consequence of our chosen technique is that we can identify and discard client properties which do not take part in the final score evaluation, effectively acting as a dimensionality reduction scheme. We compare ourselves with state of the art approaches, such as support vector machines, Bayesian networks, and extreme learning machines, to name a few. The data sets we benchmark against amount to a total of 8, of which we mention the well-known Australian credit and German credit data sets, and the performance indicators are the following: percentage correctly classified, area under curve, partial Gini index, H-measure, Brier score and Kolmogorov-Smirnov statistic, respectively. Finally, we obtain encouraging results, which, although placing us in the lower half of the hierarchy, drive us to further refine the algorithm.Keywords: expression trees, financial credit scoring, genetic algorithm, genetic programming, symbolic evolution
Procedia PDF Downloads 1173498 Risk, Capital Buffers, and Bank Lending: The Adjustment of Euro Area Banks
Authors: Laurent Maurin, Mervi Toivanen
Abstract:
This paper estimates euro area banks’ internal target capital ratios and investigates whether banks’ adjustment to the targets have an impact on credit supply and holding of securities during the financial crisis in 2005-2011. Using data on listed banks and country-specific macro-variables a partial adjustment model is estimated in a panel context. The results indicate, firstly, that an increase in the riskiness of banks’ balance sheets influences positively on the target capital ratios. Secondly, the adjustment towards higher equilibrium capital ratios has a significant impact on banks’ assets. The impact is found to be more size-able on security holdings than on loans, thereby suggesting a pecking order.Keywords: Euro area, capital ratios, credit supply, partial adjustment model
Procedia PDF Downloads 4483497 Functional Variants Detection by RNAseq
Authors: Raffaele A. Calogero
Abstract:
RNAseq represents an attractive methodology for the detection of functional genomic variants. RNAseq results obtained from polyA+ RNA selection protocol (POLYA) and from exonic regions capturing protocol (ACCESS) indicate that ACCESS detects 10% more coding SNV/INDELs with respect to POLYA. ACCESS requires less reads for coding SNV detection with respect to POLYA. However, if the analysis aims at identifying SNV/INDELs also in the 5’ and 3’ UTRs, POLYA is definitively the preferred method. No particular advantage comes from ACCESS or POLYA in the detection of fusion transcripts.Keywords: fusion transcripts, INDEL, RNA-seq, WES, SNV
Procedia PDF Downloads 2873496 A Fourier Method for Risk Quantification and Allocation of Credit Portfolios
Authors: Xiaoyu Shen, Fang Fang, Chujun Qiu
Abstract:
Herewith we present a Fourier method for credit risk quantification and allocation in the factor-copula model framework. The key insight is that, compared to directly computing the cumulative distribution function of the portfolio loss via Monte Carlo simulation, it is, in fact, more efficient to calculate the transformation of the distribution function in the Fourier domain instead and inverting back to the real domain can be done in just one step and semi-analytically, thanks to the popular COS method (with some adjustments). We also show that the Euler risk allocation problem can be solved in the same way since it can be transformed into the problem of evaluating a conditional cumulative distribution function. Once the conditional or unconditional cumulative distribution function is known, one can easily calculate various risk metrics. The proposed method not only fills the niche in literature, to the best of our knowledge, of accurate numerical methods for risk allocation but may also serve as a much faster alternative to the Monte Carlo simulation method for risk quantification in general. It can cope with various factor-copula model choices, which we demonstrate via examples of a two-factor Gaussian copula and a two-factor Gaussian-t hybrid copula. The fast error convergence is proved mathematically and then verified by numerical experiments, in which Value-at-Risk, Expected Shortfall, and conditional Expected Shortfall are taken as examples of commonly used risk metrics. The calculation speed and accuracy are tested to be significantly superior to the MC simulation for real-sized portfolios. The computational complexity is, by design, primarily driven by the number of factors instead of the number of obligors, as in the case of Monte Carlo simulation. The limitation of this method lies in the "curse of dimension" that is intrinsic to multi-dimensional numerical integration, which, however, can be relaxed with the help of dimension reduction techniques and/or parallel computing, as we will demonstrate in a separate paper. The potential application of this method has a wide range: from credit derivatives pricing to economic capital calculation of the banking book, default risk charge and incremental risk charge computation of the trading book, and even to other risk types than credit risk.Keywords: credit portfolio, risk allocation, factor copula model, the COS method, Fourier method
Procedia PDF Downloads 1663495 An Attentional Bi-Stream Sequence Learner (AttBiSeL) for Credit Card Fraud Detection
Authors: Amir Shahab Shahabi, Mohsen Hasirian
Abstract:
Modern societies, marked by expansive Internet connectivity and the rise of e-commerce, are now integrated with digital platforms at an unprecedented level. The efficiency, speed, and accessibility of e-commerce have garnered a substantial consumer base. Against this backdrop, electronic banking has undergone rapid proliferation within the realm of online activities. However, this growth has inadvertently given rise to an environment conducive to illicit activities, notably electronic payment fraud, posing a formidable challenge to the domain of electronic banking. A pivotal role in upholding the integrity of electronic commerce and business transactions is played by electronic fraud detection, particularly in the context of credit cards which underscores the imperative of comprehensive research in this field. To this end, our study introduces an Attentional Bi-Stream Sequence Learner (AttBiSeL) framework that leverages attention mechanisms and recurrent networks. By incorporating bidirectional recurrent layers, specifically bidirectional Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) layers, the proposed model adeptly extracts past and future transaction sequences while accounting for the temporal flow of information in both directions. Moreover, the integration of an attention mechanism accentuates specific transactions to varying degrees, as manifested in the output of the recurrent networks. The effectiveness of the proposed approach in automatic credit card fraud classification is evaluated on the European Cardholders' Fraud Dataset. Empirical results validate that the hybrid architectural paradigm presented in this study yields enhanced accuracy compared to previous studies.Keywords: credit card fraud, deep learning, attention mechanism, recurrent neural networks
Procedia PDF Downloads 133494 The Effect of Visual Fluency and Cognitive Fluency on Access Rates of Web Pages
Authors: Xiaoying Guo, Xiangyun Wang
Abstract:
Access rates is a key indicator of reflecting the popularity of web pages. Having high access rates are very important for web pages, especially for news web pages, online shopping sites and searching engines. In this paper, we analyzed the influences of visual fluency and cognitive fluency on access rates of Chinese web pages. Firstly, we conducted an experiment of scoring the web pages. Twenty-five subjects were invited to view top 50 web pages of China, and they were asked to give a score in a 5-point Likert-scale from four aspects, including complexity, comfortability, familiarity and usability. Secondly, the obtained results was analyzed by correlation analysis and factor analysis in R. By factor analysis; we analyzed the contributions of visual fluency and cognitive fluency to the access rates. The results showed that both visual fluency and cognitive fluency affect the access rate of web pages. Compared to cognitive fluency, visual fluency play a more important role in user’s accessing of web pages.Keywords: visual fluency, cognitive fluency, visual complexity, usability
Procedia PDF Downloads 3793493 Commercialization of Smallholder Rice Producers and Its Determinants in Ethiopia
Authors: Abebaw Assaye, Seiichi Sakurai, Marutama Atsush, Dawit Alemu
Abstract:
Rice is considered as a strategic agricultural commodity targeting national food security and import substitution in Ethiopia and diverse measures are put in place a number of initiatives to ensure the growth and development of rice sector in the country. This study assessed factors that influence smallholder farmers' level of rice commercialization in Ethiopia. The required data were generated from 594 randomly sampled rice producers using multi-stage sampling techniques from four major rice-producing regional states. Both descriptive and econometric methods were used to analyze the data. We adopted the ordered probit model to analyze factors determining output commercialization in the rice market. The ordered probit model result showed that the sex of the household head, educational status of the household head, credit use, proportion of irrigated land cultivated, membership in social groups, and land dedicated to rice production were found to influence significantly and positively the probability of being commercial-oriented. Conversely, the age of the household, total cultivated land, and distance to the main market were found to influence negatively. These findings suggest that promoting productivity-increasing technologies, development of irrigation facilities, strengthening of social institutions, and facilitating access to credit are crucial for enhancing the commercialization of rice in the study area. Since agricultural lands are limited, intensified farming through promoting improved rice technologies and mechanized farming could be an option to enhance marketable surplus and increase level of rice market particicpation.Keywords: rice, commercialization, Tobit, ordered probit, Ethiopia
Procedia PDF Downloads 833492 A Product-Specific/Unobservable Approach to Segmentation for a Value Expressive Credit Card Service
Authors: Manfred F. Maute, Olga Naumenko, Raymond T. Kong
Abstract:
Using data from a nationally representative financial panel of Canadian households, this study develops a psychographic segmentation of the customers of a value-expressive credit card service and tests for effects on relational response differences. The variety of segments elicited by agglomerative and k means clustering and the familiar profiles of individual clusters suggest that the face validity of the psychographic segmentation was quite high. Segmentation had a significant effect on customer satisfaction and relationship depth. However, when socio-demographic characteristics like household size and income were accounted for in the psychographic segmentation, the effect on relational response differences was magnified threefold. Implications for the segmentation of financial services markets are considered.Keywords: customer satisfaction, financial services, psychographics, response differences, segmentation
Procedia PDF Downloads 3343491 Early Warning System of Financial Distress Based On Credit Cycle Index
Authors: Bi-Huei Tsai
Abstract:
Previous studies on financial distress prediction choose the conventional failing and non-failing dichotomy; however, the distressed extent differs substantially among different financial distress events. To solve the problem, “non-distressed”, “slightly-distressed” and “reorganization and bankruptcy” are used in our article to approximate the continuum of corporate financial health. This paper explains different financial distress events using the two-stage method. First, this investigation adopts firm-specific financial ratios, corporate governance and market factors to measure the probability of various financial distress events based on multinomial logit models. Specifically, the bootstrapping simulation is performed to examine the difference of estimated misclassifying cost (EMC). Second, this work further applies macroeconomic factors to establish the credit cycle index and determines the distressed cut-off indicator of the two-stage models using such index. Two different models, one-stage and two-stage prediction models, are developed to forecast financial distress, and the results acquired from different models are compared with each other, and with the collected data. The findings show that the two-stage model incorporating financial ratios, corporate governance and market factors has the lowest misclassification error rate. The two-stage model is more accurate than the one-stage model as its distressed cut-off indicators are adjusted according to the macroeconomic-based credit cycle index.Keywords: Multinomial logit model, corporate governance, company failure, reorganization, bankruptcy
Procedia PDF Downloads 3773490 Digitalised Welfare: Systems for Both Seeing and Working with Mess
Authors: Amelia Morris, Lizzie Coles-Kemp, Will Jones
Abstract:
This paper examines how community welfare initiatives transform how individuals use and experience an ostensibly universal welfare system. This paper argues that the digitalisation of welfare overlooks the complex reality of being unemployed or in low-wage work, and erects digital barriers to accessing welfare. Utilising analysis of ethnographic research in food banks and community groups, the paper explores the ways that Universal Credit has not abolished face-to-face support, but relocated it to unofficial sites of welfare. The apparent efficiency and simplicity of the state’s digital welfare apparatus, therefore, is produced not by reducing the ‘messiness’ of welfare, but by rendering it invisible within the digital framework. Using the analysis of the study’s data, this paper recommends three principles of service design that would render the messiness visible to the state.Keywords: welfare, digitalisation, food bank, Universal Credit
Procedia PDF Downloads 1523489 A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance
Authors: Rupan Preet Kaur
Abstract:
This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture.Keywords: artificial intelligence, machine learning, user access review, access approval
Procedia PDF Downloads 933488 A Study of the Trap of Multi-Homing in Customers: A Comparative Case Study of Digital Payments
Authors: Shari S. C. Shang, Lynn S. L. Chiu
Abstract:
In the digital payment market, some consumers use only one payment wallet while many others play multi-homing with a variety of payment services. With the diffusion of new payment systems, we examined the determinants of the adoption of multi-homing behavior. This study aims to understand how a digital payment provider dynamically expands business touch points with cross-business strategies to enrich the digital ecosystem and avoid the trap of multi-homing in customers. By synthesizing platform ecosystem literature, we constructed a two-dimensional research framework with one determinant of user digital behavior from offline to online intentions and the other determinant of digital payment touch points from convenient accessibility to cross-business platforms. To explore on a broader scale, we selected 12 digital payments from 5 countries of UK, US, Japan, Korea, and Taiwan. With the interplays of user digital behaviors and payment touch points, we group the study cases into four types: (1) Channel Initiated: users originated from retailers with high access to in-store shopping with face-to-face guidance for payment adoption. Providers offer rewards for customer loyalty and secure the retailer’s efficient cash flow management. (2) Social Media Dependent: users usually are digital natives with high access to social media or the internet who shop and pay digitally. Providers might not own physical or online shops but are licensed to aggregate money flows through virtual ecosystems. (3) Early Life Engagement: digital banks race to capture the next generation from popularity to profitability. This type of payment aimed to give children a taste of financial freedom while letting parents track their spending. Providers are to capitalize on the digital payment and e-commerce boom and hold on to new customers into adulthood. (4) Traditional Banking: plastic credit cards are purposely designed as a control group to track the evolvement of business strategies in digital payments. Traditional credit card users may follow the bank’s digital strategy to land on different types of digital wallets or mostly keep using plastic credit cards. This research analyzed business growth models and inter-firms’ coopetition strategies of the selected cases. Results of the multiple case analysis reveal that channel initiated payments bundled rewards with retailer’s business discount for recurring purchases. They also extended other financial services, such as insurance, to fulfill customers’ new demands. Contrastively, social media dependent payments developed new usages and new value creation, such as P2P money transfer through network effects among the virtual social ties, while early life engagements offer virtual banking products to children who are digital natives but overlooked by incumbents. It has disrupted the banking business domains in preparation for the metaverse economy. Lastly, the control group of traditional plastic credit cards has gradually converted to a BaaS (banking as a service) model depending on customers’ preferences. The multi-homing behavior is not avoidable in digital payment competitions. Payment providers may encounter multiple waves of a multi-homing threat after a short period of success. A dynamic cross-business collaboration strategy should be explored to continuously evolve the digital ecosystems and allow users for a broader shopping experience and continual usage.Keywords: digital payment, digital ecosystems, multihoming users, cross business strategy, user digital behavior intentions
Procedia PDF Downloads 1603487 Data Envelopment Analysis of Allocative Efficiency among Small-Scale Tuber Crop Farmers in North-Central, Nigeria
Authors: Akindele Ojo, Olanike Ojo, Agatha Oseghale
Abstract:
The empirical study examined the allocative efficiency of small holder tuber crop farmers in North central, Nigeria. Data used for the study were obtained from primary source using a multi-stage sampling technique with structured questionnaires administered to 300 randomly selected tuber crop farmers from the study area. Descriptive statistics, data envelopment analysis and Tobit regression model were used to analyze the data. The DEA result on the classification of the farmers into efficient and inefficient farmers showed that 17.67% of the sampled tuber crop farmers in the study area were operating at frontier and optimum level of production with mean allocative efficiency of 1.00. This shows that 82.33% of the farmers in the study area can still improve on their level of efficiency through better utilization of available resources, given the current state of technology. The results of the Tobit model for factors influencing allocative inefficiency in the study area showed that as the year of farming experience, level of education, cooperative society membership, extension contacts, credit access and farm size increased in the study area, the allocative inefficiency of the farmers decreased. The results on effects of the significant determinants of allocative inefficiency at various distribution levels revealed that allocative efficiency increased from 22% to 34% as the farmer acquired more farming experience. The allocative efficiency index of farmers that belonged to cooperative society was 0.23 while their counterparts without cooperative society had index value of 0.21. The result also showed that allocative efficiency increased from 0.43 as farmer acquired high formal education and decreased to 0.16 with farmers with non-formal education. The efficiency level in the allocation of resources increased with more contact with extension services as the allocative efficeincy index increased from 0.16 to 0.31 with frequency of extension contact increasing from zero contact to maximum of twenty contacts per annum. These results confirm that increase in year of farming experience, level of education, cooperative society membership, extension contacts, credit access and farm size leads to increases efficiency. The results further show that the age of the farmers had 32% input to the efficiency but reduces to an average of 15%, as the farmer grows old. It is therefore recommended that enhanced research, extension delivery and farm advisory services should be put in place for farmers who did not attain optimum frontier level to learn how to attain the remaining 74.39% level of allocative efficiency through a better production practices from the robustly efficient farms. This will go a long way to increase the efficiency level of the farmers in the study area.Keywords: allocative efficiency, DEA, Tobit regression, tuber crop
Procedia PDF Downloads 2893486 The Underground Ecosystem of Credit Card Frauds
Authors: Abhinav Singh
Abstract:
Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem
Procedia PDF Downloads 4393485 A Breakthrough Improvement Brought by Taxi-Calling APPs for Taxi Operation Level
Authors: Yuan-Lin Liu, Ye Li, Tian Xia
Abstract:
Taxi-calling APPs have been used widely, while brought both benefits and a variety of issues for the taxi market. Many countries do not know whether the benefits are remarkable than the issues or not. This paper established a comparison between the basic scenario (2009-2012) and a taxi-calling software usage scenario (2012-2015) to explain the impact of taxi-calling APPs. The impacts of taxi-calling APPs illustrated by the comparison results are: 1) The supply and demand distribution is more balanced, extending from the city center to the suburb. The availability of taxi service has been improved in low density areas, thin market attribute has also been improved; 2)The ratio of short distance taxi trip decreased, long distance service increased, the utilization of mileage increased, and the rate of empty decreased; 3) The popularity of taxi-calling APPs was able to reduce the average empty distance, cruise time, empty mileage rate and average times of loading passengers, can also enhance the average operating speed, improve the taxi operating level, and reduce social cost although there are some disadvantages. This paper argues that the taxi industry and government can establish an integrated third-party credit information platform based on credit evaluated by the data of the drivers’ driving behaviors to supervise the drivers. Taxi-calling APPs under fully covered supervision in the mobile Internet environment will become a new trend.Keywords: taxi, taxi-calling APPs, credit, scenario comparison
Procedia PDF Downloads 2543484 Italian Central Guarantee Fund: An Analysis of the Guaranteed SMEs’ Default Risk
Authors: M. C. Arcuri, L. Gai, F. Ielasi
Abstract:
Italian Central Guarantee Fund (CGF) has the purpose to facilitate Small and Medium-sized Enterprises (SMEs)’ access to credit. The aim of the paper is to study the evaluation method adopted by the CGF with regard to SMEs requiring its intervention. This is even more important in the light of the recent CGF reform. We analyse an initial sample of more than 500.000 guarantees from 2012 to 2018. We distinguish between a counter-guarantee delivered to a mutual guarantee institution and a guarantee directly delivered to a bank. We investigate the impact of variables related to the operations and the SMEs on Altman Z’’-score and the score consistent with CGF methodology. We verify that the type of intervention affects the scores and the initial condition changes with the new assessment criterions.Keywords: banks, default risk, Italian guarantee fund, mutual guarantee institutions
Procedia PDF Downloads 1743483 Continuous-Time Convertible Lease Pricing and Firm Value
Authors: Ons Triki, Fathi Abid
Abstract:
Along with the increase in the use of leasing contracts in corporate finance, multiple studies aim to model the credit risk of the lease in order to cover the losses of the lessor of the asset if the lessee goes bankrupt. In the current research paper, a convertible lease contract is elaborated in a continuous time stochastic universe aiming to ensure the financial stability of the firm and quickly recover the losses of the counterparties to the lease in case of default. This work examines the term structure of the lease rates taking into account the credit default risk and the capital structure of the firm. The interaction between the lessee's capital structure and the equilibrium lease rate has been assessed by applying the competitive lease market argument developed by Grenadier (1996) and the endogenous structural default model set forward by Leland and Toft (1996). The cumulative probability of default was calculated by referring to Leland and Toft (1996) and Yildirim and Huan (2006). Additionally, the link between lessee credit risk and lease rate was addressed so as to explore the impact of convertible lease financing on the term structure of the lease rate, the optimal leverage ratio, the cumulative default probability, and the optimal firm value by applying an endogenous conversion threshold. The numerical analysis is suggestive that the duration structure of lease rates increases with the increase in the degree of the market price of risk. The maximal value of the firm decreases with the effect of the optimal leverage ratio. The results are indicative that the cumulative probability of default increases with the maturity of the lease contract if the volatility of the asset service flows is significant. Introducing the convertible lease contract will increase the optimal value of the firm as a function of asset volatility for a high initial service flow level and a conversion ratio close to 1.Keywords: convertible lease contract, lease rate, credit-risk, capital structure, default probability
Procedia PDF Downloads 983482 Analysis of Technical Efficiency and Its Determinants among Cattle Fattening Enterprises in Kebbi State, Nigeria
Authors: Gona Ayuba, Isiaka Mohammed, Kotom Mohammed Baba, Mohammed Aabubakar Maikasuwa
Abstract:
The study examined the technical efficiency and its determinants of cattle fattening enterprises in Kebbi state, Nigeria. Data were collected from a sample of 160 fatteners between June 2010 and June 2011 using the multistage random sampling technique. Translog stochastic frontier production function was employed for the analysis. Results of the analysis show that technical efficiency indices varied from 0.74 to 0.98%, with a mean of 0.90%, indicating that there was no wide gap between the efficiency of best technical efficient fatteners and that of the average fattener. The result also showed that fattening experience and herd size influenced the level of technical efficiency at 1% levels. It is recommended that credit agencies should ensure that credit made available to the fatteners is monitored to ensure appropriate utilization.Keywords: technical efficiency, determinants, cattle, fattening enterprises
Procedia PDF Downloads 4513481 Remittances and Water Access: A Cross-Sectional Study of Sub Saharan Africa Countries
Authors: Narges Ebadi, Davod Ahmadi, Hiliary Monteith, Hugo Melgar-Quinonez
Abstract:
Migration cannot necessarily relieve pressure on water resources in origin communities, and male out-migration can increase the water management burden of women. However, inflows of financial remittances seem to offer possibilities of investing in improving drinking-water access. Therefore, remittances may be an important pathway for migrants to support water security. This paper explores the association between water access and the receipt of remittances in households in sub-Saharan Africa. Data from round 6 of the 'Afrobarometer' surveys in 2016 were used (n= 49,137). Descriptive, bivariate and multivariate statistical analyses were carried out in this study. Regardless of country, findings from descriptive analyses showed that approximately 80% of the respondents never received remittance, and 52% had enough clean water. Only one-fifth of the respondents had piped water supply inside the house (19.9%), and approximately 25% had access to a toilet inside the house. Bivariate analyses revealed that even though receiving remittances was significantly associated with water supply, the strength of association was very weak. However, other factors such as the area of residence (rural vs. urban), cash income frequencies, electricity access, and asset ownership were strongly associated with water access. Results from unadjusted multinomial logistic regression revealed that the probability of having no access to piped water increased among remittance recipients who received financial support at least once a month (OR=1.324) (p < 0.001). In contrast, those not receiving remittances were more likely to regularly have a water access concern (OR=1.294) (p < 0.001), and not have access to a latrine (OR=1.665) (p < 0.001). In conclusion, receiving remittances is significantly related to water access as the strength of odds ratios for socio-demographic factors was stronger.Keywords: remittances, water access, SSA, migration
Procedia PDF Downloads 1793480 Biometric Recognition Techniques: A Survey
Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz
Abstract:
Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric
Procedia PDF Downloads 7553479 Determinants of Non-Performing Loans: An Empirical Investigation of Bank-Specific Micro-Economic Factors
Authors: Amir Ikram, Faisal Ijaz, Qin Su
Abstract:
The empirical study was undertaken to explore the determinants of non-performing loans (NPLs) of small and medium enterprises (SMEs) sector held by the commercial banks. Primary data was collected through well-structured survey questionnaire from credit analysts/bankers of 42 branches of 9 commercial banks, operating in the district of Lahore (Pakistan), for 2014-2015. Selective descriptive analysis and Pearson chi-square technique were used to illustrate and evaluate the significance of different variables affecting NPLs. Branch age, duration of the loan, and credit policy were found to be significant determinants of NPLs. The study proposes that bank-specific and SME-specific microeconomic variables directly influence NPLs, while macroeconomic factors act as intermediary variables. Framework exhibiting causal nexus of NPLs was also drawn on the basis of empirical findings. The results elaborate various origins of NPLs and suggest that they are primarily instigated by the loan sanctioning procedure of the financial institution. The paper also underlines the risk management practices adopted by the bank at branch level to averse the risk of loan default. Empirical investigation of bank-specific microeconomic factors of NPLs with respect to Pakistan’s economy is the novelty of the study. Broader strategic policy implications are provided for credit analysts and entrepreneurs.Keywords: commercial banks, microeconomic factors, non-performing loans, small and medium enterprises
Procedia PDF Downloads 2593478 Civil Liability for Digital Crimes
Authors: Pál Mészáros
Abstract:
The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes.Keywords: civil liability, digital crimes, transfer of responsibility, civil law
Procedia PDF Downloads 643477 Effect of Urea Deep Placement Technology Adoption on the Production Frontier: Evidence from Irrigation Rice Farmers in the Northern Region of Ghana
Authors: Shaibu Baanni Azumah, William Adzawla
Abstract:
Rice is an important staple crop, with current demand higher than the domestic supply in Ghana. This has led to a high and unfavourable import bill. Therefore, recent policies and interventions in the agricultural sub-sector aim at promoting various improved agricultural technologies in order to improve domestic production and reduce the importation of rice. In this study, we examined the effect of the adoption of Urea Deep Placement (UDP) technology by rice farmers on the position of the production frontier. This involved 200 farmers selected through a multi stage sampling technique in the Northern region of Ghana. A Cobb-Douglas stochastic frontier model was fitted. The result showed that the adoption of UDP technology shifts the output frontier outward and also move the farmers closer to the frontier. Farmers were also operating under diminishing returns to scale which calls for redress. Other factors that significantly influenced rice production were farm size, labour, use of certified seeds and NPK fertilizer. Although there was an opportunity for improvement, the farmers were highly efficient (92%), compared to previous studies. Farmers’ efficiency was improved through increased education, household size, experience, access to credit, and lack of extension service provision by MoFA. The study recommends the revision of Ghana’s agricultural policy to include the UDP technology. Agricultural Extension officers of the Ministry of Food and Agriculture (MoFA) should be trained on the UDP technology to support IFDC’s drive to improve adoption by rice farmers. Rice farmers are also encouraged to expand their farm lands, improve plant population, and also increase the usage of fertilizer to improve yields. Mechanisms through which credit can be made easily accessible and effectively utilised should be identified and promoted.Keywords: efficiency, rice farmers, stochastic frontier, UDP technology
Procedia PDF Downloads 4093476 Female Entrepreneurship in Transitional Economies: An In-Depth Comparative Study about Challenges Facing Female Entrepreneurs in Nigeria and Egypt
Authors: Dina Mohamed Ayman, Rafieu Akin
Abstract:
In an attempt to increase the female total entrepreneurial activities (TEA) within Egypt and Nigeria, this paper aims to investigate the challenges facing female entrepreneurs operating in Egypt, in relative to Nigeria. In this regard, both researchers undertook a qualitative approach due to the scarcity of the literature reviewed on the topic; in those particular countries, and as an in-depth comparative mode. Therefore, ten Egyptian entrepreneurs in relative to ten Nigerian entrepreneurs were in-depth investigated. The research findings prove that female entrepreneurs face complex problems for being both gender and country-specific. Regarding the gender-specific obstacles, the work/life imbalance due to the scarcity of child-care nurseries and the prevalence of the gender-role division while performing the house chores rather than the concept of co-operation, acted as a main source of cultural challenge because women are considered mostly as 'housewives'. However, interestingly, this specific gender-discrimination challenge is proven to have no grounded effect in terms of the business-establishment and daily dealings neither in Egypt nor Nigeria, as one of the sample exclaimed 'as long as you pay, then no gender difference is set on the table'. Other country-specific challenges facing female entrepreneurs, lied in, the aggregate weak entrepreneurial framework governing both countries, also, women faced the difficulty of access to financial institutions with collateral requirements that are usually "hardly to be met", besides, the absence of the "micro-credit-Grameen-banks" concept. As well, the scarcity of incubators and business training centers providing network, consultancy and well-trained workforce to female entrepreneurs constitute a major hurdle for women entrepreneurs operating in both countries. Finally, this paper will conclude the research by offering a set of public-policy recommendations to pave the way for females to choose self-employment as a career path.Keywords: entrepreneurship, female entrepreneurship, obstacles, framework conditions, culture, micro-credit
Procedia PDF Downloads 3713475 Access to Higher Education in Nigeria: The University of Calabar Pre-Degree Programme Experience
Authors: Eni I. Eni, James Okon, Ashang J. Ashang
Abstract:
The pre-degree programme of the University of Calabar was introduced to help increase access to tertiary Education in science related courses. This has become necessary due to population increase and public awareness. Its main objective was to provide access to candidates from educationally less developed states (ELDS) and states within its catchment area. To find out if this objective of the programme has been achieved, an impact evaluation of the programme was conducted, from where the aspect of providing access to University Education was reported here. It was reasoned that if this objective of the programme was properly implemented, there should be an evidence of increase in the access to University Education. To achieve the purpose of this study, two research questions were formulated; expost-facto research design and purposive sampling technique were adopted for the study. Data was collected from the Faculty of Science and analyzed using descriptive statistics in terms of frequencies and percentages. The result of data analysis showed that the pre-degree programme of the University of Calabar has provided educational access to Nigerians especially those from educationally less developed states in science related courses. It was therefore recommended that the programme be sustained and further be improved upon to facilitate its continued provision of access to University Education in Nigeria.Keywords: higher education, pre-degree programme, University of Calabar, educationally less developed states
Procedia PDF Downloads 3333474 The Impact of E-commerce to Improve of Banking Services
Authors: Azzi Mohammed Amin
Abstract:
Summary: This note aims to demonstrate the impact that comes out of electronic commerce to improve the quality of banking services and to answer the questions raised in the problem; it also aims to find out the methods applied in the banks to improve the quality of banking. And it identified a conceptual framework for electronic commerce and electronic banking. In addition, the inclusion of case study includes the Algerian Popular Credit Bank to measure the impact of electronic commerce on the quality of banking services. Has been focusing on electronic banking services as a field of modern knowledge, including fields characterized by high module in content and content, where banking management concluded that the service and style of electronic submission is the only area to compete and improve their quality. After studying the exploration of some of the banks operating in Algeria, and concluded that the majority relies sites, especially on the Internet, to introduce themselves and their affiliates as well as the definition of customer coverage for traditional and electronic, which are still at the beginning of the road where only some plastic cards, e-Banking, Bank of cellular, ATM and fast transfers. The establishment of an electronic network that requires the use of an effective banking system overall settlement of all economic sectors also requires the Algerian banks to be ready to receive this technology through the modernization of management and modernization of services (expand the use of credit cards, electronic money, and expansion of the Internet). As well as the development of the banking media to contribute to the dissemination of electronic banking culture in the community. Has been reached that the use of the communications revolution has made e-banking services inevitable impose itself in determining the future of banks and development, has also been reached that there is the impact of electronic commerce on the improvement of banking services through the provision of the information base and extensive refresher on-site research and development, and apply strategies Marketing, all of which help banks to increase the performance of its services, despite the presence of some of the risks of the means of providing electronic service and not the nature of the service itself and clear impact also by changing the shape or location of service from traditional to electronic which works to reduce and the costs of providing high-quality service and thus access to the largest segment.Keywords: e-commerce, e-banking, impact e-commerce, B2C
Procedia PDF Downloads 893473 Recent Volatility in Islamic Banking Sector of Bangladesh: Nexus Between Economy, Religion and Politics
Authors: Abdul Kader
Abstract:
This paper attempts to investigate several contributory factors to recent volatility in the Islamic Banking sector of Bangladesh. In particular, the study explores corporate governance, credit management, credit regulations, inept board of directors, using religious sentiment as a means to deceive general people, and the degree of political interference as potential contributory factors. To find the correlation among different variables, semi-structured questionnaires were distributed among the clients, bank managers, some Banking scholars and ex-members of the board of directors of three Islamic Banks in Bangladesh. Later, ten interviews were collected from key informants to gain in-depth information about the present mismanagement of Islamic Banks in Bangladesh. After then, data were analyzed using statistical software and substantiated by secondary sources like newspapers, reports and investigative reports aired in screen media. The paper found a correlation between almost all contributory factors and recent unstable conditions in the Islamic banking sector. After performing regression analysis, this paper found a more significant relationship between some of the contributory factors with Banking volatility than others. For instance, credit management, inept board of directors, depriving customers of proving no profit in the name of business—no interest-- and political interference have a strong significant positive correlation with the present poor condition of Islamic Banking. This paper concludes that while internal management is important in recovering the losses, the government needs to ensure framing better policy for the Islamic Banking system, Central Bank needs to supervise and monitor all Islamic banks meticulously and loan receivers must go through the impartial evaluation and approved by the representatives of the Central Shariah Board. This paper also recommends that there is a need to strengthen the auditing system and improve regulatory oversight of the Islamic Banks in Bangladesh. Policy recommendations that this paper put forward could provide an outline for dealing with the existing challenging condition of Islamic Banks and these could be applied to similar problems in other countries where the Islamic Banking model exists.Keywords: Islamic bank, volatility in banking sector, shariah law, credit management, political interference
Procedia PDF Downloads 783472 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations
Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang
Abstract:
Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security
Procedia PDF Downloads 3593471 Financial Development and Economic Growth of Sub-Saharan Africa Using System GMM Analysis
Authors: Temesgen Yaekob Ergano, Sure Pulla Rao
Abstract:
The study on financial development and economic growth in Sub-Saharan Africa utilizes System GMM analysis to investigate the relationship between financial development indicators and economic performance in the region. The research findings reveal significant impacts of various financial indicators on economic growth, such as the positive influence of bank liquid reserves to bank assets ratio (R/A), trade openness, and the broad money to total reserves ratio (M/R) on the economic growth of Sub-Saharan Africa. Additionally, the study highlights the negative impact of domestic credit provided to the private sector by banks (D_bank) on economic growth, emphasizing the importance of prudent credit allocation to avoid over-indebtedness and financial crises. These results provide valuable insights for policymakers aiming to foster sustainable economic growth in the region by leveraging financial development effectively.Keywords: financial development, economic growth, Sub-Saharan Africa, system GMM analysis, financial indicators.
Procedia PDF Downloads 53