Search results for: financial security
5296 Unified Theory of the Security Dilemma: Geography, MAD and Democracy
Authors: Arash Heydarian Pashakhanlou
Abstract:
The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence
Procedia PDF Downloads 2385295 A Study of the Impact of the Global Financial Crisis on the Financial Performance of Banks in Mauritius
Authors: Narvada Ramdhany, Reena Bhattu Babajee
Abstract:
The 2007-2008 Global Financial Crisis which initiated in the US had a global outreach, impacting the financial and banking sectors of several economies; such as European countries, developing and emerging countries in Asia, Latin America and Africa. European countries represent one of the main sources of export earnings for Mauritius and given that Europe has been quite profoundly affected by the crisis, the Mauritian economy also could have been negatively affected. This study is being undertaken to see if the crisis had a spill-over effect on the Mauritian banking system. It will also enable to determine if the measures put in place to counteract the crisis by regulatory authorities have been effective. The study will be carried out on 17 banks and data will be collected over a time frame of seven years; with a pre-crisis period from 2005 to 2007 and a post-crisis period from 2009 to 2011. The impact of the crisis as such will be measured through the financial performance of the banks, using financial ratios and regression analysis. The results show that during the period concerned Mauritian banks have remained solvent and relatively stable. One of the main explanations put forward to explain the resilience of the banking sector to the crisis is that foreign exposure was relatively low. Another explanation put forward is that Mauritian banks normally transact mainly with prime borrowers unlike most the banks which were affected by the financial crisis.Keywords: global financial crisis, banking sector, financial performance, Mauritian banks
Procedia PDF Downloads 4425294 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 1915293 Forecasting for Financial Stock Returns Using a Quantile Function Model
Authors: Yuzhi Cai
Abstract:
In this paper, we introduce a newly developed quantile function model that can be used for estimating conditional distributions of financial returns and for obtaining multi-step ahead out-of-sample predictive distributions of financial returns. Since we forecast the whole conditional distributions, any predictive quantity of interest about the future financial returns can be obtained simply as a by-product of the method. We also show an application of the model to the daily closing prices of Dow Jones Industrial Average (DJIA) series over the period from 2 January 2004 - 8 October 2010. We obtained the predictive distributions up to 15 days ahead for the DJIA returns, which were further compared with the actually observed returns and those predicted from an AR-GARCH model. The results show that the new model can capture the main features of financial returns and provide a better fitted model together with improved mean forecasts compared with conventional methods. We hope this talk will help audience to see that this new model has the potential to be very useful in practice.Keywords: DJIA, financial returns, predictive distribution, quantile function model
Procedia PDF Downloads 3675292 Investigating the Relationship between Bank and Cloud Provider
Authors: Hatim Elhag
Abstract:
Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.Keywords: security, cloud, banking sector, cloud computing
Procedia PDF Downloads 4995291 An Evaluation of the Impact of International Accounting Standards on Financial Reporting Quality: Evidence from Emerging Economies
Authors: Kwadwo Yeboah
Abstract:
Background and Aims: The adoption of International Accounting Standards (IAS) is considered to be one of the most significant developments in the accounting profession. The adoption of IAS aims to improve financial reporting quality by ensuring that financial information is transparent and comparable across borders. However, there is a lack of research on the impact of IAS on financial reporting quality in emerging economies. This study aims to fill this gap by evaluating the impact of IAS on financial reporting quality in emerging economies. Methods: This study uses a sample of firms from emerging economies that have adopted IAS. The sample includes firms from different sectors and industries. The financial reporting quality of these firms is measured using financial ratios, such as earnings quality, financial leverage, and liquidity. The data is analyzed using a regression model that controls for firm-specific factors, such as size and profitability. Results: The results show that the adoption of IAS has a positive impact on financial reporting quality in emerging economies. Specifically, firms that adopt IAS exhibit higher earnings quality and lower financial leverage compared to firms that do not adopt IAS. Additionally, the adoption of IAS has a positive impact on liquidity, suggesting that firms that adopt IAS have better access to financing. Conclusions: The findings of this study suggest that the adoption of IAS has a positive impact on financial reporting quality in emerging economies. The results indicate that IAS adoption can improve transparency and comparability of financial information, which can enhance the ability of investors to make informed investment decisions. The study contributes to the literature by providing evidence of the impact of IAS adoption in emerging economies. The findings of this study have implications for policymakers and regulators in emerging economies, as they can use this evidence to support the adoption of IAS and improve financial reporting quality in their respective countries.Keywords: accounting, international, standards, finance
Procedia PDF Downloads 845290 Evaluating The Effects of Fundamental Analysis on Earnings Per Share Concept in Stock Valuation in the Zimbabwe Stock Exchange Market
Authors: Brian Basvi
Abstract:
A technique for analyzing a security's intrinsic value is called fundamental analysis. It involves looking at relevant financial, economic, and other qualitative and quantitative aspects. Earnings Per Share (EPS), a crucial metric in fundamental analysis, is calculated by dividing a company's net income by the total number of outstanding shares. With more than 70 listed businesses, the Zimbabwe Stock Exchange (ZSE) is the primary stock exchange in Zimbabwe. This study applies the EPS financial ratio and stock valuation techniques to historical stock data from 68 companies listed on the Zimbabwe Stock Exchange. According to a ZSE study, EPS significantly affects share prices that are listed on the market. The study's objective was to assess how fundamental analysis affected the idea of EPS in ZSE stock valuation. It concluded that EPS is an important consideration for investors when they make judgments about their investments. According to the study's findings, fundamental analysis is a useful tool for ZSE investors since it offers insightful information about a company's financial performance and aids in decision-making. Investors can have a better understanding of a company's underlying worth and prospects for future growth by looking into EPS and other basic aspects.Keywords: fundamental analysis, stock valuation, EPS, share pricing
Procedia PDF Downloads 435289 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks
Authors: Rossouw De Bruin, Sebastiaan H. Von Solms
Abstract:
The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model
Procedia PDF Downloads 2675288 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)
Authors: Serkan Tezgel
Abstract:
The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.Keywords: security, cooperation, asymmetrical, area denial
Procedia PDF Downloads 8035287 Cloud Computing Impact on e-Government Adoption
Authors: Ali Elshabrawy
Abstract:
Cloud computing is expected to be important for e Government in near future. Governments need it for solving some of its e Government, financial, infrastructure, legacy systems and integration problems. It reduces information technology (IT) infrastructure needs and support costs, and offers on-demand infrastructure and computational power, improved collaboration capabilities, which are important for e Government projects start up and sustainability. Budget pressures will continue to drive more and more government IT to hybrid and even public clouds, and more cooperation between cloud service providers and governmental agencies are expected, Or developing governmental private, community clouds. Motivation to convince governments to use cloud computing services, will create a pressure on cloud service providers to cope with government's requirements for interoperability, security standards, open data and integration between their cloud systems There will be significant legal action arising out of governmental uses of cloud computing, and legislation addressing both IT and business needs and consumer fears and protections. Cloud computing is a considered a revolution for IT and E business in general and e commerce, e Government in particular. As governments faces increasing challenges regarding IT infrastructure required for e Government projects implementation. As a result of Lack of required financial resources allocated for e Government projects in developed and developing countries. Cloud computing can play a major role to solve some of e Government projects challenges such as, lack of financial resources, IT infrastructure, Human resources trained to manage e Government applications, interoperability, cost efficiency challenges. If we could solve some security issues related to cloud computing usage which considered critical for e Government projects. Pretty sure it’s Just a matter of time before cloud service providers will find out solutions to attract governments as major customers for their business.Keywords: cloud computing, e-government, adoption, supply side barriers, e-government requirements, challenges
Procedia PDF Downloads 3465286 Building and Development of the Stock Market Institutional Infrastructure in Russia
Authors: Irina Bondarenko, Olga Vandina
Abstract:
The theory of evolutionary economics is the basis for preparation and application of methods forming the stock market infrastructure development concept. The authors believe that the basis for the process of formation and development of the stock market model infrastructure in Russia is the theory of large systems. This theory considers the financial market infrastructure as a whole on the basis of macroeconomic approach with the further definition of its aims and objectives. Evaluation of the prospects for interaction of securities market institutions will enable identifying the problems associated with the development of this system. The interaction of elements of the stock market infrastructure allows to reduce the costs and time of transactions, thereby freeing up resources of market participants for more efficient operation. Thus, methodology of the transaction analysis allows to determine the financial infrastructure as a set of specialized institutions that form a modern quasi-stable system. The financial infrastructure, based on international standards, should include trading systems, regulatory and supervisory bodies, rating agencies, settlement, clearing and depository organizations. Distribution of financial assets, reducing the magnitude of transaction costs, increased transparency of the market are promising tasks in the solution for questions of services level and quality increase provided by institutions of the securities market financial infrastructure. In order to improve the efficiency of the regulatory system, it is necessary to provide "standards" for all market participants. The development of a clear regulation for the barrier to the stock market entry and exit, provision of conditions for the development and implementation of new laws regulating the activities of participants in the securities market, as well as formulation of proposals aimed at minimizing risks and costs, will enable the achievement of positive results. The latter will be manifested in increasing the level of market participant security and, accordingly, the attractiveness of this market for investors and issuers.Keywords: institutional infrastructure, financial assets, regulatory system, stock market, transparency of the market
Procedia PDF Downloads 1345285 Multi-Level Security Measures in Cloud Computing
Authors: Shobha G. Ranjan
Abstract:
Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.Keywords: cloud computing, cloud security, integrity, multi-tenancy, security
Procedia PDF Downloads 5015284 The Effect of Environmental Consciousness on Firm Performance
Authors: Hossein Emari, Hossein Vazifehdoust, Hashem Nikoo Maram
Abstract:
This study aims to develop an original framework of Environmental Consciousness (EC) to explore the positive effect of environmental consciousness on financial performance through the partial mediator - green intellectual capital. A questionnaire survey on the environmental consciousness, intellectual capital, and financial performance of Iran’s manufacturing firms was conducted, and 324 samples were analyzed. This study utilizes structural equation modeling to explore the direct and indirect influences of EC on financial performance. Research results reveal that environmental consciousness had an indirect impact on financial performance through investment in green intellectual capital. It was thus known that green intellectual capital is a mediator of the relationship between environmental consciousness and financial performance. This paper may serve as a reference for firms mapping out future environmental policies and provide an input of various perspectives and arguments into the discipline of green management.Keywords: environmental consciousness, social responsibility, green intellectual capital, financial performance
Procedia PDF Downloads 4885283 Analysis of the Reasons behind the Deteriorated Standing of Engineering Companies during the Financial Crisis
Authors: Levan Sabauri
Abstract:
In this paper, we discuss the deteriorated standing of engineering companies, some of the reasons behind it and the problems facing engineering enterprises during the financial crisis. We show the part that financial analysis plays in the detection of the main factors affecting the standing of a company, classify internal problems and the reasons influencing efficiency thereof. The publication contains the analysis of municipal engineering companies in post-Soviet transitional economies. In the wake of the 2008 world financial crisis the issue became even more poignant. It should be said though that even before the problem had been no less acute for some post-Soviet states caught up in a lengthy transitional period. The paper highlights shortcomings in the management of transportation companies, with new, more appropriate methods suggested. In analyzing the financial stability of a company, three elements need to be considered: current assets, investment policy and structural management of the funding sources leveraging the stability, should be focused on. Inappropriate management of the three may create certain financial problems, with timely and accurate detection thereof being an issue in terms of improved standing of an enterprise. In this connection, the publication contains a diagram reflecting the reasons behind the deteriorated financial standing of a company, as well as a flow chart thereof. The main reasons behind low profitability are also discussed.Keywords: efficiency, financial management, financial analysis funding structure, financial sustainability, investment policy, profitability, solvency, working capital
Procedia PDF Downloads 3035282 Adding Security Blocks to the DevOps Lifecycle
Authors: Andrew John Zeller, Francis Pouatcha
Abstract:
Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.Keywords: information security, data security, cybersecurity, devOps, IT management
Procedia PDF Downloads 1165281 Assessment of the Economic Factors and Motivations towards De-Dollarization since the Early 2000s and Their Implications
Authors: Laila Algalal, Chen Xi
Abstract:
The US dollar has long served as the world's primary reserve currency. However, this dominance faces growing challenges from internal US economic pressures and the rise of alternative currencies. Internally, issues like high debt, inflation, reduced competitiveness, and economic instability due to inequality in economic policies threaten the dollar's position. Externally, more countries are establishing alternative currencies, payment systems, and regional financial institutions to reduce dollar dependence. These drivers have contributed to a decline in the dollar's share of global foreign exchange reserves from 71% in 2001 to an estimated 58% in 2022. While this 13-percentage point drop took two decades, recent initiatives suggest de-dollarization could accelerate in the coming few decades. Efforts to establish non-dollar trade deals and alternative financial systems show more substantial progress compared to initiatives in the early 2000s. As the nature of the world system is anarchic, states make either individual or group efforts to guarantee their economic security and achieve their interests. Based on neoclassical realism, this paper analyzes both internal and external US economic factors driving current and future de-dollarization and the implications on the international monetary system, in addition to examining the motivation for such moves.Keywords: de-dollarization, US dollar, monetary system, economic security, economic policies.
Procedia PDF Downloads 925280 A Framework for Secure Information Flow Analysis in Web Applications
Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa
Abstract:
Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.Keywords: web applications security, secure information flow, program dependence graph, database annotation
Procedia PDF Downloads 4715279 The Fadama Initiative: Implications for Human Security and Sustainable Development in Nigeria
Authors: Albert T. Akume, Yahya M. Abdullahi
Abstract:
The impact of poverty on individual and society is grave, hence the efforts by the government to eradicate or alleviate. In Nigeria the various efforts to reduce rural poverty by empowering them and making the process of their development self-sustaining have ended dismally. That notwithstanding, government determination to conquer poverty has not diminish as in the early 1990s the government with financial collaboration from the World Bank and African Development Bank introduced the fadama project. It is against this backdrop that this paper uses the documentary and analytical research methods to examine the implication the fadama development project has for community capacity development and human security in Nigeria. From the analysis it was discovered the fadama project improved household income of fadama farmers, community empowerment, participatory development planning and support for demand driven productive investment in farm and non-farm activities including community infrastructures. Despite this impressive result the fadama project is challenged by conflict especially in northern Nigeria and late delivery of necessary farm consumables that aid improved productivity. It was therefore recommended that the government should strengthen her various state security institutions to proactively mitigate conflicts and to ensure that farm consumables and other support services reach farmers timely.Keywords: capacity development, empowerment, fadama, human security, poverty reduction, theory of change, sustainable development
Procedia PDF Downloads 4965278 The Effects of Cross-Border Use of Drones in Nigerian National Security
Authors: H. P. Kerry
Abstract:
Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.Keywords: armed drones, drones, cross-border, national security
Procedia PDF Downloads 1585277 The Impact of Corporate Finance on Financial Stability in the Western Balkan Countries
Authors: Luan Vardari, Dena Arapi-Vardari
Abstract:
Financial stability is a critical component of economic growth and development, and it has been recognized as a key policy objective in many countries around the world. In the Western Balkans, financial stability has been a key issue in recent years, with a number of challenges facing the region, including high levels of public debt, weak banking systems, and economic volatility. Corporate finance, which refers to the financial management practices of firms, is an important factor that can impact financial stability. This paper aims to investigate corporate finance's impact on financial stability in Western Balkan countries. This study will use a mixed-methods approach to investigate the impact of corporate finance on financial stability in the Western Balkans. The study will begin with a comprehensive review of the existing literature on corporate finance and financial stability, focusing on the Western Balkan region. This will be followed by an empirical analysis of regional corporate finance practices using data from various industries and firms. The analysis will explore the relationship between corporate finance practices and financial stability, taking into account factors such as regulatory frameworks, economic conditions, and firm size. The results of the study are expected to provide insights into the impact of corporate finance on financial stability in the Western Balkans. Specifically, the study will identify the key corporate finance practices that contribute to financial stability in the region, as well as the challenges and obstacles that firms face in implementing effective corporate finance strategies. The study will also provide recommendations for policymakers and firms looking to enhance financial stability and resilience in the region.Keywords: financial regulation, debt management, investment decisions, dividend policies, economic volatility, banking systems, public debt, prudent financial management, firm size, policy recommendations
Procedia PDF Downloads 755276 Renewable Energy and Energy Security in Malaysia: A Quantitative Analysis
Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet
Abstract:
Robust economic growth, increasing population, and personal consumption are the main drivers for the rapid increase of energy demand in Malaysia. Increasing demand has compounded the issue of national energy security due to over-dependence on fossil fuel, depleting indigenous domestic conventional energy resources which in turns has increased the country’s energy import dependence. In order to improve its energy security, Malaysia has seriously embarked on a renewable energy journey. Many initiatives on renewable energy have been introduced in the past decade. These strategies have resulted in the exploding growth of renewable energy deployment in Malaysia. Therefore, this study investigated the impact of renewable energy deployment on energy security. Secondary data was used to calculate the energy security indicators. The study also compared the results of applying different energy security indicators namely availability, applicability, affordability and acceptability dimension of energy resources. The evaluation shows that Malaysia will experience slight improvement in availability and acceptability dimension of energy security. This study suggests that energy security level could be further enhanced by efficient utilization of energy, reducing carbon content of energy and facilitating low-carbon industries.Keywords: energy policy, energy security, Malaysia, renewable energy
Procedia PDF Downloads 2445275 Reimagining Financial Inclusion in the Post COVID-19 World: The Case of Grameen America
Authors: Rania Mousa, Peterson Ozili
Abstract:
A key agenda of policymakers in developed and developing countries is to increase the level of financial inclusion. Microlending institutions have been recognized as important agents of financial inclusion, which have the potential to achieve this objective and help move toward a more accessible, inclusive, and equitable path to financial sustainability. In that respect, this case study attempts to identify and assess the key initiatives undertaken by Grameen America as it responded to the COVID-19 pandemic within the framework of selected United Nations’ Sustainability Development Goals (UN’s SD Goals). This study goes beyond the stated objective by using the vulnerable group theory and special agent theory of financial inclusion to support the analysis of financial and non-financial information collected from Grameen America’s Annual Reports and audited financial statements. The study follows a qualitative content analysis method to precisely gauge the shift in Grameen’s strategy and focus, as well as to assess the impact of its initiatives on the small business community before and after the pandemic. The findings showcase that Grameen’s longstanding mission to alleviate poverty is in line with the UN’s Sustainability Development Goal 1. Furthermore, Grameen’s commitment to creating partnerships with external organizations to offer credit and non-credit services and support is consistent with UN’s Sustainability Development Goal 17. The study suggests that policymakers should foster the creation of more member-based financial and non-financial institutions which are ethically and morally responsible to their members in both good and bad times.Keywords: COVID-19, financial inclusion, microfinance, sustainable development, microlending
Procedia PDF Downloads 705274 Anti-Money Laundering and Countering of Terrorist Financing: The Role of Domestic Financial Institutions to Prevent Money Laundering
Authors: Dinesh Sivaguru, Kamal Thilakasiri
Abstract:
Preventing money laundering and terrorist financing is a major national and international problem today. Several attempts have been made to prevent money laundering by national and international dimension. These are often counteracted by the multi dynamic nature of the crimes. However, launders are often to use remittance systems to clean their ill-gotten money. This study presents the role of domestic financial institutions and the effective practices and actions should implement within domestic financial institutions to control and prevent financial crimes. This thesis highlights the progress that is required to prevent money laundering and terrorist financing, further it is an original contribution to the knowledge in an under researched field in Sri Lanka.Keywords: money laundering, terrorists financing, financial institutions, regulatory bodies
Procedia PDF Downloads 2295273 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector
Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar
Abstract:
Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability
Procedia PDF Downloads 1845272 Changes in Financial Reporting of Polish Entities Resulting from the Implementation of Directive 34/EU and Evaluation of the Changes by Accountants
Authors: Piotr Prewysz-Kwinto, Grazyna Voss
Abstract:
In June 2013, the European Parliament and the Council adopted a directive on financial reporting (Directive 2013/34/EU). The main objective was to simplify the principles of the preparation of financial statements, including the principles of the presentation and disclosures of financial information by adapting reporting burdens to the type and size of an undertaking. Therefore, the Directive introduced a classification of all undertakings into five groups, i.e. micro, small, medium-sized, large and public-interest entities, and defined in detail the classification criteria. The principles of the preparation of financial statements and the presentation of financial information as well as applicable simplifications were defined for each group. The EU Member States had to implement the provisions of Directive 34 relating to accounting and financial reporting into domestic norms until January 1, 2016. In Poland, the provisions of Directive 34 were implemented into domestic accounting norms specified in the Polish Accounting Act on a gradual basis. On July 11, 2014, the Polish Parliament adopted an amendment to the Act, introducing the Directive's solutions for micro-undertakings and on July 23, 2015, for the remaining undertakings. The aim of this paper is to present Polish solutions relating to financial reporting after the implementation of Directive 34 and the results of the survey conducted among accountants regarding the evaluation of the implemented simplifications for micro and small undertakings.Keywords: accounting standards, financial reporting, financial statement, simplification
Procedia PDF Downloads 2785271 Financial Regulations and Insolvency Risk: Empirical Evidence from Commercial Banks of Pakistan
Authors: Shumaila Zeb
Abstract:
The proposed study aims to investigate insolvency risk of commercial banks of Pakistan. Furthermore, it empirically estimates the effect of already implemented financial regulations on the insolvency risk of banks. To carry out the empirical analysis, a balanced bank-level panel data covering the period 2008-2016 is used. The Z-score is used for calculating the insolvency risk of each bank. The panel regression is used to investigate the relationship between financial regulations and insolvency risk of banks. The empirics reveal that the financial regulations enforced by State Bank of Pakistan have significant impacts on the insolvency risk of banks. The results further indicate that loan ratio and reserve ratio are positively and significantly related to the insolvency risk of banks.Keywords: insolvency risk, Z-score, financial regulations, banks
Procedia PDF Downloads 1985270 Public Perception of Energy Security in Lithuania: Between Material Interest and Energy Independence
Authors: Dainius Genys, Vylius Leonavicius, Ricardas Krikstolaitis
Abstract:
Energy security problems in Lithuania are analyzed on a regular basis; however, there is no comprehensive research on the very issue of the concept of public energy security. There is a lack of attention not only to social determinants of perception of energy security, but also a lack of a deeper analysis of the public opinion. This article aims to research the Lithuanian public perception of energy security. Complex tasks were set during the sociological study. Survey questionnaire consisted of different sets of questions: view of energy security (risk perception, political orientation, and energy security; comprehensiveness and energy security); view of energy risks and threats (perception of energy safety factors; individual dependence and burden; disobedience and risk); view of the activity of responsible institutions (energy policy assessment; confidence in institutions and energy security), demographic issues. In this article, we will focus on two aspects: a) We will analyze public opinion on the most important aspects of energy security and social factors influencing them; The hypothesis is made that public perception of energy security is related to value orientations: b) We will analyze how public opinion on energy policy executed by the government and confidence in the government are intertwined with the concept of energy security. Data of the survey, conducted on May 10-19 and June 7-17, 2013, when Seimas and the government consisted of the coalition dominated by Social Democrats with Labor, Order and Justice Parties and the Electoral Action of Poles, were used in this article. It is important to note that the survey was conducted prior to Russia’s occupation of the Crimea.Keywords: energy security, public opinion, risk, energy threat, energy security policy
Procedia PDF Downloads 5105269 Impacts of Financial Development and Operational Scale on Bank Efficiencies in Taiwan
Authors: Ying-Hsiu Chen, Pao-Peng Hsu
Abstract:
This paper adopts a two-stage data envelopment analysis to explore the impacts of financial development and bank operational scale on bank efficiencies. The sample comprises of unbalanced panel data of 32 Taiwanese enlisted in domestic commercial banks over the period 1998 to 2013. Empirical results show that technical efficiency is positively related to financial development, whereas the effect of financial development on scale efficiency is insignificant. The effect of operational scale exerts a significantly positive effect on bank efficiencies, but the gain of efficiency is decreased gradually when operational scale increases. Furthermore, increase in capital adequacy ratio and market power of banks leads to a growth of bank efficiencies.Keywords: financial development, operational scale, efficiency, DEA
Procedia PDF Downloads 5255268 Corporate Governance, Performance, and Financial Reporting Quality of Listed Manufacturing Firms in Nigeria
Authors: Jamila Garba Audu, Shehu Usman Hassan
Abstract:
The widespread failure in the financial information quality has created the need to improve the financial information quality and to strengthen the control of managers by setting up good firms structures. Published accounting information in financial statements is required to provide various users - shareholders, employees, suppliers, creditors, financial analysts, stockbrokers and government agencies – with timely and reliable information useful for making prudent, effective and efficient decisions. The relationship between corporate governance and performance to financial reporting quality is imperative; this is because despite rapid researches in this area the findings obtained from these studies are constantly inconclusive. Data for the study were extracted from the firms’ annual reports and accounts. After running the OLS regression, a robustness test was conducted for the validity of statistical inferences; the data was empirically tested. A multiple regression was employed to test the model as a technique for data analysis. The results from the analysis revealed a negative association between all the regressors and financial reporting quality except the performance of listed manufacturing firms in Nigeria. This indicates that corporate governance plays a significant role in mitigating earnings management and improving financial reporting quality while performance does not. The study recommended among others that the composition of audit committee should be made in accordance with the provision for code of corporate governance which is not more than six (6) members with at least one (1) financial expert.Keywords: corporate governance, financial reporting quality, manufacturing firms, Nigeria, performance
Procedia PDF Downloads 2455267 Efficient Signcryption Scheme with Provable Security for Smart Card
Authors: Jayaprakash Kar, Daniyal M. Alghazzawi
Abstract:
The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.Keywords: random oracle, provable security, unforgebility, smart card
Procedia PDF Downloads 593