Search results for: related-party transactions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 280

Search results for: related-party transactions

100 A Scenario-Based Experiment Comparing Managerial and Front-Line Employee Apologies in Terms of Customers' Perceived Justice, Satisfaction, and Commitment

Authors: Ioana Dallinger, Vincent P. Magnini

Abstract:

Due to the many moving parts and high human component, mistakes and failures sometimes occur during transactions in service environments. Because a certain portion of such failures is unavoidable, many service providers constantly look for guidance regarding optimal ways by which they should manage failures and recoveries. Through the use of a scenario-based experiment, the findings of this study run counter to the empowerment approach (i.e. that frontline employees should be empowered to resolve failure situations on their own doing). Specifically, this study finds that customers’ perceptions of distributive, procedural, and interactional justice are significantly higher [p-values < .05] when a manager delivers an apology as opposed to the frontline provider. Moreover, customers’ satisfaction with the recovery and commitment to the firm are also significantly stronger [p-values < .05] when a manager apologizes. Interestingly, this study also empirically tests the effects of combined apologies of both the manager and employee and finds that the combined approach yields better results for customers’ interactional justice perceptions and for their satisfaction with recovery, but not for their distributive or procedural justice perceptions or consequent commitment to the firm. This study can serve a springboard for further research. For example, perceptions and attitudes regarding employee empowerment vary based upon country culture. Furthermore, there are likely a number of factors that can moderate the cause and effect relationship between a failure recovery and customers’ post-recovery perceptions [e.g. the severity of the failure].

Keywords: apology, empowerment, service failure recovery, service recovery

Procedia PDF Downloads 296
99 Islamic Credit Risk Management in Murabahah Financing: The Study of Islamic Banking in Malaysia

Authors: Siti Nor Amira Bt. Mohamad, Mohamad Yazis B. Ali Basah, Muhammad Ridhwan B. Ab. Aziz, Khairil Faizal B. Khairi, Mazlynda Bt. Md. Yusuf, Hisham B. Sabri

Abstract:

The understanding of risk and the concept of it occurs associated in Islamic financing was well-known in the financial industry by the using of Profit-and-Loss Sharing (PLS). It was presently in any Islamic financial transactions in order to comply with shariah rules. However, the existence of risk in Murabahah contract of financing is an ability that the counterparty is unable to complete its obligations within the agreed terms. Therefore, it is called as credit or default risk. Credit risk occurs when the client fails to make timely payment after the bank makes complete delivery of assets. Thus, it affects the growth of the bank as the banking business is in no position to have appropriate measures to cover the risk. Therefore, the bank may impose penalty on the outstanding balance. This paper aims to highlight the credit risk determinant and issues surrounding in Islamic bank in Malaysia in terms of Murabahah financing and how to manage it by using the proper techniques. Finally, it explores the credit risk management concept that might solve the problems arise. The study found that the credit risk can be managed properly by improving the use of comprehensive reference checklist of business partners on their character and past performance as well as their comprehensive database. Besides that, prevention of credit risk can be done by using collateral as security against the risk and we also argue on the Shariah guidelines and procedures should be implement coherently by the banking business because so that the risk would be control by having an effective instrument for Islamic modes of financing.

Keywords: Islamic banking, credit risk, Murabahah financing, risk mitigation

Procedia PDF Downloads 456
98 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network

Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar

Abstract:

Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.

Keywords: Bitcoin network, propagation delay, clustering, scalability

Procedia PDF Downloads 115
97 Blockchain: Institutional and Technological Disruptions in the Public Sector

Authors: Maria Florencia Ferrer, Saulo Fabiano Amancio-Vieira

Abstract:

The use of the blockchain in the public sector is present today and no longer the future of disruptive institutional and technological models. There are still some cultural barriers and resistance to the proper use of its potential. This research aims to present the strengths and weaknesses of using a public-permitted and distributed network in the context of the public sector. Therefore, bibliographical/documentary research was conducted to raise the main aspects of the studied platform, focused on the use of the main demands of the public sector. The platform analyzed was LACChain, which is a global alliance composed of different actors in the blockchain environment, led by the Innovation Laboratory of the Inter-American Development Bank Group (IDB Lab) for the development of the blockchain ecosystem in Latin America and the Caribbean. LACChain provides blockchain infrastructure, which is a distributed ratio technology (DLT). The platform focuses on two main pillars: community and infrastructure. It is organized as a consortium for the management and administration of an infrastructure classified as public, following the ISO typologies (ISO / TC 307). It is, therefore, a network open to any participant who agrees with the established rules, which are limited to being identified and complying with the regulations. As benefits can be listed: public network (open to all), decentralized, low transaction cost, greater publicity of transactions, reduction of corruption in contracts / public acts, in addition to improving transparency for the population in general. It is also noteworthy that the platform is not based on cryptocurrency and is not anonymous; that is, it is possible to be regulated. It is concluded that the use of record platforms, such as LACChain, can contribute to greater security on the part of the public agent in the migration process of their informational applications.

Keywords: blockchain, LACChain, public sector, technological disruptions

Procedia PDF Downloads 172
96 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami

Abstract:

To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.

Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption

Procedia PDF Downloads 136
95 A Cost Effective Approach to Develop Mid-Size Enterprise Software Adopted the Waterfall Model

Authors: Mohammad Nehal Hasnine, Md Kamrul Hasan Chayon, Md Mobasswer Rahman

Abstract:

Organizational tendencies towards computer-based information processing have been observed noticeably in the third-world countries. Many enterprises are taking major initiatives towards computerized working environment because of massive benefits of computer-based information processing. However, designing and developing information resource management software for small and mid-size enterprises under budget costs and strict deadline is always challenging for software engineers. Therefore, we introduced an approach to design mid-size enterprise software by using the Waterfall model, which is one of the SDLC (Software Development Life Cycles), in a cost effective way. To fulfill research objectives, in this study, we developed mid-sized enterprise software named “BSK Management System” that assists enterprise software clients with information resource management and perform complex organizational tasks. Waterfall model phases have been applied to ensure that all functions, user requirements, strategic goals, and objectives are met. In addition, Rich Picture, Structured English, and Data Dictionary have been implemented and investigated properly in engineering manner. Furthermore, an assessment survey with 20 participants has been conducted to investigate the usability and performance of the proposed software. The survey results indicated that our system featured simple interfaces, easy operation and maintenance, quick processing, and reliable and accurate transactions.

Keywords: end-user application development, enterprise software design, information resource management, usability

Procedia PDF Downloads 438
94 AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security

Authors: Shanshan Zhu, Mohammad Nasim

Abstract:

Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security.

Keywords: AI-driven fraud detection, financial security, machine learning, anomaly detection, real-time fraud detection

Procedia PDF Downloads 42
93 Using Customer Satisfaction to Help Achieve Sustainable Development Goals in the Islamic Economy: A Quantitative Case Study from Amman, Jordan

Authors: Sarah A. Tobin

Abstract:

Social justice outcomes, derived from customer satisfaction, serve as a main pathway and conduit for achieving Sustainable Development Goals (SDGs) because they prompt democratizing and socially-inclusive effects that are consistent with Islamic economic values. This paper argues that achieving higher levels of social justice and the SGDs is possible only through the realization of Islamic banking and finance customer satisfaction that aligns with Islamic values in the tradition of the Shari`a (or Islamic law). Through this key manifestation of Shari`a in the banks, social justice aims of achieving SDGs become possible. This paper utilizes a case study of a large-scale survey (N=127) comparing customer satisfaction between a conventional and an Islamic bank in Amman, Jordan. Based on a series of linear regressions, the statistically-significant findings suggest that when overall customer satisfaction is high, customers are more likely to become empowered citizens demanding inclusive, quality services and corruption-free management, as well as attribute their experiences to the Islamic nature of the financial endeavors. Social justice interests and expectations increase (and SDGs are more likely met) when a customer has high levels of satisfaction. The paper concludes with policy recommendations for Islamic financial institutions that enhance customer service experiences for better achieving the social justice aims of the Islamic economy and SDGs, including transparency in transactions, exemplary customer service and follow up, and attending to Islamic values in the aesthetics of bank.

Keywords: customer satisfaction, Islamic economy, social justice, sustainable development goals

Procedia PDF Downloads 341
92 Self-Organizing Maps for Credit Card Fraud Detection

Authors: ChunYi Peng, Wei Hsuan CHeng, Shyh Kuang Ueng

Abstract:

This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.

Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies

Procedia PDF Downloads 57
91 Self-Organizing Maps for Credit Card Fraud Detection and Visualization

Authors: Peng Chun-Yi, Chen Wei-Hsuan, Ueng Shyh-Kuang

Abstract:

This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.

Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies

Procedia PDF Downloads 59
90 Assessment of the Level of Awareness and Adoption of International Public Sector Accounting Standards (IPSAS) in the Curriculum of Accounting Education in Selected Tertiary Institutions in Ondo and Ekiti States Nigeria

Authors: Olurankinse Felix, Fatukasi Bayo

Abstract:

Over the years, the medium through which government financial statements are prepared has been on cash basis of accounting. This basis was characterised with some shortcomings ranging from non- disclosure of quality and detail information relating to government financial transactions, ill informed assessment of government resource allocation, weak internal control system that inhibits accountability and transparency and non- standardisation of reporting ethics for the purpose of comparability. The emergence of international public sector accounting standards (IPSAS) is therefore seen as leverage as it aims at improving the quality of general purpose financial reporting by public sector entities thereby increasing transparency and accountability. IPSAS is a new concept that all institutions must fully adopts. The crux of this paper is to find out to what extent is the awareness and adoption of IPSAS to both students and lecturers interms of teaching, learning and inclusion in the curriculum of accounting education. The methodology involved the use of well designed questionnaires to obtain information from some selected institutions and the analysis was done with the use of maximum likelihood ordered probit regression. The result of the analysis shows that despite a high level of sensitisation/awareness of IPSAS, the degree of adoption is still low due to low level of desirability by students and lecturers. The paper recommend the need for the government to enact an enabling law to back up the adoption and more importantly to institute appropriate sanctions to ensure full compliance.

Keywords: assessment, awareness, adoption, IPSAS, cash basis

Procedia PDF Downloads 483
89 The Reality of E-Commerce in Egypt and Its Role in Enhancing Companies' Competitiveness

Authors: Esam El Gohary

Abstract:

— The companies’ ability to survive and compete in the fierce competition is determined by its competitiveness level. With the spread of information technology use and appearance of online shopping, it became crucial for companies to adopt e-commerce system to increase its competitiveness. This paper was conducted with the purpose of determine how increasing the service value through e-commerce factors (competitive strategy, ICT infrastructures, logistics, security, human resources and innovation) can enhance companies' competitiveness. The problem of this paper is summarized in the absence of the thorough awareness of e-commerce benefits for business owners and customers, as well as how to reduce the intangibility attributes of e-commerce. For this purpose this paper describes the e-commerce in Egypt and its success factors (infrastructures, legal and regulatory environment, human resources and innovation), as well as displays the barriers of such factor, to investigate the significant of these factors on increasing service value and enhance companies' competitiveness. This paper revealed that e-commerce companies have many opportunities to enhance its competitiveness in Egypt, which is enhanced by several factors. The most important factors are “strong ICT infrastructure, qualified and skilled human resources, in addition to the distinctive logistics that distinguish Egypt due to its location, strong legal and regulatory environment and Innovation, as well as the competitive strategy. As well as, companies encounter several threats such as; the lack of infrastructures and logistics in rural areas, the absence of the inclusive understanding and awareness of e-commerce, fear from e-payment transactions and fraud, the ambiguity and burdensome of customs. Through the research findings several recommendations were introduced to both government and companies to overcome threats and exploit opportunities to improve performance and enhance companies' competitiveness.

Keywords: e-commerce competitiveness, e-commerce factors, e-commerce in Egypt, information technology

Procedia PDF Downloads 103
88 Artificial intelligence and Law

Authors: Mehrnoosh Abouzari, Shahrokh Shahraei

Abstract:

With the development of artificial intelligence in the present age, intelligent machines and systems have proven their actual and potential capabilities and are mindful of increasing their presence in various fields of human life in the fields of industry, financial transactions, marketing, manufacturing, service affairs, politics, economics and various branches of the humanities .Therefore, despite the conservatism and prudence of law enforcement, the traces of artificial intelligence can be seen in various areas of law. Including judicial robotics capability estimation, intelligent judicial decision making system, intelligent defender and attorney strategy adjustment, dissemination and regulation of different and scattered laws in each case to achieve judicial coherence and reduce opinion, reduce prolonged hearing and discontent compared to the current legal system with designing rule-based systems, case-based, knowledge-based systems, etc. are efforts to apply AI in law. In this article, we will identify the ways in which AI is applied in its laws and regulations, identify the dominant concerns in this area and outline the relationship between these two areas in order to answer the question of how artificial intelligence can be used in different areas of law and what the implications of this application will be. The authors believe that the use of artificial intelligence in the three areas of legislative, judiciary and executive power can be very effective in governments' decisions and smart governance, and helping to reach smart communities across human and geographical boundaries that humanity's long-held dream of achieving is a global village free of violence and personalization and human error. Therefore, in this article, we are going to analyze the dimensions of how to use artificial intelligence in the three legislative, judicial and executive branches of government in order to realize its application.

Keywords: artificial intelligence, law, intelligent system, judge

Procedia PDF Downloads 119
87 The Impact of Strategic Information in Developing the Target Cost Approach to achieve Competitive Advantage

Authors: Rizgar Abdullah Sabir Jaf, Bayan Sedeeq Azeez Hussin, Dler Moosa Ahmed Karim

Abstract:

Presently, economic and technological developments are growing faster in an unparalleled way. The result of that is innovative changing a great deal of a great deal of assumption, concepts, transactions, and high of competition between companies all over the world. The title of the thesis is one of the subjects that get large concerns in the financial and business world in the present time. That is because many competitive firms have appeared in the regional and global markets and the rapid changes that covered all fields of life. The subjects of the dissertation have a special importance in making the firm's businesses succeed in general and the industrial firms especially. Thus, the basic purpose of this study is to determine whether target costing is used in the costing application process in their customer expectation, profit margin, cost and price determination, cost reduction and management operations. In today’s intensely competitive and highly volatile business environment, consistent development of low cost and high quality products meeting the functional requirements is a key to a company's survival. Companies continuously strive to reduce the costs while still producing quality products to stay ahead in the competition. Many companies have turned to target costing to achieve this objective. The results indicate that there is a significant positive relationship (at the significance level less than 0.05) between the factors competitive advantage and management accounting techniques in the firm's sample study.

Keywords: strategic information, target cost, competitive advantage, Iraqi soft drink firms

Procedia PDF Downloads 305
86 Shariah Guideline on Value-Based Intermediation Implementation in the Light of Maqasid Shariah Analysis

Authors: Muhammad Izzam Bin Mohd Khazar, Ruqayyah Binti Mohamad Ali, Nurul Atiqah Binti Yusri

Abstract:

Value-based intermediation (VBI) has been introduced by Bank Negara Malaysia (BNM) as the next strategic direction and growth driver for Islamic banking institutions. The aim of VBI is to deliver the intended outcome of Shariah through practices, conducts, and offerings that generate positive and sustainable impact to the economy, community and environment which is aligned to Maqasid Shariah in preserving the common interest of society by preventing harm and maximizing benefit. Hence, upon its implementation, VBI will experiment the current Shariah compliance treatment and revolutionise new policies and systems that can meritoriously entrench and convey the objectives of Shariah. However, discussion revolving VBI in the light of Maqasid analysis is still scarce hence further research needs to be undertaken. The idea of implementation of VBI vision into quantifiable Maqasid Shariah measurement is yet to be explored due to the nature of Maqasid that is variable. The contemporary scholars also have different views on the implementation of VBI. This paper aims to discuss on the importance of Maqasid Shariah in the current Islamic finance transactions by providing Shariah index measurement in the application of VBI. This study also intends to explore basic Shariah guidelines and parameters based on the objectives of Shariah; preservation of the five pillars (religion, life, progeny, intellect and wealth) with further elaboration on preservation of wealth under five headings: rawaj (circulation and marketability); wuduh (transparency); hifz (preservation); thabat (durability and tranquillity); and ‘adl (equity and justice). In alignment with these headings, Islamic finance can be innovated for VBI implementation, particularly in Maybank Islamic being a significant leader in the IFI market.

Keywords: Islamic Financial Institutions, Maqasid Index, Maqasid Shariah, sustainability, value-based intermediation

Procedia PDF Downloads 168
85 Infrastructure Sharing Synergies: Optimal Capacity Oversizing and Pricing

Authors: Robin Molinier

Abstract:

Industrial symbiosis (I.S) deals with both substitution synergies (exchange of waste materials, fatal energy and utilities as resources for production) and infrastructure/service sharing synergies. The latter is based on the intensification of use of an asset and thus requires to balance capital costs increments with snowball effects (network externalities) for its implementation. Initial investors must specify ex-ante arrangements (cost sharing and pricing schedule) to commit toward investments in capacities and transactions. Our model investigate the decision of 2 actors trying to choose cooperatively a level of infrastructure capacity oversizing to set a plug-and-play offer to a potential entrant whose capacity requirement is randomly distributed while satisficing their own requirements. Capacity cost exhibits sub-additive property so that there is room for profitable overcapacity setting in the first period. The entrant’s willingness-to-pay for the access to the infrastructure is dependent upon its standalone cost and the capacity gap that it must complete in case the available capacity is insufficient ex-post (the complement cost). Since initial capacity choices are driven by ex-ante (expected) yield extractible from the entrant we derive the expected complement cost function which helps us defining the investors’ objective function. We first show that this curve is decreasing and convex in the capacity increments and that it is shaped by the distribution function of the potential entrant’s requirements. We then derive the general form of solutions and solve the model for uniform and triangular distributions. Depending on requirements volumes and cost assumptions different equilibria occurs. We finally analyze the effect of a per-unit subsidy a public actor would apply to foster such sharing synergies.

Keywords: capacity, cooperation, industrial symbiosis, pricing

Procedia PDF Downloads 211
84 Block-Chain Land Administration Technology in Nigeria: Opportunities and Challenges

Authors: Babalola Sunday Oyetayo, Igbinomwanhia Uyi Osamwonyi, Idowu T. O., Herbert Tata

Abstract:

This paper explores the potential benefits of adopting blockchain technology in Nigeria's land administration systems while also addressing the challenges and implications of its implementation in the country's unique context. Through a comprehensive literature review and analysis of existing research, the paper delves into the key attributes of blockchain that can revolutionize land administration practices, with a particular focus on simplifying land registration procedures, expediting land title issuance, and enhancing data transparency and security. The decentralized and immutable nature of blockchain offers unique advantages, instilling trust and confidence in land transactions, which are especially crucial in Nigeria's land governance landscape. However, integrating blockchain in Nigeria's land administration ecosystem presents specific challenges, necessitating a critical evaluation of technical, socio-economic, and infrastructural barriers. These challenges encompass data privacy concerns, scalability, interoperability with outdated systems, and gaining acceptance from various stakeholders. By synthesizing these insights, the paper proposes strategies tailored to Nigeria's context to optimize the benefits of blockchain adoption while addressing the identified challenges. The research findings contribute significantly to the ongoing discourse on blockchain technology in Nigeria's land governance, offering evidence-based recommendations to policymakers, land administrators, and stakeholders. Ultimately, the paper aims to promote the effective utilization of blockchain, fostering efficiency, transparency, and trust in Nigeria's land administration systems to drive sustainable development and societal progress.

Keywords: block-chain, technology, stakeholders, land registration

Procedia PDF Downloads 72
83 The Role of BPSK (Consumer Dispute Settlement Body) in the Monitoring of Standard Clause Inclusion within Indonesian Customer Protection Law

Authors: Deviana Yuanitasari

Abstract:

The rapid development of world commerce and trade nowadays has created fast-paced demand in every business activities and transactions. That also includes the need for ready to use and practical form of standard contract. For the company or business owner, the use of standard contract is an alternative way to achieve economic goals faster, effectively and efficiently. In the other hand, for the consumer the practice of using standard contract usually unfavorable, because the contract clauses usually have been defined by the company and cannot be individually negotiated. That means consumer cannot influence the substances of the contract clauses. The purpose of this study is to get deeper understanding and analyze the role of Consumer Dispute Settlement Body in the monitoring of standard clause inclusion by businesses and industries within the context of practicing consumer protection law. Furthermore, this study will focus on the procedure of sanction and the effectiveness of the sanction for the business practitioners which disregard the inclusion of the prohibited standard clause. Therefore, this study will depict the law issues and other phenomenon that related with the role of Consumer Dispute Settlement Body in monitoring the inclusion of standard clause and procedure of sanction for the business practitioners that still use exemption clause within Consumer Protection Law System. This study results that BPSK has been assigned to monitor the inclusion of standard clause and settle consumer dispute. At this stage, BPSK role is passive, which means BPSK only takes an action if there are consumer complaints. The procedure of sanction is not part of BPSK tasks, since should there be a violation of standard clause; BPSK can only ask the business practitioners to remove the prohibited clause and not give a sanction. As a result, the procedure of sanction rule for the Standard Clause violation in this context can be considered as ineffective.

Keywords: standard contract, standard clause, consumer protection law, consumer dispute settlement body

Procedia PDF Downloads 334
82 Customer’s Choice of a Bank: An Empirical Enquiry from the Banked Ghanaian

Authors: Emmanuel Larbi Offei, Felix Agyei-Sasu, Maura Naa Densua Ashong

Abstract:

Ghana has 26 universal banks and several banking and non-banking financial institutions operating in the country. The growing number of banks has heightened competition among banks to attract and retain customers more customers to ensure sustainability. Hence the need to identify and understand factors that influences customers’ choice of banks cannot be overemphasised. This study investigates the determinants of bank selection criteria by banking customers in Ghana. Four banks were purposively sampled for this study namely Barclays, Standard Chartered, Sahel Sahara and Unibank. Convenience sampling was then used to select 114 bank customers in Accra and interviewed. Questionnaires were used to collect data that were analysed in tables and charts with the use of STATA software. The findings of the study revealed that quick/prompt services and complaint handling, safety of funds, networked branches, easy access to functional Automated Teller Machines (ATMs) and low/moderate service charges were the major determinants of customers’ choice of banks. The results further show that 89.5 percent of all deposits are held in either current or savings accounts. About 22.1 percent of the respondents indicated that they have plans of changing their banks in the near future because they are not satisfied with their banks. A gender analysis of the choice criteria showed differences between the choice criteria of the male as compared to the female. The study recommends that banks in Ghana should focus on products and policies that will not compromise on the safety of funds of their customers. Again, banks must address customer complaints and dissatisfactions as promptly as possible by taking pragmatic steps to address administrative bureaucracies and infrastructural challenges that prolong the duration of banking transactions.

Keywords: Ghana, banks, determinants, customers’ choice, competition

Procedia PDF Downloads 440
81 Rethinking the Use of Online Dispute Resolution in Resolving Cross-Border Small E-Disputes in EU

Authors: Sajedeh Salehi, Marco Giacalone

Abstract:

This paper examines the role of existing online dispute resolution (ODR) mechanisms and their effects on ameliorating access to justice – as a protected right by Art. 47 of the EU Charter of Fundamental Rights – for consumers in EU. The major focus of this study will be on evaluating ODR as the means of dispute resolution for Business-to-Consumer (B2C) cross-border small claims raised in e-commerce transactions. The authors will elaborate the consequences of implementing ODR methods in the context of recent developments in EU regulatory safeguards on promoting consumer protection. In this analysis, both non-judiciary and judiciary ODR redress mechanisms are considered, however, the significant consideration is given to – obligatory and non-obligatory – judiciary ODR methods. For that purpose, this paper will particularly investigate the impact of the EU ODR platform as well as the European Small Claims Procedure (ESCP) Regulation 861/2007 and their role on accelerating the access to justice for consumers in B2C e-disputes. Although, considerable volume of research has been carried out on ODR for consumer claims, rather less (or no-) attention has been paid to provide a combined doctrinal and empirical evaluation of ODR’s potential in resolving cross-border small e-disputes, in EU. Hence, the methodological approach taken in this study is a mixed methodology based on qualitative (interviews) and quantitative (surveys) research methods which will be mainly based on the data acquired through the findings of the Small Claims Analysis Net (SCAN) project. This project contributes towards examining the ESCP Regulation implementation and efficiency in providing consumers with a legal watershed through using the ODR for their transnational small claims. The outcomes of this research may benefit both academia and policymakers at national and international level.

Keywords: access to justice, consumers, e-commerce, small e-Disputes

Procedia PDF Downloads 128
80 Understanding Profit Shifting by Multinationals in the Context of Cross-Border M&A: A Methodological Exploration

Authors: Michal Friedrich

Abstract:

Cross-border investment has never been easier than in today’s global economy. Despite recent initiatives tightening the international tax landscape, profit shifting and tax optimization by multinational entities (MNEs) in the context of cross-border M&A remain persistent and complex phenomena that warrant in-depth exploration. By synthesizing the outcomes of existing research, this study aims to first provide a methodological framework for identifying MNEs’ profit-shifting behavior and quantifying its fiscal impacts via various macroeconomic and microeconomic approaches. The study also proposes additional methods and qualitative/quantitative measures for extracting insight into the profit shifting behavior of MNEs in the context of their M&A activities at industry and entity levels. To develop the proposed methods, this study applies the knowledge of international tax laws and known profit shifting conduits (incl. dividends, interest, and royalties) on several model cases/types of cross-border acquisitions and post-acquisition integration activities by MNEs and highlights important factors that encourage or discourage tax optimization. Follow-up research is envisaged to apply the methods outlined in this study on published data on real-world M&A transactions to gain practical country-by-country, industry and entity-level insights. In conclusion, this study seeks to contribute to the ongoing discourse on profit shifting by providing a methodological toolkit for exploring profit shifting tendencies MNEs in connection with their M&A activities and to serve as a backbone for further research. The study is expected to provide valuable insight to policymakers, tax authorities, and tax professionals alike.

Keywords: BEPS, cross-border M&A, international taxation, profit shifting, tax optimization

Procedia PDF Downloads 69
79 Credit Card Fraud Detection with Ensemble Model: A Meta-Heuristic Approach

Authors: Gong Zhilin, Jing Yang, Jian Yin

Abstract:

The purpose of this paper is to develop a novel system for credit card fraud detection based on sequential modeling of data using hybrid deep learning models. The projected model encapsulates five major phases are pre-processing, imbalance-data handling, feature extraction, optimal feature selection, and fraud detection with an ensemble classifier. The collected raw data (input) is pre-processed to enhance the quality of the data through alleviation of the missing data, noisy data as well as null values. The pre-processed data are class imbalanced in nature, and therefore they are handled effectively with the K-means clustering-based SMOTE model. From the balanced class data, the most relevant features like improved Principal Component Analysis (PCA), statistical features (mean, median, standard deviation) and higher-order statistical features (skewness and kurtosis). Among the extracted features, the most optimal features are selected with the Self-improved Arithmetic Optimization Algorithm (SI-AOA). This SI-AOA model is the conceptual improvement of the standard Arithmetic Optimization Algorithm. The deep learning models like Long Short-Term Memory (LSTM), Convolutional Neural Network (CNN), and optimized Quantum Deep Neural Network (QDNN). The LSTM and CNN are trained with the extracted optimal features. The outcomes from LSTM and CNN will enter as input to optimized QDNN that provides the final detection outcome. Since the QDNN is the ultimate detector, its weight function is fine-tuned with the Self-improved Arithmetic Optimization Algorithm (SI-AOA).

Keywords: credit card, data mining, fraud detection, money transactions

Procedia PDF Downloads 131
78 Foreign Artificial Intelligence Investments and National Security Exceptions in International Investment Law

Authors: Ying Zhu

Abstract:

Recent years have witnessed a boom of foreign investments in the field of artificial intelligence (AI). Foreign investments provide critical capital for AI development but also trigger national security concerns of host states. A notable example is an increasing number of cases in which the Committee on Foreign Investment in the United States (CFIUS) has denied Chinese acquisitions of US technology companies on national security grounds. On July 19, 2018, the Congress has reached a deal on the final draft of a new provision to strengthen CFIUS’s authority to review overseas transactions involving sensitive US technology. The question is: how to reconcile the emerging tension between, on the one hand, foreign AI investors’ expectations of a predictable investment environment, and on the other hand, host states’ regulatory power on national security? This paper provides a methodology to reconcile this tension under international investment law. Based on an examination, the national security exception clauses in international investment treaties and the application of national security justification in investor-state arbitration jurisprudence, the paper argues that a traditional interpretation of the national security exception, based on the necessity concept in customary international law, fails to take into account new risks faced by countries, including security concerns over strategic industries such as AI. To overcome this shortage, the paper proposes to incorporate an integrated national security clause in international investment treaties, which includes a two-tier test: a ‘self-judging’ test in the pre-establishment period and a ‘proportionality’ test in the post-establishment period. At the end, the paper drafts a model national security clause for future treaty-drafting practice.

Keywords: foreign investment, artificial intelligence, international investment law, national security exception

Procedia PDF Downloads 152
77 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 141
76 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 130
75 Digital Environment as a Factor of the City's Competitiveness in Attracting Tourists: The Case of Yekaterinburg

Authors: Alexander S. Burnasov, Anatoly V. Stepanov, Maria Y. Ilyushkina

Abstract:

In the conditions of transition to the digital economy, the digital environment of the city becomes one of the key factors of its tourism attractiveness. Modern digital environment makes travelling more accessible, improves the quality of travel services and the attractiveness of many tourist destinations. The digitalization of the industry allows to use resources more efficiently, to simplify business processes, to minimize risks, and to improve travel safety. The city promotion as a tourist destination in the foreign market becomes decisive in the digital environment. Information technologies are extremely important for the functioning of not only any tourist enterprise but also the city as a whole. In addition to solving traditional problems, it is also possible to implement some innovations from the tourism industry, such as the availability of city services in international systems of booking tickets and booking rooms in hotels, the possibility of early booking of theater and museum tickets, the possibility of non-cash payment by cards of international payment systems, Internet access in the urban environment for travelers. The availability of the city's digital services makes it possible to reduce ordering costs, contributes to the optimal selection of tourist products that meet the requirements of the tourist, provides increased transparency of transactions. The users can compare prices, features, services, and reviews of the travel service. The ability to share impressions with friends thousands of miles away directly affects the image of the city. It is possible to promote the image of the city in the digital environment not only through world-scale events (such as World Cup 2018, international summits, etc.) but also through the creation and management of services in the digital environment aimed at supporting tourism services, which will help to improve the positioning of the city in the global tourism market.

Keywords: competitiveness, digital environment, travelling, Yekaterinburg

Procedia PDF Downloads 136
74 The Perspective of Waria Transgenders in Singaraja on Their Reproduction Health

Authors: Made Kurnia Widiastuti Giri, Nyoman Kanca, Arie Swastini, Bambang Purwanto

Abstract:

Aim: Waria transgenders are a phenomenon whose existence is undeniable. The sexual behaviours of waria transgenders belong to the groups of high-risk STDs infections, especially HIV/AIDS. The present study was aimed at finding out the general idea of the existence of waria transgenders in Singaraja, their sexual transactions, their sexual behaviours, and at exploring the factors affecting their sexual behaviours along with their participation in regular reproduction health control. Methods: The subjects of the present research were male-to-female transgenders living in the town of Singaraja. The research applied a qualitative approach. Data collection in this research was conducted through in-depth interview and observation. Results: The results of the study exposed 1) the existence of waria transgender community in Singaraja observed from their active participation in social events such as taking the roles of counsellors in the campaign of prevention and control of HIV/AIDS with the Local Commission of AIDS Control and other foundations; 2) the sexual services provided by waria transgenders which were performed in squeeze method, oral and anal sex which could be categorized as HIV/AIDS high-risk sexual behaviours, while the consistency in doing safe sex among the trangenders in Singaraja showed that most of the waria transgenders (80%) were aware of the urgency of using condoms during sexual intercourse; and 3) the low participation of the waria transgenders in Singaraja in regular reproduction health check up at the local Centre of Public Health Service was caused by their negative perception about being examined by female doctors. Conclucions: Waria in singaraja categorized as HIV/AIDS high-risk sexual behaviours but they do have consistency in doing safe sex by using condoms. They have a negative psychological perception about being examined by female doctors.

Keywords: waria transgenders, sexual behaviours, reproduction health, hiv/aids

Procedia PDF Downloads 335
73 From Being to Becoming: Emancipation and Empowerment in the African Diaspora

Authors: R. Vidhya

Abstract:

Diasporic writings present a comprehensive view of social, cultural and psychological dualities of immigrants. Isolation and the strong feelings of insecurity and inferiority due to constant marginalization coupled with a nostalgia for their motherland, its customs, culture, language, food and people which keep haunting the minds of immigrants are the major themes that are handled by diasporic writers. In the African diaspora, more than the men, it is the women who face the brunt and burden of the triple jeopardy – the racial, class and gender discrimination. Women writers from Africa have successfully sketched the plight of African women in the diaspora. Buchi Emecheta, a Nigerian woman writer deftly portrays the African Diaspora in her novels. She skillfully weaves her stories with her own experiences as an immigrant in the United Kingdom. She portrays the immigrant life and psychology through numerous themes like exile, geographical shift of locations, transactions of culture, political instability and the dilemma of moral and religious ideologies in her diasporic novels Second-class Citizen, Gwendolyn and Kehinde. The contemporary Nigerian woman writer Chimamanda Ngozi Adichie has also dexterously depicted the diasporic dilemma of her protagonist Ifemelu in Americannah, who initially has the experience of a despondent and a downcast in the United States of America. This paper aims to analyse the diasporic sentiments and sensibilities of the Nigerian Igbo women writers Buchi Emecheta and Chimamanda Ngozi Adichie whose women characters finally find emancipation and empowerment in the African Diaspora. This study is based on the Africana Womanist Literary theory propounded by Clenora Hudson-Weems.

Keywords: African Diaspora, Nigerian women writers, Buchi Emecheta, Chimamanda Ngozi Adichie, emancipation, empowerment

Procedia PDF Downloads 287
72 Factors Affecting M-Government Deployment and Adoption

Authors: Saif Obaid Alkaabi, Nabil Ayad

Abstract:

Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.

Keywords: e-government, m-government, system dependability, system security, trust

Procedia PDF Downloads 381
71 Learning and Rethinking Language through Gendered Experiences

Authors: Neha Narayanan

Abstract:

The paper tries to explore the role of language in determining spaces occupied by women in everyday lives. It is inspired from an ongoing action research work which employs ‘immersion’- arriving at a research problematic through community research, as a methodology in a Kondh adivasi village, Kirkalpadu located in Rayagada district of the Indian state of Odisha. In the dominant development discourse, language is associated with either preservation or conservation of endangered language or empowerment through language. Beyond these, is the discourse of language as a structure, with the hegemonic quality to organise lifeworld in a specific manner. This rigid structure leads to an experience of constriction of space for women. In Kirkalpadu, the action research work is with young and unmarried women of the age 15-25. During daytime, these women are either in the agricultural field or in the bari -the backyard of the house whose rooms are linearly arranged one after the other ending with the kitchen followed by an open space called bari (in Odia) which is an intimate and gendered space- where they are not easily visible. They justify the experience of restriction in mobility and fear of moving out of the village alone by the argument that the place and the men are nihi-aaeh (not good). These women, who have dropped out of school early to contribute to the (surplus) labour requirement in the household, want to learn English to be able to read signboards when they are on the road, to be able to fill forms at a bank and use mobile phones to communicate with their romantic partner(s). But the incapacity to have within one’s grasp the province of language and the incapacity to take the mobile phone to the kind of requirements marked by the above mentioned impossible transactions with space restricts them to the bari of the house. The paper concludes by seeking to explore the possibilities of learning and rethinking languages which takes into cognizance the gendered experience of women and the desire of women to cross the borders and occupy spaces restricted to them.

Keywords: action research, gendered experience, language, space

Procedia PDF Downloads 171