Search results for: financial security
5266 Re-Imagining and De-Constructing the Global Security Architecture
Authors: Smita Singh
Abstract:
The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.Keywords: hegemonic discourse, global security, non-proliferation regime, power politics
Procedia PDF Downloads 3185265 Considering Climate Change in Food Security: A Sociological Study Investigating the Modern Agricultural Practices and Food Security in Bangladesh
Authors: Hosen Tilat Mahal, Monir Hossain
Abstract:
Despite being a food-sufficient country after revolutionary changes in agricultural inputs, Bangladesh still has food insecurity and undernutrition. This study examines the association between agricultural practices (as social practices) and food security concentrating on the potential impact of sociodemographic factors and climate change. Using data from the 2012 Bangladesh Integrated Household Survey (BIHS), this study shows how modifiedagricultural practices are strongly associated with climate change and different sociodemographic factors (land ownership, religion, gender, education, and occupation) subsequently affect the status of food security in Bangladesh. We used linear and logistic regression models to analyze the association between modified agricultural practices and food security. The findings indicate that socioeconomic statuses are significant predictors of determining agricultural practices in a society like Bangladesh and control food security at the household level. Moreover, climate change is adversely impactingeven the modified agricultural and food security association version. We conclude that agricultural practices must consider climate change while boosting food security. Therefore, future research should integrate climate change into the agriculture and food-related mitigation and resiliency models.Keywords: food security, agricultural productivity, climate change, bangladesh
Procedia PDF Downloads 1235264 Modified RSA in Mobile Communication
Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar
Abstract:
The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.Keywords: M-RSA, sensor networks, sensor applications, security
Procedia PDF Downloads 3425263 The Security Trade-Offs in Resource Constrained Nodes for IoT Application
Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve
Abstract:
The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation
Procedia PDF Downloads 1685262 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry
Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht
Abstract:
Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628
Procedia PDF Downloads 1685261 The Arabian Financial Framework in the Pre-Islamic Times: Do We Need a New Paradigm
Authors: Fahad Ahmed Qureshi
Abstract:
There were abundant renowned financial markets in Pre-Islamic Arabs. Most of those were patterned and settled during pre-particularized sunshine. Those markets were classified either as vernacular markets helping the neighboring clans, or habitual markets that people sojourned to from all articulations of the Arabian Peninsula, such as Okaz near Mecca. Some of those markets had leading significance due to their geographical positions, such as Prime market of Eden, because of their entanglement in international trade i.e. with the markets of Sub-Continent, Abyssinia, Persia and China. Other markets such as Market of Yamamah annex its gist from being situated on the caravan crossroads. Islamic worldview and Islamic epistemology base of Financial Market’s realistic theory, pragmatic model and operative approach is moderately constrained in terms of its growth. The existent situation only parasol the form of accommodative-modification and splendid-methodologies, which due to depleted and decorous endeavor in explaining Islamic financial market theoretically. This is the demand of time that particular studies should be conduct to magnify the devours in developing theoretical framework for Islamic Financial Market.Keywords: Islam, financial market, history, research, product development
Procedia PDF Downloads 4105260 Access to Financial Services to Rural Poor in Nepal: Challenges and Way Forward
Authors: Krishna Prasad Sharma
Abstract:
Nepal’s financial sector has become deeper and wider, and the number and types of financial intermediaries have grown rapidly over the past two decades. However, access to financial services remains limited for many people in many parts of rural Nepal. While financial institutions have been expanding rapidly in an urban area in recent years, the access to the rural poor is excessively inadequate due to financial illiteracy and limited numbers of financial institutions that confined only to the district headquarters. Based on the focus group discussion, semi-structured interview of key people and literature review, this paper aims to examine the supply of and demand for financial services in Nepal and the constraints to increasing access to them, and offers way forward for making the financial sector work for all of Nepal’s people, especially the rural poor. While Nepal’s government has tried to increase access to formal financial services for small businesses and low-income households through directed lending programs for small businesses and low-income households, created specialized wholesale and retail institutions, and lowered market entry requirements, formal financial services are declining, and financial intermediation is stagnating. Supply and demand indicators show that, despite government efforts, formal financial institutions do not serve the needs of most of the Nepalese population. While access to and use of formal financial services are limited, in general, the problem is acute for small businesses and low-income households. Indeed, both access and use are closely correlated with business loan size and household income. This study concludes that banks and microfinance institutions with the use of mobile phones can connect hundreds of millions of unbanked and low-income people, especially rural poor to financial services at low costs. While there are many challenges ahead in expanding the service to rural areas, the mobile financial services will be beneficial that makes payments faster and cheaper, more convenient and accessible to a greater number of senders and recipients in rural areas. In rural areas, clients will benefit from money transfer and other mobile and online services.Keywords: financial inclusion, financial enabling environment, microfinance, branchless banking, rural poor
Procedia PDF Downloads 2905259 The Role of Financial and Non-Financial Institutions in Promoting Entrepreneurship in Micro small and Medium Enterprises
Authors: Lemuel David
Abstract:
The importance of the Micro, Small, and Medium Enterprises sector is well recognized for its legitimate contribution to the Macroeconomic objectives of the Republic of Liberia, like generation of employment, input t, exports, and enhancing entrepreneurship. Right now, Medium and Small enterprises accounts for about 99 percent of the industrial units in the country, contributing 60 percent of the manufacturing sector output and approximately one-third of the nation’s exports. The role of various financial institutions like ECO bank and Non-financial Institutions like Bearch Limited support promoting the growth of Micro, Small, and Medium Enterprises is unique. A small enterprise or entrepreneur gets many types of assistance from different institutions for varied purposes in the course of his entrepreneurial journey. This paper focuses on the factors related to financial institutional support and non-financial institutional support entrepreneurs to the growth of Medium and Small enterprises in the Republic of Liberia. The significance of this paper is to support Policy and Institutional Support for Medium and Small enterprises to know the views of entrepreneurs about financial and non-financial support systems in the Republic of Liberia. This study was carried out through a survey method, with the use of questionnaires. The population for this study consisted of all registered Medium and Small enterprises which have been registered during the years 2004-2014 in the republic of Liberia. The sampling method employed for this study was a simple random technique and determined a sample size of 400. Data for the study was collected using a standard questionnaire. The questionnaire consisted of two parts: the first part consisted of questions on the profile of the respondents. The second part covers (1) financial, promotional factors and (2) non-financial promotional factors. The results of the study are based on financial and non-financial supporting activities provided by institutions to Medium and Small enterprises. After investigation, it has been found that there is no difference in the support given by Financial Institutions and non-financial Institutions. Entrepreneurs perceived “collateral-free schemes and physical infrastructure support factors are highest contributing to entry and growth of Medium and Small enterprises.Keywords: micro, small, and medium enterprises financial institutions, entrepreneurship
Procedia PDF Downloads 985258 Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net
Authors: Abdolghader Pourali, Mohammad V. Malakooti, Muhammad Hussein Yektaie
Abstract:
A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce.Keywords: reliability, colored Petri net, assessment, payment models, m-commerce
Procedia PDF Downloads 5375257 A Review of Food Security Policy Research in Central Asia
Authors: Mergen Dyussenov
Abstract:
Food security has become a prominent issue on the global policy agenda. Yet, one particular region that remains understudied is a cohort of Central Asian countries. To shed light onto the issue, the paper looks into a review of existing literature related to food security policies in Central Asia. In so doing, it seeks to systematize the context analyzed, key findings, and recommendations. Furthermore, it analyzes the role of key actors in promoting the food security policies across Central Asian nations. Finally, the paper attempts to set the agenda for further research.Keywords: food security, central Asia, the role of actors, policy analysis
Procedia PDF Downloads 3265256 Percolation of Financial Services into the Villages in India: Mirroring of Beneficiaries Responses
Authors: Radhakumari Challa
Abstract:
In India the commercial banks have taken the initiative of visiting the villages and helping the villagers open the no-frill accounts as part of the mission towards achieving the total financial inclusion. As an extension to the first phase of the study conducted a year back which revealed that the required awareness that the no-frill accounts creation is the initiative of the government to transfer either the financial assistance or other benefits of economic development directly was lacking among the villagers, the present study is undertaken to review the change in perceptions of beneficiaries in villages over a year period. The study reveals that that there is increase in the awareness among villagers regarding the purpose for which no-frills accounts are opened, about the method of operating these accounts. Awareness about their right for accessing all the financial services is also found to be on the rise.Keywords: business correspondence, financial inclusion no-frill account, percolation
Procedia PDF Downloads 3535255 Enhancing Civil Aviation Safety and Security: A Comprehensive Approach
Authors: J. Waldon
Abstract:
The civil aviation industry plays a crucial role in global transportation, connecting people and goods across the world. Ensuring the safety and security of passengers, crew, and aircraft is of paramount importance. This paper aims to address the aspect of training and human factors, amongst others, necessary for enhancing civil aviation safety and security. In this context, we are focusing on the level of attention exhibited in the checking of luggage and travel credentials, with the aim to identify areas of improvement and avoid compromising security and safety at the Nsimalen Airport Yaoundé, Cameroon. We found that there is a lack of proper awareness among both travelers and some staff on the safety and security of goods and passengers. We suggest that improved training and handling, and sensitization in the form of legible billboards are important. Thus, we recommend refresher courses like this one for staff to keep abreast with the fast-changing security landscape in air transport as well as proper sensitization, including health-related issues. In conclusion, we established that the human factors, as well as the frequency of training and refresher courses, have a positive outlook on safety and security in air transport.Keywords: safety, security, passengers, cargo
Procedia PDF Downloads 675254 A Review Paper on Data Security in Precision Agriculture Using Internet of Things
Authors: Tonderai Muchenje, Xolani Mkhwanazi
Abstract:
Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.Keywords: precision agriculture, security, IoT, EIDE
Procedia PDF Downloads 905253 Board of Directors Gender Diversity, Board Committees and Financial Performance: Evidence from Nigeria
Authors: Aliyu Aminu Baba, Yahaya Danjuma, Ahmad Sule Liman-Katagum
Abstract:
This paper examines the effects of the board of directors’ diversity on firm performance. We investigate the relationship between the number of women directors on the board and important board committees and financial performance measured as return on assets. Our statistical analysis supports the theoretical position of the effect diversity on financial performance. These studies enhanced the previous studies on the board of director’s gender diversity, board committees, and its impacts on firm financial performance. The study uses data from eighteen (18) Nigerian commercial banks. The study finds that banks with a higher number of females directors on board and board committees have higher Earning per share(EPS)) and Return on Assets (ROA). It also finds that some banks did not even have a single female on its corporate board. Evidence imply that decisions concerning the appointment of women to corporate boards should be on criteria and financial performance. It is recommended that banks can enhance their financial performance by having more female directors on their corporate board.Keywords: board of directors, gender diversity, board committees, financial performance
Procedia PDF Downloads 3235252 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems
Authors: Mirko Sailio
Abstract:
Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.Keywords: border automation, cyber-security, threat actors, border cyber-security
Procedia PDF Downloads 2035251 EarlyWarning for Financial Stress Events:A Credit-Regime Switching Approach
Abstract:
We propose a new early warning model for predicting financial stress events for a given future time. In this model, we examine whether credit conditions play an important role as a nonlinear propagator of shocks when predicting the likelihood of occurrence of financial stress events for a given future time. This propagation takes the form of a threshold regression in which a regime change occurs if credit conditions cross a critical threshold. Given the new early warning model for financial stress events, we evaluate the performance of this model and currently available alternatives, such as the model from signal extraction approach, and linear regression model. In-sample forecasting results indicate that the three types of models are useful tools for predicting financial stress events while none of them outperforms others across all criteria considered. The out-of-sample forecasting results suggest that the credit-regime switching model performs better than the two others across all criteria and all forecasting horizons considered.Keywords: cut-off probability, early warning model, financial crisis, financial stress, regime-switching model, forecasting horizons
Procedia PDF Downloads 4355250 Protecting Privacy and Data Security in Online Business
Authors: Bilquis Ferdousi
Abstract:
With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.Keywords: privacy, data security, legislation, online business
Procedia PDF Downloads 1065249 Effect of the Food Distribution on Household Food Security Status in Iran
Authors: Delaram Ghodsi, Nasrin Omidvar, Hassan Eini-Zinab, Arash Rashidian, Hossein Raghfar
Abstract:
Food supplementary programs are policy approaches that aim to reduce financial barriers to healthy diets and tackle food insecurity. This study aimed to evaluate the effect of the supportive section of Multidisciplinary Supplementary Program for Improvement of Nutritional Status of Children (MuPINSC) on households’ food security status and nutritional status of mothers. MuPINSC is a national integrative program in Iran that distributes supplementary food basket to malnourished or growth retarded children living in low-income families in addition to providing health services, including sanitation, growth monitoring, and empowerment of families. This longitudinal study is part of a comprehensive evaluation of the program. The study participants included 359 mothers of children aged 6 to 72 month under coverage of the supportive section of the program in two provinces of Iran (Semnan and Qazvin). Demographic and economic characteristics of families were assessed by a questionnaire. Data on food security of family was collected by locally adapted Household Food Insecurity Access Scale (HFIAS) at the baseline of the study and six month thereafter. Weight and height of mothers were measured at the baseline and end of the study and mother’s BMI was calculated. Data were analysed, using paired t-test, GEE (Generalized Estimating Equation), and Chi-square tests. Based on the findings, at the baseline, only 4.7% of families were food-secure, while 13.1%, 38.7% and, 43.5% were categorized as mild, moderate and severe food insecure. After six months follow up, the distribution of different levels of food security changed significantly (P<0.001) to 7.9%, 11.6%, 42.6%, and 38%, respectively. At the end of the study, the chance of food insecurity was significantly 20% lower than the beginning (OR=0.796; 0.653-0.971). No significant difference was observed in maternal BMI based on food security (P>0.05). The findings show that the food supplementary program for children improved household food security status in the studied households. Further research is needed to assess other factors that affect the effectiveness of this large scale program on nutritional status and household’s food security.Keywords: food security, food supplementary program, household, malnourished children
Procedia PDF Downloads 4015248 Governance and Financial Constraints the Impact on Corporate Social Responsibility Implementation in Cooperatives
Authors: Wanlapha Phraibueng, Patrick Sentis, Geraldine Riviere-Giordano
Abstract:
Corporate Social Responsibility (CSR) initiatives have been widely discussed especially in investor-oriented firms. In contrast, cooperatives pay less attention to CSR because their activities have integrated the responsibility and the solidity of social, economic and environment. On the other hand, by adopting ownership theory and agency theory – cooperatives ignore CSR investment due to unclarified decision control in the governance and the limitation to acquire the capital financed. The unique governance and financial structures in cooperatives lead to the conflict among the stakeholders and long-term investment which have an impact on firm financial performance. As an illustration of cooperatives dilemmas, we address the question of Whether or not cooperatives in term of governance and financial structures are the constraints on implementing CSR policies. We find that the governance and financial structures in large cooperatives are the influence factors which predispose cooperatives to invest on CSR. In contrast, in the startup or small cooperatives, its governance and financial structures are the constraints on implementing CSR policies. We propose the alternative financial structure based on the trade-off between debt and equity which aims to relax the restrictions in cooperatives’ governance and allow cooperatives to acquire the capital financed either from its members or non-members. We suggest that engaging equity as a financial structure induces cooperatives to invest on CSR policies. Alternative financial structure eliminates not only cooperative ownership control problem but also the constraints in capital acquisition. By implementing CSR activities consistent with the alternative financial choice, cooperatives can increase firm’s value and reduce the conflict among their stakeholders.Keywords: cooperatives, corporate social responsibility, financial, governance
Procedia PDF Downloads 1395247 The Role of Intellectual Security Immunisation in Reducing Extremism in the Kingdom of Saudi Arabia, 1979 – 2019
Authors: Anas Abdulrahman A. Almiman
Abstract:
In recent decades, efforts to combat extremism have focused on non-physical dimensions, as various countries have attempted to raise security awareness or promote authentic and moderate Islamic education. The Kingdom of Saudi Arabia is one of the most successful and unique cases because it has focused on the immunization of Islamic intellectual security to combat extremism. This study aims to define the concept and importance of Islamic intellectual security in the Kingdom of Saudi Arabia through a descriptive-analytical study. It describes the potential role of Islamic intellectual security immunization in reducing extremism in the Kingdom of Saudi Arabia from 1979 to 2019, identifying various factors that connect Islamic intellectual security immunization to extremism reduction. One such factor is the MISK Foundation’s forums and conferences intended to raise Islamic intellectual security and reduce intellectual deviation, thus reducing extremism. It concludes that the common significant factor for Islamic intellectual deviation is direct commands and prohibitions. This study supports the efforts made by the Kingdom of Saudi Arabia to immunize Islamic intellectual security and fight extremism as a consequence.Keywords: extremism, intellectual security immunization , Saudi Arabia, Islamic
Procedia PDF Downloads 1965246 An Overview of Risk Types and Risk Management Strategies to Improve Financial Performance
Authors: Azar Baghtaghi
Abstract:
Financial risk management is critically important as it enables companies to maintain stability and profitability amidst market fluctuations and unexpected events. It involves the precise identification of risks that could impact investments, assets, and potential revenues. By implementing effective risk management strategies, companies can insure themselves against adverse market changes and prevent potential losses. In today's era, where markets are highly complex and influenced by various factors such as macroeconomic policies, exchange rate fluctuations, and natural disasters, the need for meticulous planning to cope with these uncertainties is more pronounced. Ultimately, financial risk management means being prepared for the future and the ability to sustain business in changing environments. A company capable of managing its risks not only achieves sustainable profitability but also gains the confidence of shareholders, investors, and business partners, enhancing its competitive position in the market. In this article, the types of financial risk and risk management strategies for improving financial performance were investigated. By identifying the risks stated in this article and their evaluation techniques, it is possible to improve the organization's financial performance.Keywords: strategy, risk, risk management, financial performance.
Procedia PDF Downloads 95245 The Influence of an Occupation as a Calling on the Value of Job Security and Its Connection with Wage Levels
Authors: Malul Miki, Rafi Bar-El, Eithan Hourie
Abstract:
In this article, we test the influence of an occupation as a calling on the value of job security and its connection with wage levels. Our sample consists of 495 workers in Israel from 10 occupations in the public sector, who are assumed to have a relatively high level of job security, and the private sector, who are assumed to have less job security or none at all. These 10 occupations are social workers, lecturers, lawyers, administration workers, accountants, high school teachers, bank workers, high-tech worker, nurses and psychologists. Using regression analysis, we find that those who have occupations that the literature has defined as a calling value job security less than those in ordinary employment. In addition, salary level has no effect on this relationship. Finally, those who work in occupations that are regarded as a calling have less status quo bias than those in ordinary employment.Keywords: calling, loss aversion, job security, status quo bias
Procedia PDF Downloads 1045244 The Viability of Islamic Finance and Its Impact on Global Financial Stability: Evidence from Practical Implications
Authors: Malik Shahzad Shabbir, Muhammad Saarim Ghazi, Amir Khalil ur Rehman
Abstract:
This study examines the factors which influence and contribute towards the financial viability of Islamic finance and its impact on global financial stability. However, the purpose of this paper is to differentiate the practical implications of both Islamic and conventional finance on global financial stability. The Islamic finance is asset backed financing which creates wealth through trade, commerce and believes in risk and return sharing. Islamic banking is asset driven as against to conventional banking which is liability driven. In order to introduce new financial products for market, financial innovation in Islamic finance must be within the Shari’ah parameters that are tested against the ‘Maqasid al-Shari’ah’. Interest-based system leads to income and wealth inequalities and mis-allocation of resources. Moreover, this system has absence of just and equitable aspect of distribution that may exploit either the debt holder or the financier. Such implications are reached to a tipping point that leaves only one choice: change or face continued decline and misery.Keywords: viability, global financial stability, practical implications, asset driven, tipping point
Procedia PDF Downloads 3035243 Board Chairman, Share Ownership and Financial Reporting Quality of Microfinance Banks in Nigeria: Impact of Regulatory Changes
Authors: Muhammad Umar Kibiya
Abstract:
The study aims to examine whether regulatory changes have an impact on the financial reporting quality of Microfinance Banks in Nigeria. The research employed a panel data analysis technique, using data from 2018 to 2022. The sample includes 72 microfinance banks, using regression analyses to examine the relationship between variables. The findings indicate that Board Chairmanship has a positive and significant effect on financial reporting quality. It also reveals that share ownership has a negative and significant impact on financial reporting quality. The results suggest that regulatory changes have a positive and significant influence on financial reporting quality. Thus, findings have important implications for microfinance banks in Nigeria. It suggests that having a strong and competent board chairperson can enhance financial reporting quality, leading to more transparent and reliable information for stakeholders. Furthermore, the study highlights the importance of regulatory changes in improving financial reporting practices in the microfinance banking sector. The study contributes to the extant literature by providing empirical evidence on the relationship between board chairmanship, share ownership, financial reporting quality, and regulatory changes in microfinance banks. It further supports the concept that governance mechanisms and regulatory reforms play a crucial role in ensuring transparency and accountability within the microfinance banking sector. It recommends that microfinance banks should appoint experienced and qualified individuals as board chairpersons to enhance financial reporting quality. Furthermore, policymakers and regulatory authorities should continue to implement and enforce regulations that promote transparent financial reporting practices in microfinance banks.Keywords: board chairman, share ownership, financial reporting quality, microfinance, regulatory changes
Procedia PDF Downloads 665242 Framework for Assessment of Non-financial Concentration Risk
Authors: Anchal Gupta
Abstract:
Amid the escalating digitalization and deployment of cross-border technological solutions, a significant portion of the industry and regulatory bodies have begun to pose queries concerning the formulation, computation, and contemplation of concentration risk. In the financial sector, well-established parameters exist for gauging the concentration of a portfolio and similar elements. However, a unified framework appears to be absent, which could guide industry and regulators pertaining to non-financial concentration risk. This paper introduces a framework, constructed on the foundation of multiple regulations where regulators are advocating for licensed corporations to evaluate their concentration risk. The lacuna lies in the fact that, while regulators delineate what constitutes concentration risk, unlike other domains, no guidelines are provided that could assist firms. This frequently results in ambiguity and individual corporate interpretation, which, from a risk management standpoint, is less than ideal.Keywords: concentration risk, non-financial risk, government regulation, financial regulation, non-market risk, MAS, DORA, EDSP, SFC
Procedia PDF Downloads 405241 50+ Customers' Behavior in the Financial Market of the Czech Republic
Authors: K. Matušínská, H. Starzyczná, M. Stoklasa
Abstract:
The paper deals with behaviour of the segment 50+ in the financial market in the Czech Republic. This segment could be said as the strong market power and it can be a crucial business potential for financial business units. The main defined objective of this paper is analysis of the customers´ behaviour of the segment 50-60 years in the financial market in the Czech Republic and proposal making of the suitable marketing approach to satisfy their demands in the area of product, price, distribution and marketing communication policy. This paper is based on data from one part of primary marketing research. Paper determinates the basic problem areas as well as definition of financial services marketing, defining the primary research problem, hypothesis and primary research methodology. Finally suitable marketing approach to selected sub-segment at age of 50-60 years is proposed according to marketing research findings.Keywords: population aging in the Czech Republic, segment 50-60 years, financial services marketing, marketing research, marketing approach
Procedia PDF Downloads 3825240 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean
Authors: Jessica Kate Simonds
Abstract:
The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies
Procedia PDF Downloads 1845239 USTTB (UCRC) Financial Management, Strengths and Weaknesses
Authors: Samba Lamine Cisse, Cheick Oumar Tangara, Seynabou Sissoko, Mahamadou Diakite, Seydou Doumbia
Abstract:
Background: Financial management of a scientific research center is a crucial element in achieving ambitious scientific goals. It can be a driving force for research success, but it also has shortcomings that are important to understand. This study focuses on the crucial aspects of financial management in the context of scientific research centers, more specifically the USTTB (UCRC) in Mali in terms of strengths and weaknesses. Methodology: This study concerns the case of the UCRC, one of the USTTB's research centers. It is a qualitative study based on years of experience in project management at the USTTB, and on analyses and interpretations of everyday activities. Result: It offers practical recommendations for improving the financial stability of research institutions, thereby contributing to their mission of promoting scientific research and innovation. Scientific research centers play a crucial role in the development of knowledge, and their effective operation largely depends on the appropriate management of their financial resources. It begins with an in-depth analysis of UCRC's typical financial structure, highlighting its types and sources of funding, followed by an analysis of the strengths and weaknesses of its current financial management system. Conclusion: Financial management of a scientific research center is essential to ensure the continuity of research activities, the development of innovative projects and the achievement of scientific objectives. Adaptive financial management focused on efficiency, diversification of funding and risk control. They are essential to meeting these challenges and fostering excellence in scientific research.Keywords: financial, management, strengths, weaknesses, recommendations
Procedia PDF Downloads 145238 Influence of the Financial Crisis on the Month and the Trading Month Effects: Evidence from the Athens Stock Exchange
Authors: Aristeidis Samitas, Evangelos Vasileiou
Abstract:
The aim of this study is to examine the month and the trading month effect under changing financial trends. We choose the Greek stock market to implement our assumption because there are clear and long term periods of financial growth and recession. Daily financial data from Athens Exchange General Index for the period 2002-2012 are considered. The paper employs several linear and non-linear models, although the TGARCH asymmetry model best fits in this sample and for this reason we mainly present the TGARCH results. Empirical results show that changing economic and financial conditions influences the calendar effects. Especially, the trading month effect totally changes in each fortnight according to the financial trend. On the other hand, in Greece the January effect exists during the growth periods, although it does not exist when the financial trend changes. The findings are helpful to anybody who invest and deals with the Greek stock market. Moreover, they may pave the way for an alternative calendar anomalies research approach, so it may be useful to investors who take into account these anomalies when they draw their investment strategy.Keywords: month effect, trading month effect, economic cycles, crisis
Procedia PDF Downloads 4165237 An Exploration of Cyberspace Security, Strategy for a New Era
Authors: Laxmi R. Kasaraneni
Abstract:
The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security
Procedia PDF Downloads 294