Search results for: authenticity of transactions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 432

Search results for: authenticity of transactions

132 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 283
131 Misconception on Multilingualism in Glorious Quran

Authors: Muhammed Unais

Abstract:

The holy Quran is a pure Arabic book completely ensured the absence of non Arabic term. If it was revealed in a multilingual way including various foreign languages besides the Arabic, it can be easily misunderstood that the Arabs became helpless to compile such a work positively responding to the challenge of Allah due to their lack of knowledge in other languages in which the Quran is compiled. As based on the presence of some non Arabic terms in Quran like Istabrq, Saradiq, Rabbaniyyoon, etc. some oriental scholars argued that the holy Quran is not a book revealed in Arabic. We can see some Muslim scholars who either support or deny the presence of foreign terms in Quran but all of them agree that the roots of these words suspected as non Arabic are from foreign languages and are assimilated to the Arabic and using as same in that foreign language. After this linguistic assimilation was occurred and the assimilated non Arabic words became familiar among the Arabs, the Quran revealed as using these words in such a way stating that all words it contains are Arabic either pure or assimilated. Hence the two of opinions around the authenticity and reliability of etymology of these words are right. Those who argue the presence of foreign words he is right by the way of the roots of that words are from foreign and those who argue its absence he is right for that are assimilated and changed as the pure Arabic. The possibility of multilingualism in a monolingual book is logically negative but its significance is being changed according to time and place. The problem of multilingualism in Quran is the misconception raised by some oriental scholars that the Arabs became helpless to compile a book equal to Quran not because of their weakness in Arabic but because the Quran is revealed in languages they are ignorant on them. Really, the Quran was revealed in pure Arabic, the most literate language of the Arabs, and the whole words and its meaning were familiar among them. If one become positively aware of the linguistic and cultural assimilation ever found in whole civilizations and cultural sets he will have not any question in this respect. In this paper the researcher intends to shed light on the possibility of multilingualism in a monolingual book and debates among scholars in this issue, foreign terms in Quran and the logical justifications along with the exclusive features of Quran.

Keywords: Quran, foreign Terms, multilingualism, language

Procedia PDF Downloads 361
130 Islamic Credit Risk Management in Murabahah Financing: The Study of Islamic Banking in Malaysia

Authors: Siti Nor Amira Bt. Mohamad, Mohamad Yazis B. Ali Basah, Muhammad Ridhwan B. Ab. Aziz, Khairil Faizal B. Khairi, Mazlynda Bt. Md. Yusuf, Hisham B. Sabri

Abstract:

The understanding of risk and the concept of it occurs associated in Islamic financing was well-known in the financial industry by the using of Profit-and-Loss Sharing (PLS). It was presently in any Islamic financial transactions in order to comply with shariah rules. However, the existence of risk in Murabahah contract of financing is an ability that the counterparty is unable to complete its obligations within the agreed terms. Therefore, it is called as credit or default risk. Credit risk occurs when the client fails to make timely payment after the bank makes complete delivery of assets. Thus, it affects the growth of the bank as the banking business is in no position to have appropriate measures to cover the risk. Therefore, the bank may impose penalty on the outstanding balance. This paper aims to highlight the credit risk determinant and issues surrounding in Islamic bank in Malaysia in terms of Murabahah financing and how to manage it by using the proper techniques. Finally, it explores the credit risk management concept that might solve the problems arise. The study found that the credit risk can be managed properly by improving the use of comprehensive reference checklist of business partners on their character and past performance as well as their comprehensive database. Besides that, prevention of credit risk can be done by using collateral as security against the risk and we also argue on the Shariah guidelines and procedures should be implement coherently by the banking business because so that the risk would be control by having an effective instrument for Islamic modes of financing.

Keywords: Islamic banking, credit risk, Murabahah financing, risk mitigation

Procedia PDF Downloads 425
129 CRYPTO COPYCAT: A Fashion Centric Blockchain Framework for Eliminating Fashion Infringement

Authors: Magdi Elmessiry, Adel Elmessiry

Abstract:

The fashion industry represents a significant portion of the global gross domestic product, however, it is plagued by cheap imitators that infringe on the trademarks which destroys the fashion industry's hard work and investment. While eventually the copycats would be found and stopped, the damage has already been done, sales are missed and direct and indirect jobs are lost. The infringer thrives on two main facts: the time it takes to discover them and the lack of tracking technologies that can help the consumer distinguish them. Blockchain technology is a new emerging technology that provides a distributed encrypted immutable and fault resistant ledger. Blockchain presents a ripe technology to resolve the infringement epidemic facing the fashion industry. The significance of the study is that a new approach leveraging the state of the art blockchain technology coupled with artificial intelligence is used to create a framework addressing the fashion infringement problem. It transforms the current focus on legal enforcement, which is difficult at best, to consumer awareness that is far more effective. The framework, Crypto CopyCat, creates an immutable digital asset representing the actual product to empower the customer with a near real time query system. This combination emphasizes the consumer's awareness and appreciation of the product's authenticity, while provides real time feedback to the producer regarding the fake replicas. The main findings of this study are that implementing this approach can delay the fake product penetration of the original product market, thus allowing the original product the time to take advantage of the market. The shift in the fake adoption results in reduced returns, which impedes the copycat market and moves the emphasis to the original product innovation.

Keywords: fashion, infringement, blockchain, artificial intelligence, textiles supply chain

Procedia PDF Downloads 237
128 An Unsupervised Domain-Knowledge Discovery Framework for Fake News Detection

Authors: Yulan Wu

Abstract:

With the rapid development of social media, the issue of fake news has gained considerable prominence, drawing the attention of both the public and governments. The widespread dissemination of false information poses a tangible threat across multiple domains of society, including politics, economy, and health. However, much research has concentrated on supervised training models within specific domains, their effectiveness diminishes when applied to identify fake news across multiple domains. To solve this problem, some approaches based on domain labels have been proposed. By segmenting news to their specific area in advance, judges in the corresponding field may be more accurate on fake news. However, these approaches disregard the fact that news records can pertain to multiple domains, resulting in a significant loss of valuable information. In addition, the datasets used for training must all be domain-labeled, which creates unnecessary complexity. To solve these problems, an unsupervised domain knowledge discovery framework for fake news detection is proposed. Firstly, to effectively retain the multidomain knowledge of the text, a low-dimensional vector for each news text to capture domain embeddings is generated. Subsequently, a feature extraction module utilizing the unsupervisedly discovered domain embeddings is used to extract the comprehensive features of news. Finally, a classifier is employed to determine the authenticity of the news. To verify the proposed framework, a test is conducted on the existing widely used datasets, and the experimental results demonstrate that this method is able to improve the detection performance for fake news across multiple domains. Moreover, even in datasets that lack domain labels, this method can still effectively transfer domain knowledge, which can educe the time consumed by tagging without sacrificing the detection accuracy.

Keywords: fake news, deep learning, natural language processing, multiple domains

Procedia PDF Downloads 56
127 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network

Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar

Abstract:

Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.

Keywords: Bitcoin network, propagation delay, clustering, scalability

Procedia PDF Downloads 94
126 Blockchain: Institutional and Technological Disruptions in the Public Sector

Authors: Maria Florencia Ferrer, Saulo Fabiano Amancio-Vieira

Abstract:

The use of the blockchain in the public sector is present today and no longer the future of disruptive institutional and technological models. There are still some cultural barriers and resistance to the proper use of its potential. This research aims to present the strengths and weaknesses of using a public-permitted and distributed network in the context of the public sector. Therefore, bibliographical/documentary research was conducted to raise the main aspects of the studied platform, focused on the use of the main demands of the public sector. The platform analyzed was LACChain, which is a global alliance composed of different actors in the blockchain environment, led by the Innovation Laboratory of the Inter-American Development Bank Group (IDB Lab) for the development of the blockchain ecosystem in Latin America and the Caribbean. LACChain provides blockchain infrastructure, which is a distributed ratio technology (DLT). The platform focuses on two main pillars: community and infrastructure. It is organized as a consortium for the management and administration of an infrastructure classified as public, following the ISO typologies (ISO / TC 307). It is, therefore, a network open to any participant who agrees with the established rules, which are limited to being identified and complying with the regulations. As benefits can be listed: public network (open to all), decentralized, low transaction cost, greater publicity of transactions, reduction of corruption in contracts / public acts, in addition to improving transparency for the population in general. It is also noteworthy that the platform is not based on cryptocurrency and is not anonymous; that is, it is possible to be regulated. It is concluded that the use of record platforms, such as LACChain, can contribute to greater security on the part of the public agent in the migration process of their informational applications.

Keywords: blockchain, LACChain, public sector, technological disruptions

Procedia PDF Downloads 147
125 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami

Abstract:

To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.

Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption

Procedia PDF Downloads 107
124 A Deluge of Disaster, Destruction, Death and Deception: Negative News and Empathy Fatigue in the Digital Age

Authors: B. N. Emenyeonu

Abstract:

Initially identified as sensationalism in the eras of yellow journalism and tabloidization, the inclusion of news which shocks or provokes strong emotional responses among readers, viewers, and browsers has not only remained a persistent feature of journalism but has also seemingly escalated in the current climate of digital and social media. Whether in the relentless revelation of scandals in high places, profiles on people displaced by sporadic wars or natural disasters, gruesome accounts of trucks plowing into pedestrians in a city centre, or the coverage of mourners paying tributes to victims of a mass shooting, mainstream, and digital media are often awash with tragedy, tears, and trauma. While it may aim at inspiring sympathy, outrage, or even remedial reactions, it would appear that the deluge of grief and misery in the news merely generates in the audience a feeling that borders on hearing or seeing too much to care or act. This feeling also appears to be accentuated by the dizzying diffusion of social media news and views, most of whose authenticity is not easily verifiable. Through a survey of 400 regular consumers of news and an in-depth interview of 10 news managers in selected media organizations across the Middle East, this study therefore investigates public attitude to the profusion of bad news in mainstream and digital media. Among other targets, it examines whether the profusion of bad news generates empathy fatigue among the audience and, if so, whether there is any association between biographic variables (profession, age, and gender) and an inclination to empathy fatigue. It also seeks to identify which categories of bad news and media are most likely to drag the audience into indifference. In conclusion, the study discusses the implications of the findings for mass-mediated advocacies such as campaigns against conflicts, corruption, nuclear threats, terrorism, gun violence, sexual crimes, and human trafficking, among other threats to humanity.

Keywords: digital media, empathy fatigue, media campaigns, news selection

Procedia PDF Downloads 31
123 A Cost Effective Approach to Develop Mid-Size Enterprise Software Adopted the Waterfall Model

Authors: Mohammad Nehal Hasnine, Md Kamrul Hasan Chayon, Md Mobasswer Rahman

Abstract:

Organizational tendencies towards computer-based information processing have been observed noticeably in the third-world countries. Many enterprises are taking major initiatives towards computerized working environment because of massive benefits of computer-based information processing. However, designing and developing information resource management software for small and mid-size enterprises under budget costs and strict deadline is always challenging for software engineers. Therefore, we introduced an approach to design mid-size enterprise software by using the Waterfall model, which is one of the SDLC (Software Development Life Cycles), in a cost effective way. To fulfill research objectives, in this study, we developed mid-sized enterprise software named “BSK Management System” that assists enterprise software clients with information resource management and perform complex organizational tasks. Waterfall model phases have been applied to ensure that all functions, user requirements, strategic goals, and objectives are met. In addition, Rich Picture, Structured English, and Data Dictionary have been implemented and investigated properly in engineering manner. Furthermore, an assessment survey with 20 participants has been conducted to investigate the usability and performance of the proposed software. The survey results indicated that our system featured simple interfaces, easy operation and maintenance, quick processing, and reliable and accurate transactions.

Keywords: end-user application development, enterprise software design, information resource management, usability

Procedia PDF Downloads 412
122 Detection of JC Virus DNA and T-Ag Expression in a Subpopulation of Tunisian Colorectal Carcinomas

Authors: Wafa Toumi, Alessandro Ripalti, Luigi Ricciardiello, Dalila Gargouri, Jamel Kharrat, Abderraouf Cherif, Ahmed Bouhafa, Slim Jarboui, Mohamed Zili, Ridha Khelifa

Abstract:

Background & aims: Colorectal cancer (CRC) is one of the most common malignancies throughout the world. Several risk factors, both genetic and environmental, including viral infections, have been linked to colorectal carcinogenesis. A few studies report the detection of human polyomavirus JC (JCV) DNA and transformation antigen (T-Ag) in a fraction of the colorectal tumors studied and suggest an association of this virus with CRC. In order to investigate whether such an association of JCV with CRC will hold in a different epidemiological setting, we looked for the presence of JCV DNA and T-Ag expression in a group of Tunisian CRC patients. Methods: Fresh colorectal mucosa biopsies were obtained from 17 healthy volunteers and from both colorectal tumors and adjacent normal tissues of 47 CRC patients. DNA was extracted from fresh biopsies or from formalin-fixed, paraffin-embedded tissue sections using the Invitrogen Purelink Genomic DNA mini Kit. A simple PCR and a nested PCR were used to amplify a region of the T-Ag gene. The obtained PCR products revealed a 154 bp and a 98 bp bands, respectively. Specificity was confirmed by sequencing of the PCR products. T-Ag expression was determined by immunohistochemical staining using a mouse monoclonal antibody (clone PAb416) directed against SV40 T-Ag that cross reacts with JCV T-Ag. Results: JCV DNA was found in 12 (25%) and 22 (46%) of the CRC tumors by simple PCR and by nested PCR, respectively. All paired adjacent normal mucosa biopsies were negative for viral DNA. Sequencing of the DNA amplicons obtained confirmed the authenticity of T-Ag sequences. Immunohistochemical staining showed nuclear T-Ag expression in all 22 JCV DNA- positive samples and in 3 additional tumor samples which appeared DNA-negative by PCR. Conclusions: These results suggest an association of JCV with a subpopulation of Tunisian colorectal tumors.

Keywords: colorectal cancer, immunohistochemistry, Polyomavirus JC, PCR

Procedia PDF Downloads 339
121 Using Customer Satisfaction to Help Achieve Sustainable Development Goals in the Islamic Economy: A Quantitative Case Study from Amman, Jordan

Authors: Sarah A. Tobin

Abstract:

Social justice outcomes, derived from customer satisfaction, serve as a main pathway and conduit for achieving Sustainable Development Goals (SDGs) because they prompt democratizing and socially-inclusive effects that are consistent with Islamic economic values. This paper argues that achieving higher levels of social justice and the SGDs is possible only through the realization of Islamic banking and finance customer satisfaction that aligns with Islamic values in the tradition of the Shari`a (or Islamic law). Through this key manifestation of Shari`a in the banks, social justice aims of achieving SDGs become possible. This paper utilizes a case study of a large-scale survey (N=127) comparing customer satisfaction between a conventional and an Islamic bank in Amman, Jordan. Based on a series of linear regressions, the statistically-significant findings suggest that when overall customer satisfaction is high, customers are more likely to become empowered citizens demanding inclusive, quality services and corruption-free management, as well as attribute their experiences to the Islamic nature of the financial endeavors. Social justice interests and expectations increase (and SDGs are more likely met) when a customer has high levels of satisfaction. The paper concludes with policy recommendations for Islamic financial institutions that enhance customer service experiences for better achieving the social justice aims of the Islamic economy and SDGs, including transparency in transactions, exemplary customer service and follow up, and attending to Islamic values in the aesthetics of bank.

Keywords: customer satisfaction, Islamic economy, social justice, sustainable development goals

Procedia PDF Downloads 315
120 Quality Assessment of New Zealand Mānuka Honeys Using Hyperspectral Imaging Combined with Deep 1D-Convolutional Neural Networks

Authors: Hien Thi Dieu Truong, Mahmoud Al-Sarayreh, Pullanagari Reddy, Marlon M. Reis, Richard Archer

Abstract:

New Zealand mānuka honey is a honeybee product derived mainly from Leptospermum scoparium nectar. The potent antibacterial activity of mānuka honey derives principally from methylglyoxal (MGO), in addition to the hydrogen peroxide and other lesser activities present in all honey. MGO is formed from dihydroxyacetone (DHA) unique to L. scoparium nectar. Mānuka honey also has an idiosyncratic phenolic profile that is useful as a chemical maker. Authentic mānuka honey is highly valuable, but almost all honey is formed from natural mixtures of nectars harvested by a hive over a time period. Once diluted by other nectars, mānuka honey irrevocably loses value. We aimed to apply hyperspectral imaging to honey frames before bulk extraction to minimise the dilution of genuine mānuka by other honey and ensure authenticity at the source. This technology is non-destructive and suitable for an industrial setting. Chemometrics using linear Partial Least Squares (PLS) and Support Vector Machine (SVM) showed limited efficacy in interpreting chemical footprints due to large non-linear relationships between predictor and predictand in a large sample set, likely due to honey quality variability across geographic regions. Therefore, an advanced modelling approach, one-dimensional convolutional neural networks (1D-CNN), was investigated for analysing hyperspectral data for extraction of biochemical information from honey. The 1D-CNN model showed superior prediction of honey quality (R² = 0.73, RMSE = 2.346, RPD= 2.56) to PLS (R² = 0.66, RMSE = 2.607, RPD= 1.91) and SVM (R² = 0.67, RMSE = 2.559, RPD=1.98). Classification of mono-floral manuka honey from multi-floral and non-manuka honey exceeded 90% accuracy for all models tried. Overall, this study reveals the potential of HSI and deep learning modelling for automating the evaluation of honey quality in frames.

Keywords: mānuka honey, quality, purity, potency, deep learning, 1D-CNN, chemometrics

Procedia PDF Downloads 107
119 Self-Organizing Maps for Credit Card Fraud Detection

Authors: ChunYi Peng, Wei Hsuan CHeng, Shyh Kuang Ueng

Abstract:

This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.

Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies

Procedia PDF Downloads 23
118 Self-Organizing Maps for Credit Card Fraud Detection and Visualization

Authors: Peng, Chun-Yi, Chen, Wei-Hsuan, Ueng, Shyh-Kuang

Abstract:

This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.

Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies

Procedia PDF Downloads 25
117 Assessment of the Level of Awareness and Adoption of International Public Sector Accounting Standards (IPSAS) in the Curriculum of Accounting Education in Selected Tertiary Institutions in Ondo and Ekiti States Nigeria

Authors: Olurankinse Felix, Fatukasi Bayo

Abstract:

Over the years, the medium through which government financial statements are prepared has been on cash basis of accounting. This basis was characterised with some shortcomings ranging from non- disclosure of quality and detail information relating to government financial transactions, ill informed assessment of government resource allocation, weak internal control system that inhibits accountability and transparency and non- standardisation of reporting ethics for the purpose of comparability. The emergence of international public sector accounting standards (IPSAS) is therefore seen as leverage as it aims at improving the quality of general purpose financial reporting by public sector entities thereby increasing transparency and accountability. IPSAS is a new concept that all institutions must fully adopts. The crux of this paper is to find out to what extent is the awareness and adoption of IPSAS to both students and lecturers interms of teaching, learning and inclusion in the curriculum of accounting education. The methodology involved the use of well designed questionnaires to obtain information from some selected institutions and the analysis was done with the use of maximum likelihood ordered probit regression. The result of the analysis shows that despite a high level of sensitisation/awareness of IPSAS, the degree of adoption is still low due to low level of desirability by students and lecturers. The paper recommend the need for the government to enact an enabling law to back up the adoption and more importantly to institute appropriate sanctions to ensure full compliance.

Keywords: assessment, awareness, adoption, IPSAS, cash basis

Procedia PDF Downloads 451
116 The Reality of E-Commerce in Egypt and Its Role in Enhancing Companies' Competitiveness

Authors: Esam El Gohary

Abstract:

— The companies’ ability to survive and compete in the fierce competition is determined by its competitiveness level. With the spread of information technology use and appearance of online shopping, it became crucial for companies to adopt e-commerce system to increase its competitiveness. This paper was conducted with the purpose of determine how increasing the service value through e-commerce factors (competitive strategy, ICT infrastructures, logistics, security, human resources and innovation) can enhance companies' competitiveness. The problem of this paper is summarized in the absence of the thorough awareness of e-commerce benefits for business owners and customers, as well as how to reduce the intangibility attributes of e-commerce. For this purpose this paper describes the e-commerce in Egypt and its success factors (infrastructures, legal and regulatory environment, human resources and innovation), as well as displays the barriers of such factor, to investigate the significant of these factors on increasing service value and enhance companies' competitiveness. This paper revealed that e-commerce companies have many opportunities to enhance its competitiveness in Egypt, which is enhanced by several factors. The most important factors are “strong ICT infrastructure, qualified and skilled human resources, in addition to the distinctive logistics that distinguish Egypt due to its location, strong legal and regulatory environment and Innovation, as well as the competitive strategy. As well as, companies encounter several threats such as; the lack of infrastructures and logistics in rural areas, the absence of the inclusive understanding and awareness of e-commerce, fear from e-payment transactions and fraud, the ambiguity and burdensome of customs. Through the research findings several recommendations were introduced to both government and companies to overcome threats and exploit opportunities to improve performance and enhance companies' competitiveness.

Keywords: e-commerce competitiveness, e-commerce factors, e-commerce in Egypt, information technology

Procedia PDF Downloads 82
115 Characteristics and Guiding Strategies of College Students' Online Discourse: Based on the Analysis of One Student Forum

Authors: Hanwei Cheng, Chengbei Xu, Yijie Wang

Abstract:

More and more college students are accustomed to surfing the Internet everyday. As community members, college students have ability to express opinions and participate in social affairs, they not only accept information passively, but also voice their concerns on the Internet. We interpret the online discourses featured with anonymization, so it helps us more effectively and conveniently understand the behaviors and thoughts of college students, and educators can thus grasp the scales and directions in guiding online language. We analyzed online comments in both content and form aspects in one student forum (named Dandan, the BNU’s campus forum), and through methods of literature review and interview, we found that in term of content, college students pay attention to practical information online, emphasize on personal development and pursue hot issues; in term of form, college students' online language displays cross-border quality sometimes under the general feature of normative, and they often explore a certain topic in the form of question or discussion, and they like to show feelings in ironic and stream-of-consciousness ways. It is argued that college students intend to establish a community to facilitate personal development and meet emotional needs through the student forum, and by making comments at the forum they are also able to get involved in public affairs. We should pay attention to problems of college students' online discourse, such as boundary issues (like informal advertisement and information authenticity), emotional issues and the spread of gossip. Some possible solutions to solving online discourse problems can be applied, like we can improve access systems of student forum, clarify principles of Internet langue use, change oversimplified management approaches and use some other tactics, in order to form a mechanism of student self-regulation, also deepen the trust and cooperation between school administrators and students.

Keywords: online language, youth discourse, content and form, implication and strategy

Procedia PDF Downloads 115
114 Artificial intelligence and Law

Authors: Mehrnoosh Abouzari, Shahrokh Shahraei

Abstract:

With the development of artificial intelligence in the present age, intelligent machines and systems have proven their actual and potential capabilities and are mindful of increasing their presence in various fields of human life in the fields of industry, financial transactions, marketing, manufacturing, service affairs, politics, economics and various branches of the humanities .Therefore, despite the conservatism and prudence of law enforcement, the traces of artificial intelligence can be seen in various areas of law. Including judicial robotics capability estimation, intelligent judicial decision making system, intelligent defender and attorney strategy adjustment, dissemination and regulation of different and scattered laws in each case to achieve judicial coherence and reduce opinion, reduce prolonged hearing and discontent compared to the current legal system with designing rule-based systems, case-based, knowledge-based systems, etc. are efforts to apply AI in law. In this article, we will identify the ways in which AI is applied in its laws and regulations, identify the dominant concerns in this area and outline the relationship between these two areas in order to answer the question of how artificial intelligence can be used in different areas of law and what the implications of this application will be. The authors believe that the use of artificial intelligence in the three areas of legislative, judiciary and executive power can be very effective in governments' decisions and smart governance, and helping to reach smart communities across human and geographical boundaries that humanity's long-held dream of achieving is a global village free of violence and personalization and human error. Therefore, in this article, we are going to analyze the dimensions of how to use artificial intelligence in the three legislative, judicial and executive branches of government in order to realize its application.

Keywords: artificial intelligence, law, intelligent system, judge

Procedia PDF Downloads 91
113 The Impact of Strategic Information in Developing the Target Cost Approach to achieve Competitive Advantage

Authors: Rizgar Abdullah Sabir Jaf, Bayan Sedeeq Azeez Hussin, Dler Moosa Ahmed Karim

Abstract:

Presently, economic and technological developments are growing faster in an unparalleled way. The result of that is innovative changing a great deal of a great deal of assumption, concepts, transactions, and high of competition between companies all over the world. The title of the thesis is one of the subjects that get large concerns in the financial and business world in the present time. That is because many competitive firms have appeared in the regional and global markets and the rapid changes that covered all fields of life. The subjects of the dissertation have a special importance in making the firm's businesses succeed in general and the industrial firms especially. Thus, the basic purpose of this study is to determine whether target costing is used in the costing application process in their customer expectation, profit margin, cost and price determination, cost reduction and management operations. In today’s intensely competitive and highly volatile business environment, consistent development of low cost and high quality products meeting the functional requirements is a key to a company's survival. Companies continuously strive to reduce the costs while still producing quality products to stay ahead in the competition. Many companies have turned to target costing to achieve this objective. The results indicate that there is a significant positive relationship (at the significance level less than 0.05) between the factors competitive advantage and management accounting techniques in the firm's sample study.

Keywords: strategic information, target cost, competitive advantage, Iraqi soft drink firms

Procedia PDF Downloads 276
112 Shariah Guideline on Value-Based Intermediation Implementation in the Light of Maqasid Shariah Analysis

Authors: Muhammad Izzam Bin Mohd Khazar, Ruqayyah Binti Mohamad Ali, Nurul Atiqah Binti Yusri

Abstract:

Value-based intermediation (VBI) has been introduced by Bank Negara Malaysia (BNM) as the next strategic direction and growth driver for Islamic banking institutions. The aim of VBI is to deliver the intended outcome of Shariah through practices, conducts, and offerings that generate positive and sustainable impact to the economy, community and environment which is aligned to Maqasid Shariah in preserving the common interest of society by preventing harm and maximizing benefit. Hence, upon its implementation, VBI will experiment the current Shariah compliance treatment and revolutionise new policies and systems that can meritoriously entrench and convey the objectives of Shariah. However, discussion revolving VBI in the light of Maqasid analysis is still scarce hence further research needs to be undertaken. The idea of implementation of VBI vision into quantifiable Maqasid Shariah measurement is yet to be explored due to the nature of Maqasid that is variable. The contemporary scholars also have different views on the implementation of VBI. This paper aims to discuss on the importance of Maqasid Shariah in the current Islamic finance transactions by providing Shariah index measurement in the application of VBI. This study also intends to explore basic Shariah guidelines and parameters based on the objectives of Shariah; preservation of the five pillars (religion, life, progeny, intellect and wealth) with further elaboration on preservation of wealth under five headings: rawaj (circulation and marketability); wuduh (transparency); hifz (preservation); thabat (durability and tranquillity); and ‘adl (equity and justice). In alignment with these headings, Islamic finance can be innovated for VBI implementation, particularly in Maybank Islamic being a significant leader in the IFI market.

Keywords: Islamic Financial Institutions, Maqasid Index, Maqasid Shariah, sustainability, value-based intermediation

Procedia PDF Downloads 141
111 Ethnomedicinal Plants Used for Gastrointestinal Ailments by the People of Tribal District Kinnaur (Himachal Pradesh) India

Authors: Geeta, Richa, M. L. Sharma

Abstract:

Himachal Pradesh, a hilly State of India located in the Western Himalayas, with varied altitudinal gradients and climatic conditions, is a repository of plant diversity and the traditional knowledge associated with plants. The State is inhabited by various tribal communities who usually depend upon local plants for curing various ailments. Utilization of plant resources in their day-to-day life has been an age old practice of the people inhabiting this State. The present study pertains to the tribal district Kinnaur of Himachal Pradesh, located between 77°45’ and 79°00’35” east longitudes and between 31°05’50” and 32°05’15” north altitudes. Being a remote area with only very basic medical facilities, local people mostly use traditional herbal medicines for primary healthcare needs. Traditional healers called “Amji” are usually very secretive in revealing their medicinal knowledge to novice and pass on their knowledge to next generation orally. As a result, no written records of healing herbs are available. The aim of present study was to collect and consolidate the ethno-medicinal knowledge of local people of the district about the use of plants for treating gastrointestinal ailments. The ethnobotanical information was collected from the local practitioners, herbal healers and elderly people having rich knowledge about the medicinal herbs through semi-structured questionnaire and key informant discussions. A total 46 plant species belonging to 40 genera and 24 families have been identified which are used as cure for gastrointestinal ailments. Among the parts used for gastointestinal ailments, aerial parts (14%) were followed by the whole plant (13%), root (8%), leaves (6%), flower (5%), fruit and seed (3%) and tuber (1%). These plant species could be prioritized for conservation and subject to further studies related to phytochemical screening for their authenticity. Most of the medicinal plants of the region are collected from the wild and are often harvested for trade. Sustainable harvesting and domestication of the highly traded species from the study area is needed.

Keywords: Amji, gastrointestinal, Kinnaur, medicinal plants, traditional knowledge

Procedia PDF Downloads 370
110 Authentication and Traceability of Meat Products from South Indian Market by Species-Specific Polymerase Chain Reaction

Authors: J. U. Santhosh Kumar, V. Krishna, Sebin Sebastian, G. S. Seethapathy, G. Ravikanth, R. Uma Shaanker

Abstract:

Food is one of the basic needs of human beings. It requires the normal function of the body part and a healthy growth. Recently, food adulteration increases day by day to increase the quantity and make more benefit. Animal source foods can provide a variety of micronutrients that are difficult to obtain in adequate quantities from plant source foods alone. Particularly in the meat industry, products from animals are susceptible targets for fraudulent labeling due to the economic profit that results from selling cheaper meat as meat from more profitable and desirable species. This work presents an overview of the main PCR-based techniques applied to date to verify the authenticity of beef meat and meat products from beef species. We were analyzed 25 market beef samples in South India. We examined PCR methods based on the sequence of the cytochrome b gene for source species identification. We found all sample were sold as beef meat as Bos Taurus. However, interestingly Male meats are more valuable high price compare to female meat, due to this reason most of the markets samples are susceptible. We were used sex determination gene of cattle like TSPY(Y-encoded, testis-specific protein TSPY is a Y-specific gene). TSPY homologs exist in several mammalian species, including humans, horses, and cattle. This gene is Y coded testis protein genes, which only amplify the male. We used multiple PCR products form species-specific “fingerprints” on gel electrophoresis, which may be useful for meat authentication. Amplicons were obtained only by the Cattle -specific PCR. We found 13 market meat samples sold as female beef samples. These results suggest that the species-specific PCR methods established in this study would be useful for simple and easy detection of adulteration of meat products.

Keywords: authentication, meat products, species-specific, TSPY

Procedia PDF Downloads 349
109 Infrastructure Sharing Synergies: Optimal Capacity Oversizing and Pricing

Authors: Robin Molinier

Abstract:

Industrial symbiosis (I.S) deals with both substitution synergies (exchange of waste materials, fatal energy and utilities as resources for production) and infrastructure/service sharing synergies. The latter is based on the intensification of use of an asset and thus requires to balance capital costs increments with snowball effects (network externalities) for its implementation. Initial investors must specify ex-ante arrangements (cost sharing and pricing schedule) to commit toward investments in capacities and transactions. Our model investigate the decision of 2 actors trying to choose cooperatively a level of infrastructure capacity oversizing to set a plug-and-play offer to a potential entrant whose capacity requirement is randomly distributed while satisficing their own requirements. Capacity cost exhibits sub-additive property so that there is room for profitable overcapacity setting in the first period. The entrant’s willingness-to-pay for the access to the infrastructure is dependent upon its standalone cost and the capacity gap that it must complete in case the available capacity is insufficient ex-post (the complement cost). Since initial capacity choices are driven by ex-ante (expected) yield extractible from the entrant we derive the expected complement cost function which helps us defining the investors’ objective function. We first show that this curve is decreasing and convex in the capacity increments and that it is shaped by the distribution function of the potential entrant’s requirements. We then derive the general form of solutions and solve the model for uniform and triangular distributions. Depending on requirements volumes and cost assumptions different equilibria occurs. We finally analyze the effect of a per-unit subsidy a public actor would apply to foster such sharing synergies.

Keywords: capacity, cooperation, industrial symbiosis, pricing

Procedia PDF Downloads 184
108 Block-Chain Land Administration Technology in Nigeria: Opportunities and Challenges

Authors: Babalola Sunday Oyetayo, Igbinomwanhia Uyi Osamwonyi, Idowu T. O., Herbert Tata

Abstract:

This paper explores the potential benefits of adopting blockchain technology in Nigeria's land administration systems while also addressing the challenges and implications of its implementation in the country's unique context. Through a comprehensive literature review and analysis of existing research, the paper delves into the key attributes of blockchain that can revolutionize land administration practices, with a particular focus on simplifying land registration procedures, expediting land title issuance, and enhancing data transparency and security. The decentralized and immutable nature of blockchain offers unique advantages, instilling trust and confidence in land transactions, which are especially crucial in Nigeria's land governance landscape. However, integrating blockchain in Nigeria's land administration ecosystem presents specific challenges, necessitating a critical evaluation of technical, socio-economic, and infrastructural barriers. These challenges encompass data privacy concerns, scalability, interoperability with outdated systems, and gaining acceptance from various stakeholders. By synthesizing these insights, the paper proposes strategies tailored to Nigeria's context to optimize the benefits of blockchain adoption while addressing the identified challenges. The research findings contribute significantly to the ongoing discourse on blockchain technology in Nigeria's land governance, offering evidence-based recommendations to policymakers, land administrators, and stakeholders. Ultimately, the paper aims to promote the effective utilization of blockchain, fostering efficiency, transparency, and trust in Nigeria's land administration systems to drive sustainable development and societal progress.

Keywords: block-chain, technology, stakeholders, land registration

Procedia PDF Downloads 41
107 The Role of BPSK (Consumer Dispute Settlement Body) in the Monitoring of Standard Clause Inclusion within Indonesian Customer Protection Law

Authors: Deviana Yuanitasari

Abstract:

The rapid development of world commerce and trade nowadays has created fast-paced demand in every business activities and transactions. That also includes the need for ready to use and practical form of standard contract. For the company or business owner, the use of standard contract is an alternative way to achieve economic goals faster, effectively and efficiently. In the other hand, for the consumer the practice of using standard contract usually unfavorable, because the contract clauses usually have been defined by the company and cannot be individually negotiated. That means consumer cannot influence the substances of the contract clauses. The purpose of this study is to get deeper understanding and analyze the role of Consumer Dispute Settlement Body in the monitoring of standard clause inclusion by businesses and industries within the context of practicing consumer protection law. Furthermore, this study will focus on the procedure of sanction and the effectiveness of the sanction for the business practitioners which disregard the inclusion of the prohibited standard clause. Therefore, this study will depict the law issues and other phenomenon that related with the role of Consumer Dispute Settlement Body in monitoring the inclusion of standard clause and procedure of sanction for the business practitioners that still use exemption clause within Consumer Protection Law System. This study results that BPSK has been assigned to monitor the inclusion of standard clause and settle consumer dispute. At this stage, BPSK role is passive, which means BPSK only takes an action if there are consumer complaints. The procedure of sanction is not part of BPSK tasks, since should there be a violation of standard clause; BPSK can only ask the business practitioners to remove the prohibited clause and not give a sanction. As a result, the procedure of sanction rule for the Standard Clause violation in this context can be considered as ineffective.

Keywords: standard contract, standard clause, consumer protection law, consumer dispute settlement body

Procedia PDF Downloads 303
106 Stable Isotope Ratios Data for Tracing the Origin of Greek Olive Oils and Table Olives

Authors: Efthimios Kokkotos, Kostakis Marios, Beis Alexandros, Angelos Patakas, Antonios Avgeris, Vassilios Triantafyllidis

Abstract:

H, C, and O stable isotope ratios were measured in different olive oils and table olives originating from different regions of Greece. In particular, the stable isotope ratios of different olive oils produced in the Lakonia region (Peloponesse – South Greece) from different varieties, i.e., cvs ‘Athinolia’ and ‘koroneiki’, were determined. Additionally, stable isotope ratios were also measured in different table olives (cvs ‘koroneiki’ and ‘kalamon’) produced in the same region (Messinia). The aim of this study was to provide sufficient isotope ratio data regarding each variety and region of origin that could be used in discriminative studies of oil olives and table olives produced by different varieties in other regions. In total, 97 samples of olive oil (cv ‘Athinolia’ and ‘koroneiki’) and 67 samples of table olives (cvs ‘kalmon’ and ‘koroneiki’) collected during two consecutive sampling periods (2021-2022 and 2022-2023) were measured. The C, H, and O isotope ratios were measured using Isotope Ratio Mass Spectrometry (IRMS), and the results obtained were analyzed using chemometric techniques. The measurements of the isotope ratio analyses were expressed in permille (‰) using the delta δ notation (δ=Rsample/Rstandard-1, where Rsample and Rstandardis represent the isotope ratio of sample and standard). Results indicate that stable isotope ratios of C, H, and O ranged between -28,5+0,45‰, -142,83+2,82‰, 25,86+0,56‰ and -29,78+0,71‰, -143,62+1,4‰, 26,32+0,55‰ in olive oils produced in Lakonia region from ‘Athinolia’ and ‘koroneiki ‘varieties, respectively. The C, H, and O values from table olives originated from Messinia region were -28,58+0,63‰, -138,09+3,27‰, 25,45+0,62‰ and -29,41+0,59‰,-137,67+1,15‰, 24,37+0,6‰ for ‘Kalamon’ and ‘koroneiki’ olives respectively. Acknowledgments: This research has been co-financed by the European Regional Development Fund of the European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship and Innovation, under the call RESEARCH—CREATE—INNOVATE (Project code: T2EDK-02637; MIS 5075094, Title: ‘Innovative Methodological Tools for Traceability, Certification and Authenticity Assessment of Olive Oil and Olives’).

Keywords: olive oil, table olives, Isotope ratio, IRMS, geographical origin

Procedia PDF Downloads 26
105 Customer’s Choice of a Bank: An Empirical Enquiry from the Banked Ghanaian

Authors: Emmanuel Larbi Offei, Felix Agyei-Sasu, Maura Naa Densua Ashong

Abstract:

Ghana has 26 universal banks and several banking and non-banking financial institutions operating in the country. The growing number of banks has heightened competition among banks to attract and retain customers more customers to ensure sustainability. Hence the need to identify and understand factors that influences customers’ choice of banks cannot be overemphasised. This study investigates the determinants of bank selection criteria by banking customers in Ghana. Four banks were purposively sampled for this study namely Barclays, Standard Chartered, Sahel Sahara and Unibank. Convenience sampling was then used to select 114 bank customers in Accra and interviewed. Questionnaires were used to collect data that were analysed in tables and charts with the use of STATA software. The findings of the study revealed that quick/prompt services and complaint handling, safety of funds, networked branches, easy access to functional Automated Teller Machines (ATMs) and low/moderate service charges were the major determinants of customers’ choice of banks. The results further show that 89.5 percent of all deposits are held in either current or savings accounts. About 22.1 percent of the respondents indicated that they have plans of changing their banks in the near future because they are not satisfied with their banks. A gender analysis of the choice criteria showed differences between the choice criteria of the male as compared to the female. The study recommends that banks in Ghana should focus on products and policies that will not compromise on the safety of funds of their customers. Again, banks must address customer complaints and dissatisfactions as promptly as possible by taking pragmatic steps to address administrative bureaucracies and infrastructural challenges that prolong the duration of banking transactions.

Keywords: Ghana, banks, determinants, customers’ choice, competition

Procedia PDF Downloads 413
104 Rethinking the Use of Online Dispute Resolution in Resolving Cross-Border Small E-Disputes in EU

Authors: Sajedeh Salehi, Marco Giacalone

Abstract:

This paper examines the role of existing online dispute resolution (ODR) mechanisms and their effects on ameliorating access to justice – as a protected right by Art. 47 of the EU Charter of Fundamental Rights – for consumers in EU. The major focus of this study will be on evaluating ODR as the means of dispute resolution for Business-to-Consumer (B2C) cross-border small claims raised in e-commerce transactions. The authors will elaborate the consequences of implementing ODR methods in the context of recent developments in EU regulatory safeguards on promoting consumer protection. In this analysis, both non-judiciary and judiciary ODR redress mechanisms are considered, however, the significant consideration is given to – obligatory and non-obligatory – judiciary ODR methods. For that purpose, this paper will particularly investigate the impact of the EU ODR platform as well as the European Small Claims Procedure (ESCP) Regulation 861/2007 and their role on accelerating the access to justice for consumers in B2C e-disputes. Although, considerable volume of research has been carried out on ODR for consumer claims, rather less (or no-) attention has been paid to provide a combined doctrinal and empirical evaluation of ODR’s potential in resolving cross-border small e-disputes, in EU. Hence, the methodological approach taken in this study is a mixed methodology based on qualitative (interviews) and quantitative (surveys) research methods which will be mainly based on the data acquired through the findings of the Small Claims Analysis Net (SCAN) project. This project contributes towards examining the ESCP Regulation implementation and efficiency in providing consumers with a legal watershed through using the ODR for their transnational small claims. The outcomes of this research may benefit both academia and policymakers at national and international level.

Keywords: access to justice, consumers, e-commerce, small e-Disputes

Procedia PDF Downloads 113
103 Understanding Profit Shifting by Multinationals in the Context of Cross-Border M&A: A Methodological Exploration

Authors: Michal Friedrich

Abstract:

Cross-border investment has never been easier than in today’s global economy. Despite recent initiatives tightening the international tax landscape, profit shifting and tax optimization by multinational entities (MNEs) in the context of cross-border M&A remain persistent and complex phenomena that warrant in-depth exploration. By synthesizing the outcomes of existing research, this study aims to first provide a methodological framework for identifying MNEs’ profit-shifting behavior and quantifying its fiscal impacts via various macroeconomic and microeconomic approaches. The study also proposes additional methods and qualitative/quantitative measures for extracting insight into the profit shifting behavior of MNEs in the context of their M&A activities at industry and entity levels. To develop the proposed methods, this study applies the knowledge of international tax laws and known profit shifting conduits (incl. dividends, interest, and royalties) on several model cases/types of cross-border acquisitions and post-acquisition integration activities by MNEs and highlights important factors that encourage or discourage tax optimization. Follow-up research is envisaged to apply the methods outlined in this study on published data on real-world M&A transactions to gain practical country-by-country, industry and entity-level insights. In conclusion, this study seeks to contribute to the ongoing discourse on profit shifting by providing a methodological toolkit for exploring profit shifting tendencies MNEs in connection with their M&A activities and to serve as a backbone for further research. The study is expected to provide valuable insight to policymakers, tax authorities, and tax professionals alike.

Keywords: BEPS, cross-border M&A, international taxation, profit shifting, tax optimization

Procedia PDF Downloads 45