Search results for: authenticity of transactions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 431

Search results for: authenticity of transactions

401 Forensic Methods Used for the Verification of the Authenticity of Prints

Authors: Olivia Rybak-Karkosz

Abstract:

This paper aims to present the results of scientific research on methods of forging art prints and their elements, such as signature or provenance and forensic science methods that might be used to verify their authenticity. In the last decades, the art market has observed significant interest in purchasing prints. They are considered an economical alternative to paintings and a considerable investment. However, the authenticity of an art print is difficult to establish as similar visual effects might be achieved with drawings or xerox. The latter is easy to make using a home printer. They are then offered on flea markets or internet auctions as genuine prints. This probable ease of forgery and, at the same time, the difficulty of distinguishing art print techniques were the main reasons why this research was undertaken. A lack of scientific methods dedicated to disclosing a forgery encouraged the author to verify the possibility of using forensic science's methods known and used in other fields of expertise. This research methodology consisted of completing representative forgery samples collected in selected museums based in Poland and a few in Germany and Austria. That allowed the author to present a typology of methods used to forge art prints. Given that one of the most famous graphic design examples is bills and securities, it seems only appropriate to propose in print verification the usage of methods of detecting counterfeit currency. These methods contain an examination of ink, paper, and watermarks. On prints, additionally, signatures and imprints of stamps, etc., are forged as well. So the examination should be completed with handwriting examination and forensic sphragistics. The paper contains a stipulation to conduct a complex analysis of authenticity with the participation of an art restorer, art historian, and forensic expert as head of this team.

Keywords: art forgery, examination of an artwork, handwriting analysis, prints

Procedia PDF Downloads 98
400 Fraud Detection in Credit Cards with Machine Learning

Authors: Anjali Chouksey, Riya Nimje, Jahanvi Saraf

Abstract:

Online transactions have increased dramatically in this new ‘social-distancing’ era. With online transactions, Fraud in online payments has also increased significantly. Frauds are a significant problem in various industries like insurance companies, baking, etc. These frauds include leaking sensitive information related to the credit card, which can be easily misused. Due to the government also pushing online transactions, E-commerce is on a boom. But due to increasing frauds in online payments, these E-commerce industries are suffering a great loss of trust from their customers. These companies are finding credit card fraud to be a big problem. People have started using online payment options and thus are becoming easy targets of credit card fraud. In this research paper, we will be discussing machine learning algorithms. We have used a decision tree, XGBOOST, k-nearest neighbour, logistic-regression, random forest, and SVM on a dataset in which there are transactions done online mode using credit cards. We will test all these algorithms for detecting fraud cases using the confusion matrix, F1 score, and calculating the accuracy score for each model to identify which algorithm can be used in detecting frauds.

Keywords: machine learning, fraud detection, artificial intelligence, decision tree, k nearest neighbour, random forest, XGBOOST, logistic regression, support vector machine

Procedia PDF Downloads 117
399 Interpretation of Heritage Revitalization

Authors: Jarot Mahendra

Abstract:

The primary objective of this paper is to provide a view in the interpretation of the revitalization of heritage buildings. This objective is achieved by analyzing the concept of interpretation that is oriented in the perspective of law, urban spatial planning, and stakeholder perspective, and then develops the theoretical framework of interpretation in the cultural resources management through issues of identity, heritage as a process, and authenticity in heritage. The revitalization of heritage buildings with the interpretation of these three issues is that interpretation can be used as a communication process to express the meaning and relation of heritage to the community so as to avoid the conflict that will arise and develop as a result of different perspectives of stakeholders. Using case studies in Indonesia, this study focuses on the revitalization of heritage sites in the National Gallery of Indonesia (GNI). GNI is a cultural institution that uses several historical buildings that have been designated as heritage and have not been designated as a heritage according to the regulations applicable in Indonesia, in carrying out its function as the center of Indonesian art development and art museums. The revitalization of heritage buildings is taken as a step to meet space needs in running the current GNI function. In the revitalization master plan, there are physical interventions on the building of heritage and the removal of some historic buildings which will then be built new buildings at that location. The research matrix was used to map out the main elements of the study (the concept of GNI revitalization, heritage as identity, heritage as a process, and authenticity in the heritage). Expert interviews and document studies are the main tools used in collecting data. Qualitative data is then analyzed through content analysis and template analysis. This study identifies the significance of historic buildings (heritage buildings and buildings not defined as heritage) as an important value of history, architecture, education, and culture. The significance becomes the basis for revisiting the revitalization master plan which is then reviewed according to applicable regulations and the spatial layout of Jakarta. The interpretation that is built is (1) GNI is one of the elements of the embodiment of the National Cultural Center in the context of the region, where there are National Monument, National Museum and National Library in the same area, so the heritage not only gives identity to the past culture but the culture of current community; (2) The heritage should be seen as a dynamic cultural process towards the cultural change of community, where heritage must develop along with the urban development, so that the heritage buildings can remain alive and side by side with modern buildings but still observe the principles of preservation of heritage; (3) The authenticity of heritage should be able to balance the cultural heritage conservation approach with urban development, where authenticity can serve as a 'Value Transmitter' so that authenticity can be used to evaluate, preserve and manage heritage buildings by considering tangible and intangible aspects.

Keywords: authenticity, culture process, identity, interpretation, revitalization

Procedia PDF Downloads 123
398 Awareness about Authenticity of Health Care Information from Internet Sources among Health Care Students in Malaysia: A Teaching Hospital Study

Authors: Renjith George, Preethy Mary Donald

Abstract:

Use of internet sources to retrieve health care related information among health care professionals has increased tremendously as the accessibility to internet is made easier through smart phones and tablets. Though there are huge data available at a finger touch, it is doubtful whether all the sources providing health care information adhere to evidence based practice. The objective of this survey was to study the prevalence of use of internet sources to get health care information, to assess the mind-set towards the authenticity of health care information available via internet sources and to study the awareness about evidence based practice in health care among medical and dental students in Melaka-Manipal Medical College. The survey was proposed as there is limited number of studies reported in the literature and this is the first of its kind in Malaysia. A cross sectional survey was conducted among the medical and dental students of Melaka-Manipal Medical College. A total of 521 students including medical and dental students in their clinical years of undergraduate study participated in the survey. A questionnaire consisting of 14 questions were constructed based on data available from the published literature and focused group discussion and was pre-tested for validation. Data analysis was done using SPSS. The statistical analysis of the results of the survey proved that the use of internet resources for health care information are equally preferred over the conventional resources among health care students. Though majority of the participants verify the authenticity of information from internet sources, there was considerable percentage of candidates who feels that all the information from the internet can be utilised for clinical decision making or were not aware about the need of verification of authenticity of such information. 63.7 % of the participants rely on evidence based practice in health care for clinical decision making while 34.2 % were not aware about it. A minority of 2.1% did not agree with the concept of evidence based practice. The observations of the survey reveals the increasing use of internet resources for health care information among health care students. The results warrants the need to move towards evidence based practice in health care as all health care information available online may not be reliable. The health care person should be judicious while utilising the information from such resources for clinical decision making.

Keywords: authenticity, evidence based practice, health care information, internet

Procedia PDF Downloads 417
397 Incorporation of Hibah as a Catalyst for Channelling Profits and Compensations in Islamic Transactions

Authors: Ameen Alshugaa, Farrukh Habib

Abstract:

Shariah (the Islamic law) sanctions a plethora of profit-sharing arrangements for financial transactions. However, when it comes to the practice of Islamic banking, it is felt by the scholars and practitioners that many of these arrangements often fail to compensate different parties of a financial transaction compared to conventional banking, due to the Riba (interest / usury) element. This issue is caused by the parties inability to codify these compensations in any contract so as to avoid Riba. Here, hibah (gift) may be regarded as one of the solutions. In essence, hibah is a unilateral charity contract where a party voluntarily gives away something to another party without any counter value. This paper attempts to analyse theoretical and practical aspects of hibah from the perspective of Islamic law, enunciating its legality and detailing its allowance in Islamic banking. It also discusses several practices evaluating the role of hibah in resolving issues related to Riba. In particular, these practices demonstrate the validity of hibah as a way to distribute revenues and compensate parties in Islamic financial transactions, while achieving competitive advantage over conventional banking, and avoiding the element of Riba.

Keywords: hibah (gift), Islamic Finance, Islamic Law of Contract, profit distribution, Shariah

Procedia PDF Downloads 270
396 Efficient Fuzzy Classified Cryptographic Model for Intelligent Encryption Technique towards E-Banking XML Transactions

Authors: Maher Aburrous, Adel Khelifi, Manar Abu Talib

Abstract:

Transactions performed by financial institutions on daily basis require XML encryption on large scale. Encrypting large volume of message fully will result both performance and resource issues. In this paper a novel approach is presented for securing financial XML transactions using classification data mining (DM) algorithms. Our strategy defines the complete process of classifying XML transactions by using set of classification algorithms, classified XML documents processed at later stage using element-wise encryption. Classification algorithms were used to identify the XML transaction rules and factors in order to classify the message content fetching important elements within. We have implemented four classification algorithms to fetch the importance level value within each XML document. Classified content is processed using element-wise encryption for selected parts with "High", "Medium" or “Low” importance level values. Element-wise encryption is performed using AES symmetric encryption algorithm and proposed modified algorithm for AES to overcome the problem of computational overhead, in which substitute byte, shift row will remain as in the original AES while mix column operation is replaced by 128 permutation operation followed by add round key operation. An implementation has been conducted using data set fetched from e-banking service to present system functionality and efficiency. Results from our implementation showed a clear improvement in processing time encrypting XML documents.

Keywords: XML transaction, encryption, Advanced Encryption Standard (AES), XML classification, e-banking security, fuzzy classification, cryptography, intelligent encryption

Procedia PDF Downloads 377
395 Integrating Cost-Benefit Assessment and Contract Design to Support Industrial Symbiosis Deployment

Authors: Robin Molinier

Abstract:

Industrial symbiosis (I.S) is the realization of Industrial Ecology (I.E) principles in production systems in function. I.S consists in the use of waste materials, fatal energy, recirculated utilities and infrastructure/service sharing as resources for production. Environmental benefits can be achieved from resource conservation but economic profitability is required by the participating actors. I.S indeed involves several actors with their own objectives and resources so that each one must be satisfied by ex-ante arrangements to commit toward I.S execution (investments and transactions). Following the Resource-Based View of transactions we build a modular framework to assess global I.S profitability and to specify each actor’s contributions to costs and benefits in line with their resource endowments and performance requirements formulations. I.S projects specificities implied by the need for customization (asset specificity, non-homogeneity) induce the use of long-term contracts for transactions following Transaction costs economics arguments. Thus we propose first a taxonomy of costs and value drivers for I.S and an assignment to each actor of I.S specific risks that we identified as load profiles mismatch, quality problems and value fluctuations. Then appropriate contractual guidelines (pricing, cost sharing and warranties) that support mutual profitability are derived from the detailed identification of contributions by the cost-benefits model. This analytical framework helps identifying what points to focus on when bargaining over contracting for transactions and investments. Our methodology is applied to I.S archetypes raised from a literature survey on eco-industrial parks initiatives and practitioners interviews.

Keywords: contracts, cost-benefit analysis, industrial symbiosis, risks

Procedia PDF Downloads 315
394 Promoting Authenticity in Employer Brands to Address the Global-Local Problem in Complex Organisations: The Case of a Developing Country

Authors: Saud Al Taj

Abstract:

Employer branding is considered as a useful tool for addressing the global-local problem facing complex organisations that have operations scattered across the globe and face challenges of dealing with the local environment alongside. Despite being an established field of study within the Western developed world, there is little empirical evidence concerning the relevance of employer branding to global companies that operate in the under-developed economies. This paper fills this gap by gaining rich insight into the implementation of employer branding programs in a foreign multinational operating in Pakistan dealing with the global-local problem. The study is qualitative in nature and employs semi-structured and focus group interviews with senior/middle managers and local frontline employees to deeply examine the phenomenon in case organisation. Findings suggest that authenticity is required in employer brands to enable them to respond to the local needs thereby leading to the resolution of the global-local problem. However, the role of signaling theory is key to the development of authentic employer brands as it stresses on the need to establish an efficient and effective signaling environment wherein signals travel in both directions (from signal designers to receivers and backwards) and facilitate firms with the global-local problem. The paper also identifies future avenues of research for the employer branding field.

Keywords: authenticity, counter-signals, employer branding, global-local problem, signaling theory

Procedia PDF Downloads 339
393 Analysis and Suggestion on Patent Protection in Shanghai, China

Authors: Yuhong Niu, Na Li, Chunlin Jin, Hansheng Ding

Abstract:

The study reviewed all types of patents applied by Shanghai health system to analyze how patent development in China from the year of 1990 to 2012. The study used quantitative and comparative analysis to investigate the change and trends of patent numbers, patent types, patent claims, forward citations, patent life, patent transactions, etc. Results reflected an obviously increased numbers of invention patents, applications, and authorizations and short-life patents, but the ratio of invention patents represented an up and down change. Forward citations and transactions ratio always kept at a low level. The results meant that the protection of intellectual property in the Shanghai health sector had made great progress and lots of positive changes due to incentive policies by local government. However, the low-quality patents, at the same time, increased rapidly. Thus, in the future, it is suggested that the quality management should be strengthened, and invents should be estimated before patent application. It is also suggested that the incentives for intellectual property should be optimized to promote the comprehensive improvement of patent quantity and quality.

Keywords: patent claims, forward citations, patent life, patent transactions ratio

Procedia PDF Downloads 136
392 Taxation, Evidential and Jurisdictional Issues in Electronic Commercial Transactions in Nigeria

Authors: Michael Sunday Afolayan

Abstract:

This research work examined the challenges bedevilling the development of legal framework for electronic commercial transactions (e-commerce) in Nigeria. Nigeria does not have a clear-cut legislation regulating electronic commerce in its jurisdiction despite the geometrical rate of growth and adoption of this method of trade. It specifically posed a great challenge looking at taxation, evidential and jurisdictional issues in e-commerce in Nigeria. The author in a broader research work which is abridged here, traced the origin and development of e-commerce and the attendant laws applicable in Nigeria, examining their sufficiency or otherwise. In carrying out the research work, doctrinal mode of legal research was adopted, examining both primary and secondary sources of legal research materials within their contextual meanings. It was found that the failure to enact a law which has direct regulatory bearing on e-commerce in Nigeria has led to adoption and application of circumstantial laws, rules and common law principles to tackle the problems arising out of electronic commercial transactions, especially in the areas of taxation, evidential and jurisdictional challenges. It was ultimately suggested that there is urgent need to sign into law, the Electronic Transaction Bill which had already been passed by the National Assembly since 2017.

Keywords: e-commerce, legislation, taxation, evidential, jurisdiction

Procedia PDF Downloads 56
391 The Concept of Accounting in Islamic Transactions

Authors: Ahmad Abdulkadir Ibrahim

Abstract:

The Islamic law of transactions laid down the methods and instruments of accounting and analyzed its basic assumptions in the modern world. There is a need to examine the implications of accounting initiatives in the Muslim world and attempt to outline the important characteristics of Islamic accounting and how Islamic accounting resolves the problem of measuring the cost of Murabaha goods in case of exchange rate variation. The research tends to discuss an analytical approach to the Islamic accounting concept as well as elaborating the jurisprudential matter and practical aspects of accounting in Islamic financial transactions. It also aims to alert the practitioners of accounting in the Islamic world to be aware of the concept of accounting in Islamic jurisprudence and its historical development. The methodology adopted in this research is the qualitative method through the consultation of relevant literature, which focuses on the thematic study of the subject matter. This is followed by an analysis and discussion of the contents of the materials used. It is concluded that Islamic accounting is unique in its norms as it has been characterized by fairness, accuracy in measuring tools, truthfulness, mutual trust, moderation in making a profit, and tolerance. It was also qualified by capacity and flexibility in terms of the tools and terminology used and invented by Islamic jurisprudence in the accounting system, which indicates its validity and consistency anytime and anywhere. An important conclusion of the research also lies in the refutation of the popular idea that an Italian writer known as Luca Pacilio was the first writer who developed the basis of double-entry due to the presented proofs by Muslim scholars of critical accounting developments, which cannot be ignored. It concludes further that Islamic jurisprudence draws the accounting system codified in the foundations of a market that is far from usury, fraud, cheating, and unfair competition in all areas.

Keywords: accounting, Islamic accounting, Islamic transactions, Islamic jurisprudence, double entry, murabaha, characteristics

Procedia PDF Downloads 37
390 Real Estate Rigidities: The Effect of Cash Transactions and the Impact of Demonetisation on Them

Authors: Dishant Shahi, Aradhya Shandilya, Nand Kumar

Abstract:

We study here the impact of the black component referred to as X component in the text on Real estate transactions. The X component involved not only acts as friction in transaction but also leads to dysfunctionality in the capital market of real estate. The effect of the component is presented by using a model of economy which seeks resemblance with that of India involving property deals. The rigidities which hinder smooth transactions in property or land deals are depicted and their impact on the economy as a whole has been modelled. The effect of subprime crisis (2007) on Indian housing capital market and the role which the X component played during it, is also included in one of the sections. In the entire text, we have utilised 4 Quadrant graphs to study supply and demand causalities involved in commercial real estate. At the end we have included the impact of demonetisation as a move to counter the problem of overvaluation in the property assets arising due to the X component. The case of Demonetisation which has been the latest move by the Indian Government to control huge amount of black money in circulation has been included along with its impact on the housing and rent as well as the capital market.

Keywords: X-component, 4Q graph, real estate, capital markets, demonetisation, consumer sentiments

Procedia PDF Downloads 332
389 Influence of People and Places on the Identity of Ethnic Enclaves: A Visual Analysis of Little India, Penang

Authors: Excellent Hansda

Abstract:

Over the past years, a lot of research has been on the ethnic enclaves from historical, sociological and economic point of view. However there exist a research gap in the built environment and spatial layout of these areas. When immigrants (People) assimilate in a different place, they struggle to preserve their original identity to maintain their heritage. Then there is the Place, which is the physical manifestation of the heritage, shown through streetscape and architecture. Together 'People and Place' form a relationship with the authenticity of the enclave. As immigrants come in the host country, they try to bring their culture into the place, but at the same time, the culture of the host country also affects the immigrants. This creates conflicts not only in the lifestyle and culture of the immigrants, but also the built characteristics of the place. In the midst of such conflicts, one may easily question the authenticity of an ethnic enclave. In Malaysia, a number of ethnic enclaves emerged due to trade during the medieval times. Little India is one among the other ethnic enclaves present in Chulia Street in Malaysia. The study investigates the factors of 'Place and People', affecting the authenticity of a little India, in the context of an evolving state of Penang in Malaysia. The study is carried through extensive literature review of existing data, followed by observations drawn by visual analysis, discussions and interviews with the stakeholders of the study area. The findings of this research suggest the contribution of 'people and places' in the process of place making in an ethnic enclave. The findings are essential for conservation and further development of ethnic enclaves.

Keywords: conservation, ethnic enclaves, heritage, identity

Procedia PDF Downloads 130
388 Online Authenticity Verification of a Biometric Signature Using Dynamic Time Warping Method and Neural Networks

Authors: Gałka Aleksandra, Jelińska Justyna, Masiak Albert, Walentukiewicz Krzysztof

Abstract:

An offline signature is well-known however not the safest way to verify identity. Nowadays, to ensure proper authentication, i.e. in banking systems, multimodal verification is more widely used. In this paper the online signature analysis based on dynamic time warping (DTW) coupled with machine learning approaches has been presented. In our research signatures made with biometric pens were gathered. Signature features as well as their forgeries have been described. For verification of authenticity various methods were used including convolutional neural networks using DTW matrix and multilayer perceptron using sums of DTW matrix paths. System efficiency has been evaluated on signatures and signature forgeries collected on the same day. Results are presented and discussed in this paper.

Keywords: dynamic time warping, handwritten signature verification, feature-based recognition, online signature

Procedia PDF Downloads 133
387 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning

Authors: Ali Kazemi

Abstract:

The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.

Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis

Procedia PDF Downloads 19
386 Accountants and Anti-Money Laundering Compliance in the Real Estate Sector

Authors: Mark E. Lokanan, Liz Lee

Abstract:

This paper aims to examine the role of accountants as gatekeepers in anti-money laundering compliance in real estate transactions. The paper seeks to answer questions on ways in which accountants are involved in real estate transactions and mandatory compliance with regulatory authorities in Canada. The data for the study came from semi-structured interviews with accountants, lawyers, and government officials. Preliminary results reveal that there is a conflict between accountants’ obligation to disclose and loyalty to their clients. Accountants often do not see why they are obligated to disclose their clients' information to government agencies. The importance of the client in terms of the amount of revenue contributed to the accounting firm also plays a significant role in accountants' reporting decision-making process. Although the involvement of accountants in real estate purchase and sale transactions is limited to lawyers or notaries, they are often involved in designing financing schemes, which may involve money laundering activities. The paper is of wider public policy interests to both accountants and regulators. It is hard not to see Chartered Professional Accountant (CPA) Canada and government regulators using the findings to better understand the decision-making processes of accountants in their reporting practices to regulatory authorities.

Keywords: money laundering, real estate, disclosure, legislation, compliance

Procedia PDF Downloads 195
385 Tool for Metadata Extraction and Content Packaging as Endorsed in OAIS Framework

Authors: Payal Abichandani, Rishi Prakash, Paras Nath Barwal, B. K. Murthy

Abstract:

Information generated from various computerization processes is a potential rich source of knowledge for its designated community. To pass this information from generation to generation without modifying the meaning is a challenging activity. To preserve and archive the data for future generations it’s very essential to prove the authenticity of the data. It can be achieved by extracting the metadata from the data which can prove the authenticity and create trust on the archived data. Subsequent challenge is the technology obsolescence. Metadata extraction and standardization can be effectively used to resolve and tackle this problem. Metadata can be categorized at two levels i.e. Technical and Domain level broadly. Technical metadata will provide the information that can be used to understand and interpret the data record, but only this level of metadata isn’t sufficient to create trustworthiness. We have developed a tool which will extract and standardize the technical as well as domain level metadata. This paper is about the different features of the tool and how we have developed this.

Keywords: digital preservation, metadata, OAIS, PDI, XML

Procedia PDF Downloads 367
384 Advanced Machine Learning Algorithm for Credit Card Fraud Detection

Authors: Manpreet Kaur

Abstract:

When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours.

Keywords: automated fraud detection, isolation forest method, local outlier factor, ML algorithm, credit card

Procedia PDF Downloads 78
383 Challenge Response-Based Authentication for a Mobile Voting System

Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono

Abstract:

A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.

Keywords: authentication, data protection, mobile voting, security

Procedia PDF Downloads 382
382 Lie Symmetry Treatment for Pricing Options with Transactions Costs under the Fractional Black-Scholes Model

Authors: B. F. Nteumagne, E. Pindza, E. Mare

Abstract:

We apply Lie symmetries analysis to price and hedge options in the fractional Brownian framework. The reputation of Lie groups is well spread in the area of Mathematical sciences and lately, in Finance. In the presence of transactions costs and under fractional Brownian motions, analytical solutions become difficult to obtain. Lie symmetries analysis allows us to simplify the problem and obtain new analytical solution. In this paper, we investigate the use of symmetries to reduce the partial differential equation obtained and obtain the analytical solution. We then proposed a hedging procedure and calibration technique for these types of options, and test the model on real market data. We show the robustness of our methodology by its application to the pricing of digital options.

Keywords: fractional brownian model, symmetry, transaction cost, option pricing

Procedia PDF Downloads 374
381 TALENT GAMING©: The Innovative Methodology to Explore Talents and Empower Teams by Using Board Games

Authors: Susana F. Casla

Abstract:

Talent Gaming is an innovative methodology based on a large research done for years about how table board games can be used to empower teams. This methodology was developed thinking about the efficiency of facilitating team coaching sessions and the importance of bringing out the best of individuals when working as a team. The fact that more senses are involved in playing a board game, linked with the psychological element of space and “permission to play”, help us travel to earlier stages of our life when our authenticity was at its heights. By being focused on playing the board game, the individual does not direct their consciousness in a particular way and is rather focused in winning the board game. By doing this, his or her inner talents and authenticity surfaces and the fact that all the senses are involved impacts enormously his behaviors and attitudes. All of this combined results in an arena where our talents show up and our decision making process is not impacted by other elements, such as appearances, status or hierarchy.

Keywords: talent, team, board game, business psychology, coaching teams at work

Procedia PDF Downloads 344
380 Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net

Authors: Abdolghader Pourali, Mohammad V. Malakooti, Muhammad Hussein Yektaie

Abstract:

A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce.

Keywords: reliability, colored Petri net, assessment, payment models, m-commerce

Procedia PDF Downloads 507
379 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis

Authors: Sarthak Mishra, Astha Sinha

Abstract:

There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.

Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats

Procedia PDF Downloads 195
378 Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms

Authors: Neha Ahirwar

Abstract:

In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions.

Keywords: efficient credit card fraud detection, random forest, logistic regression, XGBoost, decision tree

Procedia PDF Downloads 25
377 Impact of Changes of the Conceptual Framework for Financial Reporting on the Indicators of the Financial Statement

Authors: Nadezhda Kvatashidze

Abstract:

The International Accounting Standards Board updated the conceptual framework for financial reporting. The main reason behind it is to resolve the tasks of the accounting, which are caused by the market development and business-transactions of a new economic content. Also, the investors call for higher transparency of information and responsibility for the results in order to make a more accurate risk assessment and forecast. All these make it necessary to further develop the conceptual framework for financial reporting so that the users get useful information. The market development and certain shortcomings of the conceptual framework revealed in practice require its reconsideration and finding new solutions. Some issues and concepts, such as disclosure and supply of information, its qualitative characteristics, assessment, and measurement uncertainty had to be supplemented and perfected. The criteria of recognition of certain elements (assets and liabilities) of reporting had to be updated, too and all this is set out in the updated edition of the conceptual framework for financial reporting, a comprehensive collection of concepts underlying preparation of the financial statement. The main objective of conceptual framework revision is to improve financial reporting and development of clear concepts package. This will support International Accounting Standards Board (IASB) to set common “Approach & Reflection” for similar transactions on the basis of mutually accepted concepts. As a result, companies will be able to develop coherent accounting policies for those transactions or events that are occurred from particular deals to which no standard is used or when standard allows choice of accounting policy.

Keywords: conceptual framework, measurement basis, measurement uncertainty, neutrality, prudence, stewardship

Procedia PDF Downloads 102
376 Ensuring Consistency under the Snapshot Isolation

Authors: Carlos Roberto Valêncio, Fábio Renato de Almeida, Thatiane Kawabata, Leandro Alves Neves, Julio Cesar Momente, Mario Luiz Tronco, Angelo Cesar Colombini

Abstract:

By running transactions under the Snapshot isolation we can achieve a good level of concurrency, specially in databases with high-intensive read workloads. However, Snapshot is not immune to all the problems that arise from competing transactions and therefore no serialization warranty exists. We propose in this paper a technique to obtain data consistency with Snapshot by using some special triggers that we named Daemon Triggers. Besides keeping the benefits of the Snapshot isolation, the technique is specially useful for those database systems that do not have an isolation level that ensures serializability, like Firebird and Oracle. We describe all the anomalies that might arise when using the Snapshot isolation and show how to preclude them with Daemon Triggers. Based on the methodology presented here, it is also proposed the creation of a new isolation level: Daemon Snapshot.

Keywords: data consistency, serialization, snapshot, isolation

Procedia PDF Downloads 295
375 Circular Economy and Remedial Frameworks in Contract Law

Authors: Reza Beheshti

Abstract:

This paper examines remedies for defective manufactured goods in commercial circular economic transactions. The linear ‘take-make-dispose’ model fits well with the conventional remedial framework in which damages are considered the primary remedy. Damages under English Sales Law encourages buyers to look for a substitute seller with broadly similar goods to the ones agreed on in the original contract, enter into contract with this new seller and hence terminate the original contract. By doing so, the buyer ends the contractual relationship. This seems contrary to the core principles of the circular economy: keeping products, components, and materials in longer use, which can partly be achieved by product refurbishment. This process involves returning a product to good working condition by replacing or repairing major components that are faulty or close to failure and making ‘cosmetic’ changes to update the appearance of a product. This remedy has not been widely accepted or applied in commercial cases, which in turn flags up the secondary nature of performance-related remedies. This paper critically analyses the laws concerning the seller’s duty to cure in English law and the extent to which they correspond with core principles of the circular economy. In addition, this paper takes into account the potential of circular economic transactions being characterised as something other than sales. In such situations, the likely outcome will be a license to use products, which may limit the choice of remedy further. Consequently, this paper suggests an outline remedial framework specifically for commercial circular economic transactions in manufactured goods.

Keywords: circular economy, contract law, remedies, English Sales Law

Procedia PDF Downloads 115
374 Financial Instruments of Islamic Banking: A Critical Analysis

Authors: Rukhsana Shaheen, Tahira Ifraq

Abstract:

Interest based transactions led the advent of Islamic banking. In order to provide an alternative to Interest based banking, financial transactions found in classical books of fiqh were employed. Musharakah, Mudarabah, Murabahah Salam, Ijara, and some other modes were adopted. These modes were modified so that they can be adopted for banking and satisfy the needs of customers. Since the inception of Islamic banking, these modes are being used and with the passage of time, are being molded and experimented with to cater different kinds of customers and requirements. Human efforts cannot be errorless. These modes too bear legal defects which need an in-depth scrutiny and refinement. The aim of this paper is to dig the basis and rulings of these modes in classical books of fiqh and analyze its modification and adoption in Islamic banking and the legal defects that these modes are bearing. Paper will prove itself fruitful by providing remedies for the legal defects.

Keywords: financial instruments, legal defects, remedies, Islamic banking

Procedia PDF Downloads 323
373 The Position of Islamic Jurisprudence in UAE Private Law: Analytical Study

Authors: Iyad Jadalhaq, Mohammed El Hadi El Maknouzi

Abstract:

The place of Islamic law in the legal system of the UAE is best understood by introducing a differentiation between its role as a formal source of law and its influence as a material source of law. What this differentiation helps clarify is that the corpus of Islamic law constitutes a much deeper influence on adjudication, law-making and the legal profession in the UAE, than it might appear at first sight, by considering its formal position in the division of labor between courts, or legislative lists of sources of law. This paper aims to examine the role of Shariah in the UAE private law system by determining the comprehensiveness of Sharia in the legal system as a whole, and not in a limited way related to it as a source of law according to Article 1 of the Civil Transactions Law. Turning to the role of the Shariah as a formal source of law, it is useful to start from Article 1 of the UAE Civil Code. This provision lays out the formal hierarchy of sources of UAE private law, these being legislation, Islamic law, and custom. Hence, when deciding a civil dispute, a judge should first refer to positive legislation in force in the UAE. Lacking the rule to cover the case before him/her, the judge ought then to refer directly to Islamic law. If the matter lacks regulation in Islamic law, only then may the judge appeal to custom. Accordingly, in connection to civil transactions, Shariah is presented here, formally, as the second source of law. Still, Shariah law addresses many other issues beyond civil transactions, including matters of morals, worship, and belief. However, in Article 1 of the UAE Civil Code, the reference to Islamic law ought to be understood as limited to the rules it lays out for civil transactions. There are four main sets of courts in the judicial systems of the UAE, whose competence is based on whether a dispute touches upon civil and commercial transactions, criminal offenses, personal statuses, or labor relations. This sectorial and multi-tiered organization of courts as a whole constitutes an institutional development compatible with the long-standing affirmation in the Shariah of the legitimacy of the judiciary. Indeed, Islamic law authorizes the governing authorities to organize the judiciary, including by allocating specific types of cases to particular kinds of judges depending on the value of the case, or by assigning judges to a specific place in which they are to exercise their jurisdictional function. In view of this, the contemporary organization of courts in the UAE can be regarded as an organic adaptation, aligned with Shariah rules on the assignment of jurisdictional authority, to the growing complexity of modern society. Therefore, we can conclude to the comprehensive role of Shariah in the entire legal system of the United Arab Emirates, including legislation, a judicial system, institutional, and administrative work.

Keywords: Islamic jurisprudence, Shariah, UAE civil code, UAE private law

Procedia PDF Downloads 94
372 Contracting Strategies to Foster Industrial Symbiosis Implementation

Authors: Robin Molinier

Abstract:

Industrial symbiosis (I.S) deals with the exchange of waste materials, fatal energy and utilities as resources for production. While it brings environmental benefits from resource conservation its economic profitability is one of the main barriers to its implementation. I.S involves several actors with their own objectives and resources so that each actor must be satisfied by ex-ante arrangements to commit toward investments and transactions. Regarding I.S Transaction cost economics helps to identify hybrid forms of governance for transactions governance due to I.S projects specificities induced by the need for customization (asset specificity, non-homogeneity). Thus we propose a framework to analyze the best contractual practices tailored to address I.S specific risks that we identified as threefold (load profiles and quality mismatch, value fluctuations). Schemes from cooperative game theory and contracting management are integrated to analyze value flows between actors. Contractual guidelines are then proposed to address the identified risks and to split the value for a set of I.S archetypes drawn from actual experiences.

Keywords: contracts, economics, industrial symbiosis, risks

Procedia PDF Downloads 184