Search results for: information security governance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13201

Search results for: information security governance

12991 The Effects of the Corporate Governance on the Level of Internet Financial Reporting: Evidence from Turkish Companies

Authors: Raif Parlakkaya, Umran Kahraman, Huseyin Cetin

Abstract:

Internet financial reporting and corporate governance issues are in the focus of academic and professional studies due to their attributed importance by stakeholders of corporations. Major aim of this study is to reveal the relationship between internet financial reporting which is held as dependent variable and some indicators of corporate governance such as the ratio of managerial ownership, blockholder ownership, number of independent members in the board of directors, frequency of meetings by audit committee and education level of audit committee members which are held as independent variables. Main purpose is to reveal the effect of corporate governance on the voluntary efforts of Internet Financial reporting. The scope of the research is limited to the Turkish Corporations listed in Borsa Istanbul (Istanbul Stock Exchange) and findings which are generated by means of SPSS software are revealed in results section and interpreted in conclusions.

Keywords: audit committee, corporate governance, internet financial reporting, managerial ownership

Procedia PDF Downloads 493
12990 Preventing Corruption in Dubai: Governance, Contemporary Strategies and Systemic Flaws

Authors: Graham Brooks, Belaisha Bin Belaisha, Hakkyong Kim

Abstract:

The problem of preventing and/or reducing corruption is a major international problem. This paper, however, specifically focuses on how organisations in Dubai are tackling the problem of money laundering. This research establishes that Dubai has a clear international anti-money laundering framework but suffers from some national weaknesses such as diverse anti-money laundering working practice, lack of communication, sharing information and disparate organisational vested self-interest.

Keywords: corruption, governance, money laundering, prevention, strategies

Procedia PDF Downloads 250
12989 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 359
12988 Corporate Governance of Intellectual Capital: The Impact of Intellectual Capital Reporting

Authors: Cesar Julio Recalde

Abstract:

Background: The role of intangible assets in today´s society is undeniable and continuously growing. More than 80% of corporate market is related to intellectual capital(IC). However, corporate governance principles and practices seem strongly based and oriented towards tangible assets. The impact of intangible assets on corporate governance might require prevention and adaptative actions. Adherence to voluntary mechanisms of intellectual capital reporting (ICR) seems to be a gateway towards adapting corporate governance to intangible assets influence and a conceptual cornerstone. The impact of adherence to intellectual capital reporting on corporate governance and performance needs to be evaluated. Purposes: This work has a sequential two folded purpose: (1) exploring the influences exerted by IC on corporate governance theory and practice, and within that context (2) analyzing the impact of adherence to voluntary mechanisms of ICR on corporate governance. Design and summary: This work employs the theory of the firm and agency theory in order to conceptually explore the effects of each dimension of IC on key corporate governance issues, namely property rights and control by shareholders and residual claims by stakeholders, fiduciary duties of management and the board, opportunistic behavior and transparency. A comprehensive IC taxonomy and map is presented. Within the resulting context, internal and external impact of ICR on corporate governance and performance is conceptually analyzed. IRC constraint and barriers are identified. Intellectual liabilities are presented within the context of IRC. Finally, IRC regulatory framework is surveyed. Findings: Relevant conclusions were rendered on the influence of intellectual capital on corporate governance. Sufficient evidence of a positive impact of IRC on corporate governance and performance was found. Additionally, it was found that IRC exerts a leveraging effect on IC itself. Intellectual liabilities are insufficiently researched and seem to have a relevant importance on IC measuring. IRC regulatory framework was found to be insufficiently developed to capture the essence of intangible assets and to meet corporate governance challenges facing IC. Originality: This work develops a progressive approach to conceptually analyze the mutual influences between IC and corporate governance. An epistemic ideogram represents the intersection of analyzed theories. An IC map is presented. The relatively new topic of intellectual liabilities is conceptually analyzed in the context of IRC. Social liabilities and client liabilities are presented.

Keywords: corporate governance, intellectual capital, intellectual capital reporting, intellectual assets, intellectual liabilities, voluntary mechanisms, regulatory framework

Procedia PDF Downloads 354
12987 COVID-19: A Thread to the Security System of Foreign Investment

Authors: Mehdi Ghaemi

Abstract:

In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.

Keywords: foreign investment, FPS standard, host country, public health, COVID-19

Procedia PDF Downloads 69
12986 Agency Cost, Firm Performance, Corporate Governance: Evidence from Indonesia

Authors: Arnold Sanda Layuk

Abstract:

Fraud in the disclosure of financial statements by management shows that agency conflict is an important issue in the company. The conflict has consequences for the agency costs that must be borne and has an impact on the firm's performance. The effect of agency costs on firm performance is investigated in this study, as well as whether several variables such as corporate governance mechanisms can positively moderate the agency cost and firm performance relationship. The agency cost is measured by the asset utilization ratio and discretionary expenditure ratio. The firm's performance is represented by the return on equity. Data was collected from the manufacturing companies listed on the Indonesia Stock Exchange from 2015 to 2019, then regressed on the panel data using the panel corrected standard error model (PCSE). According to the findings, agency costs are negatively related to firm performance, which supports previous empirical research findings. It also found that the agency cost and firm performance relationship is significantly moderated by board size and ownership concentration as the representatives of corporate governance mechanisms. It suggests that corporate governance can become tools to reduce agency costs and increase firm performance as well. The empirical evidence adds to previous research on agency conflict, particularly in emerging markets. These findings are expected to supplement previous research and provide additional information to shareholders in order to control opportunistic management decisions that affect their investments and discretionary operational expenses.

Keywords: agency cost, corporate governance, asset utilization ratio, firm performance

Procedia PDF Downloads 163
12985 Branding Good Corporate Governance: A Pathway to Strengthen Investors’ Perception and Brand Equity

Authors: Azaz Zaman, Imtiaz Uddin Chowdhury, Mohammad Shariful Islam

Abstract:

Corporate governance has become a crucial issue in both the business and academic world as a result of world-wide financial scandals and lack of trust in corporate practices. There is no doubt that in order to thrive and attain growth in the market, a company must earn the trust of its stakeholders by consistently delivering on its commitments. Directors of the companies thus comprehend the importance of upfront communication with relevant stakeholders to increase their confidence. The authors of this article argue that practicing good corporate governance is not enough in this highly competitive market place; corporate leaders need to market their good corporate governance practices in order to make the company more attractive to investors. This article also contends that the strength of corporate governance relies wholly upon the extent to which it is communicated simply, effectively and unceasingly to its stakeholders. The main objective of this study, therefore, is to explore the importance of branding good corporate governance in order to increase corporate brand equity, attract investors, and capture market share. A structured questionnaire comprising three sections and a total of 34 questions was prepared and surveyed by the authors among respondents residing in Bangladesh and who also have an academic and corporate background, to investigate the potential impact of branding good corporate governance in the market place. High mean values for individual questions and overall section depict that communicating and branding good corporate governance to the stakeholders will not only boost the investors’ confidence but also increase the corporate brand equity, yielding both profitable and sustainable business environment.

Keywords: brand equity, investors’ preference, good corporate governance, sustainable business environment

Procedia PDF Downloads 86
12984 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 263
12983 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 452
12982 Promoting Effective Institutional Governance in Cameroon Higher Education: A Governance Equalizer Perspective

Authors: Jean Patrick Mve

Abstract:

The increasing quest for efficiency, accountability, and transparency has led to the implementation of massive governance reforms among higher education systems worldwide. This is causing many changes in the governance of higher education institutions. Governments over the world are trying to adopt business-like organizational strategies to enhance the performance of higher education institutions. This study explores the changes that have taken place in the Cameroonian higher education sector. It also attempts to draw a picture of the likely future of higher education governance and the actions to be taken for the promotion of institutional effectiveness among higher education institutions. The “governance equalizer” is used as an analytical tool to this end. It covers the five dimensions of the New Public Management (NPM), namely: state regulation, stakeholder guidance, academic self-governance, managerial self-governance, and competition. Qualitative data are used, including semi-structured interviews with key informants at the organizational level and other academic stakeholders, documents and archival data from the university and from the ministry of higher education. It has been found that state regulation among higher education institutions in Cameroon is excessively high, causing the institutional autonomy to be very low, especially at the level of financial management, staffing and promotion, and other internal administrative affairs; at the level of stakeholder guidance there is a higher degree of stakeholders consideration in the academic and research activities among universities, though the government’s interest to keep its hands in most management activities is still high; academic self-governance is also very weak as the assignment of academics is done more on the basis of political considerations than competence; there is no real managerial self-governance among higher education institutions due to the lack of institutional capacity and insufficient autonomy at the level of decision making; there is a plan to promote competition among universities but a real competitive environment is not yet put into place. The study concludes that the government’s policy should make state control more relaxed and concentrate on steering and supervision. As well, real institutional autonomy, professional competence building for top management and stakeholder participation should be considered to guarantee competition and institutional effectiveness.

Keywords: Cameroon higher education, effective institutional governance, governance equalizer, institutional autonomy, institutional effectiveness

Procedia PDF Downloads 120
12981 The Impact of other Comprehensive Income Disclosure and Corporate Governance on Earnings Management and Firm Performance

Authors: Yan Wang, Yuan George Shan

Abstract:

This study examines whether earnings management reduces firm performance and how other comprehensive income (OCI) disclosure and strong corporate governance restrain earnings management. Using a data set comprising 6,260 firm-year observations from listed companies on the Shanghai and Shenzhen Stock Exchanges during 2009–2015, the results indicate that OCI disclosure generally improves firm performance, but earnings management lowers firm performance. The study also finds that OCI disclosure and corporate governance are complementary in restraining earnings manipulation and promote firm performance. The implications of the findings are relevant policy-makers and regulators in assisting them evaluate the consequences of convergence of Chinese Accounting Standards with the International Financial Reporting Standards.

Keywords: other comprehensive income, corporate governance, earnings management, firm performance, China

Procedia PDF Downloads 174
12980 Relative Composition of Executive Compensation Packages, Corporate Governance and Financial Reporting Quality

Authors: Philemon Rakoto

Abstract:

Most executive compensation packages consist of four major components: base fixed salary, annual and long-term non-equity incentive plans, share-based and option-based awards and pension value. According to agency theory, the relative composition of executive compensation packages is one of the mechanisms that firms use to align the interests of executives and shareholders in order to mitigate agency costs. This paper tests the effect of the relative composition of executive compensation packages on financial reporting quality. Financial reporting quality is measured by the value relevance of accounting earnings. Corporate governance is a moderating variable in the model. Using data from Canadian firms composing S&P/TSX index of the year 2013 and governance scores based on Board Games, the analysis shows that, only for firms with good governance, there is an optimal level of the proportion of executive equity-based compensation in relation to total compensation that enhances the quality of financial reporting.

Keywords: Canada, corporate governance, executive compensation packages, financial reporting quality

Procedia PDF Downloads 323
12979 Governance and Financial Constraints the Impact on Corporate Social Responsibility Implementation in Cooperatives

Authors: Wanlapha Phraibueng, Patrick Sentis, Geraldine Riviere-Giordano

Abstract:

Corporate Social Responsibility (CSR) initiatives have been widely discussed especially in investor-oriented firms. In contrast, cooperatives pay less attention to CSR because their activities have integrated the responsibility and the solidity of social, economic and environment. On the other hand, by adopting ownership theory and agency theory – cooperatives ignore CSR investment due to unclarified decision control in the governance and the limitation to acquire the capital financed. The unique governance and financial structures in cooperatives lead to the conflict among the stakeholders and long-term investment which have an impact on firm financial performance. As an illustration of cooperatives dilemmas, we address the question of Whether or not cooperatives in term of governance and financial structures are the constraints on implementing CSR policies. We find that the governance and financial structures in large cooperatives are the influence factors which predispose cooperatives to invest on CSR. In contrast, in the startup or small cooperatives, its governance and financial structures are the constraints on implementing CSR policies. We propose the alternative financial structure based on the trade-off between debt and equity which aims to relax the restrictions in cooperatives’ governance and allow cooperatives to acquire the capital financed either from its members or non-members. We suggest that engaging equity as a financial structure induces cooperatives to invest on CSR policies. Alternative financial structure eliminates not only cooperative ownership control problem but also the constraints in capital acquisition. By implementing CSR activities consistent with the alternative financial choice, cooperatives can increase firm’s value and reduce the conflict among their stakeholders.

Keywords: cooperatives, corporate social responsibility, financial, governance

Procedia PDF Downloads 111
12978 Arabic Scholar’s Governance Advocacy and Nigeria’s National Security in Nigeria: Perspective of Al-Shaykh Usman Bin Fodio

Authors: Mohammad Jamiu Abdullahi, Shykh Ahmed Abdussalam

Abstract:

The emergence of Arabic on the shore of West Africa heralded the practise of Islam and advocation for a just and egalitarian society. Islam, it was argued, has been perverted and subverted by the Hausa leadership. This necessitated the call for reforming Islam. Al-Shaykh Usman Bin Fodio grabbed the opportunity and fought the perverts to restore the glory of Islam and establish shari'ah way of life. This was the practice, especially in the northern part of Nigeria until the incursion of colonialism. The conquest of the colonial master halted the rule of jihadi leaderships and subjected them to colonialism under which only some aspects of Islamic system considered potentially beneficial to the British interest were retained. The current socio-political and economic crises in Nigeria has necessitated the need to look inwardly to the bulk of works, in Arabic, left behind by the Muslim scholars to help to salvage the country from its present political crisis, economic paralysis and legal decadence. This paper, therefore, examines the relevance of Arabic literary works that housed political/legal theories to salvaging the country from its present political crises, economic paralysis and legal decadence.

Keywords: Arabic Fodio Nigeria security, advocacy governance scholar Usman, British colonial perspective shaykh, leadership Islam jihad politics

Procedia PDF Downloads 307
12977 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 58
12976 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 134
12975 Governance vs Diaspora Remittances for Sustainable Development: A Case of Rwanda and Kenya

Authors: Albert Maake, Ifunanya Isama

Abstract:

International remittances to developing countries reached US$ 485 billion in 2018. By 2015, the East African region had surpassed US$3.5 mark. Considering this, there is no argument as to the contribution of Diaspora remittances as an alternative source of funds in the development process of the developing countries. Nevertheless, this paper seeks to argue that good governance in areas such as policy design, implementation and monitoring play a critical role in the sustainable development process of a nation as opposed to Diaspora remittances in general. Therefore this study intends at analyzing the contribution of Governance as opposed to that of Diaspora remittances for nation development. Employing documentary analysis technique, the secondary data with respect to the countries under study on Diaspora remittances will be collected. Selected indicators for Governance-HDI, Debt-to-GDP Ratio and Corruption Index, will be sourced from the World Bank Data for the purpose of consistency and where applicable the Central Statistical Agencies of the Nations under study. By means of descriptive statistics and content analysis the data will be comparatively analyzed to highlight the unique experiences in Rwanda and Kenya. The findings and interpretations from the study will affirm and promote capacity building for best practices in good governance for the countries under study.

Keywords: diaspora remittance, governance, Kenya, Rwanda, sustainable development

Procedia PDF Downloads 110
12974 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 308
12973 Governance Models of Higher Education Institutions

Authors: Zoran Barac, Maja Martinovic

Abstract:

Higher Education Institutions (HEIs) are a special kind of organization, with its unique purpose and combination of actors. From the societal point of view, they are central institutions in the society that are involved in the activities of education, research, and innovation. At the same time, their societal function derives complex relationships between involved actors, ranging from students, faculty and administration, business community and corporate partners, government agencies, to the general public. HEIs are also particularly interesting as objects of governance research because of their unique public purpose and combination of stakeholders. Furthermore, they are the special type of institutions from an organizational viewpoint. HEIs are often described as “loosely coupled systems” or “organized anarchies“ that implies the challenging nature of their governance models. Governance models of HEIs describe roles, constellations, and modes of interaction of the involved actors in the process of strategic direction and holistic control of institutions, taking into account each particular context. Many governance models of the HEIs are primarily based on the balance of power among the involved actors. Besides the actors’ power and influence, leadership style and environmental contingency could impact the governance model of an HEI. Analyzing them through the frameworks of institutional and contingency theories, HEI governance models originate as outcomes of their institutional and contingency adaptation. HEIs tend to fit to institutional context comprised of formal and informal institutional rules. By fitting to institutional context, HEIs are converging to each other in terms of their structures, policies, and practices. On the other hand, contingency framework implies that there is no governance model that is suitable for all situations. Consequently, the contingency approach begins with identifying contingency variables that might impact a particular governance model. In order to be effective, the governance model should fit to contingency variables. While the institutional context creates converging forces on HEI governance actors and approaches, contingency variables are the causes of divergence of actors’ behavior and governance models. Finally, an HEI governance model is a balanced adaptation of the HEIs to the institutional context and contingency variables. It also encompasses roles, constellations, and modes of interaction of involved actors influenced by institutional and contingency pressures. Actors’ adaptation to the institutional context brings benefits of legitimacy and resources. On the other hand, the adaptation of the actors’ to the contingency variables brings high performance and effectiveness. HEI governance models outlined and analyzed in this paper are collegial, bureaucratic, entrepreneurial, network, professional, political, anarchical, cybernetic, trustee, stakeholder, and amalgam models.

Keywords: governance, governance models, higher education institutions, institutional context, situational context

Procedia PDF Downloads 309
12972 Environmental Corporate Social Responsibility in Industrial Cities: A Collaborative Governance Approach

Authors: Muhlisin, Moh. Sofyan Budiarto

Abstract:

Corporate social responsibility (CSR) initiatives based on charity and philanthropy have not alleviated many sustainable environmental issues, particularly in industrial towns. The collaborative governance strategy is seen to be an option for resolving difficulties of coordination and communication between businesses, the government, and the community so that the goals of urban environmental management can be met via collaborative efforts. The purpose of this research is to identify the different forms of environmental CSR implementation by corporate entities and to create a CSR collaborative governance model in environmental management. This qualitative investigation was carried out in 2020 in Cilegon City, one of Indonesia’s industrial cities. To investigate their support, a total of 20 informants from three stakeholder groups, namely the government, corporate entities, and the community, were questioned. According to the study’s findings, cleaner production, eco-office, energy and natural resource conservation, waste management, renewable energy, climate change adaptation, and environmental education are all examples of CSR application in the environmental sector. The environmental potential of CSR implementation is to create collaborative governance. The role of business entities in providing the beginning circumstances is critical, while the government offers facilitative leadership and the CSR forum launches institutional design. These three factors are crucial to the efficiency of collaborative governance in industrial cities' environmental management.

Keywords: collaborative governance, CSR forum, environmental CSR, industrial city

Procedia PDF Downloads 57
12971 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 439
12970 Time for the United Kingdom to Implement Statutory Clawback Provision on Directors’ Remunerations: Lessons and Experiences from the United States and the Netherlands

Authors: John Kong Shan Ho

Abstract:

Senior executives’ remunerations of public companies have aroused much debate and attention in the media. In the aftermath of the Global Financial Crisis (GFC), excessive executive pay arrangements were blamed for contributing to excessive risk-taking, which caused the financial meltdown. Since then, regulators and lawmakers around the world have introduced regulations to strengthen the corporate governance of listed companies. A key aspect of such reform is by strengthening regulatory intervention over executives’ remunerations and increasing the transparency of such information. This article is written against such background and examines the recent proposal by the UK BEIS to ask the FRC to amend the UK Corporate Governance Code (UKCGC) to strengthen clawback provisions for directors’ remuneration in listed companies as part of its audit reform. The article examines the background and debates regarding the possible implementation of such a measure in the UK. Contrary to the BEIS’ proposal, it argues that implementing it through the UKCGC is unlikely to enhance overall corporate governance and audit quality. It argues that the UK should follow the footsteps of its US and Dutch counterparts by enacting legislation to claw back directors’ remunerations. It will also provide some recommendations as to the key factors that need to be considered in drafting such a statutory provision.

Keywords: company law, corporate governance, agency problem, directors' remunerations, clawbacks

Procedia PDF Downloads 97
12969 Educational Related Information Technology Department Transformation: A Case Study

Authors: P. Joongsiri, K. Pattanapisuth, P. Siwatintuko, S. Vasupongayya

Abstract:

This paper presents a case study of developing a four-year plan for the information technology department at the Faculty of Engineering, Prince of Songkla University, Thailand. This work can be used as a case study for other in-house information technology department in a higher educational environment. The result of this paper is the guideline of the four year plan creation process which is generated by analyzing the related theories and several best practices.

Keywords: strategic plan, management information system, information technology department governance, best practices, organization transformation

Procedia PDF Downloads 425
12968 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 210
12967 An Analysis of the Role of Watchdog Civil Society Organisations in the Public Governance in Southern Africa: A study of South Africa and Zimbabwe

Authors: Julieth Gudo

Abstract:

The prevalence of corruption in African countries and persisting unsatisfactory distribution by governments of state resources among the citizens are clear indicators of a festering problem. Civil society organisations (CSOs) in Southern African countries, as citizen representatives, have been involved in challenging the ongoing corruption and poor governance in the public sector that have caused tensions between citizens and their governments. In doing so, civil society organisations demand accountability, transparency, and citizen participation in public governance. The problem is that CSOs’ role in challenging governments is not clearly defined in both law and literature. This uncertainty has resulted in an unsatisfying operating and legal environment for CSOs and a strained relationship between themselves and the governments. This paper examines civil society organisations' role in advancing good public governance in South Africa and Zimbabwe. The study will be conducted by means of a literature review and case studies. The state of public governance in Southern Africa will be discussed. The historical role of CSOs in the region of Southern Africa will be explored, followed by their role in public governance in contemporary South Africa and Zimbabwe. The relationship between state and civil society organisations will be examined. Furthermore, the legal frameworks that regulate and authoriseCSOs in their part in challenging poor governance in the public sector will be identified and discussed. Loopholes in such provisions will be identified, and measures that CSOs use to hold those responsible for poor governance accountable for their actions will be discussed, consequently closing the existing gap on the undefined role of CSOs in public governance in Southern Africa. The research demonstrates the need for an enabling operating environment through better cooperation, communication, and the relationship between governments and CSOs, the speedy and effective amendment of existing laws, and the introduction of legal provisions that give express authority to CSOs to challenge poor governance on the part of Southern African governments. Also critical is the enforcement of laws so that those responsible for poor governance and corruption in government are held accountable.

Keywords: civil society organisations, public governance, southern Africa, South Africa, zimbabwe

Procedia PDF Downloads 85
12966 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 323
12965 Health and Safety Practices of Midsayapenos in Relation to The Governance of the Local Government Unit of Midsayap in Responding to the COVID-19 Pandemic

Authors: Jolai R. Garca, Sergio Mahinay Jr., Fathma Dubpaleg, Rhea Jaberina, Jovanne Mabit II

Abstract:

The COVID-19 pandemic has still been going on for almost two years now, but because of the health and safety practices of the citizens, together with the action of the Local Government Unit, it has slowly dissipated. This study investigated the relationship between the health and safety protocols as well as the status of governance of the Local Government Unit of Midsayap using the evidence-based key indicators of Good Governance aggregated from the Organisation for Economic Co-operation and Development (OECD). A quantitative research design was employed to determine the relationship of the variables under study. Findings showed that the residents of Midsayap often practice the necessary health and safety measures against COVID-19 and that the Local Government Unit of Midsayap is effective in responding to the pandemic.

Keywords: governance, health and safety practices, covid-19, local government unit

Procedia PDF Downloads 144
12964 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 272
12963 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 169
12962 Corporate Governance and Minority Shareholders Protection in the United Kingdom

Authors: Meltem Karatepe Kaya

Abstract:

The concept of corporate governance is not new but, due to the recent international financial crisis, it has become prominent in contemporary business, accounting and legal debates. There is a wealth of anecdotal evidence which shows that protection of minority shareholders is an important issue in the corporate governance literature. Minority shareholders typically hold low amounts of stocks, so the benefits gained from their participation in shareholder meetings are very asymmetric to the cost. Therefore, the presence of a good corporate governance structure is the proper protection of and respect for the rights and interests of shareholders, particularly those of minority shareholders. The research will attempt to find answers to the following questions: Why minority shareholders’ rights should be protected? How minority shareholders’ rights could be improved? Does the legal framework in the United Kingdom provide adequate protection for minority shareholders? This study will assess regulations about the legal protections of minority shareholders and try to find answer this question: ’Why is it inevitable for company law to treat in a successful way the problems arising from minority shareholders' conflict with other shareholders of a company?’The protection of minority shareholders is not only a corporate governance objective in its own right but also has added importance particularly in developing countries. In the United Kingdom(UK) and the United States of America(USA), there are diffused ownership structures so that any shareholders do not influence the management of the company. This is in stark contrast to companies in developing countries such as Turkey where controlling shareholders and related insiders are a well-known feature of ownership structures, and where companies are often governed and managed by controlling shareholders such as family firms and associated companies through cross-shareholdings and pyramiding ownership structures. In Turkey, the agency problem is not between shareholders and management. Rather it gives rise to another dimension of the agency problem – a conflict of interest between majority shareholders (controlling) and minority shareholders. This research will make a particularly useful contribution to knowledge-based information and understanding of company law in the UK, particularly minority shareholders' remedies. It will not only give information about law and regulations of minority shareholders' remedies but also it will provide some knowledge about doctrinal discussions and relevant cases. The major contribution to study will be in the knowledge of law and regulation in the legal protections of minority shareholders in the United Kingdom and Turkey. In this study, the recommendations will be given for the development of the legal framework and practices of protections for minority shareholders and small investors.

Keywords: controlling shareholders, corporate governance, derivative actions, minority shareholders

Procedia PDF Downloads 148