Search results for: internal party quota
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2771

Search results for: internal party quota

2741 Language as an Instrument of Manipulation and Political Control in Nigeria: The 2015 Presidential Election in Perspective

Authors: Abdulmalik Adamu

Abstract:

This study is premised on the assumption that language, particularly, English plays a significant role in the acquisition of power in Nigeria. This is against the backdrop of the fact that for the first time in the political history of Nigeria, an opposition party succeeded in dethroning an incumbent President and ruling political party in an election. Therefore the main objective was to investigate the role of language, particularly English in the acquisition of political power in Nigeria. The corpus generated for this study consisted of excerpts from the media exchange between the spokespersons of the two dominant political parties at the time of the elections in 2015; Olisa Metuh of the Peoples Democratic Party (PDP) and Lai Mohammed of the All Progressive Party (APC). The excerpts were analysed using Critical Discourse Analysis (CDA) as a research tool. The findings revealed the acceptance of the first proposition that English facilitates the acquisition of political power in Nigeria and the rejection of the second proposition that English is an instrument for the exclusion of the populist from political events in Nigeria. The study, therefore, concluded that language, particularly English played a significant role in the acquisition of political power in Nigeria.

Keywords: language, power, politics, Critical Discourse Analysis (CDA)

Procedia PDF Downloads 367
2740 Internal Audit and the Effectiveness and Efficiency of Operations in Hospitals

Authors: Naziru Suleiman

Abstract:

The ever increasing cases of financial frauds and corporate accounting scandals in recent years have raised more concern on the operation of internal control mechanisms and performance of the internal audit departments in organizations. In most cases the seeming presence of both the internal control system and internal audit in organizations do not prove useful as frauds errors and irregularities are being perpetuated. The aim of this study, therefore, is to assess the role of internal audit in achieving the objectives of internal control system of federal hospitals in Kano State from the perception of the respondents. The study used survey research design and generated data from primary source by means of questionnaire. A total number of 100 copies of questionnaire were administered out of which 68 were duly completed and returned. Cronbach’s alpha was used to test the internal validity of the various items in the constructs. Descriptive statistics, chi-square test, Mann Whitney U test and Kruskal Wallis ANOVA were employed for the analysis of data. The study finds that from the perception of the respondents, internal audit departments in Federal Hospitals in Kano State are effective and that they contribute positively to the overall attainment of the objectives of internal control system of these hospitals. There is no significant difference found on the views of the respondents from the three hospitals. Hence, the study concludes that strong and functional internal audit department is a basic requirement for effectiveness of operations of the internal control system. In the light of the findings, it is recommended that internal audit should continue to ensure that the objectives of internal control system of these hospitals are achieved through proper and adequate evaluation and review of the system.

Keywords: internal audit, internal control, federal hospitals, financial frauds

Procedia PDF Downloads 319
2739 Media Framing and Democratization Under Multi-Party System: A Case Study of the 2023 Malaysian Six-State Elections

Authors: Chew Zhao Hong

Abstract:

Since the transition of power in 2018, the Malaysian political landscape has experienced substantial shifts and complexities. The decline of the longstanding ruling party, United Malays National Organization (UMNO), following the party rotation, has given rise to splinter parties such as the Indigenous Unity Party (Bersatu), along with the enduring presence of the Pan-Malaysian Islamic Party (PAS) in the northern region of the Malay Peninsula. However, the "Sheraton Move" in 2020 led to the fall of the Pakatan Harapan government and the emergence of Perikatan Nasional, signifying the ascent of a third political force. The 2022 general elections marked Malaysia's entry into a hung parliament, culminating in an intricate negotiation that resulted in a coalition government formed by Pakatan Harapan, Barisan Nasional, and the Sarawak parties alliance (GPS), collectively governing the Malaysian federal administration. During the 2023 state elections, Pakatan Harapan and Barisan Nasional formed an unprecedented alliance, yet the media framing benefited Perikatan Nasional, even securing substantial support from UMNO's traditional constituencies. In the era of converging new media, Malaysia’s democratization faces new challenges: first, political leaders leveraging media to cultivate unfiltered personas risk inducing populism; second, under the influence of agenda-setting and two-step flow theories, media contributes to polarization; lastly, Malaysia's multi-party system is no longer effectively moderate extreme ideologies into the political center. This study examines the role of media framing and its impact on the democratization process within Malaysia's consociational democracy under a multi-party system and analyzes media discourse before and after the 2023 Malaysian state elections to explore how different parties shape public opinion and political discourse, and how political messages may be amplified or distorted in the process.

Keywords: multi-party system, democratization, elections, political polarization, Malaysia, media framing

Procedia PDF Downloads 48
2738 An Investigation on the Internal Quality Assurance System of Higher Education in Indonesia

Authors: Andi Mursidi

Abstract:

This study aims to investigate why the internal quality assurance system as the basis for the assessment of external quality assurance systems is not well developed at universities in Indonesia. To answer this problem, technical analysis used single instrumental case study with the respondents from ten universities. The findings of this study are the internal quality assurance system that is applied so far (1) only to gain accreditation; and (2) considered as a liability rather than as a necessity to meet the demands of quality standards. It needs strong commitment from internal stakeholders at the college/university to establish internal quality assurance systems that exceed the national standards of higher education. A high quality college/ university will have a good accreditation rank.

Keywords: internal stakeholders, internal quality assurance system, commitment, higher education

Procedia PDF Downloads 255
2737 The Study of Cost Accounting in S Company Based on TDABC

Authors: Heng Ma

Abstract:

Third-party warehousing logistics has an important role in the development of external logistics. At present, the third-party logistics in our country is still a new industry, the accounting system has not yet been established, the current financial accounting system of third-party warehousing logistics is mainly in the traditional way of thinking, and only able to provide the total cost information of the entire enterprise during the accounting period, unable to reflect operating indirect cost information. In order to solve the problem of third-party logistics industry cost information distortion, improve the level of logistics cost management, the paper combines theoretical research and case analysis method to reflect cost allocation by building third-party logistics costing model using Time-Driven Activity-Based Costing(TDABC), and takes S company as an example to account and control the warehousing logistics cost. Based on the idea of “Products consume activities and activities consume resources”, TDABC put time into the main cost driver and use time-consuming equation resources assigned to cost objects. In S company, the objects focuses on three warehouse, engaged with warehousing and transportation (the second warehouse, transport point) service. These three warehouse respectively including five departments, Business Unit, Production Unit, Settlement Center, Security Department and Equipment Division, the activities in these departments are classified by in-out of storage forecast, in-out of storage or transit and safekeeping work. By computing capacity cost rate, building the time-consuming equation, the paper calculates the final operation cost so as to reveal the real cost. The numerical analysis results show that the TDABC can accurately reflect the cost allocation of service customers and reveal the spare capacity cost of resource center, verifies the feasibility and validity of TDABC in third-party logistics industry cost accounting. It inspires enterprises focus on customer relationship management and reduces idle cost to strengthen the cost management of third-party logistics enterprises.

Keywords: third-party logistics enterprises, TDABC, cost management, S company

Procedia PDF Downloads 326
2736 Design of Lead-Lag Based Internal Model Controller for Binary Distillation Column

Authors: Rakesh Kumar Mishra, Tarun Kumar Dan

Abstract:

Lead-Lag based Internal Model Control method is proposed based on Internal Model Control (IMC) strategy. In this paper, we have designed the Lead-Lag based Internal Model Control for binary distillation column for SISO process (considering only bottom product). The transfer function has been taken from Wood and Berry model. We have find the composition control and disturbance rejection using Lead-Lag based IMC and comparing with the response of simple Internal Model Controller.

Keywords: SISO, lead-lag, internal model control, wood and berry, distillation column

Procedia PDF Downloads 609
2735 The Impact of Audit Committee Industry Expertise on Internal Audit Function

Authors: Abdulaziz Alzeban

Abstract:

This study examines whether internal audit function is indeed greater when audit committee members have industry expertise combined with auditing expertise. Data from a survey of 64 chief internal auditors from companies registered on the Saudi Stock Exchange TADAWL, provides results that suggest that when audit committee members possess both industry expertise and auditing expertise, the committee’s role in improving the quality of internal audit is enhanced. This outcome is concluded as one that can be generalized beyond the Saudi Arabian context.

Keywords: internal audit, audit committee, industry expertise, function

Procedia PDF Downloads 324
2734 System-level Factors, Presidential Coattails and Mass Preferences: Dynamics of Party Nationalization in Contemporary Brazil (1990-2014)

Authors: Kazuma Mizukoshi

Abstract:

Are electoral politics in contemporary Brazil still local in organization and focus? The importance of this question lies in its paradoxical trajectories. First, often coupled with institutional and sociological ‘barriers’ (e.g. the selection and election of candidates relatively loyal to the local party leadership, the predominance of territorialized electoral campaigns, and the resilience of political clientelism), the regionalization of electoral politics has been a viable and practical solution especially for pragmatic politicians in some Latin American countries. On the other hand, some leftist parties that once served as minor opposition forces at the time of foundational or initial elections have certainly expanded vote shares. Some were eventually capable of holding most (if not a majority) legislative seats since the 1990s. Though not yet rigorously demonstrated, theoretically implicit in the rise of leftist parties in legislative elections is the gradual (if not complete) nationalization of electoral support—meaning the growing equality of a party’s vote share across electoral districts and its change over time. This study will develop four hypotheses to explain the dynamics of party nationalization in contemporary Brazil: district magnitude, ethnic and class fractionalization of each district, voting intentions in federal and state executive elections, and finally the left-right stances of electorates. The study will demonstrate these hypotheses by closely working with the Brazilian Electoral Study (2002-2014).

Keywords: party nationalization, presidential coattails, Left, Brazil

Procedia PDF Downloads 106
2733 Impact of Internal Control on Fraud Detection and Prevention: A Survey of Selected Organisations in Nigeria

Authors: Amos Olusola Akinola

Abstract:

The aim of this study is to evaluate the internal control system on fraud prevention in Nigerian business organizations. A survey research was undertaken in five organizations from the banking and manufacturing sectors in Nigeria using the simple random sampling technique and primary data was obtained with the aid structured questionnaire drawn on five likert’s scale. Four Hypotheses were formulated and tested using the T-test Statistics, Correlation and Regression Analysis at 95% confidence interval. It was discovered that internal control has a significant positive relationship with fraud prevention and that a weak internal control system permits fraudulent activities among staff. Based on the findings, it was recommended that organizations should continually and methodically review and evaluate the components of its internal control system whether activities are working as planned or not and that every organization should have pre-determined guidelines for conducting its operations and ensures compliance with these set guidelines while proactive steps should be taken to establish the independence of the internal audit by making the audit reportable to the governing council of an organization and not the chief executive officer.

Keywords: internal control, internal system, internal audit, fraud prevention, fraud detection

Procedia PDF Downloads 351
2732 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors

Authors: M. S. Razana, Z. W. Shafiuddin

Abstract:

Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.

Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification

Procedia PDF Downloads 211
2731 Internal and External Validity in Experimental Economics

Authors: Helena Chytilova, Robin Maialeh

Abstract:

Experimental economics is subject to criticism with regards to frequently discussed trade-off between internal and external validity requirements, which seems to be critically flawed. Incompatibility of trade-off condition and condition of internal validity as a prerequisite for external validity is presented. In addition, the imprecise concept of artificiality found to be rather improving external validity, seems to strengthen illusory status of external versus internal validity tension. Internal validity will be further analysed with regards to Duhem-Quine problem, where unpredictability argument is significantly weakened trough application of inductivism within the illustrative hypothetical-deductive model. Discussion outlined above partially weakens critical arguments related to robustness of results in experimental economics, if perfectly controlled experimental environment is secured.

Keywords: Duhem-Quine problem, external validity, inductivism, internal validity

Procedia PDF Downloads 250
2730 Internal Migration and Poverty Dynamic Analysis Using a Bayesian Approach: The Tunisian Case

Authors: Amal Jmaii, Damien Rousseliere, Besma Belhadj

Abstract:

We explore the relationship between internal migration and poverty in Tunisia. We present a methodology combining potential outcomes approach with multiple imputation to highlight the effect of internal migration on poverty states. We find that probability of being poor decreases when leaving the poorest regions (the west areas) to the richer regions (greater Tunis and the east regions).

Keywords: internal migration, potential outcomes approach, poverty dynamics, Tunisia

Procedia PDF Downloads 279
2729 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse

Authors: Maryam Vaezi

Abstract:

In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.

Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party

Procedia PDF Downloads 298
2728 The Communist Party of China’s Approach to Human Rights and the Death Penalty in China since 1979

Authors: Huang Gui

Abstract:

The issues of human rights and death penalty are always drawing attentions from international scholars, critics and observers, activities and Chinese scholars, and most of them looking at these problems are just doing with such legal or political from a single perspective, but the real relationship between Chinese political regime and legislation is often ignored. In accordance with the Constitution of P.R.C., Communist Party of China (CPC) does not merely play a key role in political field, but in legislation and law enforcement as well. Therefore, the legislation has to implement the party’s theory and outlook, and realize the party’s policies. So is the death penalty system, though it is only concrete punishment system. Considering this point, basic upon the introducing the relationship between CPC and legislation, this paper would like to explore the shifting of CPC’s outlook on human rights and the death penalty system changes in different eras. In Maoist era, the issue of human rights was rejected and deemed as an exclusion zone, and the death penalty was unjustifiably imposed; human rights were politically recognized and accepted in Deng era, but CPC has its own viewpoints on it. CPC emphasized on national security and stability in that era, and the individual human rights weren’t taken correspondingly and reasonably account of. The death penalty was abused and deemed as an important measure to control crime. In post-Deng, human rights were gradually developed and recognized. The term of ‘state respect and protect human rights’ is contained in Constitution of P.R.C., and the individual human rights are gradually valued, but the CPC still focus on state security, development, and stability, the individual right to life hasn’t been enough valued like the right to substance. Although the steps of reforming death penalty are taking, there are still 46 crimes punishable by death. CPC should change its outlook and pay more attention to the right to life, and try to abolish death penalty de facto and de jure.

Keywords: criminal law, communist party of China, death penalty, human rights, China

Procedia PDF Downloads 388
2727 A Study of Management Principles Incorporating Corporate Governance and Advocating Ethics to Reduce Fraud at a South African Bank

Authors: Roshan Jelal, Charles Mbohwa

Abstract:

In today’s world, internal fraud remains one of the most challenging problems within companies worldwide and despite investment in controls and attention given to the problem, the instances of internal fraud has not abated. To the contrary it appears that internal fraud is on the rise especially in the wake of the economic downturn. Leadership within companies believes that the more sophisticated the controls employed the less likely it would be for employees to pilfer. This is a very antiquated view as investment in controls may not be enough to curtail internal fraud; however, ensuring that a company drives the correct culture and behaviour within the organisation is likely to yield desired results. This research aims to understand how creating a strong ethical culture and embedding the principle of good corporate governance impacts on levels of internal fraud with an organization (a South African Bank).

Keywords: internal fraud, corporate governance, ethics, reserve bank, the King Code

Procedia PDF Downloads 375
2726 A Method and System for Container Inventory Management

Authors: Lalith Edirisinghe

Abstract:

Due to the variability in global trading patterns, some ports in the world experience a shortage of shipping containers while the rest of the ports have excess container stocks. According to this study, carriers operate and manage their container inventories independently, leading to enormous container repositioning costs. In contrast, the researcher suggests that costs can be minimized if carriers exchange containers among them. In other words, rather than repositioning excess containers, a carrier could offer them to another carrier in the same port that has a shortage and vice versa. However, this is easier said than done because there is huge complexity in global container management as it involves many operational parameters such as multiple types and sizes of containers, the varying transit times of different carriers, etc., and the exchange may take place in various ports globally. Therefore, the exchange should be facilitated through a fully comprehensive automated computer system that could consider all the parameters that impact the possibility of exchange containers. Accordingly, the research used mixed research methods, combining qualitative and quantitative approaches. Data analysis is conducted using SPSS tools, and a prototype is developed as the output of the research. The proposed mathematical solution will proactively scan through the container size, type, and volume of every member carrier in each port and map how the deficit and excess quantities could be shared among them and set off the imbalance of empty container reposition at ports of their interest. The approach includes obtaining and processing container inventory information from multiple parties in real time for assessing container data associated with each party for each port at a given time. Using the container data, container inventories for each party at each port for a defined time are forecasted. A first party having surplus (offeror) and deficit (offeree) of empty containers at a first and a second port at a first time, respectively, is determined. A second party having a deficit and surplus of empty containers at the first time, respectively, is determined. Offering the first and the second party a container exchange opportunity to enable the first party to supply surplus empty containers to the second party at the first port based on the first container characteristics and the second party to supply surplus empty containers to the first party at the second port based on the second container characteristics. After the offeree obtains containers, they will be shipped to a port determined by the exporters. To ensure the sustainability of this method, the system should provide equal benefits to both the offeror and the offeree. Accordingly, the system will consider not only the number of containers exchanged but also the duration the offeree may hold them in its custody. This reduces container repositioning costs by utilizing mathematical modeling, algorithms, big data, machine learning, and artificial intelligence. This method and system may reduce the container repositioning cost by twenty percent.

Keywords: container inventory, benefit of exchange, reposition, imbalance, shipping, carriers, offeree, offeror

Procedia PDF Downloads 30
2725 Political Economy of Internal Dispalcement, Migration and Human Security in Zimbabwe: 1800 to Present Day

Authors: Chupicai Manuel

Abstract:

The purpose of this article is to examine the political economy and history of internal displacement, migration and human security in Zimbabwe from 1800 to present day. The article gives a timeline of major internal displacement, migration trends that took place in Zimbabwe before colonialism, through the colonial period up to the present day and examines the human security context of such periods. In view of the above, a political economy analysis will be employed to examine the different factors that promoted internal displacement and human movements from 1800 to the present day and explore the architecture of human security in Zimbabwe. The ultimate goal of this literature review is to provide a longitudinal analysis of internal displacement, migration and human security regimes that existed in Zimbabwe with the view of promoting social cohesion and nation building.

Keywords: human security, internal displacement, migration, political economy

Procedia PDF Downloads 319
2724 Mapping the Digital Landscape: An Analysis of Party Differences between Conventional and Digital Policy Positions

Authors: Daniel Schwarz, Jan Fivaz, Alessia Neuroni

Abstract:

Although digitization is a buzzword in almost every election campaign, the political parties leave voters largely in the dark about their specific positions on digital issues. In the run-up to the 2019 elections in Switzerland, the ‘Digitization Monitor’ project (DMP) was launched in order to change this situation. Within the framework of the DMP, all 4,736 candidates were surveyed about their digital policy positions and values. The DMP is designed as a digital policy supplement to the existing ‘smartvote’ voting advice application. This enabled a direct comparison of the digital policy attitudes according to the DMP with the topics of the ‘smartvote’ questionnaire which are comprehensive in content but mainly related to conventional policy areas. This paper’s main research goal is to analyze and visualize possible differences between conventional and digital policy areas in terms of response patterns between and within political parties. The analysis is based on dimensionality reduction methods (multidimensional scaling and principal component analysis) for the visualization of inter-party differences, and on standard deviation as a measure of variation for the evaluation of intra-party unity. The results reveal that digital issues show a lower degree of inter-party polarization compared to conventional policy areas. Thus, the parties have more common ground in issues on digitization than in conventional policy areas. In contrast, the study reveals a mixed picture regarding intra-party unity. Homogeneous parties show a lower degree of unity in digitization issues whereas parties with heterogeneous positions in conventional areas have more united positions in digital areas. All things considered, the findings are encouraging as less polarized conditions apply to the debate on digital development compared to conventional politics. For the future, it would be desirable if in further countries similar projects to the DMP could emerge to broaden the basis for conclusions.

Keywords: comparison of political issue dimensions, digital awareness of candidates, digital policy space, party positions on digital issues

Procedia PDF Downloads 157
2723 Leadership Succession and Renewal in Zimbabwe Political Parties: A Critical Analysis of the Bhora Remusango Concept

Authors: A. F. Chikerema

Abstract:

Political leadership in Africa vary from the “criminalization” of the state to political leadership as “dispensing patrimony”, the “recycling” of elites and the use of state power and resources to consolidate political and economic power (Van Wyk:2007: p1). Political parties just like any other organizations always need leadership renewal and revamping, besides ideological and policy renewal. Zimbabwean politics present a shunned leadership renewal as reflected by the two champion political parties namely ZANU PF and MDC-T. Despite hot political power contestation between MDC and ZANUPF, the parties` internal structures are hinged on the two Godfather or Father figure that is Mugabe and Tsvangirai. They are the “labels “behind the two political parties. The suppressing of dissent voice on succession and renewal of leadership in the two parties has brew resistance from within and this has resulted in factional fights within the two political parties. The disgruntlement in the political parties has led to the stemming of the ‘bhoramusango concept’ from the electorate and party cadres whereby they are throwing or donating away their votes to other political parties. The ‘bhoramusango’ concept haunted ZANUPF in 2008 leading to its defeat by the opposition MDC-T .The paper takes the form of an analytic approach on leadership crisis in Zimbabwe. The narrative is framed on key concepts of leadership: namely leadership renewal and leadership succession, as agents operating within inherited structures negotiated political settlements, and form structures of leadership. Rulers gave priority to the consolidation of state power by installing party loyalists in the armed forces, civil service and local government. As part of this process, rulers have ensured consolidated power and authority.

Keywords: leadership renewal, leadership succession, ‘Bhora Musango’, political culture, political legitimacy

Procedia PDF Downloads 385
2722 Research on Measuring Operational Risk in Commercial Banks Based on Internal Control

Authors: Baobao Li

Abstract:

Operational risk covers all operations of commercial banks and has a close relationship with the bank’s internal control. But in the commercial banks' management practice, internal control is always separated from the operational risk measurement. With the increasing of operational risk events in recent years, operational risk is paid more and more attention by regulators and banks’ managements. The paper first discussed the relationship between internal control and operational risk management and used CVaR-POT model to measure operational risk, and then put forward a modified measurement method (to use operational risk assessment results to modify the measurement results of the CVaR-POT model). The paper also analyzed the necessity and rationality of this method. The method takes into consideration the influence of internal control, improves the accuracy and effectiveness of operational risk measurement and save the economic capital for commercial banks, avoiding the drawbacks of using some mainstream models one-sidedly.

Keywords: commercial banks, internal control, operational risk, risk measurement

Procedia PDF Downloads 365
2721 Transfer of Contractual Right of Suit Evidenced in Carriage Contract of Bill of Lading in Nigeria

Authors: Eunice Chiamaka Allen-Ngbale

Abstract:

Prior to bill of lading (BOL), merchants travelled along with their goods; then recorded the goods in the ship’s mates’ register; and finally started selling the goods while in transit by way of BOL, indicative that BOL is negotiable. Common law doctrine of privity of contract did not allow the transfer of right to sue to a non-party to the contract. This created hardship to cargo owners, which made many jurisdictions enact laws in this regard. Bill of Lading Act 1855 (BLA) was enacted in the United Kingdom, which applied as statute of general application under section 375 Merchant Shipping Act 1990 (MSA) in Nigeria; and conferred contractual rights of the suit on consignees and endorsees, but on the passing of ownership upon or by reason of such consignment or endorsement on the shipment of the goods simultaneously. The repeal of section 375 MSA by section 439 MSA 2007 created a lacuna, and the doctrine of privity of contract is the extant law in Nigeria. The aim of this study is to evaluate laws governing the transfer of the contractual right of suit to a third party under the bill of lading in Nigeria. The specific objectives of this study are to ascertain: (i) whether the extant law of common law doctrine of privity of the contract covers the transfer of the right of suit to the third party under the bill of lading in Nigeria; (ii) impediment(s) of the common law to transfer such right in Nigeria in the absence of any legislation; (iii) the level of applicability of the doctrine of privity of contract as it relates to transfer of the contractual right of suit to third party under the bill of lading in Nigeria; and (iv) whether to proffer possible suggestion on how to fill the lacuna left by the repeal of Merchant Shipping Act 1990. This work adopted a doctrinal approach with reliance on primary and secondary source materials. It finds that the common law doctrine of privity of contract in Nigeria is retrogressive. This work recommends for amendment of the relevant statute to cure this defect/lacuna like other commonwealth nations for best international practices.

Keywords: contract of carriage by sea, doctrine of privity of contract, lawful holder of bill of lading, third party right of suit

Procedia PDF Downloads 130
2720 Inflation and Unemployment Rates as Indicators of the Transition European Union Countries Monetary Policy Orientation

Authors: Elza Jurun, Damir Piplica, Tea Poklepović

Abstract:

Numerous studies carried out in the developed western democratic countries have shown that the ideological framework of the governing party has a significant influence on the monetary policy. The executive authority consisting of a left-wing party gives a higher weight to unemployment suppression and central bank implements a more expansionary monetary policy. On the other hand, right-wing governing party considers the monetary stability to be more important than unemployment suppression and in such a political framework the main macroeconomic objective becomes the inflation rate reduction. The political framework conditions in the transition countries which are new European Union (EU) members are still highly specific in relation to the other EU member countries. In the focus of this paper is the question whether the same monetary policy principles are valid in these transitional countries as well as they apply in developed western democratic EU member countries. The data base consists of inflation rate and unemployment rate for 11 transitional EU member countries covering the period from 2001 to 2012. The essential information for each of these 11 countries and for each year of the observed period is right or left political orientation of the ruling party. In this paper we use t-statistics to test our hypothesis that there are differences in inflation and unemployment between right and left political orientation of the governing party. To explore the influence of different countries, through years and different political orientations descriptive statistics is used. Inflation and unemployment should be strongly negatively correlated through time, which is tested using Pearson correlation coefficient. Regarding the fact whether the governing authority is consisted from left or right politically oriented parties, monetary authorities will adjust its policy setting the higher priority on lower inflation or unemployment reduction.

Keywords: inflation rate, monetary policy orientation, transition EU countries, unemployment rate

Procedia PDF Downloads 413
2719 Design Criteria for an Internal Information Technology Cost Allocation to Support Business Information Technology Alignment

Authors: Andrea Schnabl, Mario Bernhart

Abstract:

The controlling instrument of an internal cost allocation (IT chargeback) is commonly used to make IT costs transparent and controllable. Information Technology (IT) became, especially for information industries, a central competitive factor. Consequently, the focus is not on minimizing IT costs but on the strategic aligned application of IT. Hence, an internal IT cost allocation should be designed to enhance the business-IT alignment (strategic alignment of IT) in order to support the effective application of IT from a company’s point of view. To identify design criteria for an internal cost allocation to support business alignment a case study analysis at a typical medium-sized firm in information industry is performed. Documents, Key Performance Indicators, and cost accounting data over a period of 10 years are analyzed and interviews are performed. The derived design criteria are evaluated by 6 heads of IT departments from 6 different companies, which have an internal IT cost allocation at use. By applying these design criteria an internal cost allocation serves not only for cost controlling but also as an instrument in strategic IT management.

Keywords: accounting for IT services, Business IT Alignment, internal cost allocation, IT controlling, IT governance, strategic IT management

Procedia PDF Downloads 134
2718 The Success and Failure of the Solicitor General When the U.S. Government Appears as a Direct Party before the U.S. Supreme Court

Authors: Joseph Ignagni, Rebecca Deen

Abstract:

This paper analyzes the extent to which the U.S. Supreme Court votes to support the position of the United States in cases where the government is a party to the litigation. This study considers the relationship between the Solicitor General’s Office and the U.S. Supreme Court. The Solicitor General has the unique position of being the representative of the Executive Branch and the U.S. government before the Supreme Court. While a great deal of research has looked at the Solicitor General’s success as a “friend of the court,” far less has considered this relationship when the U.S. is a direct party in the litigation. This paper investigates the success rate of the Solicitor General’s Office in these cases. We find that there is considerable variation in the U.S. government’s success rate before the Court depending on the issue, Supreme Court leadership, the ideological direction of the Court and whether the U.S. approached the Court as a petitioner or respondent. We conduct our analysis on the Court’s decisions from 1953-2009. This study adds to our understanding of checks and balances, separation of powers, and inter-institutional relationships between the branches of the federal government of the United States.

Keywords: U.S. president, solicitor general, U.S. Supreme Court, separation of power, checks and balances

Procedia PDF Downloads 327
2717 A Comparison of Methods for Neural Network Aggregation

Authors: John Pomerat, Aviv Segev

Abstract:

Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.

Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning

Procedia PDF Downloads 128
2716 Determining Factors Influencing the Total Funding in Islamic Banking of Indonesia

Authors: Euphrasia Susy Suhendra, Lies Handrijaningsih

Abstract:

The banking sector as an intermediary party or intermediaries occupies a very important position in bridging the needs of working capital investment in the real sector with funds owner. This will certainly make money more effectively to improve the economic value added. As an intermediary, Islamic banks raise funds from the public and then distribute in the form of financing. In practice, the distribution of funding that is run by Islamic Banking is not as easy as, in theory, because, in fact, there are many financing problems; some are caused by lacking the assessment and supervision of banks to customers. This study aims to analyze the influence of the Third Party Funds, Return on Assets (ROA), Non Performing Financing (NPF), and Financing Deposit Ratio (FDR) to Total Financing provided to the Community by Islamic Banks in Indonesia. The data used is monthly data released by Bank of Indonesia in Islamic Banking Statistics in the time period of January 2009 - December 2013. This study uses cointegration test to see the long-term relationship, and use error correction models to examine the relationship of short-term. The results of this study indicate that the Third Party Fund has a short-term effect on total funding, Return on Assets has a long term effect on the total financing, Non Performing Financing has long-term effects of total financing, and Financing deposit ratio has the effect of short-term and long-term of the total financing provided by Islamic Banks in Indonesia.

Keywords: Islamic banking, third party fund, return on asset, non-performing financing, financing deposit ratio

Procedia PDF Downloads 431
2715 Aggression, Satisfaction and Online Rant Engagement of College Students in General Santos City

Authors: Amanda Andrea Beatrix Brita, Dominic J. Buenaventura, Charmaine A. Seromines, Antonne Noel V. Chua, Ma. Luisa G. Badilles

Abstract:

Online ranting, or the act of forcefully expressing your opinion towards other people over the Internet, has been an ongoing issue ever since the creation of the Internet. Due to the COVID-19 pandemic, the rise of active users has been observed to have increased during this time, thus increasing the number of people being engaged in online activities, which consequently affects the number of individuals who participate in online ranting. However, with all that is observed, what is usually not a topic being discussed about this event are the motivations that lead people to do online ranting. The study was undertaken to discover the level of aggression, Satisfaction, and online engagement in their environment. We utilized 2 researcher-made questionnaires that were validated by three experts, namely for the Satisfaction and engagement levels. We adapted Cyber-Aggression Typology Questionnaire (CATQ) for the level of aggression. Quota sampling was used in determining the respondents. A quota of 250 students was recommended. The results showed that the students in every institution have a deficient level of aggression, and the majority of the institution has a shallow level of Satisfaction when it comes to online ranting. Similar findings are presented in the level of engagement; 2 out of 3 of the institution students have shallow engagement in the general settings that expound students' engagement. Although the result shows deficient levels, there are still instances and possibilities that students may still engage in an online rant regarding various circumstances when triggered. Researchers assumed that there are restrictions on movements likely to show opinions online because of consequences.

Keywords: aggression, satisfaction, online rant engagement, online rant

Procedia PDF Downloads 44
2714 Displaced People in International Marriage Law: Choice of Law and the 1951 Convention Relating to the Status of Refugees

Authors: Rorick Daniel Tovar Galvan

Abstract:

The 1951 Convention relating to the status of refugees contains a conflict of law rule for the determination of the applicable law to marriage. The wording of this provision leaves much to be desired as it uses the domicile and the residence of the spouses as single main and subsidiary connecting factors. In cases where couples live in different countries, the law applicable to the case is unclear. The same problem arises when refugees are married to individuals outside of the convention’s scope of application. Different interpretations of this legal provision have arisen to solve this problem. Courts in a number of European countries apply the so-called modification doctrine: states should apply their domestic private international rules in all cases involving refugees. Courts shall, however, replace the national connecting factor by the domicile or residence in situations where nationality is used to determine the applicable law. The internal conflict of law rule will then be slightly modified in order to be applied according to the convention. However, this approach excludes these people from using their national law if they so desire. As nationality is, in all cases, replaced by domicile or residence as connecting factor, refugees are automatically deprived of the possibility to choose this law in jurisdictions that include the party autonomy in international marriage law. This contribution aims to shed light on the international legal framework applicable to marriages celebrated by refugees and the unnecessary restrictions to the exercise of the party autonomy these individuals are subjected to. The interest is motivated by the increasing number of displaced people, the significant number of states party to the Refugee Convention – approximately 150 – and the fact that more and more countries allow choice of law agreements in marriage law. Based on a study of German, Spanish and Swiss case law, the current practices in Europe, as well as some incoherencies derived from the current interpretation of the convention, will be discussed. The main objective is showing that there is neither an economic nor a legal basis to deny refugees the right to choose the law of their country of origin in those jurisdictions providing for this possibility to other foreigners. Quite the contrary, after analyzing other provisions contained in the conventions, this restriction would mean a contravention of other obligations included in the text.

Keywords: choice of law, conflict of laws, international marriage law, refugees

Procedia PDF Downloads 118
2713 Ways for University to Conduct Research Evaluation: Based on National Research University Higher School of Economics Example

Authors: Svetlana Petrikova, Alexander Yu Kostinskiy

Abstract:

Management of research evaluation in the Higher School of Economics (HSE) originates from the HSE Academic Fund created in 2004 to facilitate and support academic research and presents its results to international academic community. As the means to inspire the applicants, science projects went through competitive selection process evaluated by the group of experts. Drastic development of HSE, quantity of applied projects for each Academic Fund competition and the need to coordinate the conduct of expert evaluation resulted in founding of the Office for Research Evaluation in 2013. The Office’s primary objective is management of research evaluation of science projects. The standards to conduct the evaluation are defined as follows: - The exercise of the process approach, the unification of the functioning of department. - The uniformity of regulatory, organizational and methodological framework. - The development of proper on-line evaluation system. - The broad involvement of external Russian and international experts, the renouncement of the usage of own employees. - The development of an algorithm to make a correspondence between experts and science projects. - The methodical usage of opened/closed international and Russian databases to extend the expert database. - The transparency of evaluation results – free access to assessment while keeping experts confidentiality. The management of research evaluation of projects is based on the sole standard, organization and financing. The standard way of conducting research evaluation at HSE is based upon Regulations on basic principles for research evaluation at HSE. These Regulations have been developed from the moment of establishment of the Office for Research Evaluation and are based on conventional corporate standards for regulatory document management. The management system of research evaluation is implemented on the process approach basis. Process approach means deployment of work as a process, which is the aggregation of interrelated and interacting activities processing inputs into outputs. Inputs are firstly client asking for the assessment to be conducted, defining the conditions for organizing and carrying of the assessment and secondly the applicant with proper for the competition application; output is assessment given to the client. While exercising process approach to clarify interrelation and interacting main parties or subjects of the assessment are determined and the way for interaction between them forms up. Parties to expert assessment are: - Ordering Party – The department of the university taking the decision to subject a project to expert assessment; - Providing Party – The department of the university authorized to provide such assessment by the Ordering Party; - Performing Party – The legal and natural entities that have expertise in the area of research evaluation. Experts assess projects in accordance with criteria and states of expert opinions approved by the Ordering Party. Objects of assessment generally are applications or HSE competition project reports. Mainly assessments are deployed for internal needs, i.e. the most ordering parties are HSE branches and departments, but assessment can also be conducted for external clients. The financing of research evaluation at HSE is based on the established corporate culture and traditions of HSE.

Keywords: expert assessment, management of research evaluation, process approach, research evaluation

Procedia PDF Downloads 223
2712 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 125