Search results for: money laundering cryptocurrency
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 581

Search results for: money laundering cryptocurrency

491 SME Credit Financing, Financial Development and Economic Growth: A VAR Approach to the Nigerian Economy

Authors: A. Bolaji Adesoye, Alimi Olorunfemi

Abstract:

This paper examines the impact of small and medium-scale enterprises (SMEs) credit financing and financial market development and their shocks on the output growth of Nigeria. The study estimated a VAR model for Nigeria using 1970-2013 annual data series. Unit root tests and cointegration are carried out. The study also explores IRFs and FEVDs in a system that includes output, commercial bank loan to SMEs, domestic credit to private sector by banks, money supply, lending rate and investment. Findings suggest that shocks in commercial bank credit to SMEs has a major impact on the output changes of Nigeria. Money supply shocks also have a sizeable impact on output growth variations amidst other financial instruments. Lastly, neutrality of investment does not hold in Nigeria as it also has impact on output fluctuations.

Keywords: SMEs financing, financial development, investment, output, Nigeria

Procedia PDF Downloads 381
490 Influence of Oil Prices on the Central Caucasus State of Georgia

Authors: Charaia Vakhtang

Abstract:

Global oil prices are seeing new bottoms every day. The prices have already collapsed beneath the psychological verge of 30 USD. This tendency would be fully acceptable for the Georgian consumers, but there is one detail: two our neighboring countries (one friendly and one hostile) largely depend on resources of these hydrocarbons. Namely, the ratio of Azerbaijan in Georgia’s total FDI inflows in 2014 marked 20%. The ratio reached 40% in the January to September 2015. Azerbaijan is Georgia’s leading exports market. Namely, in 2014 Georgia’s exports to Azerbaijan constituted 544 million USD, i.e. 19% in Georgia’s total experts. In the January to November period of 2015, the ratio exceeded 11%. Moreover, Azerbaijan is Georgia’s strategic partner country as part of many regional projects that are designated for long-term perspectives. For example, the Baku-Tbilisi-Karsi railroad, the Black Sea terminal, preferential gas tariffs for Georgia and so on. The Russian economic contribution to the Georgian economy is also considerable, despite the losses the Russian hostile policy has inflicted to our country. Namely, Georgian emigrants are mainly employed in the Russian Federation and this category of Georgian citizens transfers considerable funds to Georgia every year. These transfers account for about 1 billion USD and consequently, these funds previously equalized to total FDI inflows. Moreover, despite the difficulties in the Russian market, Russia still remains a leader in terms of money transfers to Georgia. According to the last reports, money transfers from Russia to Georgia slipped by 276 million USD in 2015 compared to 2014 (-39%). At the same time, the total money transfers to Georgia in 2015 marked 1.08 billion USD, down 25% from 1.44 billion USD in 2014. This signifies the contraction in money transfers is by ¾ dependent on the Russian factor (in this case, contraction in oil prices and the Russian Ruble devaluation directly make negative impact on money transfers to Georgia). As to other countries, it is interesting that money transfers have also slipped from Italy (to 109 million USD from 121 million USD). Nevertheless, the country’s ratio in total money transfers to Georgia has increased to 10% from 8%. Money transfers to Georgia have increased by 22% (+18 million USD) from the USA. Money transfers have halved from Greece to 117 million USD from 205 million USD. As to Turkey, money transfers to Georgia from Turkey have increased by 1% to 69 million USD. Moreover, the problems with the national currencies of Russia and Azerbaijan, along with the above-mentioned developments, outline unfavorable perspectives for the Georgian economy. The depreciation of the national currencies of Azerbaijan and Russia is expected to bring unfavorable results for the Georgian economy. Even more so, the statement released by the Russian Finance Ministry on expected default is in direct relation to the welfare of the whole region and these tendencies will make direct and indirect negative impacts on Georgia’s economic indicators. Amid the economic slowdown in Armenia, Turkey and Ukraine, Georgia should try to enhance economic ties with comparatively stronger and flexible economies such as EU and USA. In other case, the Georgian economy will enter serious turbulent zone. We should make maximum benefit from the EU association agreement. It should be noted that the Russian economy slowdown that causes both regretful and happy moods in Georgia, will make negative impact on the Georgian economy. The same forecasts are made in relation to Azerbaijan. However, Georgia has many partner countries. Enhancement and development of the economic relations with these countries may maximally alleviate negative impacts from the declining economies. First of all, the EU association agreement should be mentioned as a main source for Georgia’s economic stabilization. It is the Georgian government‘s responsibility to successfully fulfill the EU association agreement requirements. In any case the imports must be replaced by domestic products and the exports should be stimulated through government support programs. The Authorities should ensure drawing more foreign investments and money resources, accumulating more tourism revenues and reducing external debts, budget expenditures should be balanced and the National Bank should carry out strict monetary policy. Moreover, the Government should develop a long-term state economic policy and carry out this policy at various Ministries. It is also of crucial importance to carry out constitutive policy and promote perspective directions on the domestic level.

Keywords: oil prices, economic growth, foreign direct investments, international trade

Procedia PDF Downloads 247
489 Islamic Banking: A New Trend towards the Development of Banking Law

Authors: Inese Tenberga

Abstract:

Undoubtedly, the focus of the present capitalist system of finance has shifted from the concept of productivity of money to the ‘cult of money’, which is characterized by such notions as speculative activity, squander, self-profit, vested interest, etc. The author is certain that a civilized society cannot follow this economic path any longer and therefore suggests that one solution would be to integrate the Islamic financial model in the banking sector of the EU to overcome its economic vulnerability and structurally transform its economies or build resilience against shocks and crisis. The researcher analyses the Islamic financial model, which is providing the basis for the concept of non-productivity of money, and proposes to consider it as a new paradigm of economic thinking. The author argues that it seeks to establish a broad-based economic well-being with an optimum rate of economic growth, socio-economic justice, equitable distribution of income and wealth. Furthermore, the author analyses and proposes to use the experience of member states of the Islamic Development Bank for the formation of a new EU interest free banking. It is offered to create within the EU banking system a credit sector and investment sector respectively. As a part of the latter, it is recommended to separate investment banks specializing in speculative investments and non­speculative investment banks. Meanwhile, understanding of the idea of Islamic banking exclusively from the perspective of the manner of yielding profit that differs from credit banking, without considering the legal, social, ethical guidelines of Islam impedes to value objectively the advantages of this type of financial activities at the non-Islamic jurisdictions. However, the author comes to the conclusion the imperative of justice and virtue, which is inherent to all of us, exists regardless of religion. The author concludes that the global community should adopt the experience of the Muslim countries and focus on the Islamic banking model.

Keywords: credit sector, EU banking system, investment sector, Islamic banking

Procedia PDF Downloads 139
488 Determinants of Mobile Payment Adoption among Retailers in Ghana

Authors: Ibrahim Masud, Yusheng Kong, Adam Diyawu Rahman

Abstract:

Mobile payment variously referred to as mobile money, mobile money transfer, and mobile wallet refers to payment services operated under financial regulation and performed from or via a mobile device. Mobile payment systems have come to augment and to some extent try to replace the conventional payment methods like cash, cheque, or credit cards. This study examines mobile payment adoption factors among retailers in Ghana. A conceptual framework was adopted from the extant literature using the Technology Acceptance Model and the Theory of Reasoned action as the theoretical bases. Data for the study was obtained from a sample of 240 respondents through a structured questionnaire. The PLS-SEM was used to analyze the data through SPSS v.22 and SmartPLS v.3. The findings indicate that factors such as perceived usefulness, perceived ease of use, perceived security, competitive pressure and facilitating conditions are the main determinants of mobile payment adoption among retailers in Ghana. The study contributes to the literature on mobile payment adoption from developing country context.

Keywords: mobile payment, retailers, structural equation modeling, technology acceptance model

Procedia PDF Downloads 147
487 Child Labour and Contemporary Slavery: A Nigerian Perspective

Authors: Obiageli Eze

Abstract:

Millions of Nigerian children are subjected daily to all forms of abuse, ranging from trafficking to slavery, and forced labor. These under age children are taken from different parts of the Country to be used as sex slaves and laborers in the big cities, killed for rituals, organ transplantation, or used for money laundering, begging on the streets or are put to work in the fields. These children are made to do inhuman jobs under degrading conditions and face all kinds of abuse at the hands of their owners with no hope of escape. While lots of people blame poverty or culture as a basis for human trafficking in Nigeria, the National Agency for the Prohibition and Trafficking in Persons and other Related Matters (NAPTIP) says other causes of the outrageous rate of human trafficking in the country are ignorance, desperation, and the promotion and commercialization of sex by the European Union (EU) as dozens of young Nigerian children and women are forced to work as prostitutes in European countries including the Netherlands, France, Italy, and Spain. In the cause of searching for greener pastures, they are coerced into work they have not chosen and subjected to perpetual life in bondage. The Universal Declaration of Human Rights 1948 prohibits slave trade and slavery. Despite the fact that Nigeria is a Sovereign member of the United Nations and signatory to this International instrument, Child trafficking and slavery is still on the increase. This may be caused by the fact that the punishment for this crime in Nigeria is a maximum term of 10 years imprisonment with some of the worst offenders getting off with as little as 2 years imprisonment or an option of fine. It goes without saying that this punishment is not sufficient to act as a deterrent to these modern slave traders. Another major factor oiling the wheel of trafficking in the country is voodoo. The victims are taken to shrines of voodoo priests for oath taking. There, underage girls and boys are made to swear that they would never reveal the identities of their traffickers to anyone if arrested whether in the course of the journey or in the destination countries and that they would pay off debt. Nigeria needs tougher Laws in order to be able to combat human trafficking and slave trade. Also there has to be aggressive sensitization and awareness programs designed to educate and enlighten the public as to the dangers faced by these victims and the need to report any suspicious activity to the authorities. This paper attempts to give an insight into the plight of under-age Nigerian children trafficked and sold as slaves and offer a more effective stand in the fight against it.

Keywords: child labor, slavery, slave trade, trafficking

Procedia PDF Downloads 474
486 Nutritional Status of Food Insecure Students, UWC

Authors: E. C. Swart, E. Kunneke

Abstract:

Background: Disparities in food security exist between communities and households across the country, reflecting continuing social and economic inequalities. The purpose of this study was to investigate the presence of food insecurity amongst UWC students. Method: Cross-sectional study recruited 200 students via email and cellphone from an ICS generated list of randomly selected students aged 18-25. Data collection took place during the first two weeks of term 3. Individual appointments were made with consenting participants and conducted in English by trained BSc Dietetics students. Data was analysed using SPSS. The hunger scale used by Stats SA (October 2010) was used. Dietary intake was assessed using a single 24hr recall. Results: Sixty-three percent of the students reported that they do experience some food insecurity whilst 14.5% reported to go hungry due to inadequate access to food. Coping mechanisms during periods of food insecurity include: Asking a friend, neighbour, family member (40%); Borrow (15%); Steal (none); Casual jobs (12%). Anthropometric status of students did not differ statistically significantly by food security status. A statistically significantly greater proportion of Xhosa speaking students reported inadequate money for food. Students residing in residences off campus appear to be least food secure in terms of money available and limiting food intake, whilst those residing at home are less food insecure. Similar proportions of students who receive bursaries or whose parents are paying reported going hungry whilst those who supports themselves never goes hungry. Mean nutrient intake during the previous 24 hours of students who reported inadequate resources to buy food, who eat less due to inadequate resources and who goes hungry only differed statistically significantly for Vitamin B (go hungry) and for fibre (money shortage). In general the nutrient intake is lower for those who reported to eat less and go hungry except for added sugar, vitamin A and folate (go hungry), and energy, fibre, iron, riboflavin and folate (eat less). For students who reported to have inadequate money to buy food, the mean nutrient intake was higher except for calcium and thiamin. The mean body mass index of this group of students was also higher even though the difference was not statistically significant. Conclusion: Hunger is present on campus however a single 24hr recall did not confirm statistically significant lower nutrient intakes for students who reported different levels of food insecurity.

Keywords: anthropometry, dietary intake, nutritional status, students

Procedia PDF Downloads 344
485 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 131
484 Impact of Sustainability Reporting on the Financial Performance of Deposit Money Banks: Pre-Post Analysis of Integrating Environmental, Social, and Governance Disclosure into Corporate Annual Reports

Authors: A. O. Talabi, F. M. Taib, D. J. Jalaludin

Abstract:

The influence of sustainability reporting on Deposit Money Banks (DMBs)' financial performance both before and after mandated environmental, social, and governance (ESG) disclosure is examined in this article. Using a sample size of the top six strategically important listed banks in Nigeria, the study employed the paired sample t-test to assess the pre-mandatory ESG period (2009-2015) and the post-mandatory ESG period (2016-2022). According to the findings, there was no discernible difference between the performance of DMBs in Nigeria before and after the requirement for ESG disclosure. In the pre-mandatory requirement time, sustainability reporting is a major predictor of financial metrics, but in the post-mandatory requirement period, there was no discernible change in financial performance. Market authorities ought to have unrestricted authority to impose severe fines for noncompliance and bring legal action against corporations that fail to disclose ESG. This work contributes to the literature on ESG disclosure and financial performance by considering two different periods.

Keywords: financial, performance, sustainability, reporting

Procedia PDF Downloads 92
483 Usage of Cyanobacteria in Battery: Saving Money, Enhancing the Storage Capacity, Making Portable, and Supporting the Ecology

Authors: Saddam Husain Dhobi, Bikrant Karki

Abstract:

The main objective of this paper is save money, balance ecosystem of the terrestrial organism, control global warming, and enhancing the storage capacity of the battery with requiring weight and thinness by using Cyanobacteria in the battery. To fulfill this purpose of paper we can use different methods: Analysis, Biological, Chemistry, theoretical and Physics with some engineering design. Using this different method, we can produce the special type of battery that has the long life, high storage capacity, and clean environment, save money so on and by using the byproduct of Cyanobacteria i.e. glucose. Cyanobacteria are a special type of bacteria that produces different types of extracellular glucoses and oxygen with the help of little sunlight, water, and carbon dioxide and can survive in freshwater, marine and in the land as well. In this process, O₂ is more in the comparison to plant due to rapid growth rate of Cyanobacteria. The required materials are easily available in this process to produce glucose with the help of Cyanobacteria. Since CO₂, is greenhouse gas that causes the global warming? We can utilize this gas and save our ecological balance and the byproduct (glucose) C₆H₁₂O₆ can be utilized for raw material for the battery where as O₂ escape is utilized by living organism. The glucose produce by Cyanobateria goes on Krebs's Cycle or Citric Acid Cycle, in which glucose is complete, oxidizes and all the available energy from glucose molecule has been release in the form of electron and proton as energy. If we use a suitable anodes and cathodes, we can capture these electrons and protons to produce require electricity current with the help of byproduct of Cyanobacteria. According to "Virginia Tech Bio-battery" and "Sony" 13 enzymes and the air is used to produce nearly 24 electrons from a single glucose unit. In this output power of 0.8 mW/cm, current density of 6 mA/cm, and energy storage density of 596 Ah/kg. This last figure is impressive, at roughly 10 times the energy density of the lithium-ion batteries in your mobile devices. When we use Cyanobacteria in battery, we are able to reduce Carbon dioxide, Stop global warming, and enhancing the storage capacity of battery more than 10 times that of lithium battery, saving money, balancing ecology. In this way, we can produce energy from the Cyanobacteria and use it in battery for different benefits. In addition, due to the mass, size and easy cultivation, they are better to maintain the size of battery. Hence, we can use Cyanobacteria for the battery having suitable size, enhancing the storing capacity of battery, helping the environment, portability and so on.

Keywords: anode, byproduct, cathode, cyanobacteri, glucose, storage capacity

Procedia PDF Downloads 316
482 Energy Box Programme in the Netherlands

Authors: B. E. Weber, N. Vrielink, M. G. Rietbergen

Abstract:

This paper explores the long-term effects of the Energy Box trajectory on households in the private rental sector, specifically households experiencing energy poverty. The concept of energy poverty has been getting increasing attention among policymakers over the past few years. In the Netherlands, as far as we know, there are no national policies on alleviating energy poverty, which negatively impacts energy-poor households. The Energy Box can help households experiencing energy poverty by stimulating them to improve the energy efficiency of their home by changing their energy-saving behavior. Important long-term effects are that respondents indicate that they live in a more environmentally friendly way and that they save money on their energy bills. Households feel engaged with the concept of energy-saving and can see the benefits of changing their energy-saving behavior. Respondents perceived the Energy Box as a means to live more environmentally friendly, instead of it solely being a means to save money on energy bills. The findings show that most respondents signed up for the Energy Box are interested in energy-saving as a lifestyle choice instead of a financial choice, which would likely be the case for households experiencing energy poverty.

Keywords: energy-saving behavior, energy poverty, poverty, private rental sector

Procedia PDF Downloads 77
481 The Prediction of Sound Absorbing Coefficient for Multi-Layer Non-Woven

Authors: Un-Hwan Park, Jun-Hyeok Heo, In-Sung Lee, Tae-Hyeon Oh, Dae-Gyu Park

Abstract:

Automotive interior material consisting of several material layers has the sound-absorbing function. It is difficult to predict sound absorbing coefficient because of several material layers. So, many experimental tunings are required to achieve the target of sound absorption. Therefore, while the car interior materials are developed, so much time and money is spent. In this study, we present a method to predict the sound absorbing performance of the material with multi-layer using physical properties of each material. The properties are predicted by Foam-X software using the sound absorption coefficient data measured by impedance tube. Then, we will compare and analyze the predicted sound absorption coefficient with the data measured by scaled reverberation chamber and impedance tubes for a prototype. If the method is used instead of experimental tuning in the development of car interior material, the time and money can be saved, and then, the development effort can be reduced because it can be optimized by simulation.

Keywords: multi-layer nonwoven, sound absorption coefficient, scaled reverberation chamber, impedance tubes

Procedia PDF Downloads 346
480 The Quality and Management Development for Traditional Community Retailers in Samut Songkhram Province, Thailand

Authors: Suppara Charoenpoom

Abstract:

The purposes of this research were to investigate the level of consumers’ awareness of the traditional community retailers in terms of location, service quality, risk, shopping enjoyment, value for money, shopping satisfaction and intention to repurchase as well as to investigate the factors influenced the consumers’ repurchase in Samut Sonkhram Province, Thailand. The findings revealed that consumers had a high level of awareness in terms of location, and intention to repurchase. The factors influenced the consumers’ level of satisfaction included value for money, shopping enjoyment, and service quality. The factors of consumers’ level of satisfaction had an influence to the intention to repurchase. Moreover, the findings also revealed that the majority of respondents wanted traditional community retailers to continue to operate because of these reasons: close location, convenience, credit, as well as provide a place and time for community social gathering and activities.

Keywords: quality management, service quality, traditional retailer, consumers’ awareness

Procedia PDF Downloads 359
479 Laundering vs. Blanqueo: Translating Financial Crime Metaphors From English to Spanish

Authors: Stephen Gerome

Abstract:

This study examines the translation and use of metaphors in the realm of public safety discourse and intends to shed light on a continuing problem in cross-cultural communication. Metaphors can cause problems not only within languages but also in interlingual communication. The use and misuse of metaphors may hinder the ability to adequately communicate prevention efforts and, in some cases, facilitate and allow financial crime to go undetected. The use of lexicalized metaphors in communications by political entities, journalists, and legal agents in communications regarding law, policy making, compliance monitoring and enforcement as well as in adjudication can have negative consequences if misconstrued. This study provides examples of metaphor usage in published documents in a corpus linguistic study that compares the use of lexicalized metaphors in this discourse to shed light on possible unexpected consequences as well as counterproductive ones.

Keywords: translation, legal, corpus linguistics, financial

Procedia PDF Downloads 80
478 Framing the Dynamics and Functioning of Different Variants of Terrorist Organizations: A Business Model Perspective

Authors: Eisa Younes Alblooshi

Abstract:

Counterterrorism strategies, to be effective and efficient, require a sound understanding of the dynamics, the interlinked organizational elements of the terrorist outfits being combated, with a view to having cognizance of their strong points to be guarded against, as well as the vulnerable zones that can be targeted for optimal results in a timely fashion by counterterrorism agencies. A unique model regarding the organizational imperatives was evolved in this research through likening the terrorist organizations with the traditional commercial ones, with a view to understanding in detail the dynamics of interconnectivity and dependencies, and the related compulsions facing the leaderships of such outfits that provide counterterrorism agencies with opportunities for forging better strategies. It involved assessing the evolving organizational dynamics and imperatives of different types of terrorist organizations, to enable the researcher to construct a prototype model that defines the progression and linkages of the related organizational elements of such organizations. It required detailed analysis of how the various elements are connected, with sequencing identified, as any outfit positions itself with respect to its external environment and internal dynamics. A case study focusing on a transnational radical religious state-sponsored terrorist organization was conducted to validate the research findings and to further strengthen the specific counterterrorism strategies. Six different variants of the business model of terrorist organizations were identified, categorized based on their outreach, mission, and status of any state sponsorship. The variants represent vast majority of the range of terrorist organizations acting locally or globally. The model shows the progression and dynamics of these organizations through various dimensions including mission, leadership, outreach, state sponsorship status, resulting in the organizational structure, state of autonomy, preference divergence in its fold, recruitment core, propagation avenues, down to their capacity to adapt, resulting critically in their own life cycles. A major advantage of the model is the utility of mapping terrorist organizations according to their fits to the sundry identified variants, allowing for flexibility and differences within, enabling the researchers and counterterrorism agencies to observe a neat blueprint of the organization’s footprint, along with highlighting the areas to be evaluated for focused target zone selection and timing of counterterrorism interventions. Special consideration is given to the dimension of financing, keeping in context the latest developments regarding cryptocurrencies, hawala, and global anti-money laundering initiatives. Specific counterterrorism strategies and intervention points have been identified for each of the respective model variants, with a view to efficient and effective deployment of resources.

Keywords: terrorism, counterterrorism, model, strategy

Procedia PDF Downloads 131
477 The Effect of Cognitively-Induced Self-Construal and Direct Behavioral Mimicry on Prosocial Behavior

Authors: Czar Matthew Gerard Dayday, Danielle Marie Estrera, Philippe Jefferson Galban, Gabrielle Marie Heredia

Abstract:

The study aimed to examine the effects of self-construal and direct mimicry on prosocial behavior. The study made use of a 2 (Self-construal: independent or interdependent) x 2 (Mimicry: mimicry or non-mimicry) between subjects factorial design where effects of self-construal was cognitively-induced through a story with varying pronouns (We, Us, Ourselves vs. Me, I, Myself), and prosocial behavior was measured with the amount of money donated to a fabricated advocacy. The research was conducted with a convenience sampling comprised of 88 undergraduate students (58 Females, 33 Males) aged 16 to 26 years olds from the University of the Philippines, Diliman. Results from the experiment show that both factors do not have significant main effects on prosocial behavior. Additionally, their interaction also does not have a significant effect to prosocial behavior with No Mimicry x Independent ranking highest in amount of money donated and Mimicry x Interdependent ranking lowest. These results can be attributed to multiple factors, which include the collectivist orientation and sense of kapwa of Filipinos, a role reversal in the methodology and the lack of Chameleon Effect, and a weak priming of self-construal with respect to self-relatedness.

Keywords: behavior, mimicry, prosocial, self-construal

Procedia PDF Downloads 249
476 CybeRisk Management in Banks: An Italian Case Study

Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini

Abstract:

The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.

Keywords: bank, CybeRisk, information technology, risk management

Procedia PDF Downloads 210
475 Government Credit Card in State Financial Management: Public Sector Innovation in Indonesia

Authors: Paramita Nur Kurniati, Stanislaus Riyanta

Abstract:

In the midst of the heightened usage of electronic money (e-money), Indonesian government expenditure is yet governed through cash-basis transactions. This conventional system brings about a number of potential risks and obstacles to operational conduct, including state financial liquidity issue. Consequently, Ministry of Finance is currently establishing the cashless payment methods for State Budget (APBN). Included in those advance methods is credit card facility as a government expenditure payment scheme. This policy is one of the innovations within the public sector learned from other countries’ best practices. Moreover, this particular method is already prominent within the private-sector realm. Qualitative descriptive analysis technique is implemented to evaluate the contemporary innovation of using government credit card in the path towards cashless society. This approach is expected to generate several benefits for the government, particularly in minimizing corruption within the state financial management. Effective coordination among policy makers and policy implementers is essential for the success of this policy’s exercise, without neglecting prudence and public transparency aspects. Government credit card usage shall be the potent resolution for enhancing the government’s overall public service performance.

Keywords: cashless basis, cashless society, government credit card, public sector innovation

Procedia PDF Downloads 125
474 The Effect of Mood and Normative Conformity on Prosocial Behavior

Authors: Antoine Miguel Borromeo, Kristian Anthony Menez, Moira Louise Ordonez, David Carl Rabaya

Abstract:

This study aimed to test if induced mood and normative conformity have any effect specifically on prosocial behavior, which was operationalized as the willingness to donate to a non-government organization. The effect of current attitude towards the object of the prosocial behavior was also considered with a covariate test. Undergraduates taking an introductory course on psychology (N = 132) from the University of the Philippines Diliman were asked how much money they were willing to donate after being presented a video about coral reef destruction and a website that advocates towards saving the coral reefs. A 3 (Induced mood: Positive vs Fear and Sadness vs Anger, Contempt, and Disgust) x 2 (Normative conformity: Presence vs Absence) between-subjects analysis of covariance was used for experimentation. Prosocial behavior was measured by presenting a circumstance wherein participants were given money and asked if they were willing to donate an amount to the non-government organization. An analysis of covariance revealed that the mood induced has no significant effect on prosocial behavior, F(2,125) = 0.654, p > 0.05. The analysis also showed how normative conformity has no significant effect on prosocial behavior, F(1,125) = 0.238, p > 0.05, as well as their interaction F(2, 125) = 1.580, p > 0.05. However, the covariate, current attitude towards corals was revealed to be significant, F(1,125) = 8.778, p < 0.05. From this, we speculate that inherent attitudes of people have a greater effect on prosocial behavior than temporary factors such as mood and conformity.

Keywords: attitude, induced mood, normative conformity, prosocial behavior

Procedia PDF Downloads 204
473 Self-Selected Intensity and Discounting Rates of Exercise in Comparison with Food and Money in Healthy Adults

Authors: Tamam Albelwi, Robert Rogers, Hans-Peter Kubis

Abstract:

Background: Exercise is widely acknowledged as a highly important health behavior, which reduces risks related to lifestyle diseases like type 2 diabetes, cardiovascular disease. However, exercise adherence is low in high-risk groups and sedentary lifestyle is more the norm than the exception. Expressed reasons for exercise participation are often based on delayed outcomes related to health threats and benefits but also enjoyment. Whether exercise is perceived as rewarding is well established in animal literature but the evidence is sparse in humans. Additionally, the question how stable any reward is perceived with time delays is an important question influencing decision-making (in favor or against a behavior). For the modality exercise, this has not been examined before. We, therefore, investigated the discounting of pre-established self-selected exercise compared with established rewards of food and money with a computer-based discounting paradigm. We hypothesized that exercise will be discounted like an established reward (food and money); however, we expect that the discounting rate is similar to a consumable reward like food. Additionally, we expected that individuals’ characteristics like preferred intensity, physical activity and body characteristics are associated with discount rates. Methods: 71 participants took part in four sessions. The sessions were designed to let participants select their preferred exercise intensity on a treadmill. Participants were asked to adjust their speed for optimizing pleasantness over an exercise period of up to 30 minutes, heart rate and pleasantness rating was measured. In further sessions, the established exercise intensity was modified and tested on perceptual validity. In the last exercise session rates of perceived exertion was measured on the preferred intensity level. Furthermore, participants filled in questionnaires related to physical activity, mood, craving, and impulsivity and answered choice questions on a bespoke computer task to establish discounting rates of their preferred exercise (kex), their favorite food (kfood) and a value-matching amount of money (kmoney). Results: Participants self-selected preferred speed was 5.5±2.24 km/h, at a heart rate of 120.7±23.5, and perceived exertion scale of 10.13±2.06. This shows that participants preferred a light exercise intensity with low to moderate cardiovascular strain based on perceived pleasantness. Computer assessment of discounting rates revealed that exercise was quickly discounted like a consumable reward, no significant difference between kfood and kex (kfood =0.322±0.263; kex=0.223±0.203). However, kmoney (kmoney=0.080±0.02) was significantly lower than the rates of exercise and food. Moreover, significant associations were found between preferred speed and kex (r=-0.302) and between physical activity levels and preferred speed (r=0.324). Outcomes show that participants perceived and discounted self-selected exercise like an established reward (food and money) but was discounted more like consumable rewards. Moreover, exercise discounting was quicker in individuals who preferred lower speeds, being less physically active. This may show that in a choice conflict between exercise and food the delay of exercise (because of distance) might disadvantage exercise as the chosen behavior particular in sedentary people. Conclusion: exercise can be perceived as a reward and is discounted quickly in time like food. Pleasant exercise experience is connected to low to moderate cardiovascular and perceptual strain.

Keywords: delay discounting, exercise, temporal discounting, time perspective

Procedia PDF Downloads 245
472 Early Prediction of Disposable Addresses in Ethereum Blockchain

Authors: Ahmad Saleem

Abstract:

Ethereum is the second largest crypto currency in blockchain ecosystem. Along with standard transactions, it supports smart contracts and NFT’s. Current research trends are focused on analyzing the overall structure of the network its growth and behavior. Ethereum addresses are anonymous and can be created on fly. The nature of Ethereum network and addresses make it hard to predict their behavior. The activity period of an ethereum address is not much analyzed. Using machine learning we can make early prediction about the disposability of the address. In this paper we analyzed the lifetime of the addresses. We also identified and predicted the disposable addresses using machine learning models and compared the results.

Keywords: blockchain, Ethereum, cryptocurrency, prediction

Procedia PDF Downloads 70
471 Migration and Provision of Support to Left-Behind Parents in Rural Cambodia

Authors: Benjamas Penboon, Zachary Zimmer, Aree Jampaklay

Abstract:

Cambodia is a country where labor migration has been consistently high. Coupled with advancing labor opportunities in urban areas, a function partly of globalization, this is resulting in massive migration out of rural areas. This is particularly true in Cambodia where there are high migration and a very large proportion of adult children living some distant from their parents. This paper explores characteristics associated with migrant providing support to parents in rural Cambodia. With reference to perspectives of family altruism and solidarity, this analysis particularly focusses on how a series of variables representing family integration and residential location associates with intergenerational monetary and instrumental support from migrants. The study hypothesizes that migrants are more likely to provide support when parents are in need, and there are no alternative means of support. Data come from The Rural Household Survey (N=3,713), part of the 2011 Cambodian Rural Urban Migration Project (CRUMP). Multilevel multinomial models indicate international migrants are likely to give money, while internal migrants are likely to provide both money and instrumental support, especially when migrants have no sibling and their parent in poor health status. In addition, employed migrants are two times providing monetary compared to those unemployed. Findings elucidate the decision to which and why support occurs more often when no other source of support exists and also depends on the ability to provide of migrants themselves.

Keywords: migration, left-behind parent, intergenerational relations, support, rural, Cambodia

Procedia PDF Downloads 142
470 Socioeconomic Impact of Capture and Sale of Scylla serrata in Metuge Community

Authors: Siran Offman, TeóFilo Nhamuhuco, EzíDio Cuamba

Abstract:

Scylla serrata is important for livelihood in coastal communities in Metuge District, Northern Mozambique, where the study was conducted from June to August 2014. The aim was to estimate the socioeconomic impact of mangrove crabs captures in Metuge communities. Data was collected based on semi-structured questionnaire in the landing sites and in local crab markets. In total were inquired 26 crab collectors and 6 traders, this activity is practiced only by men, with ages ranging from 15 to 68 years old. To capture the crab the collectors use a long iron hook with 1.5-2 meters, during 5-7 times per week, spending about 5-8 hours a day. The captured varied from 2-20 kg per day. In the village 1 kg costs 1-1.5 USD and 3 USD applied by traders who sell along the streets, for tourists and specific customers from Asia, where the traders can sell until 50 kg.The incomes vary from 11-174USD per month. The value chain between the collectors and trader is unreasonable, as the second makes less effort and earns more, thereby the socio-economic impact is observed, however not high for the collectors, as the money is intended to purchase food and agricultural instruments. In another hand, 90% of collectors dropped out the school, and the money does not have a great impact as they still have precarious housing, rely on community wells to access water, do not have electric power and possess high number of family members.

Keywords: socio-economic and of, impacts, capture, sale, Scylla serrata

Procedia PDF Downloads 205
469 Corruption and Anti-Corruption Policies: The Case of Iraq

Authors: Sarwan Hasan

Abstract:

This article is to investigate the main forms and causes of corruption and provides anti-corruption policies. It is significant to find out how both interact and affect each other. The research focuses particularly on the case study of Iraq from 2003 to 2023. In this way, the main methods of analysis will be the system approach to analyze the relationship of different elements of the political system of Iraq in the context of corruption, the process-tracing method to explain the reasons for corruption, and content analysis of the official documents important for the research topic. Moreover, the SWOT analysis will be used in the part about the anti-corruption policies. This article concludes that the main causes behind corruption in Iraq are power distribution based on muhassasa tayifiya (power apportionment based on ethno-sectarianism), decentralized political system, sectarian division, Iran, and socio-cultural structure. The main forms of corruption in the country are illegal enrichment, using public positions for sectarian agenda, criminal corruption, bribery, political patronage, clientelism, cronyism, nepotism, embezzlement, kickback, extortion, money laundry, speed money, theft, and justice obstruction. The main anti-corruption policies in Iraq are establishing the Commission of Integrity, Board of Supreme Audit, Inspectors General and Parliamentary Committee, Internalization (assistance from foreign actors), economic adjustment and financial reform, and the new anti-corruption program of the new Prime Minister (Mohamed Shiyah al-Sudani).

Keywords: anti-corruption, corruption, Iraq, anti-corruption policies

Procedia PDF Downloads 45
468 Child Trafficking for Adoption Purposes: A Study into the Criminogenic Factors of the German Intercountry Adoption System

Authors: Elvira Loibl

Abstract:

In Western countries, the demand for adoptable children, especially healthy babies, has been considerably high for several years. Rising infertility rates, liberal abortion politics, the widespread use of contraception, and the increasing acceptance of unmarried motherhood are factors that have decreased the number of infants available for domestic adoption in the U.S. and Europe. As a consequence, many involuntarily childless couples turn to intercountry adoption as a viable alternative to have a child of their own. However, the demand for children far outpaces the supply of orphans with the desired characteristics. The imbalance between the number of prospective adopters and the children available for intercountry adoption results in long waiting lists and high prices. The inordinate sums of money involved in the international adoption system have created a commercial ‘underbelly’ where unethical and illicit practices are employed to provide the adoption market with adoptable children. Children are being purchased or abducted from their families, hospitals or child care institutions and then trafficked to receiving countries as ‘orphans’. This paper aims to uncover and explain the factors of the German adoption system that are conducive to child trafficking for adoption purposes. It explains that the tension between money and integrity as experienced by German adoption agencies, blind trust in the authorities in the sending countries as well as a lenient control system encourage and facilitate the trafficking in children to Germany.

Keywords: child trafficking, intercountry adoption, market in adoptable babies, German adoption system

Procedia PDF Downloads 260
467 Financial Technology: The Key to Achieving Financial Inclusion in Developing Countries Post COVID-19 from an East African Perspective

Authors: Yosia Mulumba, Klaus Schmidt

Abstract:

Financial Inclusion is considered a key pillar for development in most countries around the world. Access to affordable financial services in a country’s economy can be a driver to overcome poverty and reduce income inequalities, and thus increase economic growth. Nevertheless, the number of financially excluded populations in developing countries continues to be very high. This paper explores the role of Financial Technology (Fintech) as a key driver for achieving financial inclusion in developing countries post the COVID-19 pandemic with an emphasis on four East African countries: Kenya, Tanzania, Uganda, and Rwanda. The research paper is inspired by the positive disruption caused by the pandemic, which has compelled societies in East Africa to adapt and embrace the use of financial technology innovations, specifically Mobile Money Services (MMS), to access financial services. MMS has been further migrated and integrated with other financial technology innovations such as Mobile Banking, Micro Savings, and Loans, and Insurance, to mention but a few. These innovations have been adopted across key sectors such as commerce, health care, or agriculture. The research paper will highlight the Mobile Network Operators (MNOs) that are behind MMS, along with numerous innovative products and services being offered to the customers. It will also highlight the regulatory framework under which these innovations are being governed to ensure the safety of the customers' funds.

Keywords: financial inclusion, financial technology, regulatory framework, mobile money services

Procedia PDF Downloads 123
466 Statistical Models and Time Series Forecasting on Crime Data in Nepal

Authors: Dila Ram Bhandari

Abstract:

Throughout the 20th century, new governments were created where identities such as ethnic, religious, linguistic, caste, communal, tribal, and others played a part in the development of constitutions and the legal system of victim and criminal justice. Acute issues with extremism, poverty, environmental degradation, cybercrimes, human rights violations, crime against, and victimization of both individuals and groups have recently plagued South Asian nations. Everyday massive number of crimes are steadfast, these frequent crimes have made the lives of common citizens restless. Crimes are one of the major threats to society and also for civilization. Crime is a bone of contention that can create a societal disturbance. The old-style crime solving practices are unable to live up to the requirement of existing crime situations. Crime analysis is one of the most important activities of the majority of intelligent and law enforcement organizations all over the world. The South Asia region lacks such a regional coordination mechanism, unlike central Asia of Asia Pacific regions, to facilitate criminal intelligence sharing and operational coordination related to organized crime, including illicit drug trafficking and money laundering. There have been numerous conversations in recent years about using data mining technology to combat crime and terrorism. The Data Detective program from Sentient as a software company, uses data mining techniques to support the police (Sentient, 2017). The goals of this internship are to test out several predictive model solutions and choose the most effective and promising one. First, extensive literature reviews on data mining, crime analysis, and crime data mining were conducted. Sentient offered a 7-year archive of crime statistics that were daily aggregated to produce a univariate dataset. Moreover, a daily incidence type aggregation was performed to produce a multivariate dataset. Each solution's forecast period lasted seven days. Statistical models and neural network models were the two main groups into which the experiments were split. For the crime data, neural networks fared better than statistical models. This study gives a general review of the applied statistics and neural network models. A detailed image of each model's performance on the available data and generalizability is provided by a comparative analysis of all the models on a comparable dataset. Obviously, the studies demonstrated that, in comparison to other models, Gated Recurrent Units (GRU) produced greater prediction. The crime records of 2005-2019 which was collected from Nepal Police headquarter and analysed by R programming. In conclusion, gated recurrent unit implementation could give benefit to police in predicting crime. Hence, time series analysis using GRU could be a prospective additional feature in Data Detective.

Keywords: time series analysis, forecasting, ARIMA, machine learning

Procedia PDF Downloads 134
465 Together - A Decentralized Application Connects Ideas and Investors

Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith

Abstract:

Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).

Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding

Procedia PDF Downloads 181
464 Optimization of Economic Order Quantity of Multi-Item Inventory Control Problem through Nonlinear Programming Technique

Authors: Prabha Rohatgi

Abstract:

To obtain an efficient control over a huge amount of inventory of drugs in pharmacy department of any hospital, generally, the medicines are categorized on the basis of their cost ‘ABC’ (Always Better Control), first and then categorize on the basis of their criticality ‘VED’ (Vital, Essential, desirable) for prioritization. About one-third of the annual expenditure of a hospital is spent on medicines. To minimize the inventory investment, the hospital management may like to keep the medicines inventory low, as medicines are perishable items. The main aim of each and every hospital is to provide better services to the patients under certain limited resources. To achieve the satisfactory level of health care services to outdoor patients, a hospital has to keep eye on the wastage of medicines because expiry date of medicines causes a great loss of money though it was limited and allocated for a particular period of time. The objectives of this study are to identify the categories of medicines requiring incentive managerial control. In this paper, to minimize the total inventory cost and the cost associated with the wastage of money due to expiry of medicines, an inventory control model is used as an estimation tool and then nonlinear programming technique is used under limited budget and fixed number of orders to be placed in a limited time period. Numerical computations have been given and shown that by using scientific methods in hospital services, we can give more effective way of inventory management under limited resources and can provide better health care services. The secondary data has been collected from a hospital to give empirical evidence.

Keywords: ABC-VED inventory classification, multi item inventory problem, nonlinear programming technique, optimization of EOQ

Procedia PDF Downloads 229
463 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns

Authors: Vitali Kremez

Abstract:

The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.

Keywords: bitcoin, cybercrime, ransomware, Russia

Procedia PDF Downloads 167
462 Examination of the Self-Expression Model with Reference to Luxury Watches with Particular Regard of the Buying-Reasons

Authors: Christopher Benedikt Jakob

Abstract:

Human beings are intrigued by luxury watches for decades. It is fascinating that customers pay an enormous amount of money for specific wristwatch models. It is fascinating that customers of the luxury watch industry accept a yearly price increase. This behavior increases their desirability even more. Luxury watches are perceived as status symbols, but they are additionally accepted as a currency without the disadvantage of currency fluctuations. It is obvious that the symbolic value is more important as the functional value with reference to the buying-reasons as regards luxury watches. Nowadays human beings do not need a wristwatch to read the time. Tablets, notebooks, smartphones, the watch in the car and watches on public places are used to inform people about the current time. This is one of the reasons why there is a trend that people do not wear wristwatches anymore. Due to these facts, this study has the intention to give answers to the question why people invest an enormous amount of money on the consumption of luxury watches and why those watches are seen as a status symbol. The study examines why the luxury watch industry records significant growth rates. The self-expression model is used as an appropriate methodology to find reasons why human beings purchase specific luxury watches. This evaluative approach further discusses if human beings are aware of their current self and their ideal self and how they express them. Furthermore, the research critically evaluates the people’s social self and their ideal social self. One of the goals is to identify if customers know why they like specific luxury watches and dislike others although they have the same quality and cost comparable prices.

Keywords: luxury watch, brand awareness, buying-behaviour, consumer, self-expression

Procedia PDF Downloads 132