Results for 'Financial Security'

987 found
Order:
  1. Assessment of the determinants of the financial security of railways in Ukraine.Igor Britchenko, N. I. Bohomolova, S. S. Pinchuk & O. O. Kravchenko - 2018 - Financial and Credit Activity: Problems of Theory and Practice 4 (27):270-282.
    The paper is devoted to the study of determinants determined the level of financial security of economic systems. It is shown that the financial security of an economic system implies the achievement of a level of financial stability that will contribute to simultaneously maintaining financial equilibrium and ensuring targeted growth in line with the development strategy. The level of financial security of rail transport in Ukraine was analyzed and it was determined that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  21
    Deep Fraud Net: A Deep Learning _Approach for Cyber Security and Financial Fraud Detection and Classification (13th edition).Sugumar DrR. - 2023 - Journal of Internet Services and Information Security 13 (4):138-157. Translated by Sugumar Dr.R..
    Given the growing dependence on digital systems and the escalation of financial fraud occurrences, it is imperative to implement efficient cyber security protocols and fraud detection methodologies. The threat's dynamic nature often challenges conventional methods, necessitating the adoption of more sophisticated strategies. Individuals depend on pre-established regulations or problem-solving processes, which possess constraints in identifying novel and intricate fraudulent trends. Conventional techniques need help handling noise data and the substantial expenses incurred by false positives and true positives. To (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Estimation of state financial support for non-priority territorial units using the example of bridge constructions.Iaroslava Levchenko & Igor Britchenko - 2021 - Eastern-European Journal of Enterprise Technologies 1 (13 (109) (2021)):26 - 34.
    The article discloses the problem of distributing state financial support based on an integrated approach. The study has proved the urgency and necessity of state support for the lowest priority territorial units (regions). It answers the research question of what components need to be included in the methodology for determining state financial support. A comprehensive method for estimating the share of public funds is proposed, taking into account the investment attractiveness of a region (oblast) and the risk of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. PERSONAL FINANCIAL MANAGEMENT PRACTICES AMONG SELECTED PERSONNEL OF THE BUREAU OF THE TREASURY – CENTRAL OFFICE.Daren D. Cortez - 2023 - Get International Research Journal 1 (2).
    The study aimed to determine the personal financial management practices among selected personnel of the Bureau of the Treasury – Central Office. It used the descriptive method of gathering data. The respondents of the study consisted of 183 personnel from 35 divisions of the Bureau and selected through simple random probability sampling technique. The study shown that most of the respondents aged 26 to 35 years old, female, single, bachelor’s degree holder, rank and file workers, permanent employees, have been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Global security and economic asymmetry: a comparison of developed and developing countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. New Financial Technologies: Understanding the Revolution on the Move, SciencesPo, 24h, 2018.Jean Langlois-Berthelot - unknown
    By the end of the course students will be able to: - Analyze the issues caused by anonymization and financial virtualization -Develop a clear understanding of Digital Identity and the legal aspects of it - Identify the functioning of cryptocurrencies, blockchain and « digital cash » - Understand the reconfiguration of the balance of power between "traditional" financial actors and new financial players. - Assess the latest developments in cryptocurrency law - Explain new risks in terms of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  9. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Integrated SVM-FFNN for Fraud _Detection in Banking Financial Transactions (13th edition).DrR. Sugumar DrR. Udayakumar, DrP. Bharath Kumar Chowdary, , DrT. Devi - 2023 - Journal of Internet Services and Information Security 13 (4):12-25. Translated by Sugumar Dr.R..
    Detecting fraud in financial transactions is crucial for guaranteeing the integrity and security of financial systems. This paper presents an integrated approach for detecting fraudulent activities that incorporates Support Vector Machines (SVM) and Feedforward Neural Networks (FFNN). The proposed methodology utilizes the strengths of SVM and FFNN to distinguish between classes and capture complex patterns and relationships, respectively. The SVM model functions as a feature extractor, supplying the FFNN with high-level representations as inputs. Through an exhaustive evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. 'Information as a Condition of Justice in Financial Markets: The Regulation of Credit-Rating Agencies.Boudewijn De Bruin - 2016 - In Lisa Herzog (ed.), Just Financial Markets?: Finance in a Just Society. Oxford University Press. pp. 250-270.
    This chapter argues for deregulation of the credit-rating market. Credit-rating agencies are supposed to contribute to the informational needs of investors trading bonds. They provide ratings of debt issued by corporations and governments, as well as of structured debt instruments (e.g. mortgage-backed securities). As many academics, regulators, and commentators have pointed out, the ratings of structured instruments turned out to be highly inaccurate, and, as a result, they have argued for tighter regulation of the industry. This chapter shows, however, that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  72
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. ENSURING ECONOMIC SECURITY OF TRADE ENTERPRISES IN THE FORMATION OF PRICING POLICY.Maksym Bezpartochnyi & Igor Britchenko - 2022 - Financial and Credit Activity: Problems of Theory and Practice 43 (2):146-156.
    The article considers the problem of ensuring the economic security of trade enterprises by forming an optimal pricing policy. The methodology of formation the minimum and maximum selling prices of trade enterprise, maintenance of margin of economic security, which is based on research of turnover costs and working capital of trade enterprise is offered. Based on statistical data of trade enterprises, the types of prices by product range are determined, which form a stable economic situation and ensure economic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  35
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information (...) governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 largest for-profit United States headquartered corporations. The results of the multiple linear regression indicated the model was able to significantly predict ISG effectiveness, F(5, 89) = 3.08, p = 0.01, R² = 0.15. Strategic alignment was the only statistically significant (t = 2.401, p <= 0.018) predictor. The implications for positive social change include the potential to constructively understand the correlates of ISG effectiveness, thus increasing the propensity for consumer trust and reducing consumers' costs. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Development of a method for selected financing of scientific and educational institutions through targeted capital investment in the development of innovative technologies.Iaroslava Levchenko, Oksana Dmytriieva, Inna Shevchenko, Igor Britchenko, Vitalii Kruhlov, Nina Avanesova, Oksana Kudriavtseva & Olesia Solodovnik - 2021 - Eastern-European Journal of Enterprise Technologies 3 (13 (111)):55 - 62.
    The problem of supporting scientific and educational institutions is considered. A method of selective financing of scientific and educational institutions that create innovative technologies taking into account their investment in innovative developments is proposed. On the basis of statistical data on the indicators for assessing the activities of scientific and educational institutions and the indicator of the innovative potential of a scientific and educational institution from the production of innovations (PNn), their rating was calculated. The essence of PNn is to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Work/Life Integration.Erin C. Tarver - 2013 - In Christopher Luetege (ed.), Handbook of the Philosophical Foundations of Business Ethics. Springer. pp. 1191--1202.
    Some provisions of the UN’s Convention on the Elimination of Discrimination Against Women (CEDAW) are clearly important from the perspective of business ethics, particularly those calling for equal rights for women to employment and financial security. Some other provisions of CEDAW are equally as important for ethical business practices and Corporate Social Responsibility (CSR), but are frequently overlooked because of the presumption that they are not strictly business concerns: the rights of women to participation in public life, marriage, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  13
    Comprehensive Plan for Population Growth Control & Senior Citizen Social Safety Net in the Philippines.Angelito Malicse - manuscript
    Comprehensive Plan for Population Growth Control & Senior Citizen Social Safety Net in the Philippines -/- To ensure sustainable population growth while also supporting senior citizens who have no children or lack financial support, the government must integrate social safety net laws for both family planning and elderly welfare. -/- I. Population Growth Control Through Social Safety Net Laws -/- 1. TAX REFORMS TO INCENTIVIZE SMALLER FAMILIES -/- A. Incentives for Small Families -/- Higher tax deductions for families with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  12
    The Holistic Governance Model (HGM): A Blueprint for the Future.Angelito Malicse - manuscript
    The Holistic Governance Model (HGM): A Blueprint for the Future -/- Introduction -/- Governments today face increasing challenges, from economic instability and climate change to corruption and social inequality. No single government system has fully solved these issues, but by integrating the best aspects of existing models, we can create an optimal governance system. -/- The Holistic Governance Model (HGM) is a hybrid system that combines elements from Social Democracy, Technocracy, Semi-Direct Democracy, China’s Whole-Process People’s Democracy, and the Modified Westminster (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The mindsponge and BMF analytics for innovative thinking in social sciences and humanities.Quan-Hoang Vuong, Minh-Hoang Nguyen & Viet-Phuong La (eds.) - 2022 - Berlin, Germany: De Gruyter.
    Academia is a competitive environment. Early Career Researchers (ECRs) are limited in experience and resources and especially need achievements to secure and expand their careers. To help with these issues, this book offers a new approach for conducting research using the combination of mindsponge innovative thinking and Bayesian analytics. This is not just another analytics book. 1. A new perspective on psychological processes: Mindsponge is a novel approach for examining the human mind’s information processing mechanism. This conceptual framework is used (...)
    Download  
     
    Export citation  
     
    Bookmark   104 citations  
  23. The essence of financing the space in in the post-war period as an integral part of the country’s reconstruction plan.Svitlana Koshova, Igor Britchenko & Maksym Bezpartochnyi - 2022 - Financial and Credit Activity: Problems of Theory and Practice 45 (4):405-415.
    This paper studies the issue of financing the Space Industry at the State Level in the Postwar period as part of the country’s recovery plan, as one of the foremost critical zones of technological development and to ensure space security and defence. The European Space Agency (ESA) is, identified as the main player in the European space sector. It is determined that the current structure of ESA – Space 4.0 – provides for the success of European space activities in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Do corporations have a duty to be trustworthy?Nikolas Kirby, Andrew Kirton & Aisling Crean - 2018 - Journal of the British Academy 6 (Supplementary issue 1):75-129.
    Since the global financial crisis in 2008, corporations have faced a crisis of trust, with growing sentiment against ‘elites and ‘big business’ and a feeling that ‘something ought to be done’ to re-establish public regard for corporations. Trust and trustworthiness are deeply moral significant. They provide the ‘glue or lubricant’ that begets reciprocity, decreases risk, secures dignity and respect, and safeguards against the subordination of the powerless to the powerful. However, in deciding how to restore trust, it is difficult (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century.Vladimir Rogozhin - 2018 - Academia.
    The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the Security Council with measures to improve the effectiveness of the management system, address the "veto problem", problem of financing, improve staff work and administrative and financial control, strengthen UN media, improvement of work with the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Transformation of international economic relations: modern challenges, risks, opportunities and prospects: collective monograph.M. Bezpartochnyi - 2017 - ISMA University.
    The authors of the book have come to the conclusion that it is necessary to effectively use the methodological tools for assessing the competitiveness of financial and insurance markets, methodological approaches to assessing the effectiveness of regional policy, internal audit of resources. Basic research is aimed at researching the main trends in the international economy, socialization of global economic development, investment aspects of development countries, functioning of consumer market in the international economic system, trends of international population migration, processes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Politics of Evasion: A post-globalization dialogue along the edge of the state.Robert Latham - 2016 - Routledge.
    Burgeoning national security programs; thickening borders; Wikileaks and Anonymous; immigrant rights rallies; Occupy movements; student protests; neoliberal austerity; global financial crises – these developments underscore how much the fable of a hope-filled post-cold war globalization has faded. In its place looms the prospect of states and corporations transforming a permanent war on terror into a permanent war on society. How, at this juncture, might policymakers and power-holders in leading states and corporations of the Global North be reframing their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  87
    Governing the Agent-to-Agent Economy of Trust via Progressive Decentralization.Tomer Jordi Chaffer - manuscript
    Current approaches to AI governance often fall short in anticipating a future where AI agents manage critical tasks, such as financial operations, administrative functions, and beyond. As AI agents may eventually delegate tasks among themselves to optimize efficiency, understanding the foundational principles of human value exchange could offer insights into how AI-driven economies might operate. Just as trust and value exchange are central to human interactions in open marketplaces, they may also be critical for enabling secure and efficient interactions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. An Introduction to Interdisciplinary Research: Theory and Practice.Steph Menken, Machiel Keestra, Lucas Rutting, Ger Post, Mieke de Roo, Sylvia Blad & Linda de Greef (eds.) - 2016 - Amsterdam University Press.
    A SECOND COMPLETELY REVISED EDITION OF THIS TEXTBOOK ON INTERDISCIPLINARY RESEARCH WAS PUBLISHED WITH AMSTERDAM UNIVERSITY PRESS IN 2022. Check out that version here and a PDF of its ToC and Introduction, as this first edition (AUP 2016) is no longer available. [This book (128 pp.) serves as an introduction and manual to guide students through the interdisciplinary research process. We are becoming increasingly aware that, as a result of technological developments and globalisation, problems are becoming so complex that they (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  30. COVID-19, gender inequality, and the responsibility of the state.Nikki Fortier - 2020 - International Journal of Wellbeing 3 (10):77-93.
    Previous research has shown that women are disproportionately negatively affected by a variety of socio-economic hardships, many of which COVID-19 is making worse. In particular, because of gender roles, and because women’s jobs tend to be given lower priority than men’s (since they are more likely to be part-time, lower-income, and less secure), women assume the obligations of increased caregiving needs at a much higher rate. This unfairly renders women especially susceptible to short- and long-term economic insecurity and decreases in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Analysis of Institutional Capacity of National Social Protection Policy Framework.Narith Por - 2018 - World Journal of Research and Review 6 (4):66-71.
    Cambodians are still vulnerable. To reverse those conditions, National Social Protection Strategy (N.S.P.S) was developed for the poor and vulnerable people to promote their livelihoods. Royal Government of Cambodia (R.G.C) has paid attention to social assistance. In strategic plans, highlights on strengthening, and collectively developing social security, consistent and effective. With these issues, the government establishes a national social protection policy framework to help all people in particular poor and vulnerable people (M.o.E.F, 2017, p.1). The research aims at reviewing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. No Justice in Climate Policy? Broome versus Posner, Weisbach, and Gardiner.Alyssa R. Bernstein - 2016 - Midwest Studies in Philosophy 40 (1):172-188.
    The urgent importance of dealing with the climate crisis has led some influential theorists to argue that at least some demands for justice must give way to pragmatic and strategic considerations. These theorists (Cass Sunstein, Eric Posner, and David Weisbach, all academic lawyers, and John Broome, an academic philosopher) contend that the failures of international negotiations and other efforts to change economic policies and practices have shown that moral exhortations are worse than ineffective. Although Broome's position is similar in these (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  34
    Investigation of vulnerabilities in implementation of crypto library used by OpenVPN for IPV6 deployment.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (4):1-13.
    Abstract. The increasing adoption of IPv6 has introduced new security concerns, including the threat of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These attacks leads service disruptions, financial losses, and reputational damage. A Denial of Service (DoS) attack is when a single computer or device sends a large amount of traffic to a network or website. Whereas A Distributed Denial of Service (DDoS) launched from multiple devices or computers, making it harder to block and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Teaching & Learning Guide for: The Epistemic Aims of Democracy.Robert Weston Siscoe - 2023 - Philosophy Compass 18 (11):e12954.
    In order to serve their citizens well, democracies must secure a number of epistemic goods. Take the truth, for example. If a democratic government wants to help its impoverished citizens improve their financial position, then elected officials will need to know what policies truly help those living in poverty. Because truth has such an important role in political decision-making, many defenders of democracy have highlighted the ways in which democratic procedures can lead to the truth. But there are also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Poverty and Hunger in the Developing World: Ethics, the Global Economy, and Human Survival.Krishna Mani Pathak - 2010 - Asia Journal of Global Studies 3 (2):88-102.
    The large number of hungry people in a global economy based on industrialization, privatization, and free trade raises the question of the ethical dimensions of the worsening food crisis in the world in general and in developing countries in particular. Who bears the moral responsibility for the tragic situation in Africa and Asia where people are starving due to poverty? Who is morally responsible for their poverty - the hungry people themselves? the international community? any particular agency or institution? In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Mergers & Acquisitions Market in Vietnam’s Transition Economy.Quan-Hoang Vuong, Tri-Dung Tran & Thi Chau Ha Nguyen - 2010 - Journal of Economic Policy and Research 5 (1):1-54.
    This paper is the first major and a thorough study on the Merger & Acquisition (M&A) activities in Vietnam’s emerging market economy, covering almost entirely the M&A history after the launch of Doi Moi. The surge in these activities since mid-2000s by no means incidentally coincides with the jump in FDI and FPI inflows into the nation. M&A industry in Vietnam has its socio-cultural traits that could help explain economic happenings, with anomalies and transitional characteristics, far better than even the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. THE INFLUENZA PANDEMIC IN COLONIAL ASANTE: LESSON DRAWING FOR THE FIGHT AGAINST COVID-19 IN THE TWENTY-FIRST CENTURY.Samuel Adu-Gyamfi, Lucky Tomdi & Phinehas Asiamah - 2021 - REVISTA DE ETNOLOGIE ȘI CULTUROLOGIE 30 (1):11-20.
    This paper pays attention to colonial strategies that were deployed to fight against the influenza pandemic among the Asante of Ghana. It does a comparative analysis of the outbreak and mode of spread of COVID-19 and influenza pandemics in Ghana and Asante, in particular. Based on the theory of lesson-drawing, the authors aimed to ascertain whether the strategies adopted to fight the current COVID-19 pandemic reminisce the earlier strategies deployed during the influenza pandemic of 1918. Based on primary and secondary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  38
    Credit Card Fraud Detection Soudari Sudheshna.Sudheshna Soudari - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (8):1-16.
    The main aim of this project is to detect fraudulent credit card transactions by utilizing credit card details. As financial transactions grow in volume and complexity, it becomes increasingly critical for credit card companies to identify fraudulent activities to protect customers from unauthorized charges. Although instances of fraud are relatively infrequent, they present substantial financial risks to both consumers and financial institutions. This research employs three machine learning techniques—One-Class SVM, Local Outlier Factor, and Isolation Forest—to analyse transaction (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  17
    Modern Monetary Theory and the Universal Law of Balance in Nature.Angelito Malicse - manuscript
    Modern Monetary Theory and the Universal Law of Balance in Nature -/- Introduction -/- Modern Monetary Theory (MMT) challenges traditional economic thinking by proposing that sovereign governments with their own currency are not financially constrained like households. Instead, they can issue money to finance public spending as long as they manage inflation and resource allocation effectively. When viewed through the lens of my universal formula, which is based on the universal law of balance in nature, MMT emerges as a valid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Engineering Topology of Construction Ecology for Dynamic Integration of Sustainability Outcomes to Functions in Urban Environments: Spatial Modeling.Moustafa Osman Mohammed - 2022 - International Scholarly and Scientific Research and Innovation 16 (11):312-323.
    Integration sustainability outcomes give attention to construction ecology in the design review of urban environments to comply with Earth’s System that is composed of integral parts of the (i.e., physical, chemical and biological components). Naturally, exchange patterns of industrial ecology have consistent and periodic cycles to preserve energy flows and materials in Earth’s System. When engineering topology is affecting internal and external processes in system networks, it postulated the valence of the first-level spatial outcome (i.e., project compatibility success). These instrumentalities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  33
    Beyond Capitalism: Designing a New Economic System for Humanity.Angelito Malicse - manuscript
    Beyond Capitalism: Designing a New Economic System for Humanity -/- Introduction -/- For centuries, capitalism has been the dominant economic system, driving technological innovation, wealth creation, and global trade. However, its flaws—extreme inequality, environmental destruction, and economic instability—have made many question whether it is still the best model for humanity. Instead of reforming capitalism, perhaps the time has come to replace it entirely with a new system that better aligns with modern challenges, human well-being, and sustainability. -/- This essay explores (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  24
    Applying Modern Monetary Theory to the Philippines: Achieving Economic Balance Through Natural Laws.Angelito Malicse - manuscript
    Applying Modern Monetary Theory to the Philippines: Achieving Economic Balance Through Natural Laws -/- Introduction -/- The Philippines faces persistent economic challenges, including slow GDP growth, high income inequality, inflationary pressures, and overpopulation. Traditional economic policies often focus on austerity, borrowing limits, and foreign investments, but these approaches fail to address the root causes of economic imbalance. -/- Modern Monetary Theory (MMT) offers an alternative by allowing the government to issue money to finance public spending without relying on foreign debt (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Main characteristics of business models and risk profile of Ukrainian banks.E. Zarutska, Roman Pavlov, Tatyana Pavlova, D. Pawliszczy & B. Kuchmacz - 2020 - Financial and Credit Activity: Problems of Theory and Practice 2 (33):15-22.
    The article investigates the main characteristics of the financial stability of Ukrainian banks, their risk profile, structure of assets, liabilities, income, expenses based on the monthly reporting data for 2004-2020 (number of observations – 3 813). The Kohonen self-organizing map (SOM) toolkit is used to form homogeneous groups of banks based on a large number of financial indicators. The selected toolkit provides a convenient visualization of the results. Each bank occupies a specific place on the SOM. The close (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  80
    Overview of Economic Values.Economics Discipline - 2024 - Theories of Value.
    In economics, economic value is a measure of the benefit provided by a good or service to an economic agent, and value for money represents an assessment of whether financial or other resources are being used effectively in order to secure such benefit.
    Download  
     
    Export citation  
     
    Bookmark  
  46. Agriculture in Bulgaria: from European Union accession to the COVID-19 pandemic.Maksym Bezpartochnyi, Igor Britchenko & Radostin Vazov - 2021 - In Grigorii Vazov (ed.), Concepts, strategies and mechanisms of economic systems management in the context of modern world challenges. VUZF Publishing House “St. Grigorii Bogoslov”. pp. 187-206.
    Agriculture in Bulgaria is one of sectors country’s economy in which significant changes have taken place over the past three decades: in the field of economic relations, the structure of farms, the size and production activity of enterprises, income and profit. These changes are due to the agrarian reform carried out in the 1990s, accession Bulgaria to the European Union, and the implementation of measures and mechanisms of the Common Agricultural Policy (CAP). In the period before accession Bulgaria to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. An Evidence-driven Research to the Transgressions of Geneva Conventions by the Communist Party of China Led Autocratic Regime.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (10):249-266.
    The "second-generation indigenization" hypothesis of Huntington's phenomenological observations on totalitarianism in Cold War regime collapse subtly portrayed the realpolitik interest groups' political influences with autocracy disbandment processes. The research puts democratization as the premise and globalization as purpose for the analysis, with the cultural anthropological psychopathology & criminological elements of genocide and crime against humanity explained, underlying some of the Communist Party of China (CPC)’s organizational behaviors. With the regionalism purposes & approaches to multilateralism by People's Republic of China (PRC), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. What It’s Like to Chill Out With Whom the Rest of the World Considers As The Most Ruthless Men: Ratko Mladic, Goran Hadzic and Radovan Karadzic (+) Confessions of a Female War Crimes Investigator.Miss Jill Louise Starr - 2001
    What It’s Like to Chill Out With Whom the Rest of the World Considers As The Most Ruthless Men: Ratko Mladic, Goran Hadzic and Radovan Karadzic (+) Confessions of a Female War Crimes Investigator By Jill Louise Starr NJ USA -/- Read My Entire Book Here (True Story) http://sites.google.com/site/thelawprojectscenternycoffices/what-it-s-like-to-chill-out-with-whom-th e-rest-of-the-world-considers-as-the-most-ruthless-men-ratko-mladic-goran-hadzic-and-radovan-karadzi c-confessions-of-a-female-war-crimes-investigator -/- Retrospectively, it was all so simple, natural and matter of fact being on a boat restaurant in Belgrade, sitting with, laughing, drinking a two hundred bottle of wine and chatting about (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Problems and prospects of Ukraine’s energy supply in the aspects of international trade.Nataliya Krasnikova & A. A. Redchenkov - 2017 - Visnyk of Dniprop’Etrovsk University. Ser. World Economy and International Economic Relations 9 (25):70-79.
    The article studies the energy efficiency of the economy and determines the need to reform the energy sector of Ukraine and conditions of its adaptation to EU requirements. Annual energy consumption in the world is about 14 billion tons of fuel. This is mainly organic origin resources – coal, oil, natural gas – 82 %, nuclear power – 7 %, hydroelectric energy – 3%, wood – 7 % renewable energy and – 1 %. The economic development of any country in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Current issues of the management of socio-economic systems in terms of globalization challenges.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that the management of socio-economic systems in the terms of global challenges requires the use of mechanisms to ensure security, optimise the use of resource potential, increase competitiveness, and provide state support to economic entities. Basic research focuses on assessment of economic entities in the terms of global challenges, analysis of the financial system, migration flows, logistics and product exports, territorial development. The research results have been implemented (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 987