Results for 'Financial security'

986 found
Order:
  1. Assessment of the determinants of the financial security of railways in Ukraine.Igor Britchenko, N. I. Bohomolova, S. S. Pinchuk & O. O. Kravchenko - 2018 - Financial and Credit Activity: Problems of Theory and Practice 4 (27):270-282.
    The paper is devoted to the study of determinants determined the level of financial security of economic systems. It is shown that the financial security of an economic system implies the achievement of a level of financial stability that will contribute to simultaneously maintaining financial equilibrium and ensuring targeted growth in line with the development strategy. The level of financial security of rail transport in Ukraine was analyzed and it was determined that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  21
    Fortifying Financial Systems: Exploring the Intersection of Microservices and Banking Security.Roshan Mahant Sumit Bhatnagar - 2024 - International Research Journal of Engineering and Technology 11 (8):748-758.
    As part of their digital transformation, financial service companies can greatly benefit from the implementation of a microservice architecture. We can build a service-oriented architecture (SOA) application using the architecture to enhance its overall performance and maintainability. This enables the application to consist of several smaller components that operate independently and simultaneously. In the financial services industry, the accuracy of artifact states holds immense significance. Given that an inaccurate artifact state or anomalous artifact operation(s) could potentially ruin the (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  4. Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):138-157.
    Given the growing dependence on digital systems and the escalation of financial fraud occurrences, it is imperative to implement efficient cyber security protocols and fraud detection methodologies. The threat's dynamic nature often challenges conventional methods, necessitating the adoption of more sophisticated strategies. Individuals depend on pre-established regulations or problem-solving processes, which possess constraints in identifying novel and intricate fraudulent trends. Conventional techniques need help handling noise data and the substantial expenses incurred by false positives and true positives. To (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  32
    Harnessing AI and Business Rules for Financial Transactions: Addressing Fraud and Security Challenges.Palakurti Naga Ramesh - 2024 - Esp International Journal of Advancements in Computational Technology 2 (4):104-119.
    In today’s rapidly evolving financial landscape, the adoption of Artificial Intelligence (AI) and Machine Learning (ML) technologies, coupled with the deployment of Business Rules Management Systems (BRMS), has transformed how financial transactions are conducted, monitored, and secured. With fraud, particularly in check deposit transactions, becoming increasingly sophisticated, financial institutions are turning to AI and ML to enhance their risk management strategies. This paper explores the integration of AI-driven models and business rules in financial transactions, focusing on (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  6. Estimation of state financial support for non-priority territorial units using the example of bridge constructions.Iaroslava Levchenko & Igor Britchenko - 2021 - Eastern-European Journal of Enterprise Technologies 1 (13 (109) (2021)):26 - 34.
    The article discloses the problem of distributing state financial support based on an integrated approach. The study has proved the urgency and necessity of state support for the lowest priority territorial units (regions). It answers the research question of what components need to be included in the methodology for determining state financial support. A comprehensive method for estimating the share of public funds is proposed, taking into account the investment attractiveness of a region (oblast) and the risk of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  26
    Data Visualization in Financial Crime Detection: Applications in Credit Card Fraud and Money Laundering.Palakurti Naga Ramesh - 2023 - International Journal of Management Education for Sustainable Development 6 (6).
    This research paper investigates the transformative applications of data visualization techniques in the realm of financial crime detection, with a specific emphasis on addressing the challenges posed by credit card fraud and money laundering. The abstract explores the intricate landscape of visualizing financial data to uncover patterns, anomalies, and potential illicit activities. Through a comprehensive review of existing methodologies and case studies, the paper illuminates the pivotal role data visualization plays in enhancing the efficiency and accuracy of fraud (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  8. New Financial Technologies: Understanding the Revolution on the Move, SciencesPo, 24h, 2018.Jean Langlois-Berthelot - unknown
    By the end of the course students will be able to: - Analyze the issues caused by anonymization and financial virtualization -Develop a clear understanding of Digital Identity and the legal aspects of it - Identify the functioning of cryptocurrencies, blockchain and « digital cash » - Understand the reconfiguration of the balance of power between "traditional" financial actors and new financial players. - Assess the latest developments in cryptocurrency law - Explain new risks in terms of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Global security and economic asymmetry: a comparison of developed and developing countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. PERSONAL FINANCIAL MANAGEMENT PRACTICES AMONG SELECTED PERSONNEL OF THE BUREAU OF THE TREASURY – CENTRAL OFFICE.Daren D. Cortez - 2023 - Get International Research Journal 1 (2).
    The study aimed to determine the personal financial management practices among selected personnel of the Bureau of the Treasury – Central Office. It used the descriptive method of gathering data. The respondents of the study consisted of 183 personnel from 35 divisions of the Bureau and selected through simple random probability sampling technique. The study shown that most of the respondents aged 26 to 35 years old, female, single, bachelor’s degree holder, rank and file workers, permanent employees, have been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  12. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  52
    Integrating Predictive Analytics into Risk Management: A Modern Approach for Financial Institutions.Palakurti Naga Ramesh - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (1):122-132.
    This paper examines how predictive analytics enhances risk management in financial institutions. Advanced tools like machine learning and statistical modeling help predict risks, identify trends, and implement strategies to prevent losses by analyzing historical and real-time data. It covers the use of predictive analytics for credit risk, market risk, operational risk, and fraud detection, with practical case studies. Additionally, it discusses challenges, ethical issues, and prospects in this field.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  15.  46
    Building Scalable Data Warehouses for Financial Analytics in Large Enterprises.Vijayan Naveen Edapurath - 2024 - International Journal of Innovative Research and Creative Technology 10 (3):1-10.
    In today's digital era, large enterprises face the daunting task of managing and analyzing vast volumes of financial data to inform strategic decision-making and maintain a competitive edge. Traditional data warehousing solutions often fall short in addressing the scale, complexity, and performance demands of modern financial analytics. This paper explores the architectural principles, technological strategies, and best practices essential for building scalable data warehouses tailored to the needs of financial analytics in large organizations. It delves into data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. SECURITY AND PRIVACY TECHNIQUE IN BIG DATA: A REVIEW.Pamarthi Kartheek - 2024 - North American Journal of Engineering Research 5 (1).
    The importance of Big Data as a foundational component of the AI and ML landscape is not going away anytime soon. As a result, the past fifteen years have seen a tremendous investment in Big Data research. The purpose of this literature review is to compile the most recent results from Big Data studies conducted over the past fifteen years. The study will address questions about the main applications of Big Data analytics, the main challenges and limitations encountered by researchers, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  65
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  44
    Integrated SVM-FFNN for Fraud Detection in Banking Financial Transactions (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):12-25.
    Detecting fraud in financial transactions is crucial for guaranteeing the integrity and security of financial systems. This paper presents an integrated approach for detecting fraudulent activities that incorporates Support Vector Machines (SVM) and Feedforward Neural Networks (FFNN). The proposed methodology utilizes the strengths of SVM and FFNN to distinguish between classes and capture complex patterns and relationships, respectively. The SVM model functions as a feature extractor, supplying the FFNN with high-level representations as inputs. Through an exhaustive evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  8
    AI-Driven Synthetic Data Generation for Financial Product Development: Accelerating Innovation in Banking and Fintech through Realistic Data Simulation.Debasish Paul Rajalakshmi Soundarapandiyan, Praveen Sivathapandi - 2022 - Journal of Artificial Intelligence Research and Applications 2 (2):261-303.
    The rapid evolution of the financial sector, particularly in banking and fintech, necessitates continuous innovation in financial product development and testing. However, challenges such as data privacy, regulatory compliance, and the limited availability of diverse datasets often hinder the effective development and deployment of new products. This research investigates the transformative potential of AI-driven synthetic data generation as a solution for accelerating innovation in financial product development. Synthetic data, generated through advanced AI techniques such as Generative Adversarial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. 'Information as a Condition of Justice in Financial Markets: The Regulation of Credit-Rating Agencies.Boudewijn De Bruin - 2016 - In Lisa Herzog, Just Financial Markets?: Finance in a Just Society. Oxford University Press. pp. 250-270.
    This chapter argues for deregulation of the credit-rating market. Credit-rating agencies are supposed to contribute to the informational needs of investors trading bonds. They provide ratings of debt issued by corporations and governments, as well as of structured debt instruments (e.g. mortgage-backed securities). As many academics, regulators, and commentators have pointed out, the ratings of structured instruments turned out to be highly inaccurate, and, as a result, they have argued for tighter regulation of the industry. This chapter shows, however, that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. ENSURING ECONOMIC SECURITY OF TRADE ENTERPRISES IN THE FORMATION OF PRICING POLICY.Maksym Bezpartochnyi & Igor Britchenko - 2022 - Financial and Credit Activity: Problems of Theory and Practice 43 (2):146-156.
    The article considers the problem of ensuring the economic security of trade enterprises by forming an optimal pricing policy. The methodology of formation the minimum and maximum selling prices of trade enterprise, maintenance of margin of economic security, which is based on research of turnover costs and working capital of trade enterprise is offered. Based on statistical data of trade enterprises, the types of prices by product range are determined, which form a stable economic situation and ensure economic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information (...) governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 largest for-profit United States headquartered corporations. The results of the multiple linear regression indicated the model was able to significantly predict ISG effectiveness, F(5, 89) = 3.08, p = 0.01, R² = 0.15. Strategic alignment was the only statistically significant (t = 2.401, p <= 0.018) predictor. The implications for positive social change include the potential to constructively understand the correlates of ISG effectiveness, thus increasing the propensity for consumer trust and reducing consumers' costs. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Investigate Methods for Visualizing the Decision-Making Processes of a Complex AI System, Making Them More Understandable and Trustworthy in financial data analysis.Kommineni Mohanarajesh - 2024 - International Transactions on Artificial Intelligence 8 (8):1-21.
    Artificial intelligence (AI) has been incorporated into financial data analysis at a rapid pace, resulting in the creation of extremely complex models that can process large volumes of data and make important choices like credit scoring, fraud detection, and stock price projections. But these models' complexity—particularly deep learning and ensemble methods—often leads to a lack of transparency, which makes it challenging for stakeholders to comprehend the decision-making process. This opacity has the potential to erode public confidence in AI systems, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Work/Life Integration.Erin C. Tarver - 2013 - In Christopher Luetege, Handbook of the Philosophical Foundations of Business Ethics. Springer. pp. 1191--1202.
    Some provisions of the UN’s Convention on the Elimination of Discrimination Against Women (CEDAW) are clearly important from the perspective of business ethics, particularly those calling for equal rights for women to employment and financial security. Some other provisions of CEDAW are equally as important for ethical business practices and Corporate Social Responsibility (CSR), but are frequently overlooked because of the presumption that they are not strictly business concerns: the rights of women to participation in public life, marriage, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  19
    The Illusion of the Pension Crisis in a Fiat Currency System.Angelito Malicse - manuscript
    The Illusion of the Pension Crisis in a Fiat Currency System -/- Introduction -/- Governments and financial institutions frequently warn of a looming pension crisis, claiming that aging populations will drain social security funds and leave future retirees without financial support. However, this narrative is fundamentally flawed. In a fiat currency system, where central banks can print money at will, the idea that there is a shortage of funds for pensions contradicts the basic mechanics of modern finance. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Development of a method for selected financing of scientific and educational institutions through targeted capital investment in the development of innovative technologies.Iaroslava Levchenko, Oksana Dmytriieva, Inna Shevchenko, Igor Britchenko, Vitalii Kruhlov, Nina Avanesova, Oksana Kudriavtseva & Olesia Solodovnik - 2021 - Eastern-European Journal of Enterprise Technologies 3 (13 (111)):55 - 62.
    The problem of supporting scientific and educational institutions is considered. A method of selective financing of scientific and educational institutions that create innovative technologies taking into account their investment in innovative developments is proposed. On the basis of statistical data on the indicators for assessing the activities of scientific and educational institutions and the indicator of the innovative potential of a scientific and educational institution from the production of innovations (PNn), their rating was calculated. The essence of PNn is to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  43
    The Holistic Governance Model (HGM): A Blueprint for the Future.Angelito Malicse - manuscript
    The Holistic Governance Model (HGM): A Blueprint for the Future -/- Introduction -/- Governments today face increasing challenges, from economic instability and climate change to corruption and social inequality. No single government system has fully solved these issues, but by integrating the best aspects of existing models, we can create an optimal governance system. -/- The Holistic Governance Model (HGM) is a hybrid system that combines elements from Social Democracy, Technocracy, Semi-Direct Democracy, China’s Whole-Process People’s Democracy, and the Modified Westminster (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  31
    The Illusion of Success: How Glamorizing Extreme Wealth Distorts Reality.Angelito Malicse - manuscript
    The Illusion of Success: How Glamorizing Extreme Wealth Distorts Reality -/- Introduction -/- In today’s world, extreme wealth accumulation is often portrayed as the ultimate symbol of success. Social media, Hollywood, and business magazines frequently celebrate billionaires, luxury lifestyles, and financial empires, creating an illusion that success is solely defined by material wealth. However, this obsession with extreme riches distorts the true meaning of achievement and fulfillment. While financial stability is important, an overemphasis on wealth as the pinnacle (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  25
    Comprehensive Plan for Population Growth Control & Senior Citizen Social Safety Net in the Philippines.Angelito Malicse - manuscript
    Comprehensive Plan for Population Growth Control & Senior Citizen Social Safety Net in the Philippines -/- To ensure sustainable population growth while also supporting senior citizens who have no children or lack financial support, the government must integrate social safety net laws for both family planning and elderly welfare. -/- I. Population Growth Control Through Social Safety Net Laws -/- 1. TAX REFORMS TO INCENTIVIZE SMALLER FAMILIES -/- A. Incentives for Small Families -/- Higher tax deductions for families with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  19
    The Advantages of Self-Sufficient Countries with Manageable Populations and Minimal Import Dependence.Angelito Malicse - manuscript
    The Advantages of Self-Sufficient Countries with Manageable Populations and Minimal Import Dependence -/- Introduction -/- In a world where globalization has connected economies, many nations remain highly dependent on imports for essentials such as food, energy, and industrial materials. While trade brings benefits, over-reliance on imports exposes nations to risks such as supply chain disruptions, inflation, and geopolitical pressures. However, some countries have successfully built self-sufficient economies, allowing them to thrive with minimal reliance on foreign resources. -/- Self-sufficient countries benefit (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  48
    Budget Plan and Expense Tracker Using PHP.Khandelwal Archeet - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (1):237-239.
    The Budget and Expense Tracker System is designed to simplify personal and business financial management. It enables users to record, monitor, and analyze their income and expenses, offering categorized insights and visual reports. With features like budget allocation, transaction tracking, and real-time notifications, the system ensures users stay informed about their financial health. By integrating tools like chart visualization, notifications, and data export options, this application is a comprehensive solution for efficient financial planning. With advancements in technology, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Is Marriage and Having a Family Compulsory in Society?Angelito Malicse - manuscript
    Is Marriage and Having a Family Compulsory in Society? -/- Marriage and family have historically been viewed as essential institutions in many societies, shaping social structures, traditions, and even economies. However, as societies evolve, perspectives on marriage and family have changed. While some still regard them as fundamental aspects of life, others see them as personal choices rather than obligations. The question remains: Is marriage and having a family compulsory in a society? The answer is no, as Individuals today have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The mindsponge and BMF analytics for innovative thinking in social sciences and humanities.Quan-Hoang Vuong, Minh-Hoang Nguyen & Viet-Phuong La (eds.) - 2022 - Berlin, Germany: De Gruyter.
    Academia is a competitive environment. Early Career Researchers (ECRs) are limited in experience and resources and especially need achievements to secure and expand their careers. To help with these issues, this book offers a new approach for conducting research using the combination of mindsponge innovative thinking and Bayesian analytics. This is not just another analytics book. 1. A new perspective on psychological processes: Mindsponge is a novel approach for examining the human mind’s information processing mechanism. This conceptual framework is used (...)
    Download  
     
    Export citation  
     
    Bookmark   170 citations  
  36. The essence of financing the space in in the post-war period as an integral part of the country’s reconstruction plan.Svitlana Koshova, Igor Britchenko & Maksym Bezpartochnyi - 2022 - Financial and Credit Activity: Problems of Theory and Practice 45 (4):405-415.
    This paper studies the issue of financing the Space Industry at the State Level in the Postwar period as part of the country’s recovery plan, as one of the foremost critical zones of technological development and to ensure space security and defence. The European Space Agency (ESA) is, identified as the main player in the European space sector. It is determined that the current structure of ESA – Space 4.0 – provides for the success of European space activities in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Do corporations have a duty to be trustworthy?Nikolas Kirby, Andrew Kirton & Aisling Crean - 2018 - Journal of the British Academy 6 (Supplementary issue 1):75-129.
    Since the global financial crisis in 2008, corporations have faced a crisis of trust, with growing sentiment against ‘elites and ‘big business’ and a feeling that ‘something ought to be done’ to re-establish public regard for corporations. Trust and trustworthiness are deeply moral significant. They provide the ‘glue or lubricant’ that begets reciprocity, decreases risk, secures dignity and respect, and safeguards against the subordination of the powerless to the powerful. However, in deciding how to restore trust, it is difficult (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century.Vladimir Rogozhin - 2018 - Academia.
    The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the Security Council with measures to improve the effectiveness of the management system, address the "veto problem", problem of financing, improve staff work and administrative and financial control, strengthen UN media, improvement of work with the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Transformation of international economic relations: modern challenges, risks, opportunities and prospects: collective monograph.M. Bezpartochnyi - 2017 - ISMA University.
    The authors of the book have come to the conclusion that it is necessary to effectively use the methodological tools for assessing the competitiveness of financial and insurance markets, methodological approaches to assessing the effectiveness of regional policy, internal audit of resources. Basic research is aimed at researching the main trends in the international economy, socialization of global economic development, investment aspects of development countries, functioning of consumer market in the international economic system, trends of international population migration, processes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. No Justice in Climate Policy? Broome versus Posner, Weisbach, and Gardiner.Alyssa R. Bernstein - 2016 - Midwest Studies in Philosophy 40 (1):172-188.
    The urgent importance of dealing with the climate crisis has led some influential theorists to argue that at least some demands for justice must give way to pragmatic and strategic considerations. These theorists (Cass Sunstein, Eric Posner, and David Weisbach, all academic lawyers, and John Broome, an academic philosopher) contend that the failures of international negotiations and other efforts to change economic policies and practices have shown that moral exhortations are worse than ineffective. Although Broome's position is similar in these (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. The Politics of Evasion: A post-globalization dialogue along the edge of the state.Robert Latham - 2016 - Routledge.
    Burgeoning national security programs; thickening borders; Wikileaks and Anonymous; immigrant rights rallies; Occupy movements; student protests; neoliberal austerity; global financial crises – these developments underscore how much the fable of a hope-filled post-cold war globalization has faded. In its place looms the prospect of states and corporations transforming a permanent war on terror into a permanent war on society. How, at this juncture, might policymakers and power-holders in leading states and corporations of the Global North be reframing their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Teaching & Learning Guide for: The Epistemic Aims of Democracy.Robert Weston Siscoe - 2023 - Philosophy Compass 18 (11):e12954.
    In order to serve their citizens well, democracies must secure a number of epistemic goods. Take the truth, for example. If a democratic government wants to help its impoverished citizens improve their financial position, then elected officials will need to know what policies truly help those living in poverty. Because truth has such an important role in political decision-making, many defenders of democracy have highlighted the ways in which democratic procedures can lead to the truth. But there are also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  39
    Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, behavioral (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  98
    Governing the Agent-to-Agent Economy of Trust via Progressive Decentralization.Tomer Jordi Chaffer - manuscript
    Current approaches to AI governance often fall short in anticipating a future where AI agents manage critical tasks, such as financial operations, administrative functions, and beyond. As AI agents may eventually delegate tasks among themselves to optimize efficiency, understanding the foundational principles of human value exchange could offer insights into how AI-driven economies might operate. Just as trust and value exchange are central to human interactions in open marketplaces, they may also be critical for enabling secure and efficient interactions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  81
    Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, case (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  46. THE INFLUENZA PANDEMIC IN COLONIAL ASANTE: LESSON DRAWING FOR THE FIGHT AGAINST COVID-19 IN THE TWENTY-FIRST CENTURY.Samuel Adu-Gyamfi, Lucky Tomdi & Phinehas Asiamah - 2021 - REVISTA DE ETNOLOGIE ȘI CULTUROLOGIE 30 (1):11-20.
    This paper pays attention to colonial strategies that were deployed to fight against the influenza pandemic among the Asante of Ghana. It does a comparative analysis of the outbreak and mode of spread of COVID-19 and influenza pandemics in Ghana and Asante, in particular. Based on the theory of lesson-drawing, the authors aimed to ascertain whether the strategies adopted to fight the current COVID-19 pandemic reminisce the earlier strategies deployed during the influenza pandemic of 1918. Based on primary and secondary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Analysis of Institutional Capacity of National Social Protection Policy Framework.Narith Por - 2018 - World Journal of Research and Review 6 (4):66-71.
    Cambodians are still vulnerable. To reverse those conditions, National Social Protection Strategy (N.S.P.S) was developed for the poor and vulnerable people to promote their livelihoods. Royal Government of Cambodia (R.G.C) has paid attention to social assistance. In strategic plans, highlights on strengthening, and collectively developing social security, consistent and effective. With these issues, the government establishes a national social protection policy framework to help all people in particular poor and vulnerable people (M.o.E.F, 2017, p.1). The research aims at reviewing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  99
    Overview of Economic Values.Economics Discipline - 2024 - Theories of Value.
    In economics, economic value is a measure of the benefit provided by a good or service to an economic agent, and value for money represents an assessment of whether financial or other resources are being used effectively in order to secure such benefit.
    Download  
     
    Export citation  
     
    Bookmark  
  49. An Introduction to Interdisciplinary Research: Theory and Practice.Steph Menken, Machiel Keestra, Lucas Rutting, Ger Post, Mieke de Roo, Sylvia Blad & Linda de Greef (eds.) - 2016 - Amsterdam University Press.
    A SECOND COMPLETELY REVISED EDITION OF THIS TEXTBOOK ON INTERDISCIPLINARY RESEARCH WAS PUBLISHED WITH AMSTERDAM UNIVERSITY PRESS IN 2022. Check out that version here and a PDF of its ToC and Introduction, as this first edition (AUP 2016) is no longer available. [This book (128 pp.) serves as an introduction and manual to guide students through the interdisciplinary research process. We are becoming increasingly aware that, as a result of technological developments and globalisation, problems are becoming so complex that they (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  50. Main characteristics of business models and risk profile of Ukrainian banks.E. Zarutska, Roman Pavlov, Tatyana Pavlova, D. Pawliszczy & B. Kuchmacz - 2020 - Financial and Credit Activity: Problems of Theory and Practice 2 (33):15-22.
    The article investigates the main characteristics of the financial stability of Ukrainian banks, their risk profile, structure of assets, liabilities, income, expenses based on the monthly reporting data for 2004-2020 (number of observations – 3 813). The Kohonen self-organizing map (SOM) toolkit is used to form homogeneous groups of banks based on a large number of financial indicators. The selected toolkit provides a convenient visualization of the results. Each bank occupies a specific place on the SOM. The close (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 986