Academic literature on the topic 'Credit security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Credit security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Credit security"

1

Yang, Ming-Hour. "Security Enhanced EMV-Based Mobile Payment Protocol." Scientific World Journal 2014 (2014): 1–19. http://dx.doi.org/10.1155/2014/864571.

Full text
Abstract:
Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. Th
APA, Harvard, Vancouver, ISO, and other styles
2

Rowlingson, R. "Credit crunch, security crunch." ITNOW 51, no. 1 (2009): 32. http://dx.doi.org/10.1093/itnow/bwp020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jacob, Otu Enyia, and Usang Okon Emmanuel. "Classification of Credit Security in Nigeria: Resolving the Perceived Dichotomy." Journal of Economics and Business 1, no. 2 (2018): 190–97. https://doi.org/10.31014/aior.1992.01.02.18.

Full text
Abstract:
This article is focused on the classification of credit security in Nigeria with a view to resolving the perceived dichotomy in the categorization. Credit security generally is within the ambit of property law which is circumstanced in secured credit. The work also attempts to determine the legal basis of this classification and the inherent utilities. We summarize that classification of security should be maintained for the purpose of distinction and clarity in aid of the unwary and non-legal minds.
APA, Harvard, Vancouver, ISO, and other styles
4

Osabohien, Romanus, Adesola Afolabi, and Abigail Godwin. "An Econometric Analysis of Food Security and Agricultural Credit Facilities in Nigeria." Open Agriculture Journal 12, no. 1 (2018): 227–39. http://dx.doi.org/10.2174/1874331501812010227.

Full text
Abstract:
Background:It is a known fact that the efficiency of credit facility positively contributes to production base of a sector, especially the Nigerian agricultural sector which is recognised as the heartbeat of the economy by employing over 70% of the country’s labour force; this forms the motivation for this study.Objective:This study examined the potential of agricultural credit facilities in terms of commercial bank credit to agriculture and agricultural credit guarantee scheme fund (ACGSF) and their corresponding interest rates to farmers towards increasing agricultural production as the path
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Zhaojun, Ming Zhu, and Ning Zhang. "Research on Dynamic Evaluation of Metro Passenger Credit." E3S Web of Conferences 372 (2023): 02016. http://dx.doi.org/10.1051/e3sconf/202337202016.

Full text
Abstract:
With the expansion of metro network, the large passenger flow in peak hours has brought great challenges to metro operation. While upgrading the security inspection, the traffic efficiency of passengers in metro stations has also been affected. Considering public security and security inspection efficiency, using the method of passenger credit rating to establish a differentiated security inspection mode has become the development direction of intelligent security inspection in the future. It is necessary to study the passenger credit evaluation system due to a lack of research on metro passen
APA, Harvard, Vancouver, ISO, and other styles
6

Saha, Mainak, M. Trinath Basu, Arpita Gupta, et al. "Enhancing credit card security using RSA encryption and tokenization: a multi-module approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 132. https://doi.org/10.11591/ijict.v14i1.pp132-140.

Full text
Abstract:
The security of credit card information remains a critical challenge, with existing methods often falling short in safeguarding data integrity, confidentiality, and privacy. Traditional approaches frequently transmit sensitive information in unencrypted formats, exposing it to significant risks of unauthorized access and breaches. This study introduces a robust security framework that leverages Rivest-Shamir-Adleman (RSA) encryption and tokenization to protect credit card information during transactions. The proposed solution is structured into three key modules: merchant, tokenization, and to
APA, Harvard, Vancouver, ISO, and other styles
7

Mainak, Saha, Trinath Basu M., Gupta Arpita, et al. "Enhancing credit card security using RSA encryption and tokenization: a multi-module approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 132–40. https://doi.org/10.11591/ijict.v14i1.pp132-140.

Full text
Abstract:
The security of credit card information remains a critical challenge, with existing methods often falling short in safeguarding data integrity, confidentiality, and privacy. Traditional approaches frequently transmit sensitive information in unencrypted formats, exposing it to significant risks of unauthorized access and breaches. This study introduces a robust security framework that leverages Rivest-Shamir-Adleman (RSA) encryption and tokenization to protect credit card information during transactions. The proposed solution is structured into three key modules: merchant, tokenization, and to
APA, Harvard, Vancouver, ISO, and other styles
8

Fadeikina, N. V., and V. S. Zyryanov. "Information and economic security of a credit institution as factors of ensuring its sustainable development." Siberian Financial School, no. 2 (August 26, 2024): 50–60. http://dx.doi.org/10.34020/1993-4386-2024-2-50-60.

Full text
Abstract:
The article defines the essence of information security as an essential component of the economic security of a credit institution on the basis of many definitions of the concepts of "information security" and "economic security" formulated by different researchers taking into account different points of view. Special attention is paid to new regulatory documents regulating the security of the critical information infrastructure of the Russian Federation, ensuring the information security of the credit and financial sector, improving the operational risk management system and comprehensive mod
APA, Harvard, Vancouver, ISO, and other styles
9

Dr. S. Gandhimathi and Ms. J. Soundarya. "Credit Card Transaction Security Using Facial Recognition Technology." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 2358–65. https://doi.org/10.32628/cseit23112573.

Full text
Abstract:
The most prevalent issue nowadays in the modern world is credit card fraud. This is due to the growth in internet transactions and e-commerce websites. When a credit card is stolen and used for unauthorized purposes, or when a fraudster uses the card's information for his own gain, credit card fraud happens. Because the credit card offers significant usage as a payment instrument, it is often used. As we all know, there are several opportunities for attackers or hackers to acquire sensitive data from online transactions. For both valid and invalid transactions, the information is processed and
APA, Harvard, Vancouver, ISO, and other styles
10

Khan, Aliza. "INDIVIDUAL'S BEHAVIOR AND PERCEPTION TOWARDS CREDIT CARD ADOPTION." Journal for Business Education and Management 3, no. 1 (2023): 23–40. https://doi.org/10.56596/jbem.v3i1.90.

Full text
Abstract:
This study investigates how people use credit cards and how they behave. The focus is on rewards, interest rate risks, security risks, and demographics. The motivations for this study are the increasing prevalence of credit cards in modern society and the need to understand the factors influencing consumers' decisions to use credit cards. It examines how various factors influence people's opinions about using credit cards, how rewards programs offered by the credit card industry influence people's opinions, how security Risks and interest rate risks affect people's opinions, and how satisfied
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Credit security"

1

Boy, Nina. "The security of public credit." Thesis, Lancaster University, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.663217.

Full text
Abstract:
This doctoral project presents an analysis of public credit as an imaginary of security against a critique of the Foucaultian analytic of liberal governmentality. The effective fiction of sovereign credit is traced in the form of the liquid government bond, the risk-free asset of financial-economic textbooks and the 'safe haven' role in times of crisis. The analytical relation between these different manifestations of public credit is conceptualized as a translation between the different terms and a translation from debt into credit, where government securities no longer require collateral but
APA, Harvard, Vancouver, ISO, and other styles
2

Dahabiyeh, Laila Ali. "IS security networks in credit card fraud prevention." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/88609/.

Full text
Abstract:
In our increasingly connected world, maintaining the security of information systems is challenging. Today’s interconnected business environment calls for a change in how IS security is achieved to include thinking about the entire networks of relationships involved in preventing threats rather than just focusing on individual organizational security processes. Despite acknowledging the role of distributed and heterogeneous actors in achieving a secure environment, there is a lack of knowledge of how these actors actually prevent security threats. Moreover, the heterogeneity of actors involved
APA, Harvard, Vancouver, ISO, and other styles
3

Sofola, Olatokunbo. "The Nigerian law of consumer credit and security." Thesis, King's College London (University of London), 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Frey, Rüdiger, Lars Rösler, and Dan Lu. "Corporate Security Prices in Structural Credit Risk Models with Incomplete Information." Wiley, 2017. http://dx.doi.org/10.1111/mafi.12176.

Full text
Abstract:
The paper studies structural credit risk models with incomplete information of the asset value. It is shown that the pricing of typical corporate securities such as equity, corporate bonds or CDSs leads to a nonlinear filtering problem. This problem cannot be tackled with standard techniques as the default time does not have an intensity under full information. We therefore transform the problem to a standard filtering problem for a stopped diffusion process. This problem is analyzed via SPDE results from the filtering literature. In particular we are able to characterize the default intensity
APA, Harvard, Vancouver, ISO, and other styles
5

Kalkan, Kutay. "A critical look at payment card industry data security standards implementation in restaurants." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 110 p, 2009. http://proquest.umi.com/pqdweb?did=1885544321&sid=4&Fmt=2&clientId=8331&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grundström, Niklas. "A Security Analysis of a Credit Card Payment System for Bitcoin Transactions." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148230.

Full text
Abstract:
Cryptocurrencies has become a very hot topic recently, with Bitcoin being the most popular. The increase in interest has led to an incentive to create payment systems for the currency that makes it easier to use for day-to-day shopping. A lot of companies are inves- tigating possible solutions for credit cards that are used for cryptocurrencies. This thesis aims to present and perform a security analysis on an already created concept of a credit card payment system for Bitcoin. The security analysis is done in a systematical approach where the modules were analyzed with predetermined restricti
APA, Harvard, Vancouver, ISO, and other styles
7

Shariff, Mohd Noor Mohd. "An evaluation of government-backed loan scheme in Malaysia." Thesis, Loughborough University, 2000. https://dspace.lboro.ac.uk/2134/7183.

Full text
Abstract:
SMEs are considered to be an engine for growth in both developed and developing countries, by generating employment opportunities, strengthening industrial linkages, securing home markets and earning valuable export revenue. Government-backed loan schemes play a major role in many countries, by enabling small and medium-sized enterprises (SMEs) to access credit facilities. The Credit Guarantee Corporation in Malaysia has been charged with this key role in assisting SMEs, and its main financing instrument is the New Principal Guarantee Scheme (NPGS). The overall aim of this thesis is to examine
APA, Harvard, Vancouver, ISO, and other styles
8

Davies, Iwan Rhun. "Aspects of title financing in personality with reference to the reform of English personal property security law." Thesis, Cardiff University, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.254674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Berg, Claudia N. "Impact of Microfinance on Food Security, Informal Credit, and Agricultural Wages| The Case of Bangladesh." Thesis, The George Washington University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3609079.

Full text
Abstract:
<p> Since its beginning in Bangladesh in the 1970s, the spread of microfinance worldwide has been impressive. While proponents argue that microfinance has improved the lives of millions of poor people, critics have raised doubts about its efficacy as a poverty alleviation strategy. Few rigorous studies of impact have been completed. My dissertation is a contribution to the ongoing debate, and focuses on Bangladesh as a case study. It consists of three empirical research essays: (i) Chapter 2 estimates the impact of microfinance on seasonal food security of the ultrapoor in Northwestern Banglad
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Credit security"

1

Duggan, A. J. Regulated credit: The credit and security aspects. Law Book Co., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loo, Wee Ling. Law of credit and security. LexisNexis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Peña, Narciso. Credit transactions. REX Book Store, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rodriguez, Rufus Bautista. Credit transactions. 2nd ed. Central Lawbook Pub., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Goode, R. M. Legal problems of credit and security. 2nd ed. Sweet & Maxwell, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goode, Royston Miles. Legal problems of credit and security. 3rd ed. Sweet & Maxwell, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mary, Donnelly. The law of credit and security. Round Hall, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Martin, Evans. Giving credit where it's due?: The success of Family Credit reassessed. Welfare State Programme, Suntory and Toyota International Centres for Economics and Related Disciplines, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

National Association of Federal Credit Unions. NAFCU's information security audit for credit unions. Sheshunoff, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Omotola, J. A. The law of secured credit. Evans Brothers (Nig. Publishers) Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Credit security"

1

East, Robert. "Working Families Tax Credit and Disabled Person’s Tax Credit." In Social Security Law. Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-14610-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Soni, Arun. "Debit/Credit Card Security." In The Cybersecurity Self-Help Guide. CRC Press, 2021. http://dx.doi.org/10.1201/9781003148678-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chow, Sherman S. M., Russell W. F. Lai, Xiuhua Wang, and Yongjun Zhao. "Privacy Preserving Credit Systems." In Network and System Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Molloy, Ian, Jiangtao Li, and Ninghui Li. "Dynamic Virtual Credit Card Numbers." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77366-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Jilin, Yingzi Chen, and Xiaoqing Feng. "Privacy-Preserving Credit Scoring on Cloud." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Close, Tyler. "Credit Transfer for Market-Based Infrastructure." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Androulaki, Elli, and Steven Bellovin. "An Anonymous Credit Card System." In Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03748-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Salcic, Zlatko. "Security for Payment of Credits Covered by ECAs." In Export Credit Insurance and Guarantees. Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137366818_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kundu, Amlan, Shamik Sural, and A. K. Majumdar. "Two-Stage Credit Card Fraud Detection Using Sequence Alignment." In Information Systems Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vatsa, Vishal, Shamik Sural, and A. K. Majumdar. "A Game-Theoretic Approach to Credit Card Fraud Detection." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Credit security"

1

Satapathy, Swetashree, Madhusri Padhy, Shubhasmita Nayak, Priyanshu Patra, Prasant Kumar Dash, and Priti Priyadarsani Pradhan. "Credit Card Security Enhancement Through Integrated Machine Learning Techniques." In 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS). IEEE, 2024. http://dx.doi.org/10.1109/iciteics61368.2024.10624859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

B S, Darshan, Vishal Kumar I B, Ashwini Kodipalli, and Trupti Rao. "Default credit card scoring using ML." In 2024 International Conference on Computational Intelligence for Security, Communication and Sustainable Development (CISCSD). IEEE, 2024. https://doi.org/10.1109/ciscsd63381.2024.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chaurasia, Sarthak, Ritik Sharma, Shubhang Tripathi, Tanya Gupta, and Bharat Bhardwaj. "Credit Card Fraud Detection Using Machine Learning." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11063781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mahure, Sonali Jagdish, and Vennala M. Reddy. "Enhancing Credit Card Security: Exploiting Machine Learning for Fraud Detection." In 2024 Second International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2024. http://dx.doi.org/10.1109/icici62254.2024.00038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aggarwal, Ananya, and Kanwarpartap Singh Gill. "AI-Enhanced Security: The Future of Credit Card Fraud Detection." In 2024 International Conference on Intelligent Computing and Sustainable Innovations in Technology (IC-SIT). IEEE, 2024. https://doi.org/10.1109/ic-sit63503.2024.10862885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guan, Guilin, Ting Zhi, Cai Yu, Yang Cao, Houze Dong, and Wei Zhou. "Security and Credit evaluation mechanism federated learning privacy protection scheme." In 2025 IEEE 17th International Conference on Computer Research and Development (ICCRD). IEEE, 2025. https://doi.org/10.1109/iccrd64588.2025.10963257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

D'souza, Kyle, Sia Puthusseri, and Aiden Gigi Samuel. "Scalable Federated Learning for Privacy-Preserving Credit Card Fraud Detection." In 2023 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2023. http://dx.doi.org/10.1109/iccst59048.2023.10726848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Patil, Chaitali, Kushal Birla, Pushkar Sunilkumar Nikumb, and Hitesh Kailash Patil. "Blockchain Powered Carbon Credit Trading System using CAP-and-Trade Mechanism." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aggarwal, Ananya, Kanwarpartap Singh Gill, Deepak Upadhyay, and Sarishma Dangi. "Fortifying Financial Security: The Power of Machine Learning in Credit Card Fraud Detection." In 2024 3rd International Conference for Advancement in Technology (ICONAT). IEEE, 2024. https://doi.org/10.1109/iconat61936.2024.10774612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Btoush, Eyad, Xujuan Zhou, Raj Gururajan, KC Chan, and Omar Alsodi. "Optimising Security: A Hybrid CNN-BiLSTM Model for Credit Card Cyber Fraud Detection." In 2024 Twelfth International Conference on Advanced Cloud and Big Data (CBD). IEEE, 2024. https://doi.org/10.1109/cbd65573.2024.00074.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Credit security"

1

Boyarchenko, Nina, and Leonardo Elias. Corporate Debt Structure over the Global Credit Cycle. Federal Reserve Bank of New York, 2024. https://doi.org/10.59576/sr.1139.

Full text
Abstract:
We study the determinants of active debt management through issuance and refinancing decisions for firms around the world. We leverage instrument-level data to create a comprehensive picture of the maturity, currency, and security type composition of firms' debt for a large cross-section of countries. At the instrument level, we estimate a predictive model of prepayment as a function of interest costs savings and maturity lengthening motives. We document that there is substantial heterogeneity in prepayment across bonds and loans and across firms, depending on their reliance on bank lending. W
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Tom W. Security Awareness and the Climate of Public Opinion: With Special Attention to Financial and Credit Issues,. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada262047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rivadeneira, Alex, Carlo Alcaraz, Nicolás Amoroso, Rodolfo Oviedo, Brenda Samaniego, and Horacio Sapriza. The Real Effects of Credit Supply Shocks During the COVID-19 Pandemic. Banco de México, 2024. https://doi.org/10.36095/banxico/di.2024.16.

Full text
Abstract:
We study the real effects of credit supply shocks during the COVID-19 pandemic in Mexico. To this end, we merge administrative micro-level data on the universe of bank loans to firms with matched employer-employee social security records. For each firm, we measure its exposure to time-varying credit supply shocks. We find that a negative credit shock of one standard deviation would have increased a firm's exit probability by 0.15 percentage points (pp) and decreased its annual employment growth by 1 pp. These effects were most pronounced among unincorporated businesses, small and young firms,
APA, Harvard, Vancouver, ISO, and other styles
4

Schling, Maja, Nicolás Pazos, Leonardo Corral, and Marisol Inurritegui. The Effects of Tenure Security on Women's Empowerment and Food Security: Evidence From a Land Regularization Program in Ecuador. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005355.

Full text
Abstract:
This paper evaluates the impact of a rural land administration program in Ecuador on female empowerment and household food security. Using a double robust estimation that combines the difference-in-difference approach with inverse probability weighting, we explore whether receiving a georeferenced cadastral map of ones parcel provides women with increased bargaining power, empowering them to participate more actively in productive and consumption decision-making that leads to improved diversification of the production portfolio and the households food security. Although we find no significant
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004195.

Full text
Abstract:
This publication reviews the history of digitalization of tax administration in Korea dating back to the 1990s and shares the countrys experience and know-how in building an efficient e-taxation architecture. Its main emphasis is on how the Korean government managed to make the best use of a wide range of taxpayer information efficiently and securely. It highlights information security and presents three case studies of an institutional framework for using third-party data: tax schemes for credit card usage, a cash receipt system, and e-invoicing. It then lays out a range of policy implication
APA, Harvard, Vancouver, ISO, and other styles
6

Rivera, Mildred, Romina Nicaretta, Estefhania Moncada, et al. Innovation in the Caribbean: Six Stories of Transformation for Sustainable Development. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013029.

Full text
Abstract:
This publication showcases the results and impact of innovative projects supported by the Inter-American Development Bank driving resilience, social progress, and sustainability in six Caribbean countries. Learn how the region is promoting sustainable development by enhancing access to credit in Barbados, upgrading water supply and sanitation systems in The Bahamas, strengthening citizen security in Guyana, empowering communities to adapt to climate change in Jamaica, rehabilitating the energy sector in Suriname, and improving health services in Trinidad and Tobago.
APA, Harvard, Vancouver, ISO, and other styles
7

Schling, Maja, Magaly Saenz Somarriba, and Juan de Dios Mattos. Land Regularization and Technical Efficiency in Agricultural Production: An Empirical Study in Andean Countries. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0012945.

Full text
Abstract:
This study evaluates the impact of land tenure security on technical efficiency of smallholder farmers in the three countries of the Andean region, Bolivia, Ecuador and Peru. Using cross-sectional data for 5,288 smallholder farmer households, we employ a multi-stage methodology, including propensity score matching, selectivity bias-corrected stochastic production frontier, and meta frontier analysis to address concerns relating to endogeneity. Results reveal that farmers who hold a formal land title on average exhibit technical efficiency that is 38.6% higher than among farmers without legal t
APA, Harvard, Vancouver, ISO, and other styles
8

Murshid, K. A. S. Food Security in an Asian Transitional Economy: The Cambodian Experience. Cambodia Development Resource Institute, 1998. https://doi.org/10.64202/wp.06.199812.

Full text
Abstract:
This working paper details the results of a study carried out from 1996 to 1997 of 244 households in three villages selected for their contrasting characteristics. One is in a rice surplus area of Prey Veng province; the second, in Kompong Speu province, is in a drought-prone area subject to violent fluctuations in rice production; the third, on the banks of the Mekong River in Kandal province, is primarily a fishing village, but with rice and reed production as additional sources of employment and income. The study therefore covers a range of agroecological and socio-economic conditions repre
APA, Harvard, Vancouver, ISO, and other styles
9

Yim, Chea, and Bruce McKenney. Domestic Fish Trade: A Case Study of Fish Marketing from the Great Lake of Phnom Penh. Cambodia Development Resource Institute, 2003. https://doi.org/10.64202/wp.29.200311.

Full text
Abstract:
This study investigates the domestic freshwater fish trade in Cambodia, focusing on the marketing chain from the Tonle Sap (Great Lake) to retail markets in Phnom Penh. As one of Cambodia’s most traded commodities, freshwater fish play a vital role in rural livelihoods and food security. The research examines market structures, transaction dynamics, and key constraints affecting trade efficiency. Based on interviews with fishers, traders, distributors, and retailers, as well as direct observation of trade activities, the study reveals a tightly linked credit-dependent system. Fishers are often
APA, Harvard, Vancouver, ISO, and other styles
10

Vera-Cossio, Diego A., Bridget Hoffmann, Camilo Pecha, et al. Re-thinking Social Protection: From Poverty Alleviation to Building Resilience in Middle-Income Households. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0004969.

Full text
Abstract:
We exploit an expansion in social protection to middle-income households to provide evidence on how middle-income households cope with economic shocks and how to build their resilience. We use a regression discontinuity design around the eligibility cutoff for a program that delivered monthly cash transfers mainly through bank accounts in Colombia. We find no impacts on food security, education, and health outcomes--the target outcomes of antipoverty programs. In contrast, program eligibility increases non-food consumption and reduces debt for routine expenses. Bank account ownership increases
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!