To see the other types of publications on this topic, follow the link: Theft insurance.

Journal articles on the topic 'Theft insurance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Theft insurance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Depken, Craig A., and E. Frank Stephenson. "Copper Theft in the United States." American Economist 62, no. 1 (October 11, 2016): 66–76. http://dx.doi.org/10.1177/0569434516672760.

Full text
Abstract:
Using monthly data for three proxies of copper theft, this article uses multivariate regression models to examine the relationship between copper prices and copper theft in the United States from 2006 through mid-2013. The findings indicate that copper thefts, as proxied by insurance claims for copper theft, newspaper articles in LexisNexis mentioning copper theft, and Google searches, are positively related to copper prices with the former two reflecting a constant elasticity not statistically different from unity. There is some evidence that copper thefts are related to the general pattern of property crime but there is no evidence that copper thefts are related to unemployment or foreclosures.
APA, Harvard, Vancouver, ISO, and other styles
2

Confer, Leanne M., John H. Boman, Cori Pryor, Thomas J. Mowen, and Paul Hemez. "Theft, Opioid Pills, Unemployment, and Insurance: A Longitudinal Analysis of American Counties in the Wake of the Opioids Crisis." Journal of Drug Issues 51, no. 3 (March 24, 2021): 504–17. http://dx.doi.org/10.1177/0022042621998690.

Full text
Abstract:
This study examines the relationships between prescription opioid pills, unemployment, health insurance, and theft. Covering the years 2006–2012, our data are an aggregate of information from the Drug Enforcement Administration, the Federal Bureau of Investigation’s National Incident-Based Reporting System, and the American Community Survey (ACS). The unit of analysis is time nested within counties. Preliminary results demonstrate that there were approximately 46 prescription opioid pills distributed per person annually in the United States between 2006 and 2012. Multivariate results reveal that counties with higher numbers of prescription opioid pills tend to experience significantly higher patterns of theft. Interestingly, health insurance is positively associated with theft while unemployment appears to protect against theft. The relationship between pills and theft is also conditioned by both unemployment and health insurance. Future research should explore these relationships to better inform efforts at making responsible social policy in the midst of the opioids crisis.
APA, Harvard, Vancouver, ISO, and other styles
3

CIOACA, Catalin, and Florin OLTEANU. "THEORETICAL CONSIDERATIONS ON POSSIBLE INSURANCE OF DRONES AGAINST DAMAGE AND THEFT." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 18, no. 1 (June 24, 2016): 133–38. http://dx.doi.org/10.19062/2247-3173.2016.18.1.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dionne, Georges, and Kili C. Wang. "Does insurance fraud in automobile theft insurance fluctuate with the business cycle?" Journal of Risk and Uncertainty 47, no. 1 (July 3, 2013): 67–92. http://dx.doi.org/10.1007/s11166-013-9171-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Talesh, Shauhin A. "Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as “Compliance Managers” for Businesses." Law & Social Inquiry 43, no. 02 (2018): 417–40. http://dx.doi.org/10.1111/lsi.12303.

Full text
Abstract:
While data theft and cyber risk are major threats facing organizations, existing research suggests that most organizations do not have sufficient protection to prevent data breaches, deal with notification responsibilities, and comply with privacy laws. This article explores how insurance companies play a critical, yet unrecognized, role in assisting organizations in complying with privacy laws and dealing with cyber theft. My analysis draws from and contributes to two literatures on organizational compliance: new institutional organizational sociology studies of how organizations respond to legal regulation and sociolegal insurance scholars' research on how institutions govern through risk. Through participant observation at conferences, interviews, and content analysis of insurer manuals and risk management services, my study highlights how insurers act as compliance managers for organizations dealing with cyber security threats. Well beyond pooling and transferring risk, insurance companies offer cyber insurance and unique risk management services that influence the ways organizations comply with privacy laws.
APA, Harvard, Vancouver, ISO, and other styles
6

Wieteska, Stanisław. "Ubezpieczenia od kradzieży ruchomych zabytków kultury z ekspozycji stałej w Polsce." Kwartalnik Kolegium Ekonomiczno-Społecznego. Studia i Prace 4, no. 3 (December 13, 2015): 279–94. http://dx.doi.org/10.33119/kkessip.2015.4.3.19.

Full text
Abstract:
Insurance coverage is one of the methods of providing security for movablecultural property. The article discusses the scale of theft of such objects in Polandand methods of valuation for the purposes of determining the sum of insurance.
APA, Harvard, Vancouver, ISO, and other styles
7

Fadiya, Olusanjo O., Panos Georgakis, Ezekiel Chinyio, and Peter Akadiri. "Analysing the perceptions of UK building contractors on the contributors to the cost of construction plant theft." Journal of Financial Management of Property and Construction 18, no. 2 (August 2, 2013): 128–41. http://dx.doi.org/10.1108/jfmpc-10-2012-0039.

Full text
Abstract:
PurposeThe purpose of this paper is to consider the significance of the sources of cost of construction plant theft identified in previous studies and derive rates which can enhance proper estimation of the cost of plant theft to the construction industry. The direct and indirect costs of plant theft include replacement cost (new‐for‐old/depreciated), emergency cost, hire replacement cost, productivity loss, increased labour cost, loss of goodwill, administration cost, increased insurance premium and social cost.Design/methodology/approachThe cost‐contribution of these various sources was studied, using a structured questionnaire which was administered to building contractors in the UK construction industry, to measure their opinions of the frequency and severity of the contribution of the sources to the cost of construction plant theft. The questionnaires were administered to 220 companies and 51 of them were fully completed, representing 23.1 per cent of the original sample. The responses were analysed using descriptive and inferential statistics to derive the probabilities of sources contributing to the cost of plant theft.FindingsThe results of the analysis show that the rates of contribution to the cost of plant theft varies significantly between the sources, with “loss of output” and “increased insurance premium” ranking as the top‐two costs of plant theft in the UK construction industry. The rates derived in this study can be used by contractors to reasonably estimate the cost of plant theft, especially when there is need to justify the adoption of measures that can mitigate plant theft.Originality/valueThis study generated rates of contribution by factors which contribute to the overall cost of theft of construction plant in the UK. These rates can provide a more reliable estimate of the cost of plant theft than current estimations which vary significantly.
APA, Harvard, Vancouver, ISO, and other styles
8

Moussa, H. "An Alternative Solution to the Moral Hazard Problem and Some Sufficient Conditions for Its Absence." Recherches économiques de Louvain 51, no. 2 (June 1985): 181–94. http://dx.doi.org/10.1017/s077045180008252x.

Full text
Abstract:
Moral hazard is one of the problems that is believed to plague the insurance industry. A major aspect of the problem deals with the effect of the availability of insurance on the level of care exercised by the insured to reduce the probability of loss. When an insurance policy is not available against, say theft, an economic agent could devote time to watching over his property. At the extreme he could ensure that the probability of loss was zero, but the cost of such a strategy would likely be prohibitive. For such an instance the optimal action is to expend an effort less than that required to reduce the probability of theft to zero and hence to bear some risk. If we assume that economic agents are risk averse they would be willing to pay for a transfer of risk to another economic agent thereby enhancing their welfare. This transfer of risk is obtained through the purchase of an insurance policy. However if all goods are normal, the increase in welfare obtained from the purchase of insurance will be used to increase the consumption of leisure and that of other goods. As a consequence the purchase of insurance will cause the economic agents to expand less effort on the reduction of the probability of loss. That is, the optimal level of effort devoted to guarding against loss will depend on whether insurance is available.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Fan. "Does Identity Theft Insurance Undermine Risk Perceptions and Increase Risky Behavioral Intentions?" Asian Economic and Financial Review 9, no. 8 (2019): 926–35. http://dx.doi.org/10.18488/journal.aefr.2019.98.926.935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pao, Tsung-I., Larry Y. Tzeng, and Kili C. Wang. "Typhoons and Opportunistic Fraud: Claim Patterns of Automobile Theft Insurance in Taiwan." Journal of Risk and Insurance 81, no. 1 (February 14, 2013): 91–112. http://dx.doi.org/10.1111/j.1539-6975.2012.01498.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Salama, Ramiz, Ayman Okal, and Krell Chiprausha. "Development of application for software piracy protection from hackers attacks." New Trends and Issues Proceedings on Humanities and Social Sciences 6, no. 6 (December 6, 2019): 81–91. http://dx.doi.org/10.18844/prosoc.v6i6.4470.

Full text
Abstract:
Recently, programming theft has been a serious issue for programming ventures and extremely huge costs were required to secure their applications. As per Business Software Alliance, the worldwide programming theft rate in 2013 was 43% and the business estimation of unlicensed programming establishments was $62.7 billion, which brought about a large loss in income and a number positions in programming organisations. This paper will exhibit that ‘programming robbery insurance framework’ is mostly used to secure the theft of the framework. Presently, a progressive number of clients download the product without having the consent of the product’s proprietor since the product has the item key which can be located/used by an obscure individual to utilise that product. Our methodology will utilise ‘Macintosh-based confirmation’ and create an item key, which checks or compares the item key against a unique MAC address on each machine. Keywords: Copyright protection, software piracy prevention, identification, authentication, intellectual property protection, diversity, tailored updates.
APA, Harvard, Vancouver, ISO, and other styles
12

McDowell, Ryan W. "Run Gauntlets or Pay Pirates? Regulating Vessel Speeds in High-Risk Waters." American Journal of Trade and Policy 8, no. 2 (May 21, 2021): 155–70. http://dx.doi.org/10.18034/ajtp.v8i2.540.

Full text
Abstract:
Maritime commerce in world commerce. Each year, vessels carry more cargo at higher costs and faster speeds. Insurance is an integral part of shipping, as it protects cargoes and crews against the perils of the sea. This article focuses on the peril of piracy, a criminal practice that has evolved significantly throughout history. Pirates today, as pirates of the past, prey upon the unprotected. Yet, modern piracy, unlike historical piracy, is essentially non-violent. The modern pirate profits from ransom, not theft. Today, piracy is a monetary risk with compu­­­table consequences: an insurable threat. Anti-piracy methods, including insurance, impose steep costs to world trade. In the past decade, pirate activity has declined while piracy insurance has grown more expensive. This phenomenon is problematic, but an industry-wide solution is a challenging construct. To handle the costly risks of piracy is to balance the distinct and competing interests of ship-owners, insurers, operators, and governments. As this Article argues, insurance can more efficiently mitigate piracy’s puzzling risk. After discussing maritime piracy and maritime insurance, this Article outlines the legal and regulatory schema for a system to mandate the speeds of vessels that transit pirate-prone waters. The proposed regulation is mechanically sound, logistically feasible, cost-effective, and enforceable. To diminish the costly risk of piracy, this Article proposes revising a treaty to afford the International Maritime Organization (IMO) jurisdiction to regulate vessel speeds on the high seas.
APA, Harvard, Vancouver, ISO, and other styles
13

Tamunobarafiri, Amavey, Shaun Aghili, and Sergey Butakov. "Data Security and Privacy Assurance Considerations in Cloud Computing for Health Insurance Providers." International Journal of Monitoring and Surveillance Technologies Research 5, no. 4 (October 2017): 1–22. http://dx.doi.org/10.4018/ijmstr.2017100101.

Full text
Abstract:
Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft Resource Centre, over twenty-five percent of data breaches in the US targeted healthcare. The HIPAA Journal reported an increase in healthcare data breaches in the US in 2016, exposing over 16 million health records. The growing incidents of cyberattacks in healthcare are compelling insurance providers to implement mitigating controls. Addressing data security and privacy issues before cloud adoption protects from monetary and reputation losses. This article provides an assessment tool for health insurance providers when adopting cloud vendor solutions. The final deliverable is a proposed framework derived from prominent cloud computing and governance sources, such as the Cloud Security Alliance, Cloud Control Matrix (CSA, CCM) v 3.0.1 and COBIT 5 Cloud Assurance.
APA, Harvard, Vancouver, ISO, and other styles
14

Dey, Subhashish. "The Importance of Health Insurance in the Various Insurance Sectors in India: A Review." International Journal of Industrial Marketing 7, no. 1 (November 20, 2022): 31. http://dx.doi.org/10.5296/ijim.v7i1.20485.

Full text
Abstract:
The pressure of competitive and dynamic markets has contributed to the provision of these services. A booming financial market holds the interest of most of the Indian today. The banks are no longer the means of saving money and taking loans but they have turned into one stop any financial need by a common man. For banks seeking to improve their performance, developing offers to attract mass affluent customers may be the key to raising their profile and reducing their cost-to income ratios. Each banking institution must weigh the economics of such a move and determine whether there is demand for such service in its market. Insurance is a finance service for collecting the savings of public and providing them with risk coverage. It reimbursement in a situation of loss, The risk may be certain events like death, retirement, pension, education, marriage etc. or uncertain events like theft, accident, fire, ill-health, etc. Insurance is pooling of risks, when the concepts of insurance to arises, a pre-payment of some type is required. Today, there is insurance for many aspects of daily living: Business, Auto, Health, Life and Travel. The health insurance is one of the very important products for various types of insurance products. In this study we are analysis the various types of health insurance policy effects on the human life.
APA, Harvard, Vancouver, ISO, and other styles
15

Smith, Robert. "Documenting entrepreneurial opportunism in action." British Food Journal 119, no. 1 (January 3, 2017): 105–21. http://dx.doi.org/10.1108/bfj-07-2016-0324.

Full text
Abstract:
Purpose The contemporary rustler is a shrewd businessman, or rogue farmer exploiting food supply chain anomalies. Indeed, the first conviction in the UK for 20 years was a farmer stealing from neighbouring farmers. The theft of sheep in the UK is an expanding criminal enterprise which remains under researched. The purpose of this paper is to examine what is known of the illegal trade and its links to food fraud from a supply chain perspective with an emphasis on food integrity issues. Design/methodology/approach There is a dearth of current viable literature on livestock theft in a western context making it necessary to turn to socio-historical research and to official documents such as those published by the NFU and other insurance companies to build up a picture of this illegal practice. This is supplemented by documentary research of articles published in the UK press. Findings From this raw data a typology of rustlers is developed. The findings point to insider “supply chain” knowledge being a key facet in the theft of livestock. Other examples in the typology relate to urban thieves wrestling live sheep into a car and to industry insiders associated with the abattoir sector. Research limitations/implications The obvious limitations is that as yet there are few detected cases of rustling in the UK so the developing typology of rustlers is sketchy. Another limitation is that much of the evidence upon which the typology is developed is anecdotal. Originality/value The typology should prove helpful to academics, insurance companies, investigators, industry insiders and farmers to help them understand this contemporary crime and how to prevent its spread. It also sheds light on food integrity in relation to the purchase and consumption of the end product in that customers expect to be purchasing legally and ethically reared animal products.
APA, Harvard, Vancouver, ISO, and other styles
16

يوسف عبد الرحمن الجبوري, أ. م. د. فؤاد, and م. م. ابتسام عباس عبد الحسن. "الرقمنة المستقبلية ودعم تأمين راس المال الفكري دراسة حالة- في شركة التأمين الوطنية." Iraqi Journal For Economic Sciences 2021, no. 68 (March 13, 2021): 22–41. http://dx.doi.org/10.31272/ijes2021.68.2.

Full text
Abstract:
Abstract This study is based on the idea that future electronic digitization has an important and clear role in enhancing the work of insurance companies in the field of securing intellectual capital in line with the new global variables to preserve the real wealth of the advancement of contemporary societies and organizations with high performance in harmony with the new direction for them. Where the organizations in general, the research organization (the National Insurance Company) and other companies of similar orientation suffer from the formation of a clear perceptual image in using this type of insurance to protect it from theft and loss and to ensure intellectual property rights. Where the researchers directed to build conclusions and recommendations through scientific methodologies through specialized samples in this field. We resort to personal interviews and examination form to study the case and arrive at the results through descriptive analysis. The two researchers reached the most important conclusion, which is the apparent negligence in applying international standards that guarantee this type of insurance (intellectual capital).
APA, Harvard, Vancouver, ISO, and other styles
17

Mensah, Nicholas Oppong, Jacqueline Joyce Twintoh, Ernest Christlieb Amrago, Anthony Donkor, and Samuel Afotey Anang. "Forestry insurance preference among tree growers in the Ashanti Region of Ghana: a tobit and multi-nomial regression approach." Managerial Finance 47, no. 8 (March 9, 2021): 1194–212. http://dx.doi.org/10.1108/mf-10-2020-0535.

Full text
Abstract:
PurposeThe study analyses the preference for forestry insurance amongst tree growers in the Ashanti Region of Ghana. Specifically, the authors examine the factors influencing the amount of forestry insurance and the choice for forestry insurance types.Design/methodology/approachA total of one hundred and seventy (170) tree growers were sampled for the study. The tobit model, multi-nomial regression and Kendall's tau were employed to analyse the factors affecting the amount for forestry insurance, the choice for forestry insurance types and the perils to forest quality, respectively.FindingsThe results of the study indicate that the incidence of bush fire and theft were the key perils that affect forest quality. In total, 52.94% of respondents preferred forest plantation fire insurance as named-peril insurance whereas 70.59% preferred a combination of forest plantation fire, windstorm and consequential loss insurance as multi-peril insurance. The majority (89.4%) of the respondents were willing to pay an amount between Ghc 10.00–49.00 (US$ 2–8) per stand. On the one hand, results of the tobit model reveal age, income, experience in forest management, land ownership and the previous occurrence of fire as the factors affecting the amount for forestry insurance. On the other hand, the multi-nomial results indicate the previous occurrence of fire, gender, forest size, income and risk aversion significantly influenced the choice for forestry insurance types, namely named peril and multi-peril.Originality/valueSeveral studies exist for forestry insurance in the developed countries. However, in West Africa specifically, Ghana, studies on forestry insurance appear to be non-existent. Above and beyond, this study, therefore, adds to the paucity of research on forestry insurance in Ghana and serves as a framework for agricultural insurance institutions such as the Ghana Agricultural Insurance Pool (GAIP) and World cover and other agricultural insurance institutions globally.
APA, Harvard, Vancouver, ISO, and other styles
18

Macdonald, Fiona, Eleanor Bentham, and Jenny Malone. "Wage theft, underpayment and unpaid work in marketised social care." Economic and Labour Relations Review 29, no. 1 (February 22, 2018): 80–96. http://dx.doi.org/10.1177/1035304618758252.

Full text
Abstract:
Marketised models of social care provision in Australia are placing pressures on service providers and driving changes in work organisation and employer practices, with potential to degrade social care jobs. While international experience of marketised social care has demonstrated the vulnerability of social care workers to wage theft and other violations of employment laws, Australia’s relatively strong industrial relations safety net might be expected to be better able to protect these low-paid workers. Nevertheless, there is emerging evidence of negative impacts on the pay and entitlements of frontline workers in the expanding community support and homecare workforce. This study investigates the paid and unpaid work time of disability support workers under Australia’s new National Disability Insurance Scheme. The research takes a novel approach combining analysis of working day diaries and qualitative interviews with employees to expose how jobs are being fragmented and work is being organised into periods of paid and unpaid time, leaving employees paid below their minimum entitlement. The article highlights the role of social care policy along with inadequate employment regulation. JEL Codes: J390, J81, J88
APA, Harvard, Vancouver, ISO, and other styles
19

DANSU, Sewhenu Francis, Olufemi Adebowale ABASS, and Yeside Abiodun OYETAYO. "FACTORS INFLUENCING THE CHOICE OF THIRD PARTY LIABILITY MOTOR INSURANCE AMONG ACADEMIC STAFF IN LAGOS STATE, NIGERIA." LASU Journal of Employment Relations & Human Resource Management 1, no. 1 (December 1, 2018): 210–20. http://dx.doi.org/10.36108/ljerhrm/8102.01.0122.

Full text
Abstract:
The coverage of the Third Party Liability (TPL) motor insurance is limited when compared with the third party liability, fire & theft and comprehensive coverage. Notwithstanding this limitation, vehicle owners seem to still prefer the third party liability motor insurance policy. This study seeks to identify the major factors responsible for this sentiment. 300 academic staff across five tertiary institutions in Lagos were engaged in this study. Data were gathered with the use of structured questionnaire, 146 copies of the questionnaires were duly completed and found useful for the study. The data were analysed by conducting factor analysis and testing three hypotheses using correlation analysis with the aid of Statistical Package for Social Sciences (SPSS), version 20. The study found significant positive relationship existing between family size, price of insurance, number of vehicles owned and marital status and the choice of TPL motor insurance policy among academic staff of higher institutions in Lagos State. The findings of the study reflected that TPL motor insurance is preferred because it is cheap and its purchase will not mainly hinder the attainment of the needs of any family members. It is recommended that safety of life and properties other than price of motor insurance should be considered when making motor insurance policy choice and that there is need to review the law of motor insurance with the aim of expanding the mandatory minimum coverage to cater for the life and properties of the insured.
APA, Harvard, Vancouver, ISO, and other styles
20

Fadhil, Rahmat, Zuraida Hanum, and Muhammad Yunus. "Sistem Pengembangan Asuransi Usaha Ternak Sapi/Kerbau di Provinsi Aceh." Jurnal Ilmu Pertanian Indonesia 26, no. 4 (October 27, 2021): 569–81. http://dx.doi.org/10.18343/jipi.26.4.569.

Full text
Abstract:
Cow/buffalo-business insurance (AUTS/K) is a form of risk mitigation for livestock businesses run by farmers. Various risks that are often occurred include livestock death, natural disasters, disease outbreaks, and livestock theft. If not handled properly, it can threaten the sustainability of this business, especially the small-scale livestock-business sector. This study aimed to formulate a developing system of cattle/buffalo-livestock insurance using the soft-systems methodology (SSM) approach. This research was conducted in Aceh Province from December 2020 to February 2021 using an expert survey by collecting data and information through parties who have competence or expertise in the field being studied. The development of this insurance system can be said to be an effort to improve and a solution to any problems currently being experienced in the implementation of AUTS/K. The result of improvements includes optimizing the roles of each party involved and program innovation to intensify AUTS/K products among breeders. The results showed that the SSM approach could describe the problem well and form a conceptual model for the AUTS/K system in Aceh province. Improvements to policies, assistance, and promotion systems are recommended as solutions to the problems related to livestock-insurance system implemented. Keywords: breeders, conceptual model, insurance system, soft-systems methodology, syariah insurance
APA, Harvard, Vancouver, ISO, and other styles
21

Suharyanto, Akhmad Ansyor, and Zikril Hidayat. "Willingness to pay on cattle business insurance in supporting UPSUS SIWAB in Bangka Belitung Province." E3S Web of Conferences 316 (2021): 02021. http://dx.doi.org/10.1051/e3sconf/202131602021.

Full text
Abstract:
Apart from productivity problems, the implementation of beef cattle business is faced with various risks. Several risks faced by smallholder beef cattle business, such as; price, disease, feed, marketing, theft, and relationship with traders. In order to maintain the sustainability of the livestock business, breeders need a guarantee in order to continue their business. This guarantee can be in the form of livestock insurance. Cattle insurance is one of the important programs to support the livestock sector, given the important role of cattle insurance not only for breeders but for various parties. This study aims to obtain information about the willingness to pay (WTP) on cattle business insurance in Bangka Belitung Province. This research was conducted from June to October 2018 in Bangka Belitung Province. Data collection was carried out by interviewing 150 farmers as respondents as primary data. In order to strengthen this, secondary data was collected from the agricultural agency at the provincial level. The WTP value obtained shows that it is still below the value of the premium paid at this time, this indicates that farmers still want subsidies from the government for the implementation of AUTS to minimize the risk of livestock business.
APA, Harvard, Vancouver, ISO, and other styles
22

Kurmaiev, Petro, Liudmyla Seliverstova, Olena Bondarenko, and Nataliia Husarevych. "Cyber insurance: the current situation and prospects of development." Revista Amazonia Investiga 9, no. 28 (April 21, 2020): 65–73. http://dx.doi.org/10.34069/ai/2020.28.04.8.

Full text
Abstract:
The aim of the article is to analyze current trends in the development of cyber insurance. The following methods of scientific research were used in the preparation of the article: generalization, correlation analysis, comparative analysis. The authors analyze in detail the main trends in the spread of cybercrime. The correlation analysis between the number of registered cybercrimes in a particular country and its GDP, the number of business entities, indicated the lack of correlation between the studied indicators. It states that the most common types of cybercrime are: hacking, unauthorized access, accidental exposure, insider and physical theft. The sectoral analysis of the distribution of cybercrime has revealed a decrease in the share of financial companies while increasing the share of health care companies. It is noted that cyber insurance is one of the effective preventive measures that minimize the negative effects of cybercrime intervention. The article presents segmentation of the cyber insurance market by geography and size of insurance companies. The results of the analysis showed the dominance of US companies in the cyber insurance market. It is stated that the sectoral distribution of cybersecurity policy purchasers in general follows the trends of the sectoral distribution of cybercrime. The volume of cyber insurance, expenses of insured legal entities is analyzed. The main trends in the development of cyber insurance have been identified. The factors that hold back the development of cyber risk insurance have been identified. The main ones include the following: high level of information entropy in the process of cyber risk assessment, lack of a single standard for filling insurance services in the field of cyber insurance. It is noted that in the medium term the cyber insurance market is prospective for insurance companies. This is caused by the increasing scale of cyber threats and the costs associated with cyberattacks.
APA, Harvard, Vancouver, ISO, and other styles
23

Sauer, Thomas C. "Solar investment risk mitigation − are we all on the same page?" EPJ Photovoltaics 10 (2019): 7. http://dx.doi.org/10.1051/epjpv/2019005.

Full text
Abstract:
Currently, the PV solar sector represents approx. 2% of worldwide annual electricity production (https://webstore.iea.org/world-energy-outlook-2018), and therefore, is just at the verge of becoming visible in most countries. As the PV sector becomes increasingly visible to the next order of magnitude sometime in future, representing 20% in the electricity mix and beyond, it is now a good time to discuss reliability, predictability, and performance of PV power plants and as a consequence, the improvement potential for financial returns. Building on this train of thought, this article will provide a short introduction of PV power plant risks, predominantly related to technical performance. The question of risk mitigation measures will then be discussed: On the one side, quality assurance is a viable risk mitigation measure. However, even with quality assurance measures implemented, there are limitations when it comes to backstopping financial losses in the event that the performance deteriorates more than predicted and warranted by the manufacturers, or if the manufacturers or EPC's are no longer in business when incidental power degrades beyond calculated limits. Insurance solutions seem to provide an additional risk mitigation measure. Most insurance solutions on the market, however, only cover against externally induced risk exposures, e.g. severe weather, theft. Most of these insurance solutions follow a certain minimum standard. A few insurance products offer performance insurances where general cover is less standardized. All this triggers the question of how to look at insurance solutions. The interests of an insurance company are generally different than those of the insured stakeholders. These different viewpoints will be discussed, and selected warranty and insurance aspects will be considered. Recently, approximately 3500 insurance claim cases were statistically analyzed (http://www.pvstatlab.rwth-aachen.de/index.php/PVScan-project.html). Selected results of this analysis will be discussed. The article closes with an outlook of how insurers can likewise mitigate their risk exposure − in the end, insurers are only as good as the balance of the solvency resulting from their business model, or in the terminology of the insurance sector, the loss ratio must be at an acceptable level. This is where IECRE, the IEC System for Certification to Standards Relating to Equipment for Use in Renewable Energy Applications (https://www.iecre.org/), offering an international standard for certification − and in future − a rating system for PV power plants on a system level comes into play.
APA, Harvard, Vancouver, ISO, and other styles
24

Dabbugudi, Muralikrishna. "Artificial Intelligence on Property and Casualty Insurance." European Journal of Electrical Engineering and Computer Science 6, no. 6 (November 14, 2022): 26–30. http://dx.doi.org/10.24018/ejece.2022.6.6.473.

Full text
Abstract:
The property insurance and casualty insurance sector are large insurance sector that protects or covers the stuff you own (like Home, car and trucks). The provider that provides or covers huge amount of coverage to properties (like cars, trucks, motorcycles and property), other constructions, accidents, vandalism, on theft etc. Casualty insurance is that the policy has the liability coverage to protect yourself if you are the one who is legally responsible for an accident that creates injuries to another party or creates damage to the other party’s appurtenances. The property and casualty insurance are combined together into one insurance product under a single policy. With the help of innovative technology growth, Property and Casualty Insurance Carriers are steadily using leading-edge technologies like Artificial Intelligence and Machine learning, to avoid an intermediary between the insurer and the customer and directly reaching to the customers and make sure to deliver prompt and accurate services without any interruptions at an affordable cost. Among many examples, we can use one being an example is utilized of Artificial Intelligence and Machine learning in the Property and Casualty insurance sector, which is leading towards to have a much greater number of use cases substantial as prevention of fraudulent claims, making fast and accurate business decisions, predictive data analytics, improve customer satisfaction and much more. Mainly this paper talks about emerging technologies like AI, ML which is used and adopted in Property Insurance and Casualty Insurance domain. Artificial Intelligence provides many benefits to insurance carriers, so carriers can improve their process to support their customers. What is an AI: “AI is all about how the digitals and humans can collaborate; how digital can take over tasks they can do much better and faster than human, so human can focus on what only he can do.”
APA, Harvard, Vancouver, ISO, and other styles
25

Malik, Adnan, Zahoor Khan, Sami Ullah Khan, and Malik Muhammad. "Comprehensive and Technical Efficiency of Insurance and Takaful Companies in Pakistan." COMSATS Journal of Islamic Finance 5, no. 2 (December 28, 2020): 1–28. http://dx.doi.org/10.26652/cjif.5202021.

Full text
Abstract:
Comprehensive and Technical Efficiency of Insurance and Takaful Companies in Pakistan Insurance and Takaful companies, both, are business organizations existing for the motive of profit. Large capital is required by the shareholders to establish a company; therefore, the company is expected to earn sufficient profit to meet the expectations of the shareholders. Moreover, a company also has its responsibilities towards its customers in terms of quality service. Shareholders are more concerned with their profit and customers regarding the services. Companies pay claims when the covered persons suffer a loss which can be the death of the family’s only bread earner, factory on fire, theft of business goods etc. Therefore, efficient financial performance of insurance and Takaful companies is important to fulfil the requirements of both: shareholders and clients. This study investigates financial efficiency of insurance and Takaful companies via Data Envelopment Analysis during the period 2011 to 2015. We have taken six general (non - life ) insurance & Takaful companies operating in Pakistan with input factors labor cost, assets and output factors premium / contribution received and percentage of claims paid. Results show that insurance and takaful companies are more than 80% efficient in their operations. For further increasing their efficiencies, they need to reduce their input by less than 20% to have same level of output. Comparing efficiencies of insurance and takaful companies, insurance companies are more efficient in terms of pure technical & super efficiency while takaful companies have higher scale efficiency than insurance companies, though the difference in most of the cases is less than 2%. Both types of companies need to improve their efficiencies by decreasing their assets input and labor cost while retaining the same output level of premiums and claims. Keywords: General insurance, Data Envelopment Analysis (DEA); Malmquist index, Takaful, Scale and technical efficiency
APA, Harvard, Vancouver, ISO, and other styles
26

Lafta, Naseer Sabbar. "Prospects for preserving Iraq's architectural heritage." Akkad Journal Of Law And Public Policy 1, no. 4 (March 18, 2022): 198–211. http://dx.doi.org/10.55202/ajlpp.v1i4.86.

Full text
Abstract:
The Iraqi Antiquities and Heritage Act No. 55 of 2002, through its provisions to the Archaeological Authority, allowed the disposal of heritage materials through specific legal conditions by displaying heritage materials to the public, preserving them, or evacuating heritage areas in the event of a threat to them, as well as the possibility of showing them for scientific study purposes, as well as to be communicated to the public in museums and exhibitions inside Iraq. However, all these legal conditions permitted by the legislator to the archaeological authority are not without dangers that may accompany them, including vandalism, extinction, demolition, theft, and fire, and this causes an irreparable loss. In this study, we try to establish the possibility of securing materials for Iraq's architectural heritage, which we are trying to provide through the general rules of the insurance contract. We divided this research into two types of research that were the first title on the concept of the danger of securing architectural heritage materials. The second topic is entitled The Benefits of this insurance by putting the insurance of architectural heritage materials into practice
APA, Harvard, Vancouver, ISO, and other styles
27

Noviyanti, Lienda. "PERSEPSI MASYARAKAT DESA SAYANG RW 03 KECAMATAN JATINANGOR KABUPATEN SUMEDANG TERHADAP PENTINGNYA PROTEKSI KENDARAAN BERMOTOR." Dharmakarya 8, no. 3 (September 6, 2019): 145. http://dx.doi.org/10.24198/dharmakarya.v8i3.21059.

Full text
Abstract:
As the times and technology became more sophisticated, human needs and mobility also increased. One such technology is vehicle. It cannot be denied that motorized vehicles and cars have now become the most important parts of everyday life. Vehicle protection is very important to keep vehicles safe, especially in areas prone to theft. Protection of the vehicle itself is divided into two ways, namely by personal and insurance methods. The fact is that vehicle protection carried out by Desa Sayang residents is still very minimal, which is caused by a lack of knowledge and understanding of citizens about the importance of vehicle protection. Seen from only a few residents who have insurance services to protect their vehicles. Measuring the perceptions of residents of RW 03 Desa Sayang, Jatinangor Subdistrict, Sumedang Regency is divided into 2 things, namely knowledge (cognition) and behavior (konasi). Of the 97 informants interviewed, it was found that people's knowledge of insurance was not good. While their knowledge of vehicle protection in general is quite good. In addition, vehicle ownership also affects individual knowledge of insurance and vehicle protection. Unfortunately, protection of vehicles in the form of insurance is rarely done by residents because most are hampered in terms of costs and feel they do not need it. Therefore, a perception survey and vehicle protection socialization were made in Sayang Village, Jatinangor Sub-District, Sumedang Regency so that residents would be more aware of maintaining their vehicles.
APA, Harvard, Vancouver, ISO, and other styles
28

Calloway, Laura, Lesa Huber, and L. Jean Camp. "Privacy and Usability in COVID Enrollment Apps." Innovation in Aging 5, Supplement_1 (December 1, 2021): 658. http://dx.doi.org/10.1093/geroni/igab046.2488.

Full text
Abstract:
Abstract Enrollment apps for COVID-19 vaccinations are meant to be privacy-enhancing, but poor design puts privacy at risk. We report on a qualitative exploration of the experiences of older adults attempting to register for vaccination. We engaged in a think-aloud protocol with six participants over age 65 over Zoom as they used the New York state vaccination portal. Authentication requirements were: Medicare ID, DOB, address, and phone (optional). For this cohort, Social Security numbers were the default Medicare ID. We found that a privacy-enhanced authentication option exists, but efforts to use privacy-preserving enrollment were confounded by security-enhancing timeouts. Choosing to use the time-consuming privacy-preserving authentication increased the risk that available vaccines were taken. As a result, older adults reliant on volunteers to enroll revealed sensitive information and risked identity theft. A design that was meant to be privacy-enhancing by offering multiple avenues for authentication and ensuring logout via timeouts created a system where the more secure option was not effectively available due to a competing security mechanism. This was exacerbated by a counter counting down the number of vaccine sites available, similar to a well-known stress condition used to create cognitive load in laboratory experiments. All six participants used privacy-sensitive information to enroll; provided adequate information for identity theft; and all six encountered stop points. The countdown of available vaccination sites, the time required for insurance validation as an alternative to Medicare ID, and logging off after inactivity to prevent session theft each are good practices; but fail together.
APA, Harvard, Vancouver, ISO, and other styles
29

Gómez-Déniz, Emilio, and Enrique Calderín-Ojeda. "A Priori Ratemaking Selection Using Multivariate Regression Models Allowing Different Coverages in Auto Insurance." Risks 9, no. 7 (July 20, 2021): 137. http://dx.doi.org/10.3390/risks9070137.

Full text
Abstract:
A comprehensive auto insurance policy usually provides the broadest protection for the most common events for which the policyholder would file a claim. On the other hand, some insurers offer extended third-party car insurance to adapt to the personal needs of every policyholder. The extra coverage includes cover against fire, natural hazards, theft, windscreen repair, and legal expenses, among some other coverages that apply to specific events that may cause damage to the insured’s vehicle. In this paper, a multivariate distribution, based on a conditional specification, is proposed to account for different numbers of claims for different coverages. Then, the premium is computed for each type of coverage separately rather than for the total claims number. Closed-form expressions are given for moments and cross-moments, parameter estimates, and for a priori premiums when different premiums principles are considered. In addition, the severity of claims can be incorporated into this multivariate model to derive multivariate claims’ severity distributions. The model is extended by developing a zero-inflated version. Regression models for both multivariate families are derived. These models are used to fit a real auto insurance portfolio that includes five types of coverage. Our findings show that some specific covariates are statistically significant in some coverages, yet they are not so for others.
APA, Harvard, Vancouver, ISO, and other styles
30

Ramdas Gautam and Dr. Vinod Kankar. "Cybercrime Insurance Is A Protection Tool Of The Society: An Analytical Study." Legal Research Development 7, no. I (September 30, 2022): 32–34. http://dx.doi.org/10.53724/lrd/v7n1.12.

Full text
Abstract:
Despite the increasing awareness of cybercrime, there are many people who are still not sure what it is. Cybercrime is a criminal activity that is committed using computers or the internet. It can include anything from hacking and identity theft to fraud and child pornography. With the rise of technology, cybercrime has become one of the most common forms of crime. According to a report by Norton, a cyber-security company, there were 4.1 billion records breached in the first six months of 2019 alone. And the rate of cybercrime is only increasing. The same report stated that the average cost of a data breach globally was $3.86 million in 2018, which is up 6% from the previous year. During the duration of the Pandemic of Covid-19 most, most of the cyber-crimes increased by around five hundred times is stated by Chief of Defence Staff (CDS) General Bipin Rawat in a discussion with the Hindu Newspaper reporter in Nov. 2021. With the growing rate of cybercrime, many businesses are starting to purchase cybercrime insurance. Cybercrime insurance is a protection tool that businesses can use to financially protect themselves in the event of a data breach or other type of cyber-attack. In this research paper, we will explore the need for cybercrime insurance and how it can help businesses recover from a cyber-attack. We will also look at some of the challenges that businesses face when it comes to purchasing such insurance.
APA, Harvard, Vancouver, ISO, and other styles
31

Pavia, Luke, Simon Grima, Inna Romanova, and Jonathan V. Spiteri. "Fine Art Insurance Policies and Risk Perceptions: The Case of Malta." Journal of Risk and Financial Management 14, no. 2 (February 6, 2021): 66. http://dx.doi.org/10.3390/jrfm14020066.

Full text
Abstract:
The aim of this paper is to identify the risks that need to be addressed when holding fine art, determine which are perceived as being the most important, and whether the risk perception is influenced by demographic variables such as age, educational background, and field of occupation. To identify the risks and evaluate the risk perception, we used a purposely designed questionnaire and sent it via various sources of communication systems and applications to individuals knowledgeable on fine arts. Findings revealed that, generally, art deterioration, art fraud, and art theft are the three main highlighted risks, with art deterioration considered in the high-risk range. In terms of risk perception, forgery is the biggest concern. On the other hand, considerations of the investment value of art lessened perceived risk exposure. Furthermore, the study has shown that certain risk perceptions were influenced by the participants’ demographic variables. Both the identified risks and risk perception considerations analyzed within this study provide us with insights as to what needs to be considered when offering fine art insurance, particularly when it comes to which risks that are perceived as being the most pressing by potential policyholders, and how these perceptions vary according to individual demographics variables as noted above.
APA, Harvard, Vancouver, ISO, and other styles
32

Cant, Michael Colin, and Elsa C. Nell. "Employee theft in the South African retail industry: Killing the goose that lays the golden egg?" Corporate Ownership and Control 10, no. 1 (2012): 444–54. http://dx.doi.org/10.22495/cocv10i1c4art5.

Full text
Abstract:
Employee theft has once again come to the fore as a result of the economic crises prevailing world wide. It is a known fact that as economic hardships increase people are looking at other ways and means to supplement their declining income. One such method is unethical behaviour in the form of employee theft. Retail shrinkage as a result of theft by employees and consumers is a serious problem worldwide and has a direct effect on commerce and industry. Not only does it result in a loss of profit but the retailer is also faced with additional costs such as legal expenses, loss of productivity, expensive security measures, product replacements, increased insurance, loss of trained staff and the expense of retraining new staff in the case of conviction of dishonest employees. The cost of employee theft is enormous and it has a definite and detrimental impact on business activities. Industry estimates place shrinkage at between 5 and 7 percent of turnover, with most companies budgeting for at least 3 to 5 percent. The main purpose of the study was to examine the reasons why employees participate in this type of dishonest behaviour and the methods that they use in such instances. The research followed a quantitative approach where a survey questionnaire was used as the data collection method. As few if any person will admit to stealing, projection techniques were used to obtain the information. It was found that employees are aware of a variety of methods by which employees steal. The impression was gained that employees are not aware of the impact and effect losses of this nature have on the future success of a company. Dishonesty creates its own vicious circle. If management is perceived as treating employees unfairly in order to make even larger profits employees become defiant and react in such a dishonest manner. Employees then regard stealing as paying management back for this. This study highlights the areas where corrective action is required and indicates the need for a strict security policy and a beneficial corporate environment to be created by management.
APA, Harvard, Vancouver, ISO, and other styles
33

Esther Omolara, Abiodun, Aman Jantan, Oludare Isaac Abiodun, Humaira Arshad, Kemi Victoria Dada, and Etuh Emmanuel. "HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys." Health Informatics Journal 26, no. 3 (January 20, 2020): 2083–104. http://dx.doi.org/10.1177/1460458219894479.

Full text
Abstract:
Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy concerns represent one of the major threats facing the electronic health record system. For instance, a cybercriminal may use a brute-force attack to authenticate into a patient’s account to steal the patient’s personal, medical or genetic details. This threat is amplified given that an individual’s genetic content is connected to their family, thus leading to security risks for their family members as well. Several cases of patient’s data theft have been reported where cybercriminals authenticated into the patient’s account, stole the patient’s medical data and assumed the identity of the patients. In some cases, the stolen data were used to access the patient’s accounts on other platforms and in other cases, to make fraudulent health insurance claims. Several measures have been suggested to address the security issues in electronic health record systems. Nevertheless, we emphasize that current measures proffer security in the short-term. This work studies the feasibility of using a decoy-based system named HoneyDetails in the security of the electronic health record system. HoneyDetails will serve fictitious medical data to the adversary during his hacking attempt to steal the patient’s data. However, the adversary will remain oblivious to the deceit due to the realistic structure of the data. Our findings indicate that the proposed system may serve as a potential measure for safeguarding against patient’s information theft.
APA, Harvard, Vancouver, ISO, and other styles
34

Anandika, Gemilang Dwi. "Prosedur Pelaksanaan Ganti Rugi Asuransi Kendaraan Bermotor." Law, Development and Justice Review 4, no. 2 (June 28, 2022): 183–93. http://dx.doi.org/10.14710/ldjr.v4i2.13581.

Full text
Abstract:
Tujuan dari penelitian ini adalah untuk mengetahui prosedur pelaksanaan ganti rugi asuransi kendaraan bermotor. Kemungkinan manusia menghadapi kerugian merupakan suatu risiko. Risiko yang dihadapi oleh setiap orang itu dapat mengenai orang itu sendiri maupun harta kekayaannya. Oleh sebab itu, ada beberapa usaha manusia untuk mengatasi suatu risiko. Upaya untuk mengatasi risiko atas suatu keadaan yang tidak pasti tersebut dapat dilakukan dengan cara antara lain dengan menghindari, mencegah, memperalihkan, menerima, membagi. Usaha mengatasi risiko tersebut yang berhubungan dengan asuransi adalah memperalihkan risiko, berarti risiko yang menjadi tanggung jawabnya dialihkan kepada pihak lain untuk menanggungnya.Asuransi selaku Penanggung, menanggung kendaraan bermotor yang mengalami tabrakan, benturan, terbalik, tergelincir dari jalan, termasuk juga akibat kesalahan material, konstruksi, cacat sendiri atau sebab lain; pencurian; kebakaran; dan sambaran petir, hal ini telah sesuai dengan azas imdenitas dan azas kepentingan. Kata Kumci : Asuransi, Ganti rugi AbstractThe purpose of this study was to determine the procedure for implementing motor vehicle insurance compensation. The possibility of humans facing losses is a risk. The risks faced by each person can affect the person himself or his wealth. Therefore, there are several human efforts to overcome a risk. Efforts to overcome the risk of an uncertain situation can be done by, among others, avoiding, preventing, transferring, accepting, sharing. The effort to overcome these risks related to insurance is to transfer the risk, meaning that the risk that is their responsibility is transferred to another party to bear it. Insurance as the Insurer, covers motorized vehicles that experience collisions, collisions, overturning, slipping from the road, including also due to material errors, construction, self-defect or other causes; theft; fire; and lightning strikes, this is in accordance with the principle of identity and the principle of importance. Keyword: Insurance, Compensation
APA, Harvard, Vancouver, ISO, and other styles
35

Abd Muhaimin, Abdul Wahab. "Tinjauan Hukum Islam Tentang Asuransi." Mizan: Journal of Islamic Law 3, no. 1 (July 3, 2019): 71. http://dx.doi.org/10.32507/mizan.v3i1.434.

Full text
Abstract:
AbstractInsurance in general is a guarantee or coverage given by the insurer to the person who is covered for the risk of loss as stipulated in the policy (letter of agreement) if there is fire, theft, damage, death or other accident with the insured by paying the premium as determined to the insurer each month. Whereas Sharia Insurance is a collaborative effort to protect and help each other, among a number of people in the face of a number of risks through agreements that are in accordance with sharia. Islamic insurance is mutual protection and help is called ta'awun, which is the principle of living mutual protection and help on the basis of the Islamic Brotherhood between members of sharia insurance in the face of disaster (risk). Therefore, premiums on sharia insurance are a number of funds paid by participants consisting of savings, fees, and tabarru funds. The discussion in this article is more of an analysis of how Islamic law answers the current problem of insurance.Keywords: Insurance, Islamic Law AbstrakAsuransi secara umum merupakan jaminan atau pertanggungan yang diberikan oleh penanggung kepada yang ditanggung untuk resiko kerugian sebagaimana ditetapkan dalam polis (surat perjanjian) bila terjadi kebakaran, kecurian, kerusakan, kematian atau kecelakaan lainnya dengan tertanggung dengan membayar premi sebanyak yang ditentukan kepada penanggung tiap bulan. Sedangkan Asuransi Syariah merupakan usaha kerjasama saling melindungi dan tolong-menolong, di antara sejumlah orang dalam menghadapi sejumlah resiko melalui perjanjian yang sesuai dengan syariah. Asuransi syariah bersifat saling melindungi dan tolong-menolong disebut dengan ta’awun, yaitu prinsip hidup saling melindungi dan tolong-menolong atas dasar Ukhuwah Islamiyah antara anggota peserta asuransi syariah dalam menghadapi malapetaka (risiko). Oleh sebab itu, premi pada asuransi syariah adalah sejumlah dana yang dibayarkan oleh peserta yang terdiri atas dana tabungan, biaya, dan tabarru’. Pembahasan dalam artikel ini lebih kepada analisa bagaimana Hukum Islam menjawab permasalahan asuransi yang berkembang saat ini.Kata Kunci: Asuransi, Hukum Islam
APA, Harvard, Vancouver, ISO, and other styles
36

Bhaskar, T., and Madhu Oruganti. "Reversible Data Hiding Scheme for Video." International Journal of Information Security and Privacy 13, no. 2 (April 2019): 1–13. http://dx.doi.org/10.4018/ijisp.2019040101.

Full text
Abstract:
With the exponential progression in communication technology, advanced mixed media content such as image, sound and video can be effectively duplicated and put away effortlessly without any loss in their original content. Therefore, it is distinctly critical to beat this and the need of a reasonable sort of copyright insurance framework inside the data. Reversible Data Hiding (RDH) keeps up the brilliant property that the first cover can be losslessly recouped after inserted information is separated while securing the picture substance's privacy. This may be liable to a few cause errors on information extraction and image reclamation. We propose to maintain the incredible property that the original cover has which can be losslessly recovered after embedded data is extracted while securing the image content's confidentiality. This strategy protects against different sorts of attacks on the computerized information and hence provides a robust answer for information theft cases.
APA, Harvard, Vancouver, ISO, and other styles
37

Scott, H. "Interference without ownership: The theft of incorporeal money in the South African law of unjustified enrichment." Acta Juridica 2021 (2021): 343–73. http://dx.doi.org/10.47348/acta/2021/a13.

Full text
Abstract:
First National Bank of Southern Africa v Perry, Nissan South Africa v Marnitz NO and Absa Bank v Lombard Insurance, as well as Trustees, Estate Whitehead v Dumas and Absa Bank v Moore, together amount to a concerted attempt on the part of South African courts to provide victims of the theft of incorporeal money with adequate redress. However, it has proved difficult to find a satisfactory juristic explanation for this series of decisions. This chapter shows that a model organised around the extension of the vindicatio to incorporeal money is unworkable. Instead, having considered briefly a second possibility, namely, the English constructive trust, this chapter advances an analysis of the plaintiff’s claim to the stolen money solely in terms of the non-consensual enrichment (that is, enrichment other than by deliberate conferral) of the defendant at their expense. Apart from its superior explanatory power, such an approach offers a blueprint for future development, insofar as it opens the way to the recognition of a secured claim where the proceeds of stolen money have been used to discharge the thief ’s pre-existing secured debts: the doctrine of subrogation to extinguished rights. This chapter closes by considering the implications of these conclusions for wider debates about the proper size and shape of the law of unjust enrichment.
APA, Harvard, Vancouver, ISO, and other styles
38

Grima, Simon, and Pierpaolo Marano. "Designing a Model for Testing the Effectiveness of a Regulation: The Case of DORA for Insurance Undertakings." Risks 9, no. 11 (November 12, 2021): 206. http://dx.doi.org/10.3390/risks9110206.

Full text
Abstract:
Technology is sometimes seen as a disruption that although provides opportunities for growth and development, also provides opportunities for deception, theft, and fraud. On the other hand, automation can make it easier to identify and protect from threats. Hence, a proposal was made by the European Commission to enact a digital operations resilience act. Therefore, our objective in this paper is to lay out the perceived characteristics of effective regulation by using DORA as our case study. We do this by carrying out a literature review and extracting using the thematic analysis approach propositions for these characteristics. Then, we test these using exploratory factor analysis and design a model for perceived effective regulation (PERM). We test the reliability and validity of this model by using the Cronbach alpha. Results show that according to our model, an effective regulation should have four characteristics, specifically “Flexibility and Integration”, “Proportionality and Cost”, “Reliability and Transparency”, and “Relevance and Timeliness”. Findings laid out in this paper and PERM can be used to test other proposed regulations to ensure that they are effective before being enacted and also to determine when there is a need for a revamp in specified areas of current regulations and requirements.
APA, Harvard, Vancouver, ISO, and other styles
39

Lawrence, James. "Legal challenges to aerial drone technology in the oil and gas industry." APPEA Journal 56, no. 2 (2016): 616. http://dx.doi.org/10.1071/aj15122.

Full text
Abstract:
The use of unmanned aerial vehicles (UAVs) has grown exponentially across a host of sectors in the past year, with the oil and gas industry at the forefront of that charge. UAVs can provide real-time vision and data collection from previously inaccessible vantage points, along with reducing time and effort when applied to tasks that previously required costly solutions. Pipeline inspections monitoring, theft and damage using UAVs is possible due to the ability to cover large distances as well as offering imaging and sensor technology. Similarly, UAVs have the ability to provide accurate, close-up views of offshore oil platforms, providing operators with immediate inspection to areas otherwise available only with difficulty. On-board emission and heat sensors offer wide-ranging assistance to operators, particularly in the context of leak detection and flare stack inspection. Along with this growth comes the need to ensure legal compliance and adequate insurance coverage. The insurance industry is leading the charge through fostering the development of industry standards designed to set a benchmark in UAV operation. Increasing use of UAVs has already caught the eye of federal regulators. For example, Civil Aviation Safety Authority (CASA) in Australia will soon release revised regulations around commercial use of UAVs, and the US Federal Aviation Administration (FAA) is expected to release similar regulations in early 2016. This extended abstract focuses on the legal challenges associated with the ever-expanding application of UAVs to the oil and gas industry.
APA, Harvard, Vancouver, ISO, and other styles
40

Et.al, Lakshman Ji. "Robust Digital Watermarking Techniques for protecting copyright Applied to Digital Data: A Survey." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 3819–25. http://dx.doi.org/10.17762/turcomat.v12i3.1669.

Full text
Abstract:
The colossal prominence of the World Wide Web in the mid 1990's shown the business capability of offering media assets through the computerized networks. Since business intrigues look to utilize the advanced organizations to offer computerized media revenue driven, they have a solid interest in ensuring their proprietorship rights. Since the danger of utilizing media data, advanced fabrications, and unapproved sharing (robbery) of computerized content has expanded among content makers, merchants and clients. Today mixed media data theft alone has exposed all the enterprises to multi-billion income misfortunes. Customary advanced substance security methods, for example, encryption and scrambling, alone can't give satisfactory insurance of copyrighted substance, in light of the fact that these advances can't ensure computerized content whenever they are decoded. One approach to debilitate illicit duplication is to embed data known as watermark, into possibly weak information so that it is difficult to isolate the watermark from the information. Computerized watermarking is the way toward embedding’s an advanced sign or example inside a computerized picture, which gives proof of realness. This paper presents a study on different data concealing strategies and depicts characterization of advanced Watermarking procedures.
APA, Harvard, Vancouver, ISO, and other styles
41

Wu, Pei-Ju, Mu-Chen Chen, and Chih-Kai Tsau. "The data-driven analytics for investigating cargo loss in logistics systems." International Journal of Physical Distribution & Logistics Management 47, no. 1 (February 13, 2017): 68–83. http://dx.doi.org/10.1108/ijpdlm-02-2016-0061.

Full text
Abstract:
Purpose Cargo loss has been a major issue in logistics management. However, few studies have tackled the issue of cargo loss severity via business analytics. Hence, the purpose of this paper is to provide guidance about how to retrieve valuable information from logistics data and to develop cargo loss mitigation strategies for logistics risk management. Design/methodology/approach This study proposes a research design of business analytics to scrutinize the causes of cargo loss severity. Findings The empirical results of the decision tree analytics reveal that transit types, product categories, and shipping destinations are key factors behind cargo loss severity. Furthermore, strategies for cargo loss prevention were developed. Research limitations/implications The proposed framework of cargo loss analytics provides a research foundation for logistics risk management. Practical implications Companies with logistics data can utilize the proposed business analytics to identify cargo loss factors, while companies without logistics data can employ the proposed cargo loss mitigation strategies in their logistics systems. Originality/value This pioneer empirical study scrutinizes the critical cargo loss issues of cargo damage, cargo theft, and cargo liability insurance through exploiting real cargo loss data.
APA, Harvard, Vancouver, ISO, and other styles
42

Wolak, Grzegorz. "The Value of a Vehicle upon the Conclusion of the Vehicle Accident and Theft Insurance Contract as the Basis for Determining Compensation. A Gloss to the Supreme Court’s Judgment of 24 April 2018 (V CSK 305/17)." Prawo Asekuracyjne 4, no. 101 (December 15, 2019): 91–104. http://dx.doi.org/10.5604/01.3001.0013.6744.

Full text
Abstract:
In the gloss to the judgment of 24 April 2018, V CSK 305/17, the author welcomed the Supreme Court’s position about the permissibility of a clause in the vehicle accident and insurance contract whereby the vehicle value calculated by the insurer upon the conclusion of the contract shall be the basis to determine compensation in the case of total loss (Article 8241 para. 1 of the Polish Civil Code).
APA, Harvard, Vancouver, ISO, and other styles
43

Hanna, Alan, and Lezley-Anne Hanna. "Topic Analysis of UK Fitness to Practise Cases: What Lessons Can Be Learnt?" Pharmacy 7, no. 3 (September 4, 2019): 130. http://dx.doi.org/10.3390/pharmacy7030130.

Full text
Abstract:
Background: Fitness to practise (FtP) impairment (failure of a healthcare professional to demonstrate skills, knowledge, character and/or health required for their job) can compromise patient safety, the profession’s reputation, and an individual’s career. In the United Kingdom (UK), various healthcare professionals’ FtP cases (documents about the panel hearing(s) and outcome(s) relating to the alleged FtP impairment) are publicly available, yet reviewing these to learn lessons may be time-consuming given the number of cases across the professions and amount of text in each. We aimed to demonstrate how machine learning facilitated the examination of such cases (at uni- and multi-professional level), involving UK dental, medical, nursing and pharmacy professionals. Methods: Cases dating from August 2017 to June 2019 were downloaded (577 dental, 481 medical, 2199 nursing and 63 pharmacy) and converted to text files. A topic analysis method (non-negative matrix factorization; machine learning) was employed for data analysis. Results: Identified topics were criminal offences; dishonesty (fraud and theft); drug possession/supply; English language; indemnity insurance; patient care (including incompetence) and personal behavior (aggression, sexual conduct and substance misuse). The most frequently identified topic for dental, medical and nursing professions was patient care whereas for pharmacy, it was criminal offences. Conclusions: While commonalities exist, each has different priorities which professional and educational organizations should strive to address.
APA, Harvard, Vancouver, ISO, and other styles
44

Krambia Kapardis, Maria, and Konstantinos Papastergiou. "Fraud victimization in Greece: room for improvement in prevention and detection." Journal of Financial Crime 23, no. 2 (May 3, 2016): 481–500. http://dx.doi.org/10.1108/jfc-02-2015-0010.

Full text
Abstract:
Purpose The purpose of this paper is to investigate fraud victimisation of Greek companies during the financial crisis years. Moreover, the paper seeks to encourage the implementation of proactive and reactive measures in an effort to minimize fraud victimisation. Design/methodology/approach Drawing on an extensive literature review and utilising a questionnaire administered by Krambia-Kapardis and Zopiatis (2010), auditors and management of companies who had fallen victim to fraud provided information on the typology of fraud and on proactive and reactive measures taken after a fraud incident had been reported to them. Both descriptive and inferential statistics were utilized to analyze the collected data and address the postulated research questions. Findings The survey has found that no industry or size of company is immune from fraud, with bigger companies and small- and medium-sized enterprises (SMEs) falling victim to industrial espionage and theft of cash and counterfeit, respectively. The banking and insurance sector appeared to be affected mainly by money laundering. Management fraud was mainly in the form of window dressing, whilst employee fraud involved predominately theft of cash and assets. Loss of reputation emerged as the main concern for the victim, and it had a determining impact on deciding not to report cases to the police. Research limitations/implications Because of the sensitive topic being investigated and despite having assured the respondents that their anonymity would be guaranteed, the respondents were hesitant in responding. Thus, the response rate was 16.4 per cent, slightly lower than a similar study carried out in Cyprus (Krambia-Kapardis and Zopiatis 2010). The findings, however, are considered to be reliable, given the fact that the respondents were individuals well versed with the topic under investigation and in a position to know if their company had fallen victim to fraud. Practical implications The findings have practical relevance to both industry stakeholders and academics who wish to further explore fraud victimization in the Greek business environment. Given that the financial crisis in Greece is continuing, fraud risk assessment ought to concentrate in the area of cash, and preventative measures need to be considered by the regulators and the victims. Originality/value Whilst fraud victimisation studies are becoming popular by the Big 4 accounting firms, there is no fraud victimisation study concentrating on the typology of fraud in Greece. With this survey, it will be possible to draw conclusions and make suggestions to the accounting profession on how to combat fraud, at a time, when the economic crisis is persisting and fraud is expected to escalate.
APA, Harvard, Vancouver, ISO, and other styles
45

Benk, Serkan, Robert W. McGee, and Tamer Budak. "A public perception study on bribery as a crime in Turkey." Journal of Financial Crime 25, no. 2 (May 8, 2018): 337–53. http://dx.doi.org/10.1108/jfc-07-2017-0061.

Full text
Abstract:
Purpose The purpose of this study is to explore the perception of Turkish citizens of the severity of bribery relative to other crimes and violations. Design/methodology/approach A questionnaire survey was administered to 545 Turkish people respondents. A five-point Likert scale that measures attitudes and behaviors using answer choices was used to categorize the degree of seriousness of each crime for data analysis. Findings The results of the study show that bribery ranked 16th among the 33 offences surveyed, that is, it lies in the middle in terms of seriousness. The results also indicate that the average person views bribery as not a very serious crime. When compared to violent crimes, bribery is significantly less serious. As for the property crimes, bribery is significantly less serious than arson and carjacking, but it significantly more serious than damage to public property, shoplifting and bike theft. When compared to white-collar crimes, bribery is remarkably less serious than embezzlement and appreciably more serious than welfare fraud, insider trading, child labor, minimum wage and insurance fraud. The results of this study are substantial; general public do not perceive bribe as a serious crime. Originality/value This is an important study in relation to Turkey. This is as a pioneer study that indicates the relationship between bribery as a crime and other offences in Turkey. The results of this study should be useful to policy-makers in Turkey and elsewhere. Another important sight of this study is the fact that the results show different correlations with similar studies put through in the other countries. According to the studies, bribery was the least serious crime in Australia and New Zealand; it ranked in the middle in terms of seriousness in Mexico, similar to Turkey; and it was also less serious than the average offense in the USA.
APA, Harvard, Vancouver, ISO, and other styles
46

Dr. Chesoli and Joshua Wafula. "THE ROLE OF FORENSIC ACCOUNTING AS A TOOL IN THE FIGHT AGAINST FINANCIAL CRIMES." EPH - International Journal of Business & Management Science 6, no. 4 (December 27, 2020): 1–7. http://dx.doi.org/10.53555/eijbms.v6i4.107.

Full text
Abstract:
Financial crime is defined as crime that is specifically committed against property. These crimes are almost always committed for the personal benefit of the criminal, and they involve an illegal conversion of ownership of the property that is involved. Financial crimes can occur in many different forms, and they happen all over the world. Some of the most common crimes facing the financial sector are money laundering, terrorist financing, fraud, tax evasion, embezzlement, forgery, counterfeiting, and identity theft. These crimes are committed every single day, and governments across the globe are constantly prosecuting financial criminals while searching for new ones. Forensic accounting utilizes accounting, auditing and investigative skills to conduct an examination into the finances of an individual or business. Forensic accounting provides an accounting analysis suitable to be used in legal proceedings. Forensic accountants are trained to look beyond the numbers and deal with the business reality of a situation. Forensic accounting is frequently used in fraud and embezzlement cases to explain the nature of a financial crime in court and in unveiling crime in both public sector and private sector. Forensic accountants analyze, interpret and summarize complex financial and business matters. They may be employed by insurance companies, banks, police forces, government agencies or public accounting firms. Forensic accountants compile financial evidence, develop computer applications to manage the information collected and communicate their findings in the form of reports or presentations. This study examined the role of forensic Accounting as a tool to fight financial crimes. The main objective is to examine the role of forensic Accounting as a tool in the fight against financial crimes. The specific objectives include: litigation support and investigative accounting. Survey research design was used because descriptive studies are characterized as simply the attempt to determine, describe or identify what is, while analytical research attempts to establish why it is that way or how it came to be” and data was collected using a 5 point Likert scale questionnaires. In analyzing data both descriptive and inferential statistics were employed. The results showed that forensic Accountants are relevant in investigating crime and they also play a significant part in litigation support. Recommendations amongst others were that professional Accountants should keep themselves abreast with emerging trends in unveiling crime.
APA, Harvard, Vancouver, ISO, and other styles
47

Christo, Paul J. "The Influence of Prescription Monitoring Programs on Chronic Pain Management." Pain Physician 3;12, no. 3;5 (May 14, 2009): 507–15. http://dx.doi.org/10.36076/ppj.2009/12/507.

Full text
Abstract:
Background: Abuse of prescribed controlled substance has become a serious social as well as health care issue over the past decade. A particularly alarming trend exists among patients aged 12 to 17. Common abuse behaviors include doctor shopping, drug theft, feigned pain symptoms to gain health care access, drug sharing, prescription forgery, and improper prescription practices. In response to this epidemic of abuse, many states have adopted prescription monitoring programs (PMPs). Such programs first originated in the early twentieth century. As of 2006, 38 states had such programs, many of which are supported by federal grants. As PMPs become more widespread, they have also increased in sophistication. By keeping a record of the prescription and dispensing of narcotics, these programs are able to build a comprehensive data network for tracking prescription medications. These databases aid law enforcement agencies in investigations of narcotic trafficking; they also help state regulatory boards to monitor improper prescription practices. Objective: This manuscript examines the basic structure of a PMP, including the way the data are collected and the way these data are stored and used. It also looks at the organizational differences amongst state programs. NASPER and Harold Rogers are two federal programs that provide funding to the state PMPs, and the current study examines the differences as well as similarities between these 2 programs. This study also compares the results of 2 reports: the U.S. General Accounting Office Study and the Twillman study. Both studies have evaluated the efficiency of the PMPs. Discussion: The U.S. General Accounting Office Study showed that while considerable differences exist among the state PMPs, these programs not only reduce the time and effort for law enforcement agencies to conduct investigations, but also cut the supply of prescription medications. However, the Twillman report suggests that prescription programs caused a shift in prescription practice, while the actual rate of abuse may not have been reduced. These 2 studies both point to the challenges the PMPs face. However, more recent data suggest that proactive use of the PMPs results in the decreased growth of prescription medication sales. Finally, a number of states have also begun to objectively evaluate the efficiencies of the system. Conclusion: Many states have developed PMPs to help regulatory agencies as well as physicians detect prescription drug abuse. Limited data so far suggest that such programs reduce abuse practices. In addition, proactive usage of the data further prevents abuse. Key words: Prescription monitoring programs, drug abuse, National All Schedules Prescription Electronic Reporting Act, Government Accountability Office, Health Insurance Portability and Accountability Act
APA, Harvard, Vancouver, ISO, and other styles
48

Setiawan, Alfian, Muhlis Ruslan, and Herminawati Abubakar. "ANALISIS STRATEGI BERSAING PRODUK KREDIT KEPEMILIKAN KENDARAAN BERMOTOR PADA PT. BANK RAKYAT INDONESIA (PERSERO)TBK KANTOR WILAYAH MAKASSAR." Indonesian Journal of Business and Management 2, no. 2 (January 7, 2021): 112–20. http://dx.doi.org/10.35965/jbm.v2i2.565.

Full text
Abstract:
Penelitian ini bertujuan untuk mengidentifikasi dan menganalisis faktor lingkungan internal (kekuatan dan kelemahan) dan faktor lingkungan eksternal (peluang dan ancaman).. Metode pengumpulan data terdiri dari observasi, wawancara, dokumentasi dan kuisioner. Populasi dan sampel dalam penelitian ini terdiri dari 44 Karyawan dengan teknik non probability sampling menggunakan metode sampling jenuh. Metode analisis data yang digunakan yaitu analisis deskriptif dan analisis swot. Hasil Penelitian menemukan bahwa faktor kekuatan (internal) yakni harga produk yang ditetapkan terjangkau konsumen memiliki skor nilai tinggi dibandingkan kualitas produk yang ditawarkan, pengaruh lokasi terhadap kelangsungan usaha, pelayanan kepada konsumen, jaminan kualitas produk, dan kerjasama yang baik dengan pihak asuransi. Sedangkan pada faktor kelemahan (internal) yakni keterbatasan jumlah karyawan yang tinggi memiliki skor paling tinggi dibadingkan dengan tingkat harga kredit kendaraan yang ditawarkan dan resiko penurunan pendapatan yang tinggi. Untuk faktor Peluang (eksternal) yang memiliki skor paling tinggi yakni perusahaan memiliki keunggulan dalam menangkap pangsa pasar yang baik dibandingkan dengan jalinan kerjasama perusahaan dengan konsumen, dampak positif dari keragaman produk yang ditawarkan, citra perusahaan yang baik dimata konsumen, respon positif konsumen terhadap jasa perusahaan, tingkat daya beli masyarakat, dan tingkat permintaan pasar.Sedangkan untuk faktor ancaman (eksternal) yakni tingkat persaingan usaha yang tinggi memiliki skor paling tinggi dibandingkan resiko usaha jasa kredit kendaran yang tinggi, resiko pekerja freelance yang tinggi, tuntutan pasar dalam peremajaan kendaraan yang tinggi, tingkat kriminalitas pencurian kendaraan yang tinggi dan tingginya pertumbuhan usaha kredti kendaraan disekitar.Secara garis besar dari ke empat faktor tersebut faktor Kekuatan dan Peluang masih memiliki skor yang lebih tinggi dibandingkan dengan faktor Kelemahan dan Ancaman sehingga PT Bank Rakyat Indonesia (Persero) Tbk berada dalam posisi yang baik. This study aims to identify and analyze the internal environmental factors (strengths and weaknesses) and external environmental factors (opportunities and threats). Data collection methods consist of observation, interviews, documentation and questionnaires. The population and sample in this study consisted of 44 employees with a non-probability sampling technique using a saturated sampling method. The data analysis method used is descriptive analysis and SWOT analysis. The results of the study found that the strength factor (internal), namely the price of the product that is determined to be affordable by consumers, has a high score compared to the quality of the product offered, the effect of location on business continuity, service to consumers, product quality assurance, and good cooperation with the insurance company. Meanwhile, the weakness (internal) factor, namely the limited number of high employees, has the highest score compared to the price level of vehicle loans offered and the risk of a high decline in income. For the Opportunity (external) factor, the highest score is the company that has the advantage of capturing a good market share compared to the company's collaboration with consumers, the positive impact of the diversity of products offered, a good corporate image in the eyes of consumers, positive consumer responses to company services , the level of public purchasing power, and the level of market demand. As for the threat factor (external), the high level of business competition has the highest score compared to the risk of high vehicle credit service business, high risk of freelance workers, high market demands in vehicle rejuvenation, the high level of vehicle theft crime and the high growth of the surrounding vehicle credit business. Broadly speaking, of the four factors, the Strength and Opportunity factors still have higher scores than the Weakness and Threats factors so that PT Bank Rakyat Indonesia (Persero ) Tbk is in a good position.
APA, Harvard, Vancouver, ISO, and other styles
49

Boschee, Pam. "Comments: Complexity of Cyber Crime Skyrockets." Journal of Petroleum Technology 73, no. 06 (June 1, 2021): 8. http://dx.doi.org/10.2118/0621-0008-jpt.

Full text
Abstract:
The cyberattack on the Colonial Pipeline system was impossible to “keep on the lowdown” as industrial attacks of limited scale often are. The shutdown of a 2.5 million B/D system of 5,500 miles of pipeline spanning from the US Gulf Coast to the East Coast does not go unnoticed. And early unconfirmed reports of a ransom payment made to decrypt the seized data intensified the spotlight on the incident. (Continental CEO Joseph Blount confirmed a $4.4-million payment on 19 May.) During what surely was a crisis management nightmare involving not only Colonial but also the US Department of Energy, Department of Transportation, Federal Bureau of Investigation (FBI), Federal Energy Regulatory Commission, Department of Homeland Security (DHS), and the Pipeline and Hazardous Materials Safety Administration (all agencies thanked by Colonial in a 15 May tweet), the information made public has heightened concerns about the security of data and critical infrastructure globally. Foremost is the escalation in the multiple layers of bad actors involved in a single attack. The FBI identified the ransomware-as-a-service (RaaS) DarkSide, which it has been investigating since October 2020. Criminal partners conduct attacks and then share the proceeds with the ransomware developers. The agency released a flash alert about DarkSide on 10 May with indicators of compromise and mitigation measures once infected. “Mitigation measures once infected.” The alert may have come too late for Colonial, whose business network was hit rather than its operational technology (OT) networks that control the pipeline. To contain the damage, it took down its own OT network. An example supporting this action of last resort occurred last year when a ransomware attack on an unidentified natural gas company’s business networks moved into its control systems at a compression facility, halting operations for 2 days, according to a DHS alert. DHS said the company did not have a plan to respond to a cyberattack. A report by FireEye, a cybersecurity firm that confirmed its hiring by Colonial, said since initially surfacing in August 2020, the creators of DarkSide and its partners have infiltrated organizations in more than 15 countries. Affiliates retain a portion of each ransom fee, ranging from 25% for fees less than $500,000 to 10% for fees greater than $5 million. Ransomware operators are masters in extortion and are using new tactics to widen their net of exploitation. In April, the DarkSide operators said in a press release that they were targeting organizations listed on the NASDAQ and other stock markets and were willing to give stock traders advance notice of upcoming attacks to allow them to reap profits when stock prices dropped as a result of the breach, according to FireEye. In another example, an attacker obtained the victim’s cyber insurance policy’s coverage limits and used that knowledge during ransom negotiation, refusing to lower the ransom fee. What this means for organizations is that their boards should assess the full spectrum of risk from prevention to detection as a business risk and have a plan in place to execute when an attack occurs. The investment required may be far less than the increasingly exorbitant ransom fees and the costs associated with the theft or destruction of data and disruption to the business.
APA, Harvard, Vancouver, ISO, and other styles
50

BILLE David Urbanus. "Impact of cyberspace on the cybersecurity of critical national assets infrastructures in Nigeria: A review of education and financial sectors." World Journal of Advanced Research and Reviews 16, no. 1 (October 30, 2022): 595–604. http://dx.doi.org/10.30574/wjarr.2022.16.1.1057.

Full text
Abstract:
Unprepared with a fragile digital infrastructures, and hurriedly tossed into the depth of the cyberspace in the Fourth and Fifth Industrial Revolutions (4IR and 5IR) by Covid-19 pandemic measures, of lockdown and needs for remote learning. The educational sector became the most vulnerable; with streams of cyber-attacks stalling virtual classes and compromising data integrity, of which the financial sector was not exempted, despite the evolvement of cyber insurance policy. The financial end users are aggravated and left at the mercy of internet fraudsters called “yahoo-yahoo” boys, coupled with hacking of SWIFT, crypto currency thefts, and Nations’ Central Banks falling into cyber-attacks, thus leaving no unconquered space for cybercriminals, even as cyber literacy and security are siloed away under stand-alone arrangements despite the interconnectedness of the cyberspace. It was against this background, that this study leverages on Theory of Endogenous Growth Model to interrogate impact of cyberspace on the protection of critical national assets and infrastructures in Nigeria. The study deconstruct national assets into education and financial sectors to assess the existing impact. This study adopts qualitative research design using exploratory research design of publicly available archive documents. Empirical evidence from study revealed that cyberspace has expanded the virtual learning horizon while cyber attacks still remain on the minimal. Findings that emanate from this study revealed cyberspace has positively impacted on the Nigeria Financial sector through financial inclusion and transaction conveniences while the damaging effect of cyberattacks remained largely covered up. The study recommends that all players in the educational sector should invest widely in cybersecurity as days of imminent cyberattacks is on the horizon as seen evolving in developed clime. Study also recommend that government should firm up cyberspace policy, and inject collectivism into cyber security plans of sectors as an improvement on the present stand alone security by banks in Nigeria.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography