scholarly journals Statement of retraction: the role of computer security management in preventing financial technology risks

Author(s):  
Ahmad Alaassar ◽  
Anne-Laure Mention ◽  
Tor Helge Aas

AbstractScholars and practitioners continue to recognize the crucial role of entrepreneurial ecosystems (EEs) in creating a conducive environment for productive entrepreneurship. Although EEs are fundamentally interaction systems of hierarchically independent yet mutually dependent actors, few studies have investigated how interactions among ecosystem actors drive the entrepreneurial process. Seeking to address this gap, this paper explores how ecosystem actor interactions influence new ventures in the financial technology (fintech) EE of Singapore. Guided by an EE framework and the use of an exploratory-abductive approach, empirical data from semi-structured interviews is collected and analyzed. The findings reveal four categories representing both the relational perspective, which features interaction and intermediation dynamics, and the cultural perspective, which encompasses ecosystem development and regulatory dynamics. These categories help explain how and why opportunity identification and resource exploitation are accelerated or inhibited for entrepreneurs in fintech EEs. The present study provides valuable contributions to scholars and practitioners interested in EEs and contributes to the academic understanding of the emerging fintech phenomenon.


2019 ◽  
Vol 22 (4) ◽  
pp. 437-456
Author(s):  
Seema Wati Narayan

This paper investigates the role of financial technology (FinTech) in propelling economic growth in Indonesia from 1998 to 2018. The FinTech industry employs a technology-based business model to provide financial services, including lending, payment, investment, and financing services. The study is motivated by endogenous growth theory, which seeks to explain technology as the most important driver of economic growth. The study finds that FinTech startups are positively correlated with Indonesia’s economic growth. FinTech firms in their first year are found to be disruptive, but they fail to have serious consequences on Indonesia’s economic growth; however, they seem to significantly encourage economic growth in their second year. These findings are derived after accounting for other important growth determinants, namely, capital per labor, foreign direct investment (FDI), stock market development, and trade openness.


Agriculture is the largest employer of India which constitutes 50% of its workforce and also a contributor to 17-18% in its GDP. Still, it is one of the most disorganized and disjointed sector.Somewhere this sector has not been given due attention and itcan be proven with the fact that the GDP contribution of this sector has fallen from 43% to 18% (1970- 2018).Though the Indian Government is digitally driving to provide financial inclusion to more than 145 million households that are not having access to banking services but still the farmers aremajorlyusing traditional credit for their basic and main two factors; Production & Consumption (Distribution). The financial segment has an important role to make agriculture aprime contributorto the economic growth of the country and also in reducing poverty. A fast-evolving technological landscape is bringing up new potential to focus&provide credit, risk-sharing, and to explore technology to enhance agricultural productivity. Our paper firstly examines agricultural finance in the Indian context and then discusses how financial technology (Fin-Tech) can drive new products in credit and risk markets in India. We evaluate the role of mobile banking, financial literacy, digital financial services, digital financial technology, and block-chain technology. The paper is concluded with a discussion of policy takeaways for Fin-Tech in agriculture to promote agricultural growth, enhance financial inclusion, and improve regional economic integration through agriculture.


2012 ◽  
Vol 2 (2) ◽  
pp. 24-33 ◽  
Author(s):  
Ioanna Dionysiou ◽  
Despo Ktoridou

Constant risk to the confidentiality, integrity and the availability of information in our everyday lives and work has increased the need for responsible use and handling of information. Security education is becoming an integral part of any undergraduate curriculum in computer science and information systems. The evolving role of security in this digital era makes it nontrivial to decide the appropriate topics that need to be covered during the course duration in a way that all aspects of security deployment are examined. The only approach to this challenge is to use student-oriented learning strategies to encourage the students not only to recognize relationships between concepts and comprehend the underlying structure of what is being learned but also expose them to methods where they are responsible for their own independent learning. The current study examines the experiences gained in COMP-431 Computer Security, a senior-level undergraduate computer security course using such methods, with an emphasis on the students’ reactions, perceptions, and experiences as well as the educator’s role in the teaching and learning process.


Author(s):  
THARISHINI KRISHNAN ◽  
SALMA YUSOF ◽  
HERLIN ANAK AMAN ◽  
KDR SUGENDERAN NAGALAN

Border security is an essential component of Malaysia’s defence and security policy. During the COVID-19 outbreak, Malaysia’s border security management was tested with the increase of illegal entry into the country. The central argument of this paper is that, whilst Movement Control Order (MCO), or lockdown as it is more commonly known, aims to restrict movement, this limited movement was exploited for illegal entries into the country, leading to the establishment of the National Task Force (NTF), which coordinated various enforcement agencies to safeguard Malaysian territory. On this ground, this paper aims to analyse the role of the NTF in responding to increasing illegal activities amidst the pandemic. The discussion is divided into: (a) identifying illegal entries during the pandemic; (b) the impact of illegal entries to border management in Malaysia; (c) examining the roles of the NTF in responding to the illegal activities; and (d) the impact of the NTF in border security management in Malaysia. As a preliminary study, this paper only uses secondary data collection in addressing the problem statement. Keywords: National task force; COVID-19 pandemic; Illegal activities; Illegal immigrants; Border security managemen


Author(s):  
Elvira Fitriyani Pakpahan ◽  
Jessica Jessica ◽  
Corris Winar ◽  
Andriaman Andriaman

The purpose of this research is to give insights on how Fintech and the role of OJK in supervising the services of Fintech in Indonesia. The presence of Fintech in Indonesia greatly helps citizens in accessing and provide easiness in financial transactions. At the moment, Fintech provides several functions that are believed to develop rapidly and Fintech also provides services on electronic money, virtual account, aggregator, lending, crowdfunding and other online monetary transactions. Various businesses that are part of Fintech are startups and online businesses. Therefore, the government should provide legal protection in order to protect both parties, the business organizers and the possible customers. In this case, business organizers with legal Fintech development have potential that is related to consumer protection, stable financial system, economy, and payment methods. The method of the research that is used in conducting this journal is the applied law research method. This research is using normative law with the facts approach and Constitution approach. In this case, Bank Indonesia has issued the Bank Indonesia Regulation No. 18/40/PBI/2016 about the implementation of the payment transaction and the Bank Indonesia Regulation No. 19/12/PBI/2017 about the implementation of Financial Technology. Along with OJK Regulation No. 13/POJK.02/2018 about the innovation of digital money in the financial services sector as a provision that covers the supervision and stipulates financial technology (fintech) industry issued by Otoritas Jasa Keuangan (OJK). Tujuan dari penelitian ini adalah untuk memberikan pengetahuan bagaimana Fintech dan peran OJK dalam mengawasi maraknya pelayanan Fintech di Indonesia. Munculnya Fintech di Indonesia sangat membantu masyarakat untuk mengakses dan mempermudah transaksi keuangan. Saat ini, Fintech memiliki berbagai fungsi yang diyakini mampu berkembang cepat dan Fintech mampu melayani electronic money, virtual account, agregator, lending, crowdfunding dan transaksi keuangan online lainnya. Berbagai usaha yang termasuk dalam Fintech adalah bisnis startup dan bisnis online. Dengan demikian Pemerintah harus memberikan suatu bentuk perlindungan hukum baik itu dari segi penyelenggara bisnis maupun untuk masyarakat yang berperan sebagai nasabah. Dalam hal ini, Pelaksanaan bisnis yang dijalankan secara legalitas untuk pengembangan fintechnya memiliki potensi resiko yang berhubungan dengan perlindungan konsumen, stabilitas sistem keuangan dan ekonomi ,serta sistem pembayaran. Metode penelitian yang digunakan dalam penyusunan jurnal ini adalah metode hukum yuridis normatif. Dimana penelitian ini meneliti hukum secara normatif dengan menggunakan pendekatan fakta dan pendekatan Undang-Undang. Dalam Hal ini Bank Indonesia (BI) mengeluarkan Peraturan Bank Indonesia No 18/40/PBI/2016 dan Peraturan Bank Indonesia No 19/12/PBI/2017 serta Peraturan OJK No. 13/POJK.02/2018 sebagai bentu pengawasan dan pengaturan industri financial technology (fintech) yang dikeluarkan oleh Otoritas Jasa Keuangan (OJK).


2021 ◽  
Vol 7 (2) ◽  
pp. 315-335
Author(s):  
A. E. Vodyasov ◽  
◽  
D. M. Kiryukhin ◽  
G. V. Sidorenko ◽  
◽  
...  

In the context of the pandemic, the role of computer security specialists in solving the problems of uninterrupted operation of transport enterprises has increased many times. The article is devoted to summing up and analyzing the experience accumulated in the RUT (MIIT) for 20 years of training specialists in the specialty “Computer Security”, determining the prospects for the development of the educational program. The article presents a methodology for using freely distributed software created by the authors of the article in the learning process in cases where it is impossible or unsafe on real objects. The main advantage of this technique is that it takes into account the experience gained by specialists in solving real cases, allows you to reproduce real system vulnerabilities without harming real systems for training purposes, makes it possible to diagnose these vulnerabilities, exploit them, choose and compare different ways to remove them from the system. The article contains an analysis of publications devoted to the experience of training personnel in the specialty “Computer Security” in different countries using various tools. The article provides an overview of the educational program and formulates the principles that form the basis of training at our university, demonstrates examples of the use of digital doubles in the learning process, focuses on the formation of interdisciplinary con nections, skills of applying theoretical knowledge to solve practical problems and analyze the results obtained. The review of the subjects of the discipline “Methods of risk management analysis”, statistical analysis of the results of the implementation of the methodology developed by the authors in practice, and their graphical interpretation is carried out. Examples of the application of risk theory to solving computer security problems are given. The article contains examples of students ‘ participation in research activities, the creation of methodological support for the relevant educational program, and various events outside the university.


2021 ◽  
Author(s):  
Elena Murzina ◽  
Marina Shemyakina

The monograph is devoted to the study of the concept of tax security management of a public legal entity. The concept is built on the interconnection of three main elements: analysis, monitoring and regulation. The role of analysis in the control system is determined. Special attention is paid to monitoring. It is proposed to use the method of constructing a heat map as a data visualization tool for monitoring. It is noted that regulation and management decision-making should be carried out taking into account the monitoring data and the main guidelines of the budgetary and tax policy of a public legal entity. The material of the monograph has a practical focus on improving the work of participants in the budgetary process to manage the tax security of a public legal entity on the basis of a risk-oriented approach. The presented material can open up new perspectives for further research. It will be of interest to those who are engaged in the development of methodological support for tax security management.


2008 ◽  
pp. 2958-2969
Author(s):  
Dieter Fink ◽  
Tobias Huegle ◽  
Martin Dortschy

This chapter identifies various levels of governance followed by a focus on the role of information technology (IT) governance with reference to information security for today’s electronic business (e-business) environment. It outlines levels of enterprise, corporate, and business governance in relation to IT governance before integrating the latter with e-business security management. E-business has made organisations even more reliant on the application of IT while exploiting its capabilities for generating business advantages. The emergence of and dependence on new technologies, like the Internet, have increased exposure of businesses to technology-originated threats and have created new requirements for security management and governance. Previous IT governance frameworks, such as those provided by the IT Governance Institute, Standards Australia, and The National Cyber Security Partnership, have not given the connection between IT governance and e-business security sufficient attention. The proposed model achieves the necessary integration through risk management in which the tensions between threat reduction and value generation activities have to be balanced.


Sign in / Sign up

Export Citation Format

Share Document