Comparative analysis of privacy policies of domestic credit card and VAN companies

2018 ◽  
Vol 12 (4) ◽  
pp. 27-43
Author(s):  
우한솔 ◽  
유진호
2022 ◽  
Vol 13 (1) ◽  
pp. 1-17
Author(s):  
Ankit Kumar ◽  
Abhishek Kumar ◽  
Ali Kashif Bashir ◽  
Mamoon Rashid ◽  
V. D. Ambeth Kumar ◽  
...  

Detection of outliers or anomalies is one of the vital issues in pattern-driven data mining. Outlier detection detects the inconsistent behavior of individual objects. It is an important sector in the data mining field with several different applications such as detecting credit card fraud, hacking discovery and discovering criminal activities. It is necessary to develop tools used to uncover the critical information established in the extensive data. This paper investigated a novel method for detecting cluster outliers in a multidimensional dataset, capable of identifying the clusters and outliers for datasets containing noise. The proposed method can detect the groups and outliers left by the clustering process, like instant irregular sets of clusters (C) and outliers (O), to boost the results. The results obtained after applying the algorithm to the dataset improved in terms of several parameters. For the comparative analysis, the accurate average value and the recall value parameters are computed. The accurate average value is 74.05% of the existing COID algorithm, and our proposed algorithm has 77.21%. The average recall value is 81.19% and 89.51% of the existing and proposed algorithm, which shows that the proposed work efficiency is better than the existing COID algorithm.


Author(s):  
Tunjung Sekar Laksmi Pandhit ◽  
Malik Cahyadin

Financial inclusion becomes a priority concern with governments in ASEAN countries such as reduce the  lack  of  access  for  public  to  formal  financial  institutions.  Moreover,  there  is  an  empirical  gap  of linkages between institutions and financial inclusion. Thus, the study aims to estimate the effect of institutions on dynamic financial inclusion. Three financial inclusion indicators are employed, namely: debit card ownership, credit card ownership, and domestic credit to GDP ratio. Institutional indicators consist of six indicators following world governance indicators. The research observations are about 88 consisting of cross-sections were eight of ASEAN countries and the time series was 2008-2018. Indeed, a dynamic panel data was employed. In general, the findings exhibit that FEM is the appropriate model under Hausman test. Specifically, debit card ownership and credit card ownership were determined by voice and accountability, and rule of law while domestic credit to GDP ratio was determined by some indicators of institutions such as voice and accountability, political stability, regulatory quality, and control of corruption. Hence, the policy implications were directed to improve the quality of institutions both country and ASEAN levels. The high quality of institutions will stimulate the acceleration and expansion of financial inclusion in ASEAN countries.


E-methodology ◽  
2019 ◽  
Vol 5 (5) ◽  
pp. 100-112
Author(s):  
Paolo Di Sia

Aim. In recent years, social networks have multiplied on the Internet, becoming more and more used, and consequently raising doubts about the security of privacy. This exponential development has attracted the attention of bad-intentioneds too. The aim of the research is to undestand how “attack algorithms” can violate the privacy of millions of people, despite privacy policies which do not allow their use.  Methods. Considering an analysis on password security on Facebook, I evaluate the problems connected with the use of an attack algorithm in relation to privacy and security.  Results. Over the  years, Facebook privacy policies have been changed, but with new services it is still possible to trace personal information. Using special phishing techniques it is possible to get the access credentials of a good percentage of users. This allows attackers to perform online transactions, view bank accounts and their transactions, call details, credit card numbers and many other personal data.  Conclusions. Waiting for the power of the future quantum Internet, it is unfortunately possible today to launch an attack exploiting the analysed techniques and even improve them, making them more effective and reaching even higher success rates, thus placing a very high number of users in serious danger.


Sign in / Sign up

Export Citation Format

Share Document