Journal articles on the topic 'Major transactions'

To see the other types of publications on this topic, follow the link: Major transactions.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Major transactions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Khan, Mohammad Monirujjaman, Nesat Tasneem RoJa, Faris A. Almalki, and Maha Aljohani. "Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract." Security and Communication Networks 2022 (May 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/2213336.

Full text
Abstract:
The days of storing data manually are behind us. We are opting for the online form of data storage and transfer. The new era of data digitization comes with its own perks and detriments. Cybersecurity is still a crucial concern today. As more data transfer occurs through an online medium, the risks of a breach and cyberattacks are inevitable. The whole foundation of e-commerce is based on the online transfer of goods and transactions without the need to travel. Transferring transactional data and transactions in e-commerce are prone to cyber threats. Our research’s major objective is to develop a system that protects against such mishaps, especially during the transfer of transactional data, and also implement an automated system that ensures these transactions occur without any errors. To implement this, we are taking advantage of new emerging technologies called blockchain and smart contract. Blockchain allows a decentralized, immutable digital ledger to safely store and transfer data across the network. Blockchain technology is used in e-commerce to transfer transactions in a safe, secure, and faster way. Blockchain enables a peer-to-peer transaction system and data encryption that enables the safe transfer of transactional data. Blockchain is used to transfer transactional data. A smart contract is a special program that enables, verifies, and enforces the terms of a contract digitally. It provides transactional security as the contact is in place. The blockchain, coupled with smart contracts, will revolutionize the future of e-commerce. We have combined blockchain technology to ensure data security and user privacy with smart contracts to ensure that the protocol for the transaction is maintained. The results are presented by building and implementing the proposed system that provides the solution for transactional data privacy.
APA, Harvard, Vancouver, ISO, and other styles
2

RUSINKIEWICZ, MAREK, PIOTR KRYCHNIAK, and ANDRZEJ CICHOCKI. "TOWARDS A MODEL FOR MULTIDATABASE TRANSACTIONS." International Journal of Cooperative Information Systems 01, no. 03n04 (December 1992): 579–617. http://dx.doi.org/10.1142/s0218215792000155.

Full text
Abstract:
In many application areas the information that may be of interest to a user is stored under the control of multiple, autonomous database systems. To support global transactions in a multidatabase environment, we must coordinate the activities of multiple Database Management Systems that were designed for independent, stand-alone operation. The autonomy and heterogeneity of these systems present a major impediment to the direct adaptation of transaction management mechanisms developed for distributed databases. In this paper we introduce a transaction model designed for a multidatabase environment. A multidatabase transaction is defined by providing a set of (local) sub-transactions, together with their precedence and dataflow requirements. Additionally, the transaction designer may specify failure atomicity and execution atomicity requirements of the multidatabase transaction. These high-level specifications are then used by the scheduler of a multidatabase transaction to assure that its execution satisfies the constraints imposed by the semantics of the application. Uncontrolled interleaving of multidatabase transactions may lead to the violation of interdatabase integrity constraints. We discuss the issues involved in a concurrent execution of multidatabase transactions and propose a new concurrency control correctness criterion that is less restrictive than global serializability. We also show how the multidatabase SQL can be extended to allow the user to specify multidatabase transactions in a nonprocedural way.
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Mandeep, Sunny Kumar, Sunny Kumar, and Tushant Garg. "Credit Card Fraud Detection Using Hidden Markov Model." International Journal of Engineering and Computer Science 8, no. 11 (December 1, 2019): 24878–82. http://dx.doi.org/10.18535/ijecs/v8i11.4386.

Full text
Abstract:
Now a day the usage of credit cards and net banking for online payments has dramatically increased. The most popular mode of online as well as regular purchase payments is through credit card and security of such transactions is also a major issue as frauds are increasing rapidly. In the existing scenario, fraud is detected after the transaction is done and it makes more difficult to find out fraudulent loses barred by issuing authority. In this paper, we observe the behaviour of credit card transactions using a Hidden Markov Model (HMM) and show how it detects frauds. An HMM is initially trained with the normal behaviour of transaction. If the present credit card transaction is not accepted by the trained HMM with enough high probability, then it declares as a fraudulent transaction. At the same time, we try to ensure that no genuine transactions are rejected.
APA, Harvard, Vancouver, ISO, and other styles
4

Lesner, Christopher, Alexander Ran, Marko Rukonic, and Wei Wang. "Large Scale Personalized Categorization of Financial Transactions." AI Magazine 41, no. 3 (September 14, 2020): 63–77. http://dx.doi.org/10.1609/aimag.v41i3.5319.

Full text
Abstract:
A major part of financial accounting involves organizing business transactions using a customizable filing system that accountants call a “chart of accounts.” This task must be carried out for every financial transaction, and hence automation is of significant value to the users of accounting software. In this article we present a large-scale recommendation system used by millions of small businesses in the USA, UK, Australia, Canada, India, and France to organize billions of financial transactions each year. The system uses machine learning to combine fragments of information from millions of users in a manner that allows us to accurately recommend chart-of-accounts categories even when users have created their own or named them using abbreviations or in foreign languages. Transactions are handled even if a given user has never categorized a transaction like that before. The development of such a system and testing it at scale over billions of transactions is a first in the financial industry.
APA, Harvard, Vancouver, ISO, and other styles
5

Lesner, Christopher, Alexander Ran, Marko Rukonic, and Wei Wang. "Large Scale Personalized Categorization of Financial Transactions." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9365–72. http://dx.doi.org/10.1609/aaai.v33i01.33019365.

Full text
Abstract:
A major part of financial accounting involves tracking and organizing business transactions over and over each month and hence automation of this task is of significant value to the users of accounting software. In this paper we present a large-scale recommendation system that successfully recommends company specific categories for several million small businesses in US, UK, Australia, Canada, India and France and handles billions of financial transactions each year. Our system uses machine learning to combine fragments of information from millions of users in a manner that allows us to accurately recommend user-specific Chart of Accounts categories. Accounts are handled even if named using abbreviations or in a foreign language. Transactions are handled even if a given user has never categorized a transaction like that before. The development of such a system and testing it at scale over billions of transactions is a first in the financial industry.
APA, Harvard, Vancouver, ISO, and other styles
6

Semenov, Dmitry A. "MAJOR TRANSACTIONS MADE BY A JOINT-STOCK COMPANY." Regional and Branch Economy, no. 3 (2022): 16–21. http://dx.doi.org/10.47576/2782-4578_2022_3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bierman, Harold. "Accounting for Interest Rate Swaps." Journal of Accounting, Auditing & Finance 2, no. 4 (October 1987): 396–408. http://dx.doi.org/10.1177/0148558x8700200407.

Full text
Abstract:
There are major accounting issues for both the counterparties and the principal of an interest rate swap transaction. Currently, the market for swaps well exceeds $150 billion, and at this writing there are no explicit accounting standards for such transactions. This paper defines the basic swap transaction and the relevant accounting issues and offers possible solutions. Notes to the financial statements are needed to reveal the changes in risk, both to the counterparties and to the principal.
APA, Harvard, Vancouver, ISO, and other styles
8

Hung, Wei-Hsi J., Chia-An Tsai, Shin-Yuan Hung, Robert McQueen, and Jau-Jeng Jou. "Evaluating Web Site Support Capabilities in Sell-Side B2B Transaction Processes." Journal of Global Information Management 19, no. 1 (January 2011): 51–79. http://dx.doi.org/10.4018/jgim.2011010103.

Full text
Abstract:
Business-to-business (B2B) transactions supported by the World Wide Web (Web) have become a major portion of e-commerce transactions. Despite growth, knowledge of the degree of Web site support capabilities in the B2B transaction process is limited. This paper longitudinally compares how Web sites supported the B2B transaction process in New Zealand and Taiwan between 2001 and 2007. The results indicate that, on average, New Zealand Web sites scored higher than those in Taiwan in both years. Yet, the rate of improvement of Taiwanese Web site scores is significant. Specifically, the support capability of several Web functions, including privacy, company information, financial information and product catalog has improved over the study period. The authors found that the sampled Web sites in New Zealand and Taiwan provide different support capabilities to the activities in the B2B transaction process. Taiwanese Web sites are more concerned with providing after-sale services via the Internet whereas New Zealand Web sites are more concerned with sharing information. These two countries’ Web sites share a similar focus on supporting B2B transactions, which provides strong support for users to conduct product promotion and information provision related activities over the Web. Based on these findings, this study suggests several implications for associated academics and practitioners.
APA, Harvard, Vancouver, ISO, and other styles
9

Roughgarden, Tim. "Transaction fee mechanism design." ACM SIGecom Exchanges 19, no. 1 (June 2021): 52–55. http://dx.doi.org/10.1145/3476436.3476445.

Full text
Abstract:
Demand for blockchains such as Bitcoin and Ethereum is far larger than supply, necessitating a mechanism that selects a subset of transactions to include "on-chain" from the pool of all pending transactions. EIP-1559 is a proposal to make several tightly coupled changes to the Ethereum blockchain's transaction fee mechanism, including the introduction of variable-size blocks and a burned base fee that rises and falls with demand. These changes are slated for deployment in Ethereum's "London fork," scheduled for late summer 2021, at which point it will be the biggest economic change made to a major blockchain to date. This short note provides an overview of recent work by the author that formally investigates and compares the incentive guarantees offered by Ethereum's current transaction fee mechanism and the new mechanism proposed in EIP-1559.
APA, Harvard, Vancouver, ISO, and other styles
10

Fanning, Kurt, and Rita Grant. "Manual vs. Computerized Practice Set: Which Achieves Learning Objectives the Best?" AIS Educator Journal 12, no. 1 (January 1, 2017): 25–33. http://dx.doi.org/10.3194/1935-8156-12.1.25.

Full text
Abstract:
ABSTRACT A major issue for accounting departments is how to adopt a user's approach to teaching the Principles level courses and still have the accounting majors adequately prepared for upper level courses. One approach is to employ a practice set within the curriculum. However, the use of a manual practice set presents several problems. The use of a computerized practice set may solve many of these issues. This paper examines this issue by testing the student's retention of information about accounting processes and procedures. The test results indicate similar outcomes from using a computerized practice set where students manually post the transactions to those students using a manual practice set. Thus, students can gain the necessary knowledge while using a computerized practice set when they post transactions. However, the test results indicate students have inferior results when using a computerized practice set that automatically posts the transactions. This suggests that student involvement in the transaction is important. Given the computerized practice set's advantages in decreasing the time and energy expended by the accounting faculty grading practice sets and the faculty's ability to help the students remotely, a strong argument can be made for using the computerized practice set when students post the transactions. Thus, accounting departments can be more confident, in certain circumstances, to choose to use computerized practice sets.
APA, Harvard, Vancouver, ISO, and other styles
11

Yuan, Chao, Mi-xue Xu, and Xue-ming Si. "Research on a New Signature Scheme on Blockchain." Security and Communication Networks 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/4746586.

Full text
Abstract:
With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.
APA, Harvard, Vancouver, ISO, and other styles
12

S., Kannan, and Somasundaram K. "Autoregressive-based outlier algorithm to detect money laundering activities." Journal of Money Laundering Control 20, no. 2 (May 2, 2017): 190–202. http://dx.doi.org/10.1108/jmlc-07-2016-0031.

Full text
Abstract:
Purpose Due to the large-size, non-uniform transactions per day, the money laundering detection (MLD) is a time-consuming and difficult process. The major purpose of the proposed auto-regressive (AR) outlier-based MLD (AROMLD) is to reduce the time consumption for handling large-sized non-uniform transactions. Design/methodology/approach The AR-based outlier design produces consistent asymptotic distributed results that enhance the demand-forecasting abilities. Besides, the inter-quartile range (IQR) formulations proposed in this paper support the detailed analysis of time-series data pairs. Findings The prediction of high-dimensionality and the difficulties in the relationship/difference between the data pairs makes the time-series mining as a complex task. The presence of domain invariance in time-series mining initiates the regressive formulation for outlier detection. The deep analysis of time-varying process and the demand of forecasting combine the AR and the IQR formulations for an effective outlier detection. Research limitations/implications The present research focuses on the detection of an outlier in the previous financial transaction, by using the AR model. Prediction of the possibility of an outlier in future transactions remains a major issue. Originality/value The lack of prior segmentation of ML detection suffers from dimensionality. Besides, the absence of boundary to isolate the normal and suspicious transactions induces the limitations. The lack of deep analysis and the time consumption are overwhelmed by using the regression formulation.
APA, Harvard, Vancouver, ISO, and other styles
13

Theophilus, Akomolafe Dipo, and Adeola Oladele Stephen. "Response Triggered Architecture for E-Payment Examined for General Purpose Transaction." Academic Journal of Applied Mathematical Sciences, no. 68 (August 25, 2020): 153–60. http://dx.doi.org/10.32861/ajams.68.153.160.

Full text
Abstract:
The explosive growth in internet coupled with advancement in Information and Communication Technology (ICT) has made business transactions much easier than it used to be in the past. For example, e-commerce has particularly benefited from the introduction of GSM system. One of the major challenges, however, is how to isolate fraudulent transactions from genuine businesses. This becomes more imperative as the advancement in ICT has brought with it fraud and related scams. In this work, we examined different types of e-commerce as well as the challenges being encountered in the course of daily transactions. We took advantage of the current trends in mobile communication networks, particularly GSM and proposed a system based on Response Triggered Architecture for electronic transaction. Our proposed system is platform independent which means only little modification is needed when switching from one platform to another. We used Visual.basic.net and knowledge in fraud for our system prototype and presented the results in the body of this work.
APA, Harvard, Vancouver, ISO, and other styles
14

Triasih, Dharu, B. Rini Heryanti, and Endah Pujiastuti. "Legal Protection for Consumers in On Sale Purchase Agreement." SHS Web of Conferences 54 (2018): 06011. http://dx.doi.org/10.1051/shsconf/20185406011.

Full text
Abstract:
One of the most significant developments at this time is the online buying and selling transactions. Sellers and buyers do not need face-to-face buying and selling transactions. They only need to have an internet connection that will take them in cyberspace. Until now, there is still a legal vacuum about it in Indonesia. The existence of E-Commerce makes it is necessary to learn about consumer protection in an online sale and purchase agreement. Therefore, there will be no legal dispute that can harm various parties commercially. The approach method used in this study was an empirical juridical approach. This research was conducted in Semarang, Pekalongan, and Magelang. The selection of three cities in Central Java is based on a purposive sampling method. Data were gained by means of an interview, questionnaire, and literature study. Primary data, secondary data. Qualitative analysis. The results showed that the main principle of online transactions in Central Java still prioritized the aspects of trust of sellers and buyers. The principles of online transaction security has not become a major concern for sellers and buyers, especially in small to medium scale transactions.
APA, Harvard, Vancouver, ISO, and other styles
15

Alshammari, Hammad, and Mohammad Alturifi. "The Impact of Digital Transactions on Employees' Performance at University of Hail." Archives of Business Research 10, no. 10 (October 28, 2022): 114–24. http://dx.doi.org/10.14738/abr.1010.13296.

Full text
Abstract:
This study aims at investigating the impact digital transactions on employees’ performance at the university of Hail in Saudi Arabia. The main purpose of the study is to investigate the impact of adoption a digitalized work system by administrators at University of Hail in increasing employees' performance. Descriptive analytical approach was implemented using survey questionnaire. The sample of the study consisted of (200) male and female administrators selected using simple random sampling procedure. The result showed that there is a significant correlation between the implementation degree of digital transactions at University of Hail and employees' performance. In light of the results, the following recommendations were suggested:-University of Hail needs to take more consideration to capitalizing the advantages of using digital transactions as one of the major variables having a positive impact on employees' performance.-Keeping abreast with new technological advances in digital transaction is a must if higher education institutions wish to be well informed about the changes worldwide.-Engaging employees in the implementation of digital transactions in the various deanships, administrations and departments at University of Hail ensures a full adoption of such a modern technology, which will, in turn, have a positive impact on employees' performance.
APA, Harvard, Vancouver, ISO, and other styles
16

Keay, Andrew. "THE HARMONIZATION OF THE AVOIDANCE RULES IN EUROPEAN UNION INSOLVENCIES." International and Comparative Law Quarterly 66, no. 1 (November 16, 2016): 79–105. http://dx.doi.org/10.1017/s0020589316000518.

Full text
Abstract:
AbstractCross-border transactions and resultant legal proceedings often cause problems. One major problem is knowing which law should govern the transaction and any legal proceedings. Cross-border insolvencies in the EU are subject to the European Regulation on Insolvency Proceedings (EIR) but this legislation does not determine which substantive insolvency law rules apply in a given insolvency. There are many differences in the insolvency rules applicable in the various EU Member States and this has caused concern in relation to the avoidance of transactions entered into by an insolvent prior to the opening of insolvency proceedings. In light of this, the paper examines options to address divergence between national avoidance rules. One option, harmonization, is analysed as well as its possible benefits and drawbacks.
APA, Harvard, Vancouver, ISO, and other styles
17

Saull, Andrew, Andrew Baum, and Fabian Braesemann. "Can digital technologies speed up real estate transactions?" Journal of Property Investment & Finance 38, no. 4 (May 19, 2020): 349–61. http://dx.doi.org/10.1108/jpif-09-2019-0131.

Full text
Abstract:
PurposeThis study presents a structured investigation of the most important causes for delay in commercial real estate transactions. It assesses the potential of digital technologies such as “Blockchain”, “Property Passports” or “Automated Valuation Models” to make transactions faster and cheaper.Design/methodology/approachThe authors conduct a focus group interview to identify the individual steps and the parties involved in real estate transactions. Subsequently, the authors discuss the prospects of digital technologies based on semi-structured interviews with real estate professionals and PropTech executives, and a comprehensive screening of technological solutions offered by PropTech firms.FindingsThe lack of an up-to-date, single pool of standardised property information turns out to be the most critical cause for delay in real estate transactions. However, the most promising technologies to mitigate this problem, in particular digital property passports summarising all relevant building information, face substantial barriers to adoption. The real estate industry has so far not been willing to more openly share data, which is a pre-requiste for the successful introduction of property passports. In addition, the principle of caveat emptor makes a lengthy due diligence process essential for buyers.Practical implicationsThe authors conclude that industry-wide collaborations are necessary to help major efficiency gaining technologies to break through. Insurance products should accompany property data log books to guarantee the quality of data provided.Originality/valueThis study considers the potential impact of technologies in the wider context of the complete real estate transaction process. It identifies the major phases of that process and the associated bottlenecks. The authors gather evidence both from industry experts and PropTech executives and contrast their views regarding the potential of digital technologies to remove those bottlenecks.
APA, Harvard, Vancouver, ISO, and other styles
18

Szczepańska, Agnieszka. "Transport Accessibility in a Suburban Zone and Its Influence on the Local Real Estate Market: A Case Study of the Olsztyn Functional Urban Area (Poland)." Land 10, no. 5 (April 29, 2021): 465. http://dx.doi.org/10.3390/land10050465.

Full text
Abstract:
The development of real estate markets in the vicinity of cities is linked with suburbanization processes. The migration of the population to suburban areas contributes to the growth of the residential property market (houses, apartments and construction plots). To minimize commuting costs, property buyers opt for locations that are situated close to the urban core. This article analyzes construction plots on the local real estate market in the Olsztyn Functional Urban Area, in terms of their temporal accessibility and demographic changes. Spatial variations in population distribution were analyzed with the use of the Gini index and geostatistical interpolation techniques. Spearman’s rank correlation coefficient was calculated to determine the relationships between the analyzed variables. The study revealed differences in the spatial distribution of the population and real estate transactions as well as strong correlations between average transaction price, number of transactions, commuting time and population. The highest number of transactions were observed in cadastral districts situated in the direct vicinity of Olsztyn’s administrative boundaries and the major transportation routes due to their high temporal accessibility.
APA, Harvard, Vancouver, ISO, and other styles
19

Barradas, Adrian, Acela Tejeda-Gil, and Rosa-María Cantón-Croda. "Real-Time Big Data Architecture for Processing Cryptocurrency and Social Media Data: A Clustering Approach Based on k-Means." Algorithms 15, no. 5 (April 22, 2022): 140. http://dx.doi.org/10.3390/a15050140.

Full text
Abstract:
Cryptocurrencies have recently emerged as financial assets that allow their users to execute transactions in a decentralized manner. Their popularity has led to the generation of huge amounts of data, specifically on social media networks such as Twitter. In this study, we propose an iterative kappa architecture that collects, processes, and temporarily stores data regarding transactions and tweets of two of the major cryptocurrencies according to their market capitalization: Bitcoin (BTC) and Ethereum (ETH). We applied a k-means clustering approach to group data according to their principal characteristics. Data are categorized into three groups: BTC typical data, ETH typical data, BTC and ETH atypical data. Findings show that activity on Twitter correlates to activity regarding the transactions of cryptocurrencies. It was also found that around 14% of data relate to extraordinary behaviors regarding cryptocurrencies. These data contain higher transaction volumes of both cryptocurrencies, and about 9.5% more social media publications in comparison with the rest of the data. The main advantages of the proposed architecture are its flexibility and its ability to relate data from various datasets.
APA, Harvard, Vancouver, ISO, and other styles
20

Minaei, Mohsen, Pedro Moreno-Sanchez, and Aniket Kate. "MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 404–24. http://dx.doi.org/10.2478/popets-2020-0058.

Full text
Abstract:
AbstractCryptocurrencies play a major role in the global financial ecosystem. Their presence across different geopolitical corridors, including in repressive regimes, has been one of their striking features. In this work, we leverage this feature for bootstrapping Censorship Resistant communication. We conceptualize the notion of stego-bootstrapping scheme and its security in terms of rareness and security against chosencovertext attacks. We present MoneyMorph, a provably secure stego-bootstrapping scheme using cryptocurrencies. MoneyMorph allows a censored user to interact with a decoder entity outside the censored region, through blockchain transactions as rendezvous, to obtain bootstrapping information such as a censorshipresistant proxy and its public key. Unlike the usual bootstrapping approaches (e.g., emailing) with heuristic security, if any, MoneyMorph employs public-key steganography over blockchain transactions to ensure provable cryptographic security. We design rendezvous over Bitcoin, Zcash, Monero, and Ethereum, and analyze their effectiveness in terms of available bandwidth and transaction cost. With its highly cryptographic structure, we show that Zcash provides 1148 byte bandwidth per transaction costing less than 0.01 USD as fee.
APA, Harvard, Vancouver, ISO, and other styles
21

Prasad, Rayapati Hari Chandra, J. Mounika, and Sangala Gopi. "System for Managing Vehicle Services." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (January 31, 2023): 519–25. http://dx.doi.org/10.22214/ijraset.2023.48618.

Full text
Abstract:
Abstract: Vehicle owners can prevent unexpected automotive problems by routinely maintaining their vehicles. It's critical to identify car issues as soon as possible to stop them from becoming major problems. Vehicle owners routinely ask auto shops about servicing. Vehicle mechanics inspect important components and address issues to make sure they are in good shape and won't break down unexpectedly. Researchers conducted the study to assess the routine business transactions and activities in vehicle repair shops. Preliminary data collected by the researchers revealed that the majority of vehicle repair companies or garages continue to conduct daily transactions manually. Customer records, client interactions, billing, tracking the progress of auto repairs, and service updates are all still entered by hand. The capstone project, "System for managing vehicle services" will automate the operations and regular transactions of the car repair shop. The system will electronically streamline processes including managing car repair orders, maintaining maintenance logs, monitoring customer and transaction records, servicing updates, and billing. The system's installation will benefit both customers and auto shops. The company's use of the system will enable vehicle garages to grow and enhance operational effectiveness. Customers can easily and comfortably conduct business for vehicle servicing.
APA, Harvard, Vancouver, ISO, and other styles
22

Phakeng, Madimetja A. L. "The Appraisal Right in terms of Section 164 of the Companies Act 71 of 2008: An Overview." Potchefstroom Electronic Law Journal 25 (January 17, 2022): 1–33. http://dx.doi.org/10.17159/1727-3781/2022/v25ia8332.

Full text
Abstract:
The appraisal right in terms of section 164 of the Companies Act 71 of 2008 has been applicable to fundamental transactions undertaken by companies for a number of years. The first two aims of this article are first to provide an overview of the appraisal right, and second to revisit certain concerns that were raised about the determination of fair value by the courts where a shareholder makes an application to court for a determination of fair value. It is suggested that this should not present a major problem in practice, considering that existing practice in takeover laws requires the valuation of shares by an independent expert when a company undertakes an affected transaction. In the main, the requirements for fundamental transactions overlap with those for affected transactions. The requirements for affected transactions adequately deal with the determination of fair value. The third aim is to provide an overview of how companies attempt to limit the effect of the appraisal right on fundamental transactions using various terms and conditions precedents, and the fourth is to discuss developments in case law on the appraisal right remedy. It is concluded that the decisions of the courts on its application will assist companies in structuring fundamental transactions and shareholders in exercising the appraisal right. Finally, the article suggests reasons for including certain subsections in the appraisal right remedy, for instance, the power of the courts to award costs in certain respects and a requirement that extends the time periods within which a shareholder may make a demand where the company fails to comply with specific requirements. It is suggested that this enhances the ability of shareholders to exercise the appraisal right. The article also provides concluding remarks advising companies and shareholders. In the case of companies, it concludes, for instance, that due diligence in identifying the risk that certain shareholders may raise appraisal rights is required before initiating a transaction that may be subject to appraisal rights. Failure to do so may be costly to the company. And, in the case of shareholders, failure to adhere to the required procedures may result in loss of their appraisal right remedy, or loss of the right to approach the courts for an appropriate relief under the appraisal right remedy.
APA, Harvard, Vancouver, ISO, and other styles
23

Shao, Kang, Tao Fan, and Kun Wang. "Analysis of Security Issue in C2C E-Commerce Based on Game Theory." Applied Mechanics and Materials 687-691 (November 2014): 1900–1903. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1900.

Full text
Abstract:
With the increasing volume of E-commerce transactions in China, trust issue in E-commerce is increasingly prominent, which has been one major bottleneck of the sound development of E-commerce in China. This thesis aims to analyze the reasons for the lack of trust in E-commerce by starting with C2C E-commerce platform, and to analyze the main factors influencing the trust conduct of transaction bodies and put forward suggestions for improving credit system through the use of the static game theory.
APA, Harvard, Vancouver, ISO, and other styles
24

Winner, Martin. "Protection of Creditors and Minority Shareholders in Cross-border Transactions." European Company and Financial Law Review 16, no. 1-2 (May 8, 2019): 44–73. http://dx.doi.org/10.1515/ecfr-2019-0006.

Full text
Abstract:
The Mobility Package currently under discussion in the Council will constitute a major breakthrough for cross-border transactions if finally adopted. Although its focus is on enabling companies to make use of the freedom of establishment, some of its core rules address the protection of creditors and minority shareholders. Both groups can be adversely affected by being transferred across borders; a coherent, harmonised regulation of both issues is crucial for ensuring a largely frictionless enforcement of the different legal regimes applicable to the company or companies affected by such a cross-border transaction. This article critically analyses the proposed regulation against this background. It takes into account the developments until the end of 2018.
APA, Harvard, Vancouver, ISO, and other styles
25

Kurniawati, Eris Tri. "ANALISIS PENGARUH TRANSAKSI GADAI EMAS TERHADAP TINGKAT KEUNTUNGAN BANK SYARIAH." Journal of Innovation in Business and Economics 4, no. 1 (August 14, 2014): 45. http://dx.doi.org/10.22219/jibe.vol4.no1.45-54.

Full text
Abstract:
The basis of this study was to provide a comprehensible description of the gold pawn transaction implemented in sharia banks and would like to identify the effect of the gold pawn transactions toward bank profits. Accordingly, this research applied statistical test instrument, specifically multiple linear regressions and the results revealed that sharia (Rahn) pawn transaction revenue has a positive effect on net income in which the contribution of independent variables on the dependent variable indicated its R2 (R-squared)value by 21.08%. Since the independent variable was not the major product which affected the bank's net income, other 78.92% of net profit variable would be clarified by other variables which were not discussed in this study
APA, Harvard, Vancouver, ISO, and other styles
26

Hunter, Jr Richard J., Henry J. Amoroso, and John H. Shannon. "A Primer on the LAW in the United States: Part III Scope of Liability in Product Liability Cases." International Journal of Learning and Development 2, no. 4 (July 4, 2012): 1. http://dx.doi.org/10.5296/ijld.v2i4.2049.

Full text
Abstract:
In Part III of our study, the authors describe the types of transactions that are most common in products liability cases and also delineate the parties to the transaction. This article concludes by discussing some “special topics” in modern product liability law: enterprise liability, alternative liability, and market share liability. The article relies on references to the Uniform Commercial Code, the Restatement of the Law of Torts, and cites the major common law cases that have impacted on these important issues. Key Words: Products Liability; Bailments; Franchising; Used Goods; Enterprise Liability; Market Share; Alternative Liability
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Chen, Shi Jie Jiang, and Bin Huang. "Strategies for the Security of Online Payments in E-Commerce." Advanced Materials Research 756-759 (September 2013): 3039–42. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3039.

Full text
Abstract:
Online payment is apparently the key for the online transactions, so its security issue becomes the center of focus in the e-commerce development. In China, however, the information leakage, transaction fraud and other security issues have occurred so frequently that they have severely affected the customer confidence, and have become one of the major blockages in the e-commerce development. This article intends to have an in depth discussion of online payment security issues, examining current situations and problems in security technology, corporate social responsibility, and also propose appropriate strategic recommendations.
APA, Harvard, Vancouver, ISO, and other styles
28

Vapa-Tankosić, Jelena, and Dejan Vukosavljević. "The analysis of the structured financial transactions as alternative sources of financing." Pravo - teorija i praksa 38, no. 1 (2021): 13–24. http://dx.doi.org/10.5937/ptp2101013v.

Full text
Abstract:
It is undeniable that global financial institutions are facing the major changes taken place during the last few years. Starting with the continuous tightening of both legal and financial regulations, preparation for the introduction of Basel 3, consolidation of the industry itself, the introduction of new information and communication technologies, enhanced safeguards to prevent money laundering, globalization of financial functions and capital markets, the traditional structure of the financial services industry has suffered many changes. Technological changes have reduced the transaction costs and accelerated the transfer of knowledge between the countries all over the world. There have emerged the modern forms of financial instruments crossing the barriers of national markets. Complex financial transactions unite all participants in the global market and, at the same time, they form the relative prices of all goods, services and capital. This paper aims to analyze the mechanism of realization of the structured financial transactions of banks and specialized institutions as alternative sources of financing in the global financial market.
APA, Harvard, Vancouver, ISO, and other styles
29

Ghofur, Ruslan Abdul, and Afiful Ichwan. "OVERVIEW THE LAW OF ZAKAT PAYMENT USES FINTECH IN ISLAMIC PERSPECTIVE." Al-Infaq: Jurnal Ekonomi Islam 11, no. 2 (December 26, 2020): 110. http://dx.doi.org/10.32507/ajei.v11i2.644.

Full text
Abstract:
AbstractThe current development of technology 4.0 has made many major changes, especially in the transaction model. The presence of Financial Technology (Fintech) has transformed cash transactions into a non-cash transaction model that can be done without having to meet face to face. This gives people the convenience of making transactions. Not only in transactions of economic activity, but also non-cash payment through Fintech have been used in paying zakat. The purpose of this research is to find out how the laws of Fintech are used to pay zakat. In this study, the authors used a literature study research method, namely by searching for documents such as national and international journals, books, and websites related to research. The results of the analysis using the nine principles of Islamic law conclude that legal fintech itself is allowed as long as the transaction does not contradict sharia principles and does not contain elements of danger. AbstrakPerkembangan teknologi 4.0 saat ini telah banyak membuat perubahan besar, terutama pada model transaksi. Hadirnya Financial Teknology (Fintech) merubah transaksi yang secara tunai ke model transaksi nontunai yang dapat dilakukan tanpa harus bertatap muka. Ini memberikan masyarakat kemudahan dalam melakukan transaksi. Tidak hanya dalam transaksi kegiatan perekonomian, namun juga pembayaran nontunai melalui Fintech telah digunakan dalam pembayaran zakat. Tujuan dari pada penelitian ini adalah untuk mengetahui bagaimana hukum penggunaan transaksi pada Fintech yang digunakan untuk membayar zakat. Dalam penelitian ini penulis menggunakan metode penelitian studi pustaka yaitu dengan mencari dokumen seperti Jurnal nasional dan internasional, buku, dan website yang berkaitan dengan penelitian. Hasil analisa menggunakan sembilan kaidah hukum Islam menyimpulkan bahwa Fintech hukum itu sendiri perbolehkan selama transaksi tidak bertentangan dengan prinsip syariah dan tidak mengandung unsur bahaya.
APA, Harvard, Vancouver, ISO, and other styles
30

Yang, Siwen. "The Revolution in Banking Method and The Total Transaction in Canada." BCP Business & Management 26 (September 19, 2022): 365–72. http://dx.doi.org/10.54691/bcpbm.v26i.1984.

Full text
Abstract:
In this century, as the digitalization of banks continues, the payment methods evolved from paperwork to online. While more and more consumers accept new banking methods, it appears to have increasing doubts about whether this digitalization really provides convenience to consumers and encourages people to make more transactions, or banks are merely following the trend, which in fact makes things more complicated. The topic of this paper is how innovations in banking methods change the volume of transactions in Canada. The three major methods of payment involved in this paper are credit card payment, internet payment, and mobile payment. The discussion is based on a prediction that the transaction volume would be positively influenced if more advanced banking methods are launched. The goal of this essay is to evaluate the reliability of this prediction by referring to real-world data, research results, and articles. In the end, based on the results concluded from the analysis, the conclusion will be drawn.
APA, Harvard, Vancouver, ISO, and other styles
31

Kumar R, Nithish. "Comparative Study of Proof of Work (PoW) and Delegated Proof of Stake (DPoS) Blockchain Consensus Algorithm." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (July 15, 2021): 650–54. http://dx.doi.org/10.22214/ijraset.2021.36425.

Full text
Abstract:
As opposed to the current system, that is controlled by a central authority, blockchain was invented by Satoshi Nakamoto in 2008 as a distributed ledger system. A major development in the technology came with the introduction of virtual cryptocurrencies where transactions were recorded and verified by miners or validators at various nodes in different locations. Since these transaction records are available to everyone, this solved the current problem of excessive double spending. In a decentralized system like blockchain, a reliable mechanism was necessary to verify the integrity of all transactions. This led to the introduction of a variety of consensus mechanisms. This paper presents the results of a comparative study between Proof of Work and Delegated Proof of Stake, both of which have been widely used in Blockchain projects recently. Based on the above, this study will primarily discuss a brief explanation of the workings of both algorithms, comparisons between them, and various factors impacting these algorithms from a crypto currency standpoint.
APA, Harvard, Vancouver, ISO, and other styles
32

Arunachalam, N., P. Prabavathy, and S. Priyatharshini. "Hidden Markov Model Based Fault Tolerance in Credit Card Transaction Security." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.32.15392.

Full text
Abstract:
Credit card fake detection has raised unique challenges due to the streaming, imbalanced, and non-stationary nature of the data that has been transacted. It had additionally included an active learning step, since the labeling (fake or genuine) use of a subset on transactions is obtained in near-real time through human investigators contacted the cardholders. In this paper, the Hidden Markov Model (HMM) algorithm has been used for sequence of Credit card operations for transaction processing and the fake can be detected by using the fake detection model during transaction processing. HMM, Fake detection model and image process had played an imperative role in the detection of credit card fake in online transactions. In fake detection, most challenging is a data problem, due to two major reasons – first, the profiles of cardholders are normal and fake lent behaviors changed constantly and secondly, credit card fake data sets are highly changed its position. Using fake detection (FD) algorithm the performance of detection in credit card transactions had highly affected by the sampling approach on dataset, selection of HMM, Fake detection model. Using fake detection (FD) algorithm an image technique had been used. A reliable augmentation of the target scarce population of fakes are important considering issues such as labeling cost; algorithm HMM, fake detection and outlines in the data streamed source. We have approached several scenarios which showed the feasibility of improving detection capabilities evaluated by means of receiver operating characteristic (ROC) curves and several key performance indicators (KPI) commonly used in financial business.
APA, Harvard, Vancouver, ISO, and other styles
33

Sihotang, Rony Andry Anthony. "Study case Remote Access for PCI DSS Compliance at Company in Jakarta." Journal of Applied Information, Communication and Technology 3, no. 2 (October 25, 2016): 35–41. http://dx.doi.org/10.33555/ejaict.v3i2.95.

Full text
Abstract:
The growth of electronic transactions in Indonesia has grown tremendously since the start of the government program of the Non-Cash National Movement (GNNT) by Bank Indonesia since 2014. It is expected that the use of cash will be replaced by electronic transactions (cashless) using ATM cards, debit cards, credit cards, electronic cards. Electronic transactions must be reliable and secure, this is what drives 5 international payment networks such as American Express, Discover, JCB, Mastercard and Visa create a data security standard to secure cardholder data PCI DSS (Payment Card Industry Data Security Standard). PCI DSS has always evolved to always keep cardholder data secure for transaction and now PCI DSS has released PCI DSS version 3.2 in April 2016. Employees need to connect to internal private networks or corporation’s network over the Internet from home or public areas such as hotels, airports, cafe mall etc. Security becomes a major consideration when access to internal networks or corporation’s network from insecure network. In this case study, one company with head office located in Jakarta, Indonesia with team development located in Seoul, South Korea. Also see the connection between convenience and security when implementing remote access in accordance with PCI DSS requirements.
APA, Harvard, Vancouver, ISO, and other styles
34

Sukhoterin, A. I. "Protected by the national system of payment cards as an experience operational decisions major tasks." Informacionno-technologicheskij vestnik 14, no. 4 (December 30, 2017): 174–81. http://dx.doi.org/10.21499/2409-1650-2017-4-174-181.

Full text
Abstract:
Every year, in the total volume of cash transactions and transactions via cards increases. In addition, only foreign payment systems is used. Country's economy was under great threat; accordingly, the creation of a national analogue was a priority task that requires a dependable program for the development and integration of the entire engineering infrastructure that make up them: information technology, telecommunications and information security. Taking into account that the databases of authorization centers contain information which full or partial loss leads to significant financial losses. It is can be much higher than the costs of information services. Because of that, it is necessary to ensure protection of all components of authorization.
APA, Harvard, Vancouver, ISO, and other styles
35

Mbaye, Mamadou. "Sustainability of cryptocurrency in blockchain technology for business development in African Countries." International Journal of Business Ecosystem & Strategy (2687-2293) 3, no. 4 (December 27, 2021): 30–37. http://dx.doi.org/10.36096/ijbes.v3i4.297.

Full text
Abstract:
The aim of the paper is to analyze the sustainability of cryptocurrency in blockchain technology in African countries for securing financial business transactions. Following the subprime crisis that shook the world economy, a new perception of money has emerged. It is a fully digital currency whose transactions are made through a distributed network. This algorithm-encrypted currency, reputed to be tamper-proof, transparent and inclusive, relies on a distributed network called the Blockchain. By comparison with traditional registers in which operations are paginated and successively recorded, transactions in blockchain technology are aggregated within the chain of blocks. It is decentralized since it is replicated on several geographic sites around the world. It enables peer-to-peer transactions, automated in real-time, reliable, secure, without intermediaries and non-repudiable. To ensure maximum security during financial transactions, blockchain miners use cryptography. This distributed system is, therefore, a major technological innovation capable of securing the financial infrastructure and mitigating failures by reducing operational risks. According to our analysis based on the Merkle tree model and blockchain energy consumption, the sustainability of cryptocurrency is a major issue for developing countries. Especially in Africa, its practicality poses a number of constraints.
APA, Harvard, Vancouver, ISO, and other styles
36

He, Yongjun, Jiacheng Lu, and Tianzheng Wang. "CoroBase." Proceedings of the VLDB Endowment 14, no. 3 (November 2020): 431–44. http://dx.doi.org/10.14778/3430915.3430932.

Full text
Abstract:
Data stalls are a major overhead in main-memory database engines due to the use of pointer-rich data structures. Lightweight coroutines ease the implementation of software prefetching to hide data stalls by overlapping computation and asynchronous data prefetching. Prior solutions, however, mainly focused on (1) individual components and operations and (2) intra-transaction batching that requires interface changes, breaking backward compatibility. It was not clear how they apply to a full database engine and how much end-to-end benefit they bring under various workloads. This paper presents CoroBase, a main-memory database engine that tackles these challenges with a new coroutine-to-transaction paradigm. Coroutine-to-transaction models transactions as coroutines and thus enables inter-transaction batching, avoiding application changes but retaining the benefits of prefetching. We show that on a 48-core server, CoroBase can perform close to 2x better for read-intensive workloads and remain competitive for workloads that inherently do not benefit from software prefetching.
APA, Harvard, Vancouver, ISO, and other styles
37

Kim, Seung Hwan, and Framarz Byramjee. "Effects Of Risks On Online Consumers Purchasing Behavior: Are They Risk-Averse Or Risk-Taking?" Journal of Applied Business Research (JABR) 30, no. 1 (December 30, 2013): 161. http://dx.doi.org/10.19030/jabr.v30i1.8291.

Full text
Abstract:
Since the beginning of e-commerce, trustworthiness of commercial web sites has been a constant issue, and, very likely, it will continue to be. When an online shopper cannot trust a web site where he or she intends to make a purchase, the online shopper would perceive a risk of transactional security and a risk of privacy of personal information. In regard to this perceived risk in online transactions, this study is set out to find the change in the level of perceived risk in Business-to-Consumer (B2C) e-commerce and to test whether or not consumers trust a web-centric company at their first visit to the companys web site. Two major findings of this study are that about one third of those surveyed for the study feel an increased risk in B2C online transactions over the previous year, and that absolute majority of them have never or rarely shopped on a web site they are not familiar with. It is further found that even an attractive deal cannot affect the risk-averse behavior of online shopping. From the findings of the study, it is concluded that risk-averse online shopping behavior is a manifestation of increased perceived risk in B2C online transactions.
APA, Harvard, Vancouver, ISO, and other styles
38

Deng, Guoying, Manuel A. Hernandez, and Shu Xu. "When Power Plants Leave Town: Environmental Quality and the Housing Market in China." Environmental and Resource Economics 77, no. 4 (October 24, 2020): 751–80. http://dx.doi.org/10.1007/s10640-020-00517-x.

Full text
Abstract:
AbstractAir pollution is a major environmental issue in China. This paper exploits the relocation of two major power plants in a large Chinese city as a quasi-natural experiment to examine the effect of changes in the quality of the environment on the housing market. We use an extensive transaction dataset of new apartment units in the affected and neighboring areas. We find that the plants’ closure is associated with a 12–14% increase in prices and 13–31% rise in the volume of transactions in neighborhoods within five kilometers of the plants. We further observe a higher change in prices among more expensive houses. The estimated monthly aggregate effect of the closures on the local housing market is over 50 million US dollars during the first 2 years after the relocations.
APA, Harvard, Vancouver, ISO, and other styles
39

Bashir, Shariq, and Daphne Teck Ching Lai. "Mining Approximate Frequent Itemsets Using Pattern Growth Approach." Information Technology and Control 50, no. 4 (December 16, 2021): 627–44. http://dx.doi.org/10.5755/j01.itc.50.4.29060.

Full text
Abstract:
Approximate frequent itemsets (AFI) mining from noisy databases are computationally more expensive than traditional frequent itemset mining. This is because the AFI mining algorithms generate large number of candidate itemsets. This article proposes an algorithm to mine AFIs using pattern growth approach. The major contribution of the proposed approach is it mines core patterns and examines approximate conditions of candidate AFIs directly with single phase and two full scans of database. Related algorithms apply Apriori-based candidate generation and test approach and require multiple phases to obtain complete AFIs. First phase generates core patterns, and second phase examines approximate conditions of core patterns. Specifically, the article proposes novel techniques that how to map transactions on approximate FP-tree, and how to mine AFIs from the conditional patterns of approximate FP-tree. The approximate FP-tree maps transactions on shared branches when the transactions share a similar set of items. This reduces the size of databases and helps to efficiently compute the approximate conditions of candidate itemsets. We compare the performance of our algorithm with the state of the art AFI mining algorithms on benchmark databases. The experiments are analyzed by comparing the processing time of algorithms and scalability of algorithms on varying database size and transaction length. The results show pattern growth approach mines AFIs in less processing time than related Apriori-based algorithms.
APA, Harvard, Vancouver, ISO, and other styles
40

Karandikar, Nikita, Antorweep Chakravorty, and Chunming Rong. "Blockchain Based Transaction System with Fungible and Non-Fungible Tokens for a Community-Based Energy Infrastructure." Sensors 21, no. 11 (May 31, 2021): 3822. http://dx.doi.org/10.3390/s21113822.

Full text
Abstract:
Renewable energy microgeneration is rising leading to creation of prosumer communities making it possible to extract value from surplus energy and usage flexibility. Such a peer-to-peer energy trading community requires a decentralized, immutable and access-controlled transaction system for tokenized energy assets. In this study we present a unified blockchain-based system for energy asset transactions among prosumers, electric vehicles, power companies and storage providers. Two versions of the system were implemented on Hyperledger Fabric. Assets encapsulating an identifier or unique information along with value are modelled as non-fungible tokens (NFT), while those representing value only are modelled as fungible tokens (FT). We developed the associated algorithms for token lifecycle management, analyzed their complexities and encoded them in smart contracts for performance testing. The results show that performance of both implementations are comparable for most major operations. Further, we presented a detailed comparison of FT and NFT implementations based on use-case, design, performance, advantages and disadvantages. Our implementation achieved a throughput of 448.3 transactions per second for the slowest operation (transfer) with a reasonably low infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
41

Giri, Nupur, Dheeraj Singh Jodha, Yash Goyal, Akshay Thite, and Abhay Tiwari. "Foreign money transfer using blockchain." ITM Web of Conferences 40 (2021): 03015. http://dx.doi.org/10.1051/itmconf/20214003015.

Full text
Abstract:
This paper focuses on using blockchain technology to enhance efficiency and cost reduction in foreign transactions through the banking system. Blockchain provides crucial features such as immutability of records and decentralization, which is then used to carry out foreign transactions. This process could be a major change in the transactions carried out by removing middle banks during transactions thereby speeding up the process. This paper aims at designing an Ethereum decentralized Banking Application for foreign money transfer using blockchain technology. Smart Contract helps to eliminate middle banks in the process by acting on rules specified in the contract. Every participant needs to abide by these rules which make it trustworthy and maintain the authenticity of the process.
APA, Harvard, Vancouver, ISO, and other styles
42

Jaysheelan, N., R. Hariharan, and G. P. Dinesh. "Has it Pierced or Yet To Pierce? A Critical Analysis of E-Retailing’s Penetration into Rural India using Extended Technology Acceptance [TAM2]." IRA-International Journal of Management & Social Sciences (ISSN 2455-2267) 6, no. 2 (February 27, 2017): 155. http://dx.doi.org/10.21013/jmss.v6.n2.p4.

Full text
Abstract:
<div><p><strong><em>Genesis: </em></strong><em>Gone are those days when markets were associated with transactions involving physical cash; due to demonetization of high value currency notes India is now witnessing a giant leap of transformation towards digital economy. Cash transactions get replaced by mobile wallets, e-payments, bank transfers, online payments etc. this brings in greater degree of transparency into the system through high degree accountability of transactions.</em></p><p><em>Cashless economy needs adoption of technology [mobile internet] to proceed smoothly; urban India is positively skewed towards digital economy, but rural India is not well equipped and educated to adopt, use and substitute the physical transaction mechanisms with digital transaction mechanisms. </em></p><p><em>Major stake holders of rural weekly markets are farmers whose literacy rates and financial status are often scaled below par. Access to smart phone is certainly increasing among rural consumers, but to what extent they are willing to adopt the mobile internet technology as a means for executing financial transactions is a debatable question. </em></p><p><em>In order to steer the rural consumer’s trajectory towards digital payment mode in rural India, it is important to understand the factors/forces influencing the acceptance of technology among rural consumers, thereby strategies can be devised to sail over the tide of resistance easily.</em></p><p><strong><em>Approach: </em></strong><em>A survey was conducted using The Extended Technology Acceptance Model [TAM2] to ascertain the various factors/forces that are responsible for resistance towards acceptance of mobile internet technology as a means for executing their financial transactions, particularly in the rural weekly markets of Ballari district.</em></p><p><strong><em>Methods: </em></strong><em>Measurement of the facets of TAM2 such as (intention to use, perceived usefulness, perceived ease of use, subjective norms, voluntariness, image) was done and subjected to rigorous data processing and analysis using the relevant statistical tools such as, KMO Test, Bartlett’s Test, cronbach’s alpha, Factor Analysis, mean, standard deviation and percentage analysis. </em></p><p><strong><em>Results: </em></strong><em>The assessment unearthed the various factors/forces affecting the rural consumer’s intentions towards acceptance of mobile internet technology as a means for executing their financial transactions, among which, safety, security, intangibility aspect, credibility and accessibility of money in electronic form were prominent.</em></p><p><strong><em>Conclusion/Recommendations: </em></strong><em>R</em><em>ural consumers lack necessary equipments [smart phones] and knowledge of usage which act as a major bottleneck blocking the inroads of digital economy in rural markets; along with many factors/forces result in resistance towards adoption of mobile internet technology for executing their financial transactions. Recommendations include all those initiatives that results in acceptance of technology among rural consumers such as, ensuring security, safety, credibility of transactions, accessibility of digital money etc.</em><strong><em> </em></strong></p></div><em>The rest of the paper is maneuvered with following sequence, Part 1: Introduction to the concept of digital economy; Part 2: Review of literature; Part 3: Gap Analysis; Part 4: Objectives of the study; Part 5: Research methodology; Part 6: Data analysis; Part 7: Findings; Part 8: Conclusion &amp; Recommendations.</em>
APA, Harvard, Vancouver, ISO, and other styles
43

Tomić, Nenad, and Violeta Todorović. "The influence of Big data concept on future tendencies in payment systems." Megatrend revija 17, no. 3 (2020): 115–30. http://dx.doi.org/10.5937/megrev2003115t.

Full text
Abstract:
The new wave of information and communication technology transformation relies on the concepts of the Internet of Things, Big Data and machine learning. These concepts will enable the connection and independent communication of a large number of devices, the processing of data that arises as a result of these processes and learning based on the refined information. Payment system is a sector that will experience major impacts by the coming changes. A large number of transactions create an information basis, whose analysis can provide precise inputs for business decision making. The subject of paper is the impact of managing a large amount of transactional data on key stakeholders in the payment process. The aim of the paper is to identify the key advantages and dangers that the Big Data concept will bring to the payment industry. The general conclusion is that the use of Big Data tools can facilitate the timely distribution of payment services and increase the security of transactions, but the price in the form of a loss of privacy is extremely high.
APA, Harvard, Vancouver, ISO, and other styles
44

Rani, Sasi Kala K., D. Ramya, D. Gokul, C. Sibiya, and S. Sreya. "Bitcoin: A Meticulous Analysis." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 786–92. http://dx.doi.org/10.1166/jctn.2019.7810.

Full text
Abstract:
Bitcoin is the worldwide crypto currency and it is the digital payment system known as the decentralized digital currency. All the transactions are recorded in a public ledger known as block chain. It has no central authority or no single administrator. This paper studies about the technical view of the bitcoin system, the problems faced in the peer-to-peer network, schemes used for improving the quality of transactions, and also the security issues faced by the user while proceeding with these transactions. It includes the major advantages of bitcoin transactions and its worldwide usage. The other side of bitcoin includes the usage of it in ransom ware attack and in other illegal activities. Finally this paper also comprises why bitcoin is not widely accepted in India.
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Le, Xuefeng Liu, and Xiaodong Lin. "A Fair and Privacy-Preserving Image Trading System Based on Blockchain and Group Signature." Security and Communication Networks 2021 (October 31, 2021): 1–18. http://dx.doi.org/10.1155/2021/5701258.

Full text
Abstract:
With the rise of digital images in our daily lives, there is a growing need to provide an image trading market where people can monetize their images and get desired images at prices that fit their budget. Those images are usually uploaded and stored onto centralized image trading service providers’ servers and the transactions for image trading are processed by these providers. Unfortunately, transaction unfairness and users’ privacy breaches have become major concerns since the service providers might be untrusted and able to manipulate image trading prices and infer users’ private information. Recently, several approaches have been proposed to address the unfairness issue by using the decentralized ledger technique and smart contract, but users’ privacy protection is not considered. In this paper, we propose a fair and privacy-preserving protocol that supports image fair exchange and protect user privacy. In particular, we exploit blockchain and Merkle tree to construct a fair image trading protocol with low communication overhead based on smart contract, which serves as an external judge that resolves disputes between buyers and sellers in image transactions. Moreover, we extend a popular short group signature scheme to protect users’ identity privacy, prevent linkability of transactions from being inferred, and ensure traceability of malicious users who may sell fake images and/or refuse to pay. Finally, we design and build a practical and open-source image trading system to evaluate the performance of our proposed protocol. Experimental results demonstrate its effectiveness and efficiency in real-world applications.
APA, Harvard, Vancouver, ISO, and other styles
46

Vanags, Jānis, Ineta Geipele, Auseklis Sarkans, and Didzis Usenieks. "Housing Heterogeneity Dimensions and Their Elements: a Systemic Approach." Baltic Journal of Real Estate Economics and Construction Management 5, no. 1 (November 27, 2017): 23–37. http://dx.doi.org/10.1515/bjreecm-2017-0003.

Full text
Abstract:
Abstract Housing market participants constantly face the housing heterogeneity - the technical and socio-economic differences of dwellings in a certain populated area. Housing heterogeneity often complicates the managerial decision making related to housing transactions, identification and objective evaluation of the quantitative and qualitative aspects of transactions. Housing heterogeneity is an objective phenomenon that implies housing uniqueness - housing distinguishing characteristics divided into specific and interconnected groups within the framework of the research. Most of these differences can be noticed by each market participant, but some of them can be identified only by experienced and professionally trained market participants. Theory and practice have demonstrated that the constituent groups of heterogeneity influence each other and take part in the formation of market value and transaction price of housing units. The increased housing construction intensity, the continuous modernisation of construction technologies and the diversification of building materials used in housing construction, as well as restriction of the building plot of land change the quantitative and qualitative aspects of heterogeneity dimensions. This poses considerable challenges to market participants in the managerial decision making process related to housing transactions. Research results demonstrate that the socio-economic elements of housing heterogeneity are constantly changing under the influence of the dominating factors of the external and internal environment. Therefore, nowadays, housing heterogeneity has become a major cause of information asymmetry, which means that heterogeneity is inherent in the formation of socio-economic market barriers in the housing market.
APA, Harvard, Vancouver, ISO, and other styles
47

Sudrajat, Ajat. "Pajak E-Commerce, Pemecahan dan Solusinya." Jurnal Pajak Vokasi (JUPASI) 2, no. 1 (November 2, 2020): 22–36. http://dx.doi.org/10.31334/jupasi.v2i1.1107.

Full text
Abstract:
Electronic or e-trade trading (English: Electronic Commerce, also e-commerce) is a spread, purchase, sales, marketing goods and services through an electronic system such as internet or television, www, or other computer networks. Ecommerce can involve electronic fund transfers, electronic data exchange, auto inventory management systems, and automatic data collection systems. The Information Technology industry sees this e-commerce activity as the application and application of e-business (e-business) related to commercial transactions, such as: electronic fund transfer, SCM (E-Marketing), e-marketing), online marketing, online transaction processing (online transaction processing), electronic data interchange / edi), etc.E-commerce is part of e-business, where e-business coverage is wider, not just a commerce but includes also co-entrance business partners, customer service, job vacancies etc. Seeing very fast developments of the e-commerce growth in the world including in Indonesia, it is necessary an effective strategy for the tax authority in the reacting. One of the things that need to be concern is this very rapid growth should be maintained so that there is no distortion as a result of taxation policy. During this time, the tax aspect in e-commerce has been the highlight of tax authorities in the world, especially whether there should be a new tax impression on this transaction and also how to align the existing tax rules with e-commerce development.Transactions through digital media or e-commerce in Indonesia need rebuilding from the side of the legislation (Cyberlaw) so that in the future do not miss the dispute in it runs. This happens because the difficulty of tracking the transactions used through the e-commerece is either B-to-B (business to business) or B-to-C (business to consumers). For example the relationship between the supplier with the factory, how the apparatus is to oversee the existence of transactions or not between the two through the e-commerce the solution of solving the problem is the government must take steps in solving the unstable internet infrastructure issues and frequent reliable transportation, the licensing procedure of customs to dedicate to the duty procedure from dawn to the negative trade for the other value to increase the efficacy to make the rules for the epimal services that are still under the regulations of the same bank as well as the public of the transactions of online transactions, plan and conduct the introduction of certification systems, a number of large players should be able to open the way of foreign investment, including doing some major plans for foreign investors, of course with clear regulations and the government must provide ease of rules for small and medium business to gain access to investors, and giving taxes to the company in the new company.
APA, Harvard, Vancouver, ISO, and other styles
48

Shao, S. W., X. Huang, L. X. Xiao, and H. Liu. "EXPLORING THE IMPACT OF REAL ESTATE POLICY ON REAL ESTATE TRADING USING THE TIME SERIES ANALYSIS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-3/W10 (February 8, 2020): 1281–87. http://dx.doi.org/10.5194/isprs-archives-xlii-3-w10-1281-2020.

Full text
Abstract:
Abstract. Housing price is a major issue affecting people's lives, but also closely related to the interests of the people themselves. Housing prices are affected by various factors, such as economic factors, population size factors, social factors, national policy factors, the internal factors of real estate and environmental factors. With the deepening of urbanization and the agglomeration of urban population in China, housing prices have been further accelerated. The Chinese government has also introduced a series of policies to limit real estate transactions and affect property prices. This paper also aims to explore a time series analysis method to analyse the impact of real estate policies on real estate prices. Firstly, the article searches for policy factors related to real estate through government official channels such as state, Prefecture and city, and analyses key words related to policy by means of natural language processing. Then, the real estate registration volume, transaction volume and transaction house price data which are arranged into time series are modelled using ARIMA time series model, and the data are processed according to scatter plot, autocorrelation function and partial autocorrelation function graph of the model to identify its stationarity. Finally, the LPPL (logarithmic periodic power) model and MPGA (multi-population genetic algorithm) are used to fit and detect turning points of real estate registration data, and the time series detection algorithm is used to obtain the inflection time nodes of the sequence, and then the relationship between real estate policy and real estate transactions is analysed. Taking the real estate registration data in Wuhan as an example, this paper validates the above time series analysis method. The results show that some real estate policies (such as purchase restriction policy, public rental policy, etc.) have a certain impact on real estate transactions in a short time. Part of the real estate policy (such as graduate security, settlement policy, etc.) does not have a significant impact on real estate transactions. To sum up, the government's brutal blockade of macro-control of the housing market cannot fundamentally solve the housing difficulties of the people, but also standardize the real estate market trading mechanism, innovate the market trading mode, so as to promote the long-term development of the housing market.
APA, Harvard, Vancouver, ISO, and other styles
49

Saini, Neha, and Prof Dr Arvind P. Bhanu. "Legal Issues Vis a Vis Online Contracts in Global Scenario." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 13, 2021): 4482–88. http://dx.doi.org/10.47059/revistageintec.v11i4.2474.

Full text
Abstract:
E-contract is a new phenomenon which has grown due to E Commerce. E commerce has created new domains which has no limits in terms of commercial & business transactions. There are no territorial limits in the domain of e-contracts. Physical presence is not a major requirement in e-contracts. However, at the same time the need to govern E contracts has also raised. E contracts are vital part of the E Commerce which cannot be left in vacuum or unregulated. There are major challenges which are posed while transacting at the electronic medium. These issues and challenges need to be addressed properly in order to create a safe and secure electronic platform. The current research paper shall be discussing the basics of e contracts with the major issues and challenges faced while contracting electronically. The author shall be incorporating a few suggestions at the end to secure electronic contracts regime.
APA, Harvard, Vancouver, ISO, and other styles
50

Sriram, M. S. "Information Asymmetry and Trust: A Framework for Studying Microfinance in India." Vikalpa: The Journal for Decision Makers 30, no. 4 (October 2005): 77–86. http://dx.doi.org/10.1177/0256090920050407.

Full text
Abstract:
In recent times, microfinance has emerged as a major innovation in the rural financial marketplace. Microfinance largely addresses the issue of access to financial services. In trying to understand the innovation of microfinance and how it has proved to be effective, the author looks at certain design features of microfinance. He first starts by identifying the need for financial service institutions which is basically to bridge the gap between the need for financial services across time, geographies, and risk profiles. In providing services that bridge this gap, formal institutions have limited access to authentic information both in terms of transaction history and expected behaviour and, therefore, resort to seeking excessive information thereby adding to the transaction costs. The innovation in microfinance has been largely to bridge this gap through a series of trustbased surrogates that take the transaction-related risks to the people who have the information — the community through measures of social collateral. In this paper, the author attempts to examine the trajectory of institutional intermediation in the rural areas, particularly with the poor and how it has evolved over a period of time. It identifies a systematic breach of trust as one of the major problems with the institutional interventions in the area of providing financial services to the poor and argues that microfinance uses trust as an effective mechanism to address one of the issues of imperfect information in financial transactions. The paper also distinguishes between the different models of microfinance and identifies which of these models use trust in a positivist frame and as a coercive mechanism. The specific objectives of the paper are to: Superimpose the role of trust in various types of exchanges and see how it impacts the effectiveness of repeated transactions. While greater access to information fosters trust and thus helps social networks to reduce transaction costs, there could be limits to which exchanges could solely depend on networks and trust. Look at the frontiers where mutual trust cannot work as a surrogate for lower appraisal costs. Use an example in the Canadian context and see how an entity that started on the basis of social networks and trust had to morph into using the techniques used by other formal nonneighbourhood institutions as it grew in size and went beyond a threshold. Using the Canadian example, the author argues that as the transactions get sophisticated, it is possible to achieve what informal networks have achieved through the creative use of information technology. While we find that the role of trust both in the positivist and the coercive frame does provide some interesting insights into how exchanges with the poor could be managed, there still could be breaches in the assumptions. This paper identifies the conditions under which the breaches could possibly happen and also speculates on the effect of such breaches.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography