The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Insurance plays a key role in the financial industry, and it is also of great importance for people's socio-economic life. Therefore, in this paper, we demonstrate on the problem of analyzing the operating performance of insurance companies, and it is crucial for modern financial industry development. Firstly, we design an index system for evaluating operating performance of insurance companies, which...
The division of the Association of Southeast Asian Nations (ASEAN) member states in South China Sea disputes brings up the question of how state coalitions form. Analysis of this issue often delves into specific factors such as the legality of territorial claims and each state's military and economic power. Generalized predictions of coalitions, however, require analysis of a variety of factors that...
Requirements engineers need to have a comprehensive requirements modeling framework for modeling legal requirements, particularly for privacy-related regulations, which are required for IT systems. The nature of law demands a special approach for dealing with the complexity of regulations. In this paper, we integrate different approaches for modeling legal requirements into one unified framework....
In this paper, we present an Algebraic Programming System in which the algebraic approach is used to formally prove the correctness or irregularity of tax actions for tax payers corresponding to tax laws. The given taxation example illustrates the application of this system to detect the tax code inconsistencies in the decisions made by the Ukrainian Taxation Office. The Algebraic Programming System...
Banking crime is one of the widespread phenomena in 2016 are closely associated with the used of computer-based technology and internet networks that constantly evolving. One of them is the burglary of customer accounts through the internet banking facility. To overcome this, we need a method of how to detect a conspiracy of bank burglary case of customer accounts. The way to scalable is by get a...
Use Integrated information systems involves an important process which is easy to get own budgets estimated and actual deviations of financial information, a strategy that supports the practice of transparency in professional sports clubs& There is a strong correlation between all of the information systems, where the system works to give the power of data and financial reports and are based on...
This paper describes the process to elicit and classify the requirements of a Big Data-as-a-service platform. The paper provides an overview of the analysis performed on the general requirements related to project goals, models' definition, and management, as well as on the legal aspects of a Big Data Campaign. The final aim is offering a proposition on the aspects that today users and stakeholders...
The reliable integration of decentralized energy technologies and the associated system transformations represent a challenging task. Taking into account existing cross-sectoral demand and supply structures, diverse communities require specific solutions. With an appropriate business model, municipal utilities might be capable to transform themselves in a successful way. For better decision-making,...
Smart Home deployment remains within the early adopter phase. In spite of relatively moderate penetration of the patronage and healthcare functionality in the already installed devices, this feature is considered as one of the highest potential drivers for Smart Home deployment. We suggest the complex approach for medical assistance based on Smart Home usage. We propose also how to organize the human...
Computer and mobile phone based crimes have increased alarmingly in India. From the unauthorized dissemination, keeping information systems secure from tampering and from unauthorized removals are the need of the hour, otherwise, the incidents of hacking, data theft, cyber bullying and now cyber extortion as well has kept the cyber security team on its toes. For this a majority of the respondents...
This study aims to investigate the impact of investor protection on external financing. In developing economies like Pakistan, companies having foreign ownership have more access towards external finance as compared to companies having domestic ownership. Data extracted from 70 non-financial sector companies for the period 2003–2013, was analyzed by using fixed effect model. The findings showed that...
The gas crisis that occurred between members of European Union (EU), Ukraine, and Russia in 2006 is strategically investigated using the Graph Model for Conflict Resolution (GMCR). The interdependency and geopolitics of the natural gas supply and demand within Europe is a sophisticated subject. Strategic insights are derived from the review and analysis of the conflict history. The European gas dependency...
For adapting functionality to individual users, systems need interest prediction information of these users. Social media provides opportunities to gather mass user data for this purpose. To effectively extract user interests, this paper proposes a hybrid user modeling approach which integrates isolated interests discovery via text analysis into the social relationship-based method by community detection...
This paper begins with analyzing the current situation of China's security management, elaborates the importance of determining secret-related personnel and management. On the current status of secret-related personnel qualification job analysis, in-depth qualification of secret-related personnel and management to achieve the inquiry, the fuzzy comprehensive evaluation method applied to specific secret-related...
The game of Go is an ancient board game. In this game, players aim to capture the stones of their opponent by enclosing them. One possible condition for a stone is described as "safe". A safe stone can never be captured. This has been represented with a static determination by Benson [1]. In this paper, we analyze this determination mathematically, using the BW graph model that was introduced...
Auditing the execution of business processes is becoming a critical issue for organizations. Conformance checking has been proposed as a viable approach to analyze process executions with respect to a process model. In particular, alignments provide a robust approach to conformance checking in that they are able to pinpoint the causes of nonconformity. Alignment-based techniques usually rely on a...
Emerging cyberjustice systems are in need of relevant requirements engineering approaches, for example, to provide citizens with better access to the judicial system. In this context, this paper proposes the use of goal modeling for developing Online Dispute Resolution (ODR) systems in Canada. With ODR, the use of technology has the potential of increasing access to justice at low cost. We argue that...
Analyzing accountability violations and identifying the guilty party is a challenging process especially where multiple tenants are hosted by a single application instance. To handle this issue, we propose an approach for accountability violation analysis. It is based on service patterns as an abstract model to provide reusable and suitable description of the different characteristics of the analysis...
Three approaches to better understanding conflict resolution results are discussed and applied to a trans-boundary water conflict between the United States and Canada. A decision support system, called GMCR+, is utilized to carry out the analysis and provide strategic insights. These approaches will improve and simplify the analysis process especially for larger conflict models.
Several models have been proposed to represent conditional executions and dependencies among real-time concurrent tasks for the purpose of schedulability analysis. Among them, task graphs with cyclic recurrent behavior, i.e., those modeled with a single source vertex and a period parameter specifying the minimum amount of time that must elapse between successive activations of the source job, allow...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.