CINXE.COM
Search results for: online transaction
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: online transaction</title> <meta name="description" content="Search results for: online transaction"> <meta name="keywords" content="online transaction"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="online transaction" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="online transaction"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2876</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: online transaction</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2876</span> Supplier Relationship Management Model for Sme’s E-Commerce Transaction Broker Case Study: Hotel Rooms Provider</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Veronica%20S.%20Moertini">Veronica S. Moertini</a>, <a href="https://publications.waset.org/abstracts/search?q=Niko%20Ibrahim"> Niko Ibrahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Verliyantina"> Verliyantina</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As market intermediary firms, e-commerce transaction broker firms need to strongly collaborate with suppliers in order to develop brands seek by customers. Developing suitable electronic Supplier Relationship Management (e-SRM) system is the solution to the need. In this paper, we propose our concept of e-SRM for transaction brokers owned by small medium enterprises (SMEs), which includes the integrated e-SRM and e-CRM architecture, the e-SRM applications with their functions. We then discuss the customization and implementation of the proposed e-SRM model in a specific transaction broker selling hotel rooms, which owned by an SME, KlikHotel.com. The implementation of the e-SRM in KlikHotel.com has been successfully boosting the number of suppliers (hotel members) and hotel room sales. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-CRM" title="e-CRM">e-CRM</a>, <a href="https://publications.waset.org/abstracts/search?q=e-SRM" title=" e-SRM"> e-SRM</a>, <a href="https://publications.waset.org/abstracts/search?q=SME" title=" SME"> SME</a>, <a href="https://publications.waset.org/abstracts/search?q=transaction%20broker" title=" transaction broker"> transaction broker</a> </p> <a href="https://publications.waset.org/abstracts/16293/supplier-relationship-management-model-for-smes-e-commerce-transaction-broker-case-study-hotel-rooms-provider" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16293.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">500</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2875</span> Investigation of Compliance of the Prevailing Import Murabah'a to Sharia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aqeel%20Akhtar">Aqeel Akhtar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of prevailing modes of finance in emerging Islamic banking system is Murabah’a; a financial transaction in which cost and profit both must be recognized by buyer. Otherwise the transaction would become invalid. In this mainstream, import Murabah’a transaction is divergent in such a way that the cost is not recognized and identified due to execution of import transaction in foreign currency i.e. US Dollar and the next transaction of Murabaha’a with the client is executed in local currency. Since this transaction is executed in dual currency i.e. bank pays supplier in foreign currency and executes Murabah’a with its client in local currency and it is not allowed in according to Islamic Injunctions as mentioned in hadith narrated by Hazrat Ibn-e-Umar (May Allah be pleased with them) used to sell his camels with Dirhams and take dinars instead and vice versa. Upon revealing before the Prophet (SAW), he was advised that it must not be contingent in the agreement and the ready rate would be applied and possession of one of the consideration is compulsory. The solution in this regard is that the import Murabah’a transaction should be in single currency, however, other currency can be paid in payment at the time of payment in a very indispensable situation provided that ready rate would be applied. Moreover, some of other solutions have also been given in this regard. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=shariah%20compliance" title="shariah compliance">shariah compliance</a>, <a href="https://publications.waset.org/abstracts/search?q=import%20murabaha" title=" import murabaha"> import murabaha</a>, <a href="https://publications.waset.org/abstracts/search?q=islamic%20banking" title=" islamic banking"> islamic banking</a>, <a href="https://publications.waset.org/abstracts/search?q=product%20development" title=" product development"> product development</a> </p> <a href="https://publications.waset.org/abstracts/40148/investigation-of-compliance-of-the-prevailing-import-murabaha-to-sharia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40148.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2874</span> Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarthak%20Mishra">Sarthak Mishra</a>, <a href="https://publications.waset.org/abstracts/search?q=Astha%20Sinha"> Astha Sinha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business-business%20transaction%20%28B2B%29" title="business-business transaction (B2B)">business-business transaction (B2B)</a>, <a href="https://publications.waset.org/abstracts/search?q=business-consumer%20transaction%20%28B2C%29" title=" business-consumer transaction (B2C)"> business-consumer transaction (B2C)</a>, <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title=" e-commerce"> e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20transaction" title=" online transaction"> online transaction</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20and%20security%20threats" title=" privacy and security threats"> privacy and security threats</a> </p> <a href="https://publications.waset.org/abstracts/53081/securing-the-electronic-commerce-the-way-forward-a-comparative-ananlysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53081.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">232</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2873</span> Bank ATM Monitoring System Using IR Sensor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Saravanakumar">P. Saravanakumar</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Raja"> N. Raja</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Rameshkumar"> M. Rameshkumar</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Mohankumar"> D. Mohankumar</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Sateeshkumar"> R. Sateeshkumar</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Maheshwari"> B. Maheshwari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research work is designed using Microsoft VB. Net as front end and MySQL as back end. The project deals with secure the user transaction in the ATM system. This application contains the option for sending the failed transaction details to the particular customer by using the SMS. When the customer withdraws the amount from the Bank ATM system, sometimes the amount will not be dispatched but the amount will be debited to the particular account. This application is used to avoid this type of problems in the ATM system. In this proposed system using IR technique to detect the dispatched amount. IR Transmitter and IR Receiver are placed in the path of cash dispatch. It is connected each other through the IR signal. When the customers withdraw the amount in the ATM system then the amount will be dispatched or not is monitored by IR Receiver. If the amount will be dispatched then the signal will be interrupted between the IR Receiver and the IR Transmitter. At that time, the monitoring system will be reduced their particular withdraw amount on their account. If the cash will not be dispatched, the signal will not be interrupted, at that time the particular withdraw amount will not be reduced their account. If the transaction completed successfully, the transaction details such as withdraw amount and current balance can be sent to the customer via the SMS. If the transaction fails, the transaction failed message can be send to the customer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ATM%20system" title="ATM system">ATM system</a>, <a href="https://publications.waset.org/abstracts/search?q=monitoring%20system" title=" monitoring system"> monitoring system</a>, <a href="https://publications.waset.org/abstracts/search?q=IR%20Transmitter" title=" IR Transmitter"> IR Transmitter</a>, <a href="https://publications.waset.org/abstracts/search?q=IR%20Receiver" title=" IR Receiver"> IR Receiver</a> </p> <a href="https://publications.waset.org/abstracts/1706/bank-atm-monitoring-system-using-ir-sensor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">310</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2872</span> Factors of Social Media Platforms on Consumer Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zebider%20Asire%20Munyelet">Zebider Asire Munyelet</a>, <a href="https://publications.waset.org/abstracts/search?q=Yibeltal%20Chanie%20Manie"> Yibeltal Chanie Manie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the modern digital landscape, the increase of social media platforms has become identical to the evolution of online consumer behavior. This study investigates the complicated relationship between social media and the purchasing decisions of online buyers. Through an extensive review of existing literature and empirical research, the aim is to comprehensively analyze the multidimensional impact that social media exerts on the various stages of the online buyer's journey. The investigation encompasses the exploration of how social media platforms serve as influential channels for information dissemination, product discovery, and consumer engagement. Additionally, the study investigates into the psychological aspects underlying the role of social media in shaping buyer preferences, perceptions, and trust in online transactions. The methodologies employed include both quantitative and qualitative analyses, incorporating surveys, interviews, and data analytics to derive meaningful insights. Statistical models are applied to distinguish patterns in online buyer behavior concerning product awareness, brand loyalty, and decision-making processes. The expected outcomes of this research contribute not only to the academic understanding of the dynamic interplay between social media and online buyer behavior but also offer practical implications for marketers, e-commerce platforms, and policymakers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=consumer%20Behavior" title="consumer Behavior">consumer Behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20purchasing" title=" online purchasing"> online purchasing</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20transaction" title=" online transaction"> online transaction</a> </p> <a href="https://publications.waset.org/abstracts/177166/factors-of-social-media-platforms-on-consumer-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177166.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2871</span> A Study on Al-Riba Al-Hukmi and Its Instances from View of Islam</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abolfazl%20Alishahi%20Ghalehjoughi">Abolfazl Alishahi Ghalehjoughi</a>, <a href="https://publications.waset.org/abstracts/search?q=Bi%20Bi%20Zeinab%20Hoseni"> Bi Bi Zeinab Hoseni </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Islam is a comprehensive religion, and has rules for any thing. Islam attaches respect and importance to properties as well, and outlaws some types of transaction. A type of transaction that is strictly forbidden by the Islam is riba (usury), for which special punishments is considered in the Qur’an and hadiths. Usury is divided into (riba qarzi) loan usury and riba muamili (transaction usury); sometimes, in transaction and interest free loan contracts, ziyadah aini (interest in kind and of the same kind as that of the object of transaction) is not stipulated, but performance of work, provision of an advantage or a service, or a respite is stipulated, in which case although no ziyadah aini is in place, the transaction still constitutes usury and is outlaw. For instance, if a bank stipulates in an interest free loan contract that it pays a person the interest free loan only if he/she deposits a sum in the bank, this is an instance of riba hukmi. Or, for muamilah sarfi (transaction is which object of transaction and consideration is gold or silver) to be legitimate, it necessary that both the object of transaction and the consideration be handed over between the parties, because if a party takes delivery of the considered or object of transaction while the other party does not, the party who has taken delivery will accrue a benefit, as he/she wins time until he/she makes delivery to the other party, and this tantamount to usury in muamilah sarfi. Or, if a person lends a sum to another person, while the lender is indebted to the borrower, if the lender stipulates that he/she lends such amount only if the borrower postpones the maturity date of the lender’s debt to borrower, which is in one month, for a particular period of time, such loan will constitute usury. This research first provides views on riba hukmi, and then proceeds to analysis of views, trying to study fundamentals and proof regarding prohibition of riba hukmi, and to analyze instances of riba hukmi according to religious and hadith books. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islam" title="Islam">Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=riba" title=" riba"> riba</a>, <a href="https://publications.waset.org/abstracts/search?q=prohibition" title=" prohibition"> prohibition</a>, <a href="https://publications.waset.org/abstracts/search?q=riba%20hukmi" title=" riba hukmi"> riba hukmi</a> </p> <a href="https://publications.waset.org/abstracts/15362/a-study-on-al-riba-al-hukmi-and-its-instances-from-view-of-islam" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15362.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">371</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2870</span> Modeling and Analyzing the WAP Class 2 Wireless Transaction Protocol Using Event-B </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rajaa%20Filali">Rajaa Filali</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Bouhdadi"> Mohamed Bouhdadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents an incremental formal development of the Wireless Transaction Protocol (WTP) in Event-B. WTP is part of the Wireless Application Protocol (WAP) architectures and provides a reliable request-response service. To model and verify the protocol, we use the formal technique Event-B which provides an accessible and rigorous development method. This interaction between modelling and proving reduces the complexity and helps to eliminate misunderstandings, inconsistencies, and specification gaps. As result, verification of WTP allows us to find some deficiencies in the current specification. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=event-B" title="event-B">event-B</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20transaction%20protocol" title=" wireless transaction protocol"> wireless transaction protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=proof%20obligation" title=" proof obligation"> proof obligation</a>, <a href="https://publications.waset.org/abstracts/search?q=refinement" title=" refinement"> refinement</a>, <a href="https://publications.waset.org/abstracts/search?q=Rodin" title=" Rodin"> Rodin</a>, <a href="https://publications.waset.org/abstracts/search?q=ProB" title=" ProB"> ProB</a> </p> <a href="https://publications.waset.org/abstracts/73221/modeling-and-analyzing-the-wap-class-2-wireless-transaction-protocol-using-event-b" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73221.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">317</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2869</span> The Impact of Transaction Costs on Rebalancing an Investment Portfolio in Portfolio Optimization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B.%20Marasovi%C4%87">B. Marasović</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Pivac"> S. Pivac</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20V.%20Vukasovi%C4%87"> S. V. Vukasović</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Constructing a portfolio of investments is one of the most significant financial decisions facing individuals and institutions. In accordance with the modern portfolio theory maximization of return at minimal risk should be the investment goal of any successful investor. In addition, the costs incurred when setting up a new portfolio or rebalancing an existing portfolio must be included in any realistic analysis. In this paper rebalancing an investment portfolio in the presence of transaction costs on the Croatian capital market is analyzed. The model applied in the paper is an extension of the standard portfolio mean-variance optimization model in which transaction costs are incurred to rebalance an investment portfolio. This model allows different costs for different securities, and different costs for buying and selling. In order to find efficient portfolio, using this model, first, the solution of quadratic programming problem of similar size to the Markowitz model, and then the solution of a linear programming problem have to be found. Furthermore, in the paper the impact of transaction costs on the efficient frontier is investigated. Moreover, it is shown that global minimum variance portfolio on the efficient frontier always has the same level of the risk regardless of the amount of transaction costs. Although efficient frontier position depends of both transaction costs amount and initial portfolio it can be concluded that extreme right portfolio on the efficient frontier always contains only one stock with the highest expected return and the highest risk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Croatian%20capital%20market" title="Croatian capital market">Croatian capital market</a>, <a href="https://publications.waset.org/abstracts/search?q=Markowitz%20model" title=" Markowitz model"> Markowitz model</a>, <a href="https://publications.waset.org/abstracts/search?q=fractional%20quadratic%20programming" title=" fractional quadratic programming"> fractional quadratic programming</a>, <a href="https://publications.waset.org/abstracts/search?q=portfolio%20optimization" title=" portfolio optimization"> portfolio optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=transaction%20costs" title=" transaction costs"> transaction costs</a> </p> <a href="https://publications.waset.org/abstracts/21383/the-impact-of-transaction-costs-on-rebalancing-an-investment-portfolio-in-portfolio-optimization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21383.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2868</span> Blame Classification through N-Grams in E-Commerce Customer Reviews</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Subhadeep%20Mandal">Subhadeep Mandal</a>, <a href="https://publications.waset.org/abstracts/search?q=Sujoy%20Bhattacharya"> Sujoy Bhattacharya</a>, <a href="https://publications.waset.org/abstracts/search?q=Pabitra%20Mitra"> Pabitra Mitra</a>, <a href="https://publications.waset.org/abstracts/search?q=Diya%20Guha%20Roy"> Diya Guha Roy</a>, <a href="https://publications.waset.org/abstracts/search?q=Seema%20Bhattacharya"> Seema Bhattacharya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> E-commerce firms allow customers to evaluate and review the things they buy as a positive or bad experience. The e-commerce transaction processes are made up of a variety of diverse organizations and activities that operate independently but are connected together to complete the transaction (from placing an order to the goods reaching the client). After a negative shopping experience, clients frequently disregard the critical assessment of these businesses and submit their feedback on an all-over basis, which benefits certain enterprises but is tedious for others. In this article, we solely dealt with negative reviews and attempted to distinguish between negative reviews where the e-commerce firm is explicitly blamed by customers for a bad purchasing experience and other negative reviews. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title="e-commerce">e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20shopping" title=" online shopping"> online shopping</a>, <a href="https://publications.waset.org/abstracts/search?q=customer%20reviews" title=" customer reviews"> customer reviews</a>, <a href="https://publications.waset.org/abstracts/search?q=customer%20behaviour" title=" customer behaviour"> customer behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=text%20analytics" title=" text analytics"> text analytics</a>, <a href="https://publications.waset.org/abstracts/search?q=n-grams%20classification" title=" n-grams classification"> n-grams classification</a> </p> <a href="https://publications.waset.org/abstracts/168088/blame-classification-through-n-grams-in-e-commerce-customer-reviews" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168088.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">257</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2867</span> Implicit Transaction Costs and the Fundamental Theorems of Asset Pricing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erindi%20Allaj">Erindi Allaj</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper studies arbitrage pricing theory in financial markets with transaction costs. We extend the existing theory to include the more realistic possibility that the price at which the investors trade is dependent on the traded volume. The investors in the market always buy at the ask and sell at the bid price. Transaction costs are composed of two terms, one is able to capture the implicit transaction costs and the other the price impact. Moreover, a new definition of a self-financing portfolio is obtained. The self-financing condition suggests that continuous trading is possible, but is restricted to predictable trading strategies which have left and right limit and finite quadratic variation. That is, predictable trading strategies of infinite variation and of finite quadratic variation are allowed in our setting. Within this framework, the existence of an equivalent probability measure is equivalent to the absence of arbitrage opportunities, so that the first fundamental theorem of asset pricing (FFTAP) holds. It is also proved that, when this probability measure is unique, any contingent claim in the market is hedgeable in an L2-sense. The price of any contingent claim is equal to the risk-neutral price. To better understand how to apply the theory proposed we provide an example with linear transaction costs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arbitrage%20pricing%20theory" title="arbitrage pricing theory">arbitrage pricing theory</a>, <a href="https://publications.waset.org/abstracts/search?q=%01transaction%20costs" title=" transaction costs"> transaction costs</a>, <a href="https://publications.waset.org/abstracts/search?q=fundamental%20theorems%20of%20arbitrage" title=" fundamental theorems of arbitrage"> fundamental theorems of arbitrage</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20markets" title=" financial markets"> financial markets</a> </p> <a href="https://publications.waset.org/abstracts/11705/implicit-transaction-costs-and-the-fundamental-theorems-of-asset-pricing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11705.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">360</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2866</span> User-Based Cannibalization Mitigation in an Online Marketplace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vivian%20Guo">Vivian Guo</a>, <a href="https://publications.waset.org/abstracts/search?q=Yan%20Qu"> Yan Qu </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Online marketplaces are not only digital places where consumers buy and sell merchandise, and they are also destinations for brands to connect with real consumers at the moment when customers are in the shopping mindset. For many marketplaces, brands have been important partners through advertising. There can be, however, a risk of advertising impacting a consumer’s shopping journey if it hurts the use experience or takes the user away from the site. Both could lead to the loss of transaction revenue for the marketplace. In this paper, we present user-based methods for cannibalization control by selectively turning off ads to users who are likely to be cannibalized by ads subject to business objectives. We present ways of measuring cannibalization of advertising in the context of an online marketplace and propose novel ways of measuring cannibalization through purchase propensity and uplift modeling. A/B testing has shown that our methods can significantly improve user purchase and engagement metrics while operating within business objectives. To our knowledge, this is the first paper that addresses cannibalization mitigation at the user-level in the context of advertising. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cannibalization" title="cannibalization">cannibalization</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20marketplace" title=" online marketplace"> online marketplace</a>, <a href="https://publications.waset.org/abstracts/search?q=revenue%20optimization" title=" revenue optimization"> revenue optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=yield%20optimization" title=" yield optimization"> yield optimization</a> </p> <a href="https://publications.waset.org/abstracts/82203/user-based-cannibalization-mitigation-in-an-online-marketplace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82203.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2865</span> Optimal Hedging of a Portfolio of European Options in an Extended Binomial Model under Proportional Transaction Costs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Norm%20Josephy">Norm Josephy</a>, <a href="https://publications.waset.org/abstracts/search?q=Lucy%20Kimball"> Lucy Kimball</a>, <a href="https://publications.waset.org/abstracts/search?q=Victoria%20Steblovskaya"> Victoria Steblovskaya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hedging of a portfolio of European options under proportional transaction costs is considered. Our discrete time financial market model extends the binomial market model with transaction costs to the case where the underlying stock price ratios are distributed over a bounded interval rather than over a two-point set. An optimal hedging strategy is chosen from a set of admissible non-self-financing hedging strategies. Our approach to optimal hedging of a portfolio of options is based on theoretical foundation that includes determination of a no-arbitrage option price interval as well as on properties of the non-self-financing strategies and their residuals. A computational algorithm for optimizing an investor relevant criterion over the set of admissible non-self-financing hedging strategies is developed. Applicability of our approach is demonstrated using both simulated data and real market data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=extended%20binomial%20model" title="extended binomial model">extended binomial model</a>, <a href="https://publications.waset.org/abstracts/search?q=non-self-financing%20hedging" title=" non-self-financing hedging"> non-self-financing hedging</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=proportional%20transaction%20costs" title=" proportional transaction costs"> proportional transaction costs</a> </p> <a href="https://publications.waset.org/abstracts/83333/optimal-hedging-of-a-portfolio-of-european-options-in-an-extended-binomial-model-under-proportional-transaction-costs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83333.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2864</span> A Study on the Relationship between Transaction Fairness, Social Capital, Supply Chain Integration and Sustainability: Focusing on Manufacturing Companies of South Korea</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sung-Min%20Park">Sung-Min Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Chan%20Kwon%20Park"> Chan Kwon Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Chae-Bogk%20Kim"> Chae-Bogk Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this study is to analyze the relationship between transaction fairness, social capital, supply chain integration and sustainability. Based on the previous studies, measurement items were determined by using SPSS 22 and exploratory factor analysis was performed, and again, using AMOS 21 for confirmatory factor analysis and path analysis was performed by using study items that satisfy reliability, validity, and appropriateness of measurement model. It has shown that transaction fairness has a (+) significant effect on social capital, social capital on supply chain integration, supply chain integration on economic sustainability and social sustainability, and has a (+), but not significant effect on environmental sustainability. It has shown that supply chain integration has been proven to play a role as a parameter between social capital and economic and social sustainability, but not as a parameter between environmental sustainability. Through this study, it is suggested that clearly examining the relationship between fairness of trade, social capital, supply chain integration and sustainability, maintaining fairness of the transaction make formation of social capital, and further integration of supply chain, and achieve sustainability of entire supply chain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=transaction%20fairness" title="transaction fairness">transaction fairness</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20capital" title=" social capital"> social capital</a>, <a href="https://publications.waset.org/abstracts/search?q=supply%20chain%20integration" title=" supply chain integration"> supply chain integration</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainability" title=" sustainability"> sustainability</a> </p> <a href="https://publications.waset.org/abstracts/74486/a-study-on-the-relationship-between-transaction-fairness-social-capital-supply-chain-integration-and-sustainability-focusing-on-manufacturing-companies-of-south-korea" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74486.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">441</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2863</span> Developers’ Gains and Losses from the Economic Incentives of Green Building: Explanations from the Transitional Gains Trap and Transaction Cost Economics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ke%20Fan">Ke Fan</a>, <a href="https://publications.waset.org/abstracts/search?q=Edwin%20H.%20W.%20Chan"> Edwin H. W. Chan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Economic incentives of green building (GB) have been implemented to promote green building and address the market barriers. However, if developers could gain from the incentives, why not all the buildings are green? This paper aims to study this problem and provide a new perspective to look at the economic incentives. The theories of Transitional Gains Trap (TGP) and Transaction Cost Economics (TCE) are employed to explain the developers’ gains and losses from the economic incentives. This paper takes the GFA (gross floor area) concession incentive in Hong Kong, which is one of the most popular incentives, as the case to conduct in-depth case study and it did interview to validate the results. The results show that after implementing the GFA concession scheme, the benefit of the GFA concession is capitalized into land value. Therefore, developers have to bear the increased land cost, which supports the theory of the TGP. Even though, some developers are still not willing to participate in the incentive scheme because of high transaction costs (TCs). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=green%20building" title="green building">green building</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20incentives" title=" economic incentives"> economic incentives</a>, <a href="https://publications.waset.org/abstracts/search?q=transitional%20gains%20trap" title=" transitional gains trap"> transitional gains trap</a>, <a href="https://publications.waset.org/abstracts/search?q=transaction%20cost" title=" transaction cost"> transaction cost</a> </p> <a href="https://publications.waset.org/abstracts/61235/developers-gains-and-losses-from-the-economic-incentives-of-green-building-explanations-from-the-transitional-gains-trap-and-transaction-cost-economics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61235.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">291</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2862</span> The Impact of Bitcoin and Cryptocurrency on the Development of Community</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Felib%20Ayman%20Shawky%20Salem">Felib Ayman Shawky Salem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title="cryptocurrency">cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title=" bitcoin"> bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=payment%20methods" title=" payment methods"> payment methods</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=appropriation" title=" appropriation"> appropriation</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20retailers" title=" online retailers"> online retailers</a>, <a href="https://publications.waset.org/abstracts/search?q=TOE%20framework" title=" TOE framework"> TOE framework</a>, <a href="https://publications.waset.org/abstracts/search?q=disappropriation" title=" disappropriation"> disappropriation</a>, <a href="https://publications.waset.org/abstracts/search?q=non-appropriationBitCoin" title=" non-appropriationBitCoin"> non-appropriationBitCoin</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20protection" title=" financial protection"> financial protection</a>, <a href="https://publications.waset.org/abstracts/search?q=crypto%20currency" title=" crypto currency"> crypto currency</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering%20cryptocurrency" title=" money laundering cryptocurrency"> money laundering cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20wallet" title=" digital wallet"> digital wallet</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a> </p> <a href="https://publications.waset.org/abstracts/186455/the-impact-of-bitcoin-and-cryptocurrency-on-the-development-of-community" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186455.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">41</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2861</span> Impact of E-Commerce Logistics Service Quality on Online Customer Satisfaction in UAE</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Leena%20Wanganoo">Leena Wanganoo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this digital age with the mushrooming of online companies across the globe has led to an unprecedented new business model. The frequency of online purchasing varies across the globe, but trend shows a steep upward movement. From Generation X to the Millennial the consumer not only wants to order the product with the click of mouse but also very demanding service quality during pre to post-transaction stage. The existing research examines the impact of website quality on the on behavioral intentions in e-services customers and has not adequately recognized the quality of e-commerce logistics perceived by the customer.In order to address this gap, this study examines the relationship among the logistics service quality, satisfaction, and loyalty. Drawing upon a sample of 350 millennial customers from various regions of UAE will work within the framework of structural equation modeling (SEM). Finally, the study would use Importance-Performance analysis (IPA) to discuss the relations of the level of customers’ expected logistics service quality and level of customers’ perceived logistics serviced quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=logistics%20service%20quality" title="logistics service quality">logistics service quality</a>, <a href="https://publications.waset.org/abstracts/search?q=customer%20satisfaction" title=" customer satisfaction"> customer satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=loyalty" title=" loyalty"> loyalty</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20commerce" title=" electronic commerce"> electronic commerce</a> </p> <a href="https://publications.waset.org/abstracts/84406/impact-of-e-commerce-logistics-service-quality-on-online-customer-satisfaction-in-uae" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84406.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2860</span> The Role of Validity and Reliability in the Development of Online Testing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ani%20Demetrashvili">Ani Demetrashvili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to show how students trust online tests and determine validity and reliability in the development of online testing. The pandemic situation changed every field in the world, and it changed education as well. Educational institutions moved into the online space, which was the only decision they were able to make at that time. Online assessment through online proctoring was a totally new challenge for educational institutions, and they needed to deal with it successfully. Participants were chosen from the English language center. The validity of the questionnaire was identified according to the Likert scale and Cronbach’s alpha; later, data from the participants was analyzed as well. The article summarizes literature that is available about online assessment and is interesting for people who are interested in this kind of assessment. Based on the research findings, students favor in-person testing over online assessment due to their lack of experience and skills in the latter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=online%20assessment" title="online assessment">online assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20proctoring" title=" online proctoring"> online proctoring</a> </p> <a href="https://publications.waset.org/abstracts/187376/the-role-of-validity-and-reliability-in-the-development-of-online-testing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187376.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">40</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2859</span> A Study on the Interest of Muslims towards Syariah Bank in Yogyakarta, Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Hikmah">Muhammad Hikmah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Based on the population census in 2015, Indonesia consists of 254.9 millions of people, and 80% of them are Muslims (Data of Central Bureau of Statistic). Indonesia becomes the highest number of Muslims civilization in the world. The question would be, is the number of population proportional to the growth of Syariah transaction in Indonesia? It is going to be discussed in this research. The problem limitation of this research is in Syariah Banking. Therefore, Syariah transaction in this study is described as transaction only in Syariah Banking. The researcher focused on the study in Yogyakarta, a city in Indonesia. The development of Syariah Bank assets until January 2016, based on statistic data launched by Financial Services Authority (FSA), has increased Rp 287.44 trillion, however, a total amount of bank achieves Rp 6.198,15 trillions. It means that the assets of Syariah Bank are only 4.64% from the total amount of banking assets in Indonesia, though, Syariah Banking was first established in 1991, known as Bank Muamalat. As we can see that in these 25 years, Syariah Banking could only reach that number. Based on the press conference of FSA and Syariah Banking Exhibition iB Vaganza in 2015, the number of Syariah Bank’s customers are under 10 millions. With 80% of Muslims, Syariah Bank is not able to be a market leader in Indonesia. This will be answered in this research, how much the interest if Muslims in Yogyakarta towards Syariah Bank compared to conventional bank. This study will be conducted in Yogyakarta. The sampling will represent to the muslims having good knowledge of Islam, such as dawn prayer worshipers in some mosques in Yogyakarta. There are some reasons why Indonesian muslims are not interested in Syariah Bank, such as the people do not put trust in Syariah Bank; there are some obligation where they work to have conventional bank; business matters services which is not covered by Syariah Bank where most of them are limited to the laws authorities; and there is no sufficient knowledge about the importance of syariah transaction from religion point of view. Each of them is going to be discussed in this research. The suggestions of this study are we should share our knowledge about Islamic transaction anywhere and we need to support Syariah Bank to have Syariah principles. For those who have the authority should be active as well to announce the rules of the constitution supporting the development of syariah transaction in order to be apply perfectly. We hope that trust from the people will increase, and we should provide Syariah Banking products which fulfill business needs. Finally, syariah transaction will be the solution for all people in the world in bussiness transaction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=shariah" title="shariah">shariah</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic" title=" Islamic"> Islamic</a>, <a href="https://publications.waset.org/abstracts/search?q=banking" title=" banking"> banking</a>, <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title=" Indonesia"> Indonesia</a> </p> <a href="https://publications.waset.org/abstracts/50241/a-study-on-the-interest-of-muslims-towards-syariah-bank-in-yogyakarta-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2858</span> Appraisal of Transaction Cost in South African Construction Projects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kenneth%20O.%20Otasowie">Kenneth O. Otasowie</a>, <a href="https://publications.waset.org/abstracts/search?q=Matthew%20Ikuabe"> Matthew Ikuabe</a>, <a href="https://publications.waset.org/abstracts/search?q=Clinton%20Aigbavboa"> Clinton Aigbavboa</a>, <a href="https://publications.waset.org/abstracts/search?q=Ayodeji%20Oke"> Ayodeji Oke</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Construction project cost are not only made up of production costs. This cost comprises of many other elements such as the preparation of a bidding document, cost estimations, drafting contractual agreements and monitoring that contractual obligations are met. Several studies have stressed the need for transaction costs (TC) to be defined in a way that covers all phases of a project and not only the pre-contract phase. Hence, this study aims to appraise transaction cost in South African (SA) construction projects by assessing what constitutes transaction cost, influencing factors and possible optimisation measures. A survey design was adopted. A total number of eighty (80) questionnaires were administered to quantity surveyors, procurement managers and project managers in Guateng Province, SA and seventy-two (72) were returned and found suitable for analysis. Collected data was analysed using percentage, mean item score, standard deviation, one-sample t-test. The findings show that external technical interaction, uncertainty, human factors are the most significant constituents of TC in SA, while technical competency, experience in similar project type and project characteristics are the leading influencing factors. Furthermore, understanding project characteristics, clear communication and technically competent project teams are most of the significant measures for optimising TC in SA construction projects. Therefore, this study recommends that a competent project team and a clear communication are fundamental to proper management of TC in SA construction projects. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construction%20projects" title="construction projects">construction projects</a>, <a href="https://publications.waset.org/abstracts/search?q=project%20cost" title=" project cost"> project cost</a>, <a href="https://publications.waset.org/abstracts/search?q=South%20Africa" title=" South Africa"> South Africa</a>, <a href="https://publications.waset.org/abstracts/search?q=transaction%20cost" title=" transaction cost"> transaction cost</a> </p> <a href="https://publications.waset.org/abstracts/157479/appraisal-of-transaction-cost-in-south-african-construction-projects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157479.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2857</span> Fear of Isolation, Online Efficacy, and Selective Exposure in Online Political Discourse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kyujin%20Shim">Kyujin Shim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores how individual motivations in political psychology will lead to political expression and online discourse, and how those online political discourses result in individuals’ exposure to extreme/ personally-entertaining/ disinhibiting content. This study argues that a new framework beyond the conventional paradigm (e.g., selective exposure based on partisanship/ ideology) is needed for better grasp of non-ideological/ anarchic, and/or of nonpartisan yet anonymity-/ extremity-/ disinhibition-related online behaviors regarding political conversations. Further, this study proposes a new definition of ‘selective exposure,’ with special attention to online efficacy and psychological motivations/gratifications sought in the online sphere. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=selective%20exposure" title="selective exposure">selective exposure</a>, <a href="https://publications.waset.org/abstracts/search?q=fear%20of%20isolation" title=" fear of isolation"> fear of isolation</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20psychology" title=" political psychology"> political psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20discourse" title=" online discourse"> online discourse</a> </p> <a href="https://publications.waset.org/abstracts/57638/fear-of-isolation-online-efficacy-and-selective-exposure-in-online-political-discourse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2856</span> Time, Uncertainty, and Technological Innovation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xavier%20Everaert">Xavier Everaert</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ever since the publication of “The Problem of Social” cost, Coasean insights on externalities, transaction costs, and the reciprocal nature of harms, have been widely debated. What has been largely neglected however, is the role of technological innovation in the mitigation of negative externalities or transaction costs. Incorporating future uncertainty about negligence standards or expected restitution costs and the profit opportunities these uncertainties reveal to entrepreneurs, allow us to frame problems regarding social costs within the reality of rapid technological evolution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=environmental%20law%20and%20economics" title="environmental law and economics">environmental law and economics</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurship" title=" entrepreneurship"> entrepreneurship</a>, <a href="https://publications.waset.org/abstracts/search?q=commons" title=" commons"> commons</a>, <a href="https://publications.waset.org/abstracts/search?q=pollution" title=" pollution"> pollution</a>, <a href="https://publications.waset.org/abstracts/search?q=wildlife" title=" wildlife"> wildlife</a> </p> <a href="https://publications.waset.org/abstracts/20308/time-uncertainty-and-technological-innovation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20308.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">421</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2855</span> Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lok%20Yi%20Joyce%20Poon">Lok Yi Joyce Poon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20wallet" title="digital wallet">digital wallet</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20payment" title=" mobile payment"> mobile payment</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20purchasing%20behavior" title=" online purchasing behavior"> online purchasing behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=WeChat%20Pay" title=" WeChat Pay"> WeChat Pay</a> </p> <a href="https://publications.waset.org/abstracts/58555/analysis-the-impacts-of-wechat-mobile-payment-in-china-teens-online-purchasing-behaviors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58555.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2854</span> Internet Shopping: A Study Based On Hedonic Value and Flow Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pui-Lai%20To">Pui-Lai To</a>, <a href="https://publications.waset.org/abstracts/search?q=E-Ping%20Sung"> E-Ping Sung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the flourishing development of online shopping, an increasing number of customers see online shopping as an entertaining experience. Because the online consumer has a double identity as a shopper and an Internet user, online shopping should offer hedonic values of shopping and Internet usage. The purpose of this study is to investigate hedonic online shopping motivations from the perspectives of traditional hedonic value and flow theory. The study adopted a focus group interview method, including two online and two offline interviews. Four focus groups of shoppers consisted of online professionals, online college students, offline professionals and offline college students. The results of the study indicate that traditional hedonic values and dimensions of flow theory exist in the online shopping environment. The study indicated that online shoppers seem to appreciate being able to learn things and grow to become competitive achievers online. Comparisons of online hedonic motivations between groups are conducted. This study serves as a basis for the future growth of Internet marketing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=flow%20theory" title="flow theory">flow theory</a>, <a href="https://publications.waset.org/abstracts/search?q=hedonic%20motivation" title=" hedonic motivation"> hedonic motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20shopping" title=" internet shopping"> internet shopping</a> </p> <a href="https://publications.waset.org/abstracts/29860/internet-shopping-a-study-based-on-hedonic-value-and-flow-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29860.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">280</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2853</span> Research on the Online Learning Activities Design and Students’ Experience Based on APT Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wang%20Yanli">Wang Yanli</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheng%20Yun"> Cheng Yun</a>, <a href="https://publications.waset.org/abstracts/search?q=Yang%20Jiarui"> Yang Jiarui</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the separation of teachers and students, online teaching during the COVID-19 epidemic was faced with many problems, such as low enthusiasm of students, distraction, low learning atmosphere, and insufficient interaction between teachers and students. The essay designed the elaborate online learning activities of the course 'Research Methods of Educational Science' based on the APT model from three aspects of multiple assessment methods, a variety of teaching methods, and online learning environment and technology. Student's online learning experience was examined from the perception of online course, the perception of the online learning environment, and satisfaction after the course’s implementation. The research results showed that students have a positive overall evaluation of online courses, a high degree of engagement in learning, positive acceptance of online learning, and high satisfaction with it, but students hold a relatively neutral attitude toward online learning. And some dimensions in online learning experience were found to have positive influence on students' satisfaction with online learning. We suggest making the good design of online courses, selecting proper learning platforms, and conducting blended learning to improve students’ learning experience. This study has both theoretical and practical significance for the design, implementation, effect feedback, and sustainable development of online teaching in the post-epidemic era. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=APT%20model" title="APT model">APT model</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20learning" title=" online learning"> online learning</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20learning%20activities" title=" online learning activities"> online learning activities</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20experience" title=" learning experience"> learning experience</a> </p> <a href="https://publications.waset.org/abstracts/130109/research-on-the-online-learning-activities-design-and-students-experience-based-on-apt-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130109.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2852</span> In Online and Laboratory We Trust: Comparing Trust Game Behavior in Three Environments</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kaisa%20M.%20Herne">Kaisa M. Herne</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanna%20E.%20Bj%C3%B6rkstedt"> Hanna E. Björkstedt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Comparisons of online and laboratory environments are important for assessing whether the environment influences behavioral results. Trust game behavior was examined in three environments: 1) The standard laboratory setting with physically present participants (laboratory), 2) An online environment with an online meeting before playing the trust game (online plus a meeting); and 3) An online environment without a meeting (online without a meeting). In laboratory, participants were present in a classroom and played the trust game anonymously via computers. Online plus a meeting mimicked the laboratory in that participants could see each other in an online meeting before sessions started, whereas online without a meeting was a standard online experiment in which participants did not see each other at any stages of the experiment. Participants were recruited through pools of student subjects at two universities. The trust game was identical in all conditions; it was played with the same software, anonymously, and with stranger matching. There were no statistically significant differences between the treatment conditions regarding trust or trustworthiness. Results suggest that conducting trust game experiments online will yield similar results to experiments implemented in a laboratory. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=laboratory%20vs.%20online%20experiment" title="laboratory vs. online experiment">laboratory vs. online experiment</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20behavior" title=" trust behavior"> trust behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20game" title=" trust game"> trust game</a>, <a href="https://publications.waset.org/abstracts/search?q=trustworthiness%20behavior" title=" trustworthiness behavior"> trustworthiness behavior</a> </p> <a href="https://publications.waset.org/abstracts/179342/in-online-and-laboratory-we-trust-comparing-trust-game-behavior-in-three-environments" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179342.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2851</span> Factor Driving Consumer Intention in Online Shopping </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wanida%20Suwunniponth">Wanida Suwunniponth</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objectives of this research paper was to study the influencing factors that contributed the willingness of consumers to purchase products online included quality of website, perceived ease of use, perceived usefulness, trust on online purchases, attitude towards online shopping and intentions to online purchases. The research was conducted in both quantitative and qualitative methods, by utilizing both questionnaire and in-depth interview. A questionnaire was used to collect data from 350 consumers who had online shopping experiences in Bangkok, Thailand. Statistics utilized in this research included descriptive statistics and path analysis. The findings revealed that the factors concerning with quality of website, perceived ease of use and perceived usefulness played an influence on trust in online shopping. Trust also played an influence on attitude towards online purchase, whereas trust and attitude towards online purchase manipulated the intention of online purchase. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title="e-commerce">e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=intention" title=" intention"> intention</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20shopping" title=" online shopping"> online shopping</a>, <a href="https://publications.waset.org/abstracts/search?q=TAM" title=" TAM"> TAM</a>, <a href="https://publications.waset.org/abstracts/search?q=technological%20acceptance%20model" title=" technological acceptance model"> technological acceptance model</a> </p> <a href="https://publications.waset.org/abstracts/8129/factor-driving-consumer-intention-in-online-shopping" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8129.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">260</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2850</span> Infrastructure Investment Law Formulation to Ensure Low Transaction Cost at Policy Level: Case Study of Public Private Partnership Project at the Ministry of Public Works and Housing of the Republic of Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yolanda%20Indah%20Permatasari">Yolanda Indah Permatasari</a>, <a href="https://publications.waset.org/abstracts/search?q=Sudarsono%20Hardjosoekarto"> Sudarsono Hardjosoekarto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Public private partnership (PPP) scheme was considered as an alternative source of funding for infrastructure provision. However, the performance of PPP scheme and interest of private sector to participate in the provision of infrastructure was still practically low. This phenomenon motivates the research to reconstruct the form of collaborative governance at the policy level from the perspective of transaction cost of the PPP scheme. Soft-system methodology (SSM)-based action research was used as this research methodology. The result of this study concludes that the emergence of transaction cost sources at the policy level is caused by the absence of a law that governs infrastructure investment, especially the implementation of PPP scheme. This absence is causing the imbalance in risk allocation and risk mitigation between the public and private sector. Thus, this research recommended the formulation of infrastructure investment law that aims to minimize asymmetry information, to anticipate the principal-principal problems, and to provide legal basis that ensures risk certainty and guarantee fair risk allocation between public and private sector. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=public%20governance" title="public governance">public governance</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20private%20partnership" title=" public private partnership"> public private partnership</a>, <a href="https://publications.waset.org/abstracts/search?q=soft%20system%20methodology" title=" soft system methodology"> soft system methodology</a>, <a href="https://publications.waset.org/abstracts/search?q=transaction%20cost" title=" transaction cost"> transaction cost</a> </p> <a href="https://publications.waset.org/abstracts/104441/infrastructure-investment-law-formulation-to-ensure-low-transaction-cost-at-policy-level-case-study-of-public-private-partnership-project-at-the-ministry-of-public-works-and-housing-of-the-republic-of-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104441.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2849</span> Self-Organizing Maps for Credit Card Fraud Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=ChunYi%20Peng">ChunYi Peng</a>, <a href="https://publications.waset.org/abstracts/search?q=Wei%20Hsuan%20CHeng"> Wei Hsuan CHeng</a>, <a href="https://publications.waset.org/abstracts/search?q=Shyh%20Kuang%20Ueng"> Shyh Kuang Ueng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=self-organizing%20map%20technology" title="self-organizing map technology">self-organizing map technology</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20detection" title=" fraud detection"> fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20visualization" title=" information visualization"> information visualization</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20analysis" title=" data analysis"> data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=composite%20intelligent%20system%20technologies" title=" composite intelligent system technologies"> composite intelligent system technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20technologies" title=" decision support technologies"> decision support technologies</a> </p> <a href="https://publications.waset.org/abstracts/183639/self-organizing-maps-for-credit-card-fraud-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183639.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">57</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2848</span> Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Essang%20Anwana%20Onuntuei">Essang Anwana Onuntuei</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinyere%20Blessing%20Azunwoke"> Chinyere Blessing Azunwoke</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybercrime%20legislation" title="cybercrime legislation">cybercrime legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20attacks" title=" cyber attacks"> cyber attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20privacy%20and%20protection%20law" title=" consumer privacy and protection law"> consumer privacy and protection law</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20transaction%20law" title=" electronic transaction law"> electronic transaction law</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20and%20data%20protection%20law" title=" privacy and data protection law"> privacy and data protection law</a>, <a href="https://publications.waset.org/abstracts/search?q=prohibition" title=" prohibition"> prohibition</a>, <a href="https://publications.waset.org/abstracts/search?q=prosecution" title=" prosecution"> prosecution</a> </p> <a href="https://publications.waset.org/abstracts/188440/empirical-analysis-of-the-global-impact-of-cybercrime-laws-on-cyber-attacks-and-malware-types" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188440.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">41</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2847</span> Self-Organizing Maps for Credit Card Fraud Detection and Visualization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peng%20Chun-Yi">Peng Chun-Yi</a>, <a href="https://publications.waset.org/abstracts/search?q=Chen%20Wei-Hsuan"> Chen Wei-Hsuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ueng%20Shyh-Kuang"> Ueng Shyh-Kuang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=self-organizing%20map%20technology" title="self-organizing map technology">self-organizing map technology</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20detection" title=" fraud detection"> fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20visualization" title=" information visualization"> information visualization</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20analysis" title=" data analysis"> data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=composite%20intelligent%20system%20technologies" title=" composite intelligent system technologies"> composite intelligent system technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20technologies" title=" decision support technologies"> decision support technologies</a> </p> <a href="https://publications.waset.org/abstracts/183172/self-organizing-maps-for-credit-card-fraud-detection-and-visualization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183172.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=95">95</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=96">96</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=online%20transaction&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>