23 resultados para financial security
em WestminsterResearch - UK
Resumo:
This paper explores the prospects and challenges of achieving human security through United Nations (UN) human rights law. The paper does not aim to pronounce definitively on the achievement of human security by way of UN human rights law that is, to assess the achievement of human security per se 'as a future end state'. Rather the focus of the paper is firmly placed on the capacity of UN human rights law to achieve human security. The paper departs from the premise that if human rights define human security, international human rights law and UN human rights law in particular should have something to say about the achievement of human security.
Resumo:
It has been suggested human female breast size may act as signal of fat reserves, which in turn indicates access to resources. Based on this perspective, two studies were conducted to test the hypothesis that men experiencing relative resource insecurity should perceive larger breast size as more physically attractive than men experiencing resource security. In Study 1, 266 men from three sites in Malaysia varying in relative socioeconomic status (high to low) rated a series of animated figures varying in breast size for physical attractiveness. Results showed that men from the low socioeconomic context rated larger breasts as more attractive than did men from the medium socioeconomic context, who in turn perceived larger breasts as attractive than men from a high socioeconomic context. Study 2 compared the breast size judgements of 66 hungry versus 58 satiated men within the same environmental context in Britain. Results showed that hungry men rated larger breasts as significantly more attractive than satiated men. Taken together, these studies provide evidence that resource security impacts upon men’s attractiveness ratings based on women’s breast size.
Resumo:
The objective of this paper is to study the interactions between Economic liberalisation, Political liberalisation and Financial development in African countries. More specifically, we seek to establish the impact of Economic, Political and institutional openness on financial deepening. The empirical approach will be two-step procedure, first using a difference in difference method to show the various aspect of financial liberalisation on economic and political freedom while the second step will be using panel data techniques from period 1990 to 2005. The estimation results can be summarised as the following, first, Economic and financial liberalisation did account significantly for the financial development performance. While political stability show a positive overall effect on financial development, the association with Political freedom is consistent only after controlling the endogeneity of Political freedom on financial development. This result indicates that the transformation of the political and economic environment has improved the performance of the financial sector.
Resumo:
This paper present empirical evidence on how financial development is related to income distribution in a panel data set covering 22 African countries for the period between 1990 to 2004. A dynamic panel estimation technique (GMM) is employ and the findings indicate that income inequality decrease as economies develop their financial sector, which is consistent with the bulk of theoretical and empirical research. The result also confirm that educational attainment play a significant role in making income distribution more equal. We also find no evidence supporting the Greenwood-Jovanovic hypothesis of an inverted-U- shaped relationship between financial sector development and inequality.
Financial instability, financial liberalisation and economic growth: evidence from African countries
Resumo:
We investigate the risk effects of bank acquisitions of insurance companies and securities firms between 1991 and 2012 using a newly constructed dataset of M&A deals. We examine risk changes before and after deal announcements by decomposing risk into systematic and idiosyncratic components. Subsequently, we investigate the relationship between risk and diversification by modelling the determinants of risks. We find that bank combinations with securities firms yield higher risks than combinations with insurance companies. Bank size is an important and consistent determinant of risk whereas diversification is not. Our results inform the continuing debate on diversification versus functional separation of bank activities.
Resumo:
This paper examined the psychological impact of the online dating romance scam. Unlike other mass-marketing fraud victims, these victims experienced a ‘double hit’ of the scam: a financial loss and the loss of a relationship. For most, the loss of the relationship was more upsetting than their financial losses (many described the loss of the relationship as a ‘death’). Some described their experience as traumatic and all were affected negatively by the crime. Most victims had not found ways to cope given the lack of understanding from family and friends. Denial (e.g., not accepting the scam was real or not being able to separate the fake identity with the criminal) was identified as an ineffective means of coping, leaving the victim vulnerable to a second wave of the scam. Suggestions are made as to how to change policy with regards to law enforcement deal with this crime.
Resumo:
The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants - insulated from the minutiae of hardware maintenance - rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating operations to IaaS platforms due to security concerns. In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. We continue with an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.