6 resultados para Institutional identity
em Cochin University of Science
Resumo:
Department of Applied Economics, Cochin University of Science and Technology
Resumo:
Vast changes have taken place in the field of institutional rural credit in India since the nationalisation of nineteen commercial banks in 1969. The supply of institutional finance to cultivators amounted to 63.2 percent of the total credit in 1981 compared to 31.2 percent in 1971. Insti tutionalisation of agricultural credit envisaged two objectives in general. One was to emancipate cultivators and farmers from the clutches of indigenous financiers and money lenders. The second was to make farmers financially capable of adopting the new technology or improved practices in agriculture so as to increase their agricultural production and thereby contributing to the development of agriculture in India. Though vast literature on Institutional Credi t and agriculture is available, no indepth and serious work examining thoroughly the cause of credit diversion has been undertaken so far. The present study is an attempt to fill up this gap. The study will be helpful to lending insti tutions, viz. Co-ope:r-atives, Commercial banks and various other insti tutional agencies in connection with their lending activity_ Also, the study will help government in .formulating proper policies that will insure a preferential treatment in favour of the most needy category of farmers and cultivators with respect to agricultural credit disbursement
Resumo:
Today higher education system and R&D in science & Technology has undergone tremendous changes from the traditional class room learning system and scholarly communication. Huge volume of Academic output and scientific communications are coming in electronic format. Knowledge management is a key challenge in the current century .Due to the advancement of ICT, Open access movement, Scholarly communications, Institutional repositories, ontology, semantic web, web 2.0 etc has revolutionized knowledge transactions and knowledge management in the field of science & technology. Today higher education has moved into a stage where competitive advantage is gained not just through access of infonnation but more importantly from new Knowledge creations.This paper examines the role of institutional repository in knowledge transactions in current scenario of Higher education.
Resumo:
In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.
Resumo:
Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have their own shortcomings and consequently bring security issues to email systems. This paper proposes a new secure email system based on IBE which combines finger print authentication and proxy service for encryption and decryption
Resumo:
The study is important for the fact that it places the management dynamics of marine fisheries sector in the context of growing unrest of local communities over the emerging resource conflicts and degradation Economic crisis in small scale marine fisheries due to high operating cost continue to hinder the efforts towards conservation in many ways The migration of mechanized fleet as a response to profit maximization strategy of enterprises continues to be a threat to resource management Therefore this study explores how to revamp the small scale mechanized sector effectively and profitably to ensure rational allocation of resources The thesis attempts to examine how livelihood vulnerabilities of artisanal fish workers influence the crafting of management institutions Finally by combining insights of an institutional framework the study establishes the need for recognising the role of both formal and informal institutions in the management of marine fisheries in Kerala