978 resultados para financial security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report will describe the activities undertaken during my internship at the Personnel Department (DPE-UPE4.1) in Caixa Geral de Depósitos (CGD), Lisbon, between September 22, 2014, and February 28, 2015. I consider that it is important to note from the outset i) that the subject of my training was suggested by my supervisor in the DPE and accepted by me; and ii) that the internship consisted essentially of carrying out research and information gathering into the different social systems that coexist within the bank and the application of each legal system in solving concrete situations of the CGD employees. The research and analysis of information was important not only for my study but for the CGD itself, as it enables the department to have such an important matter, full of specific characteristics, condensed into a single document, i.e. this report. This is a complex reality. The various welfare systems differ according to the contractual agreement linking the employee to the employer at the date when the labour contract is signed, and also the unique/singular characteristics of the CGD. In the early stage I started by trying to understand the financial institution and its organization and role and the department where I worked. So I analyzed the CGD Statutes and the legal measures that crystallized the scheme for its employees and I also researched its domestic and international operations. The first month was devoted to the research and analysis of such legislation to understand the creation of the CGD and its path to date. In the second and third months I studied the legal social systems that are applied to different groups of CGD workers. This period was quite important to identify and understand the differences between those regimes of CGD employees as well as the procedure inherent in each case. I highlighted the non-implementation of “the social protection regime of convergence” to the workers of this institution; the differences regarding the allocation of sickness subsidies paid to workers who belong to Social Security and CGA contributors, as well as the enforcement of internal rules to all the workers when a work-related accident happens.Then I focused on to assessing and examining external legislation and several internal regulations in order to obtain solutions to questions raised and situations involving by the workers, in order to understand how the DPE solves these situations. Over the last three months of internship, after this more theoretical work, I began the analysis of concrete situations involving employees carrying out their duties in Portugal and abroad. Some of these situations had been received by the department before the beginning of my internship and others over this period. When I was “working” in the DPE I analyzed “cases” that had been solved and some others without a final solution because they were still in courts. As for the last ones (new cases) I was able to follow their assessment and sometimes their outcome. Some of them became study cases for me. Over these five months of my internship, several cases were analyzed and discussed by legal experts of DPE in which I could participate. I always worked hard. I know that this action contributed to elucidate me about the treatment of the issues, and allowed me to have a direct contact with some workers and be part of a dynamic work team. For these reasons, my internship report is not merely descriptive of activities. It consists of an analysis of rules (legislation) and a regulatory framework of activities and it is also a description of several specific situations solved or in a solution process. Through this work I intend to make known the particular reality of a modern Portuguese financial institution not only because of its importance in our country but also such a large number of employees work here (in Portugal and abroad). I should add that throughout my internship I was allowed to attend conferences, within the scope of the bank in order to get a broader view of some issues related to the daily life of the DPE and the CGD. So, I participated in I Jornadas Bancárias and the Conferência Internacional do Contrato a Termo, given that the CGD is a bank and the DPE deals with legal and labour relations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Equity research report

Relevância:

20.00% 20.00%

Publicador:

Resumo:

O fim da Guerra Fria é um caso inédito de mudança pacífica da estrutura internacional, em que os Estados Unidos e a União Soviética transcendem a divisão bipolar para decidir os termos da paz no quadro das instituições que definem o modelo de ordenamento multilateral, consolidando a sua legitimidade. Nesse contexto, ao contrário dos casos precedentes de reconstrução internacional no fim de uma guerra hegemónica, o novo sistema do post-Guerra Fria, caracterizado pela unipolaridade, pela regionalização e pela homogeneização, forma-se num quadro de continuidade institucional. A ordem política do post-Guerra Fria é um sistema misto em que as tensões entre a hierarquia unipolar e a anarquia multipolar, a integração global e a fragmentação regional e a homogeneidade e a heterogeneidade política, ideológica e cultural condicionam as estratégias das potências. As crises internacionais vão pôr à prova a estabilidade da nova ordem e a sua capacidade para garantir mudanças pacíficas. A primeira década do post-Guerra Fria mostra a preponderância dos Estados Unidos e a sua confiança crescente, patente nas Guerras do Golfo Pérsico e dos Balcãs, bem como na crise dos Estreitos da Formosa. A reacção aos atentados do "11 de Setembro" revela uma tentação imperial da potência unipolar, nomeadamente com a invasão do Iraque, que provoca uma crise profunda da comunidade de segurança ocidental. A vulnerabilidade do centro da ordem internacional é confirmada pela crise constitucional europeia e pela crise financeira global. Essas crises não alteram a estrutura de poder mas aceleram a erosão da ordem multilateral e criam um novo quadro de possibilidades para a evolução internacional, que inclui uma escalada dos conflitos num quadro de multipolaridade regional, uma nova polarização entre as potências democráticas conservadoras e uma coligação revisionista autoritária, bem como a restauração de um concerto entre as principais potências internacionais.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Globalization brought some deep changes to the world (dis)order. Nowadays, more than in other moment in history, we are closer to the ones physically far, living in “global village” called by Marshall McLuhan (1962). The concepts and premises built in this new order, have totally broken with the ones that “came out from Westphalia”, which had last to the end of the cold war, like, for example, the concept of security. Since then, security has been facing one of its biggest transformations ever, completely disrupting the state border based idea and starting to be extended to other domains, as human, economic, environmental and IT security, among others. In this global and interdependent environment, “new” threats and risks have raised, which are demanding a comprehensive approach from the States, international organizations and other actors, to allow the analysis and understanding its impacts on the various society sectors and orders. Inside the enormous challenges to the global security, it is important to regard the organized crime, which covers, by itself, a set of threats and risks, enhanced by its connection to other types of criminality, such as terrorism. The goals pursued and the tactics used by criminal organizations during the perpetration of illegal activities, specially the drug smuggling, have impact in an wide spectrum of the social, economic financial and politic dimensions, which should not be underestimated, otherwise our own security may be compromised. Therefore, the current investigation intends to be an important catalyst to the idea debate inside security scope, through the analysis of the organized crime and the drug smuggling, adding to a discussion of this issue, which should be deeper and holistic, aiming a better understanding of the challenges provided by our society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increasing role of the European Foundations, urges for more transparency. The prevalent accounting frameworks in which they operate and report their activities are mostly based on national laws. This lack of harmonization, limits comparison between European foundations. Thus, this Work Project analyzes the current financial reporting by European foundations, and evaluates the similarities, differences and data availability between countries. The research provides evidence about little information available, deficiency in the financial reporting, within and between countries. The research recommends the need to ensure uniformity by providing a clear definition for public-benefit purpose, harmonization of laws and financial reporting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Préface My thesis consists of three essays where I consider equilibrium asset prices and investment strategies when the market is likely to experience crashes and possibly sharp windfalls. Although each part is written as an independent and self contained article, the papers share a common behavioral approach in representing investors preferences regarding to extremal returns. Investors utility is defined over their relative performance rather than over their final wealth position, a method first proposed by Markowitz (1952b) and by Kahneman and Tversky (1979), that I extend to incorporate preferences over extremal outcomes. With the failure of the traditional expected utility models in reproducing the observed stylized features of financial markets, the Prospect theory of Kahneman and Tversky (1979) offered the first significant alternative to the expected utility paradigm by considering that people focus on gains and losses rather than on final positions. Under this setting, Barberis, Huang, and Santos (2000) and McQueen and Vorkink (2004) were able to build a representative agent optimization model which solution reproduced some of the observed risk premium and excess volatility. The research in behavioral finance is relatively new and its potential still to explore. The three essays composing my thesis propose to use and extend this setting to study investors behavior and investment strategies in a market where crashes and sharp windfalls are likely to occur. In the first paper, the preferences of a representative agent, relative to time varying positive and negative extremal thresholds are modelled and estimated. A new utility function that conciliates between expected utility maximization and tail-related performance measures is proposed. The model estimation shows that the representative agent preferences reveals a significant level of crash aversion and lottery-pursuit. Assuming a single risky asset economy the proposed specification is able to reproduce some of the distributional features exhibited by financial return series. The second part proposes and illustrates a preference-based asset allocation model taking into account investors crash aversion. Using the skewed t distribution, optimal allocations are characterized as a resulting tradeoff between the distribution four moments. The specification highlights the preference for odd moments and the aversion for even moments. Qualitatively, optimal portfolios are analyzed in terms of firm characteristics and in a setting that reflects real-time asset allocation, a systematic over-performance is obtained compared to the aggregate stock market. Finally, in my third article, dynamic option-based investment strategies are derived and illustrated for investors presenting downside loss aversion. The problem is solved in closed form when the stock market exhibits stochastic volatility and jumps. The specification of downside loss averse utility functions allows corresponding terminal wealth profiles to be expressed as options on the stochastic discount factor contingent on the loss aversion level. Therefore dynamic strategies reduce to the replicating portfolio using exchange traded and well selected options, and the risky stock.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

QUESTION UNDER STUDY: Thirty-day readmissions can be classified as potentially avoidable (PARs) or not avoidable (NARs) by following a specific algorithm (SQLape®). We wanted to assess the financial impact of the Swiss-DRG system, which regroups some readmissions occurring within 18 days after discharge within the initial hospital stay, on PARs at our hospital. METHODS: First, PARs were identified from all hospitalisations recorded in 2011 at our university hospital. Second, 2012 Swiss-DRG readmission rules were applied, regrouped readmissions (RR) were identified, and their financial impact computed. Third, RRs were classified as potentially avoidable (PARRs), not avoidable (NARRs), and others causes (OCRRs). Characteristics of PARR patients and stays were retrieved, and the financial impact of PARRS was computed. RESULTS: A total of 36,777 hospitalisations were recorded in 2011, of which 3,140 were considered as readmissions (8.5%): 1,470 PARs (46.8%) and 1,733 NARs (53.2%). The 2012 Swiss-DRG rules would have resulted in 910 RRs (2.5% of hospitalisations, 29% of readmissions): 395 PARRs (43% of RR), 181 NARRs (20%), and 334 OCRRs (37%). Loss in reimbursement would have amounted to CHF 3.157 million (0.6% of total reimbursement). As many as 95% of the 395 PARR patients lived at home. In total, 28% of PARRs occurred within 3 days after discharge, and 58% lasted less than 5 days; 79% of the patients were discharged home again. Loss in reimbursement would amount to CHF 1.771 million. CONCLUSION: PARs represent a sizeable number of 30-day readmissions, as do PARRs of 18-day RRs in the 2012 Swiss DRG system. They should be the focus of attention, as the PARRs represent an avoidable loss in reimbursement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Little is known about the financial burden of individuals with depressive symptoms. This study explored that burden, using data from the Survey of Health, Ageing, and Retirement in Europe. To assess the association between depressive symptoms and the individuals' financial burden for medical care and whether they forwent medical care because of costs, logistic regressions were performed that adjusted for age, gender, marital status, education, and chronic diseases. A total of 16,696 noninstitutionalized individuals aged 50-79 years were included in the study. Individuals with depressive symptoms and those without such symptoms bore a similar financial burden. However, individuals with depressive symptoms were at increased risk of forgoing care because of costs, which may worsen their health and financial situation

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tutkimuksen tavoite Tutkimuksen tavoite oli kerätä FI:n johdolle tietoa henkilöstön suhtautumisesta organisaatiomuutokseen. Tutkimus toimii pohjana muutosprosessin kriittiselle tarkastelulle ja mahdollisille muutoksille resurssien kohdentamisessa. Tutkimusmenetelmä Organisaatiomuutosta käsittelevä kirjallisuus muodosti tutkielman teoriapohjan. Tutkimuksen aineisto kerättiin kyselylomakkeella FI:n henkilöstölle ja neljällä haastattelulla henkilöstön ja johdon kanssa. Johtopäätökset Yleisesti tuloksista on nähtävissä, että vastaajat ovat aluksi vastustaneet muutosta, vaikka muutos itsessään onkin nähty positiivisena kehityksenä. Vastarintaa ovat aiheuttaneet pääasiallisesti muutoksen johtamisen tyyli ja tiedotuksen kokeminen riittämättömänä.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tutkimuksen päätavoitteena on tutkia taloudellisen näkökulman integroimista laatuajatteluun pohjautuvaan johtamisjärjestelmään esimerkkiyrityksessä. Johtamisjärjestelmän tulee tuottaa tietoa johdon strategiselle päätöksenteolle ja lisäksi täyttää laatujärjestelmän (ISO 9001:2000) asettamat vaatimukset. Tutkimuksen kohteena oleva työkalu on balanced scorecard (tasapainotettu tuloskortti). Työn tarkoituksena on ehdottaa balanced scorecard- talouden tunnuslukuja esimerkkiyritykselle. Tutkimuksen tavoitteisiin päästään empiiristä tutkimusta varten tehdyn teoreettisen viitekehyksen avulla. Empiiristä tutkimustietoa kerätään osallistuvan havainnoinnin, haastattelujen ja keskustelujen avulla. Tutkimusmenetelmänä on laadullinen case -tutkimus. Balanced scorecardin eri näkökulmille ehdotettiin tunnuslukuja empiirisen tutkimuksen pohjalta. Lisäksi talouden näkökulmaa tutkittiin tarkemmin. Tutkimuksen johtopäätöksenä esitettiin, että taloudelliset tunnusluvut mittaavat ensisijaisesti strategiaa eivätkä laatua. Lisäksi huomioitiin, että tuloskorttien tulisi olla koekäytössä ennen bonuspalkkauksen ja balanced scorecardin yhdistämistä.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Within the framework of state security policy, the focus of this dissertation are the relations between how new security threats are perceived and the policy planning and bureaucratic implementation that are designed to address them. In addition, this thesis explores and studies some of the inertias that might exist in the core of the state apparatus as it addresses new threats and how these could be better managed. The dissertation is built on five thematic and interrelated articles highlighting different aspects of when new significant national security threats are detected by different governments until the threats on the policy planning side translate into protective measures within the society. The timeline differs widely between different countries and some key aspects of this process are also studied. One focus concerns mechanisms for adaptability within the Intelligence Community, another on the policy planning process within the Cabinet Offices/National Security Councils and the third focus is on the planning process and how policy is implemented within the bureaucracy. The issue of policy transfer is also analysed, revealing that there is some imitation of innovation within governmental structures and policies, for example within the field of cyber defence. The main findings of the dissertation are that this context has built-in inertias and bureaucratic seams found in most government bureaucratic machineries. As much of the information and planning measures imply security classification of the transparency and internal debate on these issues, alternative assessments become limited. To remedy this situation, the thesis recommends ways to improve the decision-making system in order to streamline the processes involved in making these decisions. Another special focus of the thesis concerns the role of the public policy think tanks in the United States as an instrument of change in the country’s national security decision-making environment, which is viewed from the perspective as being a possible source of new ideas and innovation. The findings in this part are based on unique interviews data on how think tanks become successful and influence the policy debate in a country such as the United States. It appears clearly that in countries such as the United States think tanks smooth the decision making processes, and that this model with some adaptations also might be transferrable to other democratic countries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.