• 제목/요약/키워드: Data corruption

검색결과 107건 처리시간 0.024초

Shadow Economy, Corruption and Economic Growth: An Analysis of BRICS Countries

  • NGUYEN, Diep Van;DUONG, My Tien Ha
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권4호
    • /
    • pp.665-672
    • /
    • 2021
  • The paper examines the impact of shadow economy and corruption, along with public expenditure, trade openness, foreign direct investment (FDI), inflation, and tax revenue on the economic growth of the BRICS countries. Data were collected from the World Bank, Transparency International, and Heritage Foundation over the 1991-2017 period. The Bayesian linear regression method is used to examine whether shadow economy, corruption and other indicators affect the economic growth of countries studied. This paper applies the normal prior suggested by Lemoine (2019) while the posterior distribution is simulated using Monte Carlo Markov Chain (MCMC) technique through the Gibbs sampling algorithm. The results indicate that public expenditure and trade openness can enhance the BRICS countries' economic growth, with the positive impact probability of 75.69% and 67.11%, respectively. Also, FDI, inflation, and tax revenue positively affect this growth, though the probability of positive effect is ambiguous, ranging from 51.13% to 56.36%. Further, the research's major finding is that shadow economy and control of corruption have a positive effect on the economic growth of the BRICS countries. Nevertheless, the posterior probabilities of these two factors are 62.23% and 65.25%, respectively. This result suggests that their positive effect probability is not high.

E-voting Implementation in Egypt

  • Eraky, Ahmed
    • Journal of Contemporary Eastern Asia
    • /
    • 제16권1호
    • /
    • pp.48-68
    • /
    • 2017
  • Manual elections processes in Egypt have several negative effects; that mainly leads to political corruption due to the lack of transparency. These issues negatively influence citizen's participation in the political life; while electronic voting systems aim to increase efficiency, transparency, and reduce the cost comparing to the manual voting. The main research objectives are, finding the successful factors that positively affects E-voting implementation in Egypt, in addition of finding out the reasons that keep Egyptian government far from applying E-voting, and to come up with the road map that Egyptian government has to take into consideration to successfully implement E-voting systems. The findings of the study suggest that there are seven independent variables affecting e-voting implementation which are; leadership, government willingness, legal framework, technical quality, awareness, citizen's trust in government and IT literacy. Technology-Organization-Environment (TOE) theory was used to provide an analytical framework for the study. A quantitative approach (i.e., survey questionnaire) strategy was used to collect data. A random sampling method was used to select the participants for the survey, whom are targeted voters in Egypt and have access to the internet, since the questionnaire was distributed online and the data is analyzed using regression analysis. Practical implications of this study will lead for more citizen participation in the political life due to the transparency that E-voting system will create, in addition to reduce the political corruption.

Enhancing TCP Performance over Wireless Network with Variable Segment Size

  • Park, Keuntae;Park, Sangho;Park, Daeyeon
    • Journal of Communications and Networks
    • /
    • 제4권2호
    • /
    • pp.108-117
    • /
    • 2002
  • TCP, which was developed on the basis of wired links, supposes that packet losses are caused by network congestion. In a wireless network, however, packet losses due to data corruption occur frequently. Since TCP does not distinguish loss types, it applies its congestion control mechanism to non-congestion losses as well as congestion losses. As a result, the throughput of TCP is degraded. To solve this problem of TCP over wireless links, previous researches, such as split-connection and end-to-end schemes, tried to distinguish the loss types and applied the congestion control to only congestion losses; yet they do nothing for non-congestion losses. We propose a novel transport protocol for wireless networks. The protocol called VS-TCP (Variable Segment size Transmission Control Protocol) has a reaction mechanism for a non-congestion loss. VS-TCP varies a segment size according to a non-congestion loss rate, and therefore enhances the performance. If packet losses due to data corruption occur frequently, VS-TCP decreases a segment size in order to reduce both the retransmission overhead and packet corruption probability. If packets are rarely lost, it increases the size so as to lower the header overhead. Via simulations, we compared VS-TCP and other schemes. Our results show that the segment-size variation mechanism of VS-TCP achieves a substantial performance enhancement.

Analysis and Detection of Malicious Data Hidden in Slack Space on OOXML-based Corrupted MS-Office Digital Files

  • Sangwon Na;Hyung-Woo Lee
    • International journal of advanced smart convergence
    • /
    • 제12권1호
    • /
    • pp.149-156
    • /
    • 2023
  • OOXML-based MS-Office digital files are extensively utilized by businesses and organizations worldwide. However, OOXML-based MS-Office digital files are vulnerable to forgery and corruption attack by including hidden suspicious information, which can lead to activating malware or shell code being hidden in the file. Such malicious code can cause a computer system to malfunction or become infected with ransomware. To prevent such attacks, it is necessary to analyze and detect the corruption of OOXML-based MS-Office files. In this paper, we examine the weaknesses of the existing OOXML-based MS-Office file structure and analyzes how concealment and forgery are performed on MS-Office digital files. As a result, we propose a system to detect hidden data effectively and proactively respond to ransomware attacks exploiting MS-Office security vulnerabilities. Proposed system is designed to provide reliable and efficient detection of hidden data in OOXML-based MS-Office files, which can help organizations protect against potential security threats.

Defending Non-control-data Attacks using Influence Domain Monitoring

  • Zhang, Guimin;Li, Qingbao;Chen, Zhifeng;Zhang, Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3888-3910
    • /
    • 2018
  • As an increasing number of defense methods against control-data attacks are deployed in practice, control-data attacks have become challenging, and non-control-data attacks are on the rise. However, defense methods against non-control-data attacks are still deficient even though these attacks can produce damage as significant as that of control-data attacks. We present a method to defend against non-control-data attacks using influence domain monitoring (IDM). A definition of the data influence domain is first proposed to describe the characteristics of a variable during its life cycle. IDM extracts security-critical non-control data from the target program and then instruments the target for monitoring these variables' influence domains to ensure that corrupted variables will not be used as the attackers intend. Therefore, attackers may be able to modify the value of one security-critical variable by exploiting certain memory corruption vulnerabilities, but they will be prevented from using the variable for nefarious purposes. We evaluate a prototype implementation of IDM and use the experimental results to show that this method can defend against most known non-control-data attacks while imposing a moderate amount of performance overhead.

Enhancement of SCTP Throughput using Chunk Checksum

  • Lin Cui;Koh Seok J.;Hong Yong-Geun
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2006년도 춘계학술발표대회
    • /
    • pp.1147-1150
    • /
    • 2006
  • Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted SCTP packet will be regarded as a lost packet and then discarded. This may result in degradation of SCTP's throughput performance over wireless networks. This paper proposes a new chunk checksum scheme for SCTP, in which each data chunk contains its own checksum field and SACK chunk carry corresponding Transmission Sequence Number (TSN) with timestamp for every corruption event. The proposed chunk checksum scheme is introduced with the following three purposes: 1) to distinguish the chunk corruptions from the chunk losses; 2) to avoid the unnecessary halving of the congestion window (cwnd) in the case of chunk corruption; 3) to avoid the unwanted timeouts which can be induced in conventional SCTP in the case that the retransmitted data chunks are corrupted again in wireless networks. Simulation results show that the proposed chunk checksum scheme could improve the SCTP throughput in the wireless environments with a high bit error rate.

  • PDF

The Impact of Financial Integration on Economic Growth in Southeast Asia

  • Bong, Angkeara;Premaratne, Gamini
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제6권1호
    • /
    • pp.107-119
    • /
    • 2019
  • This paper examines the impact of financial integration on economic growth in Southeast Asia over the period 1993-2013. This paper further investigates whether the relationship depends on the level of financial and economic development, government corruption, and macroeconomic policy. These questions raise important issues both from a theoretical and a policy perspective. We employ the generalized methods of moment (GMM) in the dynamic panel estimation framework to analyse several factors, including initial income, initial schooling, financial development, inflation, trade openness, corruption, and financial crisis. The study further analyzes the data using the EGLS model to examine the consistency of the GMM model. We found that financial integration has a significant positive effect on economic growth in Southeast Asia. Our findings suggest that increasing financial integration could improve the productive capacity of the economy, including more investments and efficient allocation of capital, and thus enhancing economic growth in this region. More specifically, the results suggest that the government should work towards eliminating corruption and stabilizing macroeconomics in order to enhance financial integration and economic growth. This paper sheds new insights on a better evaluation of the past and present theorizing on the subject of financial integration and economic growth; especially, in Southeast Asia.

The Role of Economics, Politics and Institutions on Budget Deficit in ASEAN Countries

  • NGO, Minh Ngoc;NGUYEN, Loc Duc
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권9호
    • /
    • pp.251-261
    • /
    • 2020
  • The paper examines the role of some determinants of economics, politics and institutions on the budget deficit volatility in some countries of the Association of South East Asian Nations (ASEAN) such as Indonesia, Thailand and Vietnam. The paper uses the fixed effects model (FEM) and the random effects model (REM) to investigate panel data of these countries in the period of 1990-2018. Moreover, the study also explores ordinary least square (OLS) to analyze time-series data for each country in the same period to make comparison among them. The economic data is collected from international financial statistics and world development indicators. The data on political variables are collected from International Country Risk Data Guide (ICRG). The empirical results both confirm that corruption and political stability are important indicators of budget deficit. Besides, the paper suggests authorities should pay more attention on improving the institutional setup of the economy in order to avoid high and unstable deficit. The findings offer new insight on the budget deficit in essence and suggest that the most important thing need to be done ahead is to strongly implement anti-corruption actions. By doing so, the status of budget deficit would be remarkably improved immediately.

Mapping Block Information Recovery

  • Abdulhadi, Alahmadi;Chung, Tae Sun
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.506-507
    • /
    • 2015
  • Our scheme going to use the advanteges of shadow technical and use it in flash memory. With our scheme we can maintain the system from corruption by making a capy table for table mappinng. It is make us to recover the data easily when something unusually happen to the system.

Trade of ICT Products, Government, and Economic Growth: Evidence from East Asia-Pacific Region

  • NGUYEN, Lien Phuong;PHAM, Van Hong Thi
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권8호
    • /
    • pp.175-183
    • /
    • 2020
  • This study explores the effect of trade of Information Communications Technology (ICT) products and government's role, measured by three factors: Control of corruption, Government effectiveness, and Administrative tax level, on raising the economy across the East Asia-Pacific region. Secondary data were collected from the World Bank database of 21 countries over 12 years from 2006 to 2017. Applying the Panel corrected standard error model and running a robustness check based on the Dynamic panel data method, this research found that the exported ICT products, control of corruption, and government effectiveness could increase the economic income of a country in the region. The paper also provided the evidence indicating that the imported ICT products and the Administrative tax level are two harmful factors for economic growth. The major finding confirmed the useful contribution on improving government quality and its economy. First, improving the economy of a country always poses various challenges to its government. During the past decades, although much of the literature confirmed that exporting ICT products could promote an economy, very few studies investigated the role of Administrative tax level and the Government effectiveness. Second, there are only a few studies exploring the capability of government and the economic growth in the Asia-Pacific region.