• Title/Summary/Keyword: Data corruption

Search Result 107, Processing Time 0.027 seconds

Country-Level Institutional Quality and Public Debt: Empirical Evidence from Pakistan

  • MEHMOOD, Waqas;MOHD-RASHID, Rasidah;AMAN-ULLAH, Attia;ZI ONG, Chui
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.21-32
    • /
    • 2021
  • This paper aims to investigate the relationship between country-level institutional quality and public debt in the context of Pakistan. The hypotheses of this study were assessed by using the country-level institutional quality data for Pakistan throughout the years from 1996 to 2018. Data came from the World Databank, IMF and Worldwide Governance Indicators databases. For the analysis, ordinary least square, quantile regression and robust regression were employed to assess the factors influencing the public debt. The results of this study indicate that the factors of voice and accountability, regulatory quality, and control of corruption have a positive and significant relationship with public debt, while political stability, government effectiveness, and the rule of law have a negative and significant effect on public debt. Based on the findings, a weak country-level institutional quality poses a substantial market risk as it signals the existence of an unfavorable economic condition that raises public debt. It was also revealed that an improved performance of country-level institutional quality can lead to the improvement of financial market transparency, hence reduce public debt. In contrast to previous studies, the present study will be breaking ground in enhancing public insight regarding the impact of country-level institutional quality on Pakistan's public debt.

The Impact of Tax Evasion on Afghanistan's Economy

  • TAWHEED, Qais;CONG, Wang;RAFIQEE, Noorullah;QADERI, Khwaja Bahman;SHARIFI, Mohammad Shabir;HALIMI, Muhammad Shekaib
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.9
    • /
    • pp.317-325
    • /
    • 2022
  • The simple regression model (SRM) is used in this study to look at potential economic growth-influencing factors. The sample's period runs from 2005 to 2019. The data was gathered from various ministries and government agencies such as the Central Bank of Afghanistan's Statistical Bulletin, the World Bank, the United Nations (UN), World Bank open data, NASA, Ministry of Finance (MoF), Ministry of Economy (MoE), and Central Bank of Afghanistan's Statistical Bulletin (CBA), as well as the internet and news. There is an urgent need to ensure that taxes are collected in the most efficient manner possible because one of the enormous management gaps in Afghanistan over the last two decades has been tax evasion. According to the results of this study, tax evasion has a negative and significant impact on Afghanistan's economic growth. We can affirm that the subject of this article is among the most significant topics recently discussed in my country. If the right solutions are implemented, It can significantly contribute to quickening the cycle of the developing Afghan economy and turning it from an unstable to a sustainable one.

Challenges of Recruitment and Selection Process of Librarians in Federal University Libraries in South-South, Nigeria

  • Ufuoma, Eruvwe;Omekwu, Charles Obiora
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.2
    • /
    • pp.29-40
    • /
    • 2022
  • The study investigated the challenges of recruitment and selection process of librarians in federal university libraries in South-South, Nigeria. The study adopted a descriptive survey. The population of the study consists of 108 librarians. 95 copies of the questionnaire were filled and returned. The questionnaire was used in collecting data. The overall reliability of the instrument yielded 0.95 with the use of Cronbach Alpha Coefficient. Standard deviation and mean was used to generate the data that was gathered. The rating scale of 4 points was subjected to an estimation procedure using SPSS version 17.0. A mean score of 2.5 and above on any item was accepted. The findings revealed that the librarians identified the challenges to include ethnicity influence; favouritisms; recruitment based on godfatherism; dwindling budgetary allocation. The librarians also identified some of the strategies to include performance at interview as benchmark; equity and fairness as benchmark; recruitment should be done according to relevant discipline; and having channels for reporting cases of corruption during recruitment. Based on the above findings the study recommended among others that recruitment and selection of qualified librarians should be done according to the laid down procedures.

Quality Evaluation of e-Government Services: A Systematic Literature Sudan as a Case Study

  • Elmouez Samir Abd Elhameed Mohamed;Amgad Atta Abedelmageed Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.95-108
    • /
    • 2023
  • The technological revolution, also referred to as the Fourth Industrial Revolution, it embraced by government should transform the way governments serve their citizens. The growth of broadband in Africa is leapfrogging its technological development. And thus, many African governments will soon be able to offer quality e-Government services to their citizens. These technologically driven governments will be able to provide decision-makers with timeous information to make judgments that could influence policies. Proponents of e-Government believe that in the digital age, governments can use this information to reduce corruption and increase, accountability, transparency, efficiency, and public participation. e-Government service quality should ensure customer satisfaction. Although many studies have examined the role of e-Government and the quality of its services, few studies have examined the quality of e-Government services in terms of both supply and demand. This paper examines and reviews the academic-state-of-the-art on the factors that affect the quality of e-Government services from both perspectives. Utilizing both qualitative and quantitative methods for data gathering and analysis, a mixed methods research methodology was used.

Research of organized data extraction method for digital investigation in relational database system (데이터베이스 시스템에서 디지털 포렌식 조사를 위한 체계적인 데이터 추출 기법 연구)

  • Lee, Dong-Chan;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.565-573
    • /
    • 2012
  • To investigate the business corruption, the obtainments of the business data such as personnel, manufacture, accounting and distribution etc., is absolutely necessary. Futhermore, the investigator should have the systematic extraction solution from the business data of the enterprise database, because most company manage each business data through the distributed database system, In the general business environment, the database exists in the system with upper layer application and big size file server. Besides, original resource data which input by user are distributed and stored in one or more table following the normalized rule. The earlier researches of the database structure analysis mainly handled the table relation for database's optimization and visualization. But, in the point of the digital forensic, the data, itself analysis is more important than the table relation. This paper suggests the extraction technique from the table relation which already defined in the database. Moreover, by the systematic analysis process based on the domain knowledge, analyzes the original business data structure stored in the database and proposes the solution to extract table which is related incident.

A Study on Characteristics and Techniques that Affect Data Integrity for Digital Forensic on Flash Memory-Based Storage Devices (플래시 메모리 기반 저장장치에서 디지털 포렌식을 위한 데이터 무결성에 영향을 주는 특성 및 기술 연구)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.7-12
    • /
    • 2023
  • One of the most important characteristics of digital forensics is integrity. Integrity means that the data has not been tampered with. If evidence is collected during digital forensic and later tampered with, it cannot be used as evidence. With analog evidence, it's easy to see if it's been tampered with, for example, by taking a picture of it. However, the data on the storage media, or digital evidence, is invisible, so it is difficult to tell if it has been tampered with. Therefore, hash values are used to prove that the evidence data has not been tampered with during the process of collecting evidence and submitting it to the court. The hash value is collected from the stored data during the evidence collection phase. However, due to the internal behavior of NAND flash memory, the physical data shape may change over time from the acquisition phase. In this paper, we study the characteristics and techniques of flash memory that can cause the physical shape of flash memory to change even if no intentional data corruption is attempted.

Particle filter for Correction of GPS location data of a mobile robot (이동로봇의 GPS위치 정보 보정을 위한 파티클 필터 방법)

  • Noh, Sung-Woo;Kim, Tae-Gyun;Ko, Nak-Yong;Bae, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.381-389
    • /
    • 2012
  • This paper proposes a method which corrects location data of GPS for navigation of outdoor mobile robot. The method uses a Bayesian filter approach called the particle filter(PF). The method iterates two procedures: prediction and correction. The prediction procedure calculates robot location based on translational and rotational velocity data given by the robot command. It incorporates uncertainty into the predicted robot location by adding uncertainty to translational and rotational velocity command. Using the sensor characteristics of the GPS, the belief that a particle assumes true location of the robot is calculated. The resampling from the particles based on the belief constitutes the correction procedure. Since usual GPS data includes abrupt and random noise, the robot motion command based on the GPS data suffers from sudden and unexpected change, resulting in jerky robot motion. The PF reduces corruption on the GPS data and prevents unexpected location error. The proposed method is used for navigation of a mobile robot in the 2011 Robot Outdoor Navigation Competition, which was held at Gwangju on the 16-th August 2011. The method restricted the robot location error below 0.5m along the navigation of 300m length.

Design and Implementation of e2eECC for Automotive On-Chip Bus Data Integrity (차량용 온칩 버스의 데이터 무결성을 위한 종단간 에러 정정 코드(e2eECC)의 설계 및 구현)

  • Eunbae Gil;Chan Park;Juho Kim;Joonho Chung;Joosock Lee;Seongsoo Lee
    • Journal of IKEEE
    • /
    • v.28 no.1
    • /
    • pp.116-122
    • /
    • 2024
  • AMBA AHB-Lite bus is widely used in on-chip bus protocol for low-power and cost-effective SoC. However, it lacks built-in error detection and correction for end-to-end data integrity. This can lead to data corruption and system instability, particularly in harsh environments like automotive applications. To mitigate this problem, this paper proposes the application of SEC-DED (Single Error Correction-Double Error Detection) to AMBA AHB-Lite bus. It aims not only to detect errors in real-time but also to correct them, thereby enhancing end-to-end data integrity. Simulation results demonstrate real-time error detection and correction when errors occur, which bolsters end-to-end data integrity of automotive on-chip bus.

An Analysis of the Social Phenomena and Perceptions of the Special Case of Military Service System in Korean Sports Field Using Big Data (빅데이터분석을 통한 체육계 병역특례제도의 사회적 현상 및 인식분석)

  • Lee, Hyun-Jeong;Han, Hae-Won
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.4
    • /
    • pp.229-236
    • /
    • 2019
  • The purpose of this paper is to analyze social phenomena and perceptions by collecting and analyzing data on public opinion, views and trends related to special case of military service in the sports community through Big KINDS operated by the Korea Press Promotion Foundation. To this end, the related keywords were derived and visualized by implementing a LDA(latent dirichlet allocation) technique to derive problems found in social phenomena based on big data analysis. The topics derived include "re-lighting special case on military service," " military service corruption controversy," "special case of military service for athletes," "alternative military service system for artists " and "parliamentary inspection of the administration" This could be used as a basic data for identifying accurate information on social controversies related to special case of military service in the sports community and drawing up practical measures that are considered in line with the principle of just and equal burden.

Research on Advanced Methods for Data Extraction from Corrupted OOXML Files (손상된 OOXML 파일에서의 데이터 추출 고도화 방안 연구)

  • Jiyun Kim;Minsoo Kim;Woobeen Park;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.193-206
    • /
    • 2024
  • In tandem with the advancements in the digital era, the significance of digital data has escalated, necessitating an increased focus on digital forensics investigations. However, the process of collecting and analyzing digital evidence faces significant challenges, such as the unidentifiability of damaged files due to issues like media corruption and anti-forensic techniques. Moreover, the technological limitations of existing tools hinder the recovery of damaged files, posing difficulties in the evidence collection process. This paper aims to propose solutions for the recovery of corrupted MS Office files commonly used in digital data creation. To achieve this, we analyze the structure of MS Office files in the OOXML format and present a novel approach to overcome the limitations of current recovery tools. Through these efforts, we aim to contribute to enhancing the quality of evidence collection in the field of digital forensics by efficiently recovering and identifying damaged data.