• Title/Summary/Keyword: Northern Border University

Search Result 86, Processing Time 0.02 seconds

Risk Management Functions and Audit Report Lag among Listed Saudi Manufacturing Companies

  • OMER, Waddah Kamal Hassan;ALJAAIDI, Khaled Salmen;AL-MOATAZ, Ehsan Saleh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.8
    • /
    • pp.61-67
    • /
    • 2020
  • This paper examines whether the combination of risk management and audit committee functions are associated with audit report lag. Audit report lag is considered an important aspect of the financial reporting. The financial reports are the main source of information for shareholders through which they make their decisions and it assists in reducing the information asymmetry. As the internal control mechanisms substitute the external ones, the internal board committees formed by the board of directors can reduce the audit work and, consequently, reduces the audit report lag. A key committee is the risk management committee. This paper examines whether the combination of risk management and audit committee functions are associated with audit report lag. We posit that a combination of such functions in one committee refereed as audit committee affects the audit report delay. Data were obtained from 198 manufacturing companies listed on the Saudi Stock Exchange (Tadawul) for the years 2016-2018. A pooled OLS regression analysis shows that a combination of risk management and audit committee functions in a stand-alone committee named "audit committee" is associated with longer audit report lag. The outcomes suggest companies should prioritize the establishment of standalone risk management committee with activities separated from those of audit committees.

A Multi-Stage Approach to Secure Digital Image Search over Public Cloud using Speeded-Up Robust Features (SURF) Algorithm

  • AL-Omari, Ahmad H.;Otair, Mohammed A.;Alzwahreh, Bayan N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.65-74
    • /
    • 2021
  • Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.

Effectiveness Score of the Board of Directors and Modified Audit Opinion: Empirical Evidence from Malaysian Publicly-Listed Companies

  • OMER, Waddah Kamal Hassan;ALJAAIDI, Khaled Salmen;YUSOF, Mohd Atef Md.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.8
    • /
    • pp.289-296
    • /
    • 2020
  • The study investigates the association between the effectiveness of the board of directors and the likelihood that a company receives a modified audit opinion (as a measure of the quality of companies' external financial reporting) in Malaysia. The sample companies were extracted from the population of publicly-available information mainly the annual reports of publicly-listed companies on the Bursa Malaysia. 136 firm-year observations listed on Bursa Malaysia were identified to examine the relationship between the effectiveness of the board of directors and a modified audit opinion. Data used in this study are collected from two separate sources - annual reports and Datastream. Any missing financial figure from Datastream was acquired from the annual reports. To test the study's hypotheses, we use the pooled cross-sectional logistic regression analysis for 136 firm-year observations listed on Bursa Malaysia over the period 2009-2011. The evidence we have uncovered is consistent with the hypothesis that companies with large score of the board of directors' effectiveness are less possible to receive a modified audit opinion. Therefore, the result confirms that the combined effect of the board of directors' characteristics has a significant negative association with the likelihood of the companies receiving a modified audit opinion.

Corporate Governance Mechanisms in Saudi Arabia: The Case of Family Ownership with Audit Committee Activity

  • WAKED, Sami;ALJAAIDI, Khaled
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.151-156
    • /
    • 2021
  • This paper empirically examines the relationship between one of the major corporate governance attributes; family ownership and the audit committee activity across a sample of 430 publicly traded firms on the Saudi Stock Exchange (Tadawul) for the period 2012-2019. Using the Pooled OLS regression, this study finds that family ownership is negatively associated with audit committee activity. This study reported that family ownership is negatively associated with audit committee activity, giving support to the convergence-of-interest hypothesis. Therefore, the existence of family ownership as a monitoring corporate governance mechanism substitutes the audit committee activity as another monitoring mechanism. This study provides empirical evidence on the associations of two internal corporate governance mechanisms, namely; family ownership and audit committee activity in the Saudi context where there is a paucity of research in this area. The findings of this study provide a new understanding regarding the extent to which family ownership impacts the activity of audit committees in manufacturing companies. Similarly, the companies' management, external auditors, bankers, and companies would also benefit from understanding the influential factors of the audit committee activities.

The Market Orientation from Dual Perspectives: Customers and Managers Perceptions in Tunisian Banks

  • Najjar, Faouzi;Missaoui, Yosra
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.31-42
    • /
    • 2021
  • Several studies have been conducted on market orientation over the last three decades. However, the majority of previous research focused exclusively on an internal vision that conceives the market orientation from an organizational perspective, considering the market orientation as a strictly perceived culture or behavior by company's staff (managers and employees) .This study aims to emphasize the importance of analyzing the market orientation from a dual perspective by investigating simultaneously the perceptions of customers and those of managers. It examines the perceptual gap or perceptual congruence of market orientation between customers and managers. A survey is conducted with Tunisian bank managers and B to B customers to measure their market orientation perception. The results should reveal level of manager's market orientation in Tunisian banks compared to customers' perceptions. The perception gaps of market orientation between managers and customers named congruence is highlighted and categorized. This study provides some contributions to fill the gap emerging from the one-sidedness of market orientation evaluation and gives a dyadic vision of market orientation that helps managers in their continuous learning about markets and sensing customers' needs and expectations. Market orientation level between the two groups is evaluated to give some managerial recommendations.

Baekdu Mountain's East Flowing Streams on the Old Map of Korea (한국 고지도에 표현된 백두산 동류 수계)

  • Moon, Sang Myeoung
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.2
    • /
    • pp.259-281
    • /
    • 2013
  • This research aims to analyze Baekdu mountain are with it's the east flowing streams which are the issues on the old maps. Also, it will analyze the eastern flows, Tomoon river; Boongye river; Dooman river, from Baekdu mountain which have been the border settlement issues since Josun dynasty. Also, it will analyze the north-eastern flows, Heukryong river; Songhwa river; Sockpyung river; Tomoon river; Boongye river; Dooman river, from Baekdu mountain which have been the border settlement issues since Josun dynasty. The mainly issued Baekdu mountain's north-eastern flows can be classified into six different flows by the classifications, it proves that there are various Baekdu mountain north-eastern flows on the old maps. the two streams theory of Tomoon and Doman river explains the perspective of the northern expansion, and the one stream theory expresses it by stating Boongye and Sockpyung river as the same one. However, in the case of the meaning of Boongye river is Haeran river on the middle of one stream theory map, there is no region expanding perspective but the same border perspective that Korean peninsula and China match. Boongye river is expressed into four different meanings. (1) It is the same river with Sockpyung and shows the regional expanding perception. (2) It is the same river with Tomoon and the down stream of Tomoon river.(3) It expresses the current name, Haeran river. (4) It simply means the river shows the boundary.

  • PDF

The Climate of Korea in the View of the Climatic Year (연후(年候)에서 본 한국(韓國)의 기후(氣候))

  • Kang, Man-Suk
    • Journal of the Korean association of regional geographers
    • /
    • v.3 no.1
    • /
    • pp.1-12
    • /
    • 1997
  • The climatic characteristics of Korea are analized with the data observed from 1972 to 1995 in 66 stations, using the climatic year method expressed by the $K{\ddot{o}}ppen's$ system of climatic classification. The climate of Korea is composed of the six climatic year types : Cfa, Cwa, Cwb, Dfa, Dwa and Dwb type. The Cwa and Dwa type occupy 95% occurrence frequency. The Cwa climatic year type predominates in the greater part of the Southern Area, the east slopes of the Taebaek Range and Cheju-do, the Dwa type does in Yongso Area and the northeastern part of Kyonggi Province. and the Cfa type does in Ullung-do. Such dominant climatic year regions become the stable climatic regions, while the regions where the various climatic types appear become the unstable climatic regions which are distributed in the northern part of the Southern Area and in the southern part of the Central Area owing to the shifts of the border between C type and D type. The border between C and D type is located in the Central Inland Area in the first half of the 1990's which the Cwa type predominates most. On the other hand the border is located in the middle part of the Southern Area in the first half of the 1980's which the Dwa type prevails most. Therefore the extents of the climatic year regions vary each year. In the interannual change of the main climatic year types, the Cwa type shows the increasing trend, while the Cfa and Dwa type reflets the decreasing tendency. The extending trend of the Cwa climatic year region appears during the period of the first half of the 1970's and the period between the latter half of the 1980's and the first half of the 1990's centering around the Southern Area. The Dwa climatic year region which was predominant in the Central Area in the first half of the 1980's has been reduced up till the recent years.

  • PDF

The Moderating Role of Ownership Concentration on the Relationship between Board Composition and Saudi Bank Performance

  • HABTOOR, Omer Saeed
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.675-685
    • /
    • 2020
  • The main purpose of this study is to investigate the potential effect of ownership concentration on the relationship between board composition and bank performance. The study employs a sample of Saudi banks listed on Saudi stock exchange (TADAUWL) over the period from 2011 to 2018. To test the study hypotheses and control for endogeneity issues, the Ordinary Least Square (OLS) and the Two-Stage Least Squares (2SLS) techniques are used. The empirical results reveal a significant negative moderating effect of ownership concentration on the association between board composition and bank performance, which confirms the study argument and supports hypotheses. The results indicate that board composition in terms of independent board members, executive board members, and non-executive board members in banks with higher ownership concentration have a weaker positive influence on bank performance. For control variables, the results are almost consistent with theoretical perspectives and previous empirical evidence. The results of this study have important implications for regulatory authorities, companies, and market participants in Saudi Arabia and countries with high concentrated ownership to understand how ownership concentration could affect corporate governance and firm performance and to identify appropriate actions to protect board composition from the influence of ownership concentration.

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.