Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s...Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.展开更多
Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum servic...Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value.展开更多
Investments in the exploitation of the continent’s raw material reserves have resulted in little (positive) impact on the energy security situation within Africa. This paper attempts to explore factors influencing th...Investments in the exploitation of the continent’s raw material reserves have resulted in little (positive) impact on the energy security situation within Africa. This paper attempts to explore factors influencing the level of energy security of Small Medium Enterprises (SMEs) in the Greater Accra Region of Ghana, and from the dimension of availability, affordability, economic efficiency and environmental stewardship or sustainability of energy. The cross-sectional survey design was employed as the design for the collection and analysis of data. The study applied a quantitative research method in examining the indicators of energy security for SMEs in Accra Metropolis in the Greater Accra Region of Ghana. The population covered about 500 SMEs who have about 100 employees and total revenue of $1 million or the equivalence in Ghana Cedis. A sample of 246 was selected through a cluster and simple random sampling. The analysis adopted statistical techniques to conduct descriptive, exploratory and inferential analysis of the data collected. Factors that influence the level of energy security of SMEs are broadly categorized into the environment and economic change, political factors, physical disruptions and market conditions. Ge- nerally, the level of energy security under the availability dimension is medium among the SMEs. Issues of affordability, economic efficiency and environmental stewardship provide high medium interventions on energy security for SMEs. It is recommended that managers of Ghana’s energy sector should ensure prudent management of the country’s energy resources since the disruption of supply lines or sources form the key conditions that influence the energy security level of SMEs. SMEs should adopt energy efficiency measures to ensure that energy is conserved for future use.展开更多
Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC...Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.展开更多
文摘Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures.
文摘Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value.
文摘Investments in the exploitation of the continent’s raw material reserves have resulted in little (positive) impact on the energy security situation within Africa. This paper attempts to explore factors influencing the level of energy security of Small Medium Enterprises (SMEs) in the Greater Accra Region of Ghana, and from the dimension of availability, affordability, economic efficiency and environmental stewardship or sustainability of energy. The cross-sectional survey design was employed as the design for the collection and analysis of data. The study applied a quantitative research method in examining the indicators of energy security for SMEs in Accra Metropolis in the Greater Accra Region of Ghana. The population covered about 500 SMEs who have about 100 employees and total revenue of $1 million or the equivalence in Ghana Cedis. A sample of 246 was selected through a cluster and simple random sampling. The analysis adopted statistical techniques to conduct descriptive, exploratory and inferential analysis of the data collected. Factors that influence the level of energy security of SMEs are broadly categorized into the environment and economic change, political factors, physical disruptions and market conditions. Ge- nerally, the level of energy security under the availability dimension is medium among the SMEs. Issues of affordability, economic efficiency and environmental stewardship provide high medium interventions on energy security for SMEs. It is recommended that managers of Ghana’s energy sector should ensure prudent management of the country’s energy resources since the disruption of supply lines or sources form the key conditions that influence the energy security level of SMEs. SMEs should adopt energy efficiency measures to ensure that energy is conserved for future use.
文摘Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts.