Search results

1 – 10 of over 12000
Book part
Publication date: 18 July 2022

Maryam Saeed and Noman Arshed

Background: Insurance was discovered many centuries before Christ (BC). In the second and third millennia BC, Chinese and Babylonian traders traded risks. Insurance is now the…

Abstract

Background: Insurance was discovered many centuries before Christ (BC). In the second and third millennia BC, Chinese and Babylonian traders traded risks. Insurance is now the backbone of the economy, but penetration is low in developing countries. Big data, internet of things (IoT), and InsurTech have recently ushered in the fourth industrial revolution in insurance.

Objective: This study examines the Indian challenges and solutions of using Big Data Analytics (BDA).

methodology: A SLR was used to extract themes/variables related to challenges and solutions in adopting BDA in the Indian insurance sector. Google Scholar was searched for relevant literature using keywords. Inclusion and exclusion criteria were used to filter the studies.

Findings: This study identified several barriers to BDA adoption in the Indian insurance industry. Policymakers could use the suggestions to improve insurance service delivery.

Practical implication: Insurers can understand the challenges, and accordingly, they can adopt the proposed solution in this study to enhance the insurance penetration in India.

Details

Big Data Analytics in the Insurance Market
Type: Book
ISBN: 978-1-80262-638-4

Keywords

Book part
Publication date: 16 November 2016

Roberto Fantozzi

The tax evasion phenomenon affects the economic systems of European countries in different ways. The literature shows that individuals provide biased information both to…

Abstract

The tax evasion phenomenon affects the economic systems of European countries in different ways. The literature shows that individuals provide biased information both to administrative agencies and household surveys. The effects of tax evasion could thus influence the income inequality computed in official statistics.

In this paper, I investigate whether tax evasion generates a bias when inequality indices are computed using household survey data. To achieve this, I apply a parametric model of the Dagum type (three parameters) on the gross personal income of 27 European countries, distinguishing between the self-employed and employees. Subsequently, the parameters computed in the model are used as dependent variables in seemingly unrelated regressions.

I find that for the self-employed, tax evasion tends to reduce inequality as measured by regular wage statistics. Thus, the results reveal that tax evasion distorts inequality indices, generating an underground inequality.

Details

Inequality after the 20th Century: Papers from the Sixth ECINEQ Meeting
Type: Book
ISBN: 978-1-78560-993-0

Keywords

Book part
Publication date: 6 September 2021

Gerhard Peschers

The chapter “Books Open Worlds for People Behind Bars” by Gerhard Peschers gives an insight into library services in correctional facilities in Germany on different levels…

Abstract

The chapter “Books Open Worlds for People Behind Bars” by Gerhard Peschers gives an insight into library services in correctional facilities in Germany on different levels, ranging from local best practice examples (e.g., Berlin, Bremen, Dortmund, and Würzburg) via regional experiences – focusing on longstanding experiences in North Rhine-Westphalia, in particular the outstanding former Münster prison library which was awarded the German national Library Prize “Library of the Year 2007” – and nationwide subjects to grown internationality based on long-term integration into the library community. Fundamental issues include history and the legal basis of prison libraries as well as practical experiences on various levels of responsibility and its diverse scope of tasks, such as collection development, data processing, interior design, events, and cooperation with city libraries.

The outlook provides the state of play and the challenges regarding digitalization for the development of prison libraries.

Finally, the author’s dream of the book tree on the prison wall, which found international resonance, invites you to share the vision of dialog and tolerance across dividing walls.

Book part
Publication date: 22 April 2015

Price Fishback

During the 1930s Franklin Roosevelt’s New Deal created a wide range of spending and loan programs. Brief descriptions are provided for the programs created by the New Deal and…

Abstract

During the 1930s Franklin Roosevelt’s New Deal created a wide range of spending and loan programs. Brief descriptions are provided for the programs created by the New Deal and loan and spending programs that were in place before the New Deal. I worked with others to create a panel data set with estimates of the spending and lending by the programs each year from 1930 through 1940. The data aggregated to broad categories are reported here and the methods and sources used to construct the estimates of the spending and lending for the categories are discussed.

Details

Research in Economic History
Type: Book
ISBN: 978-1-78441-782-6

Keywords

Book part
Publication date: 29 August 2018

Paul A. Pautler

The Bureau of Economics in the Federal Trade Commission has a three-part role in the Agency and the strength of its functions changed over time depending on the preferences and…

Abstract

The Bureau of Economics in the Federal Trade Commission has a three-part role in the Agency and the strength of its functions changed over time depending on the preferences and ideology of the FTC’s leaders, developments in the field of economics, and the tenor of the times. The over-riding current role is to provide well considered, unbiased economic advice regarding antitrust and consumer protection law enforcement cases to the legal staff and the Commission. The second role, which long ago was primary, is to provide reports on investigations of various industries to the public and public officials. This role was more recently called research or “policy R&D”. A third role is to advocate for competition and markets both domestically and internationally. As a practical matter, the provision of economic advice to the FTC and to the legal staff has required that the economists wear “two hats,” helping the legal staff investigate cases and provide evidence to support law enforcement cases while also providing advice to the legal bureaus and to the Commission on which cases to pursue (thus providing “a second set of eyes” to evaluate cases). There is sometimes a tension in those functions because building a case is not the same as evaluating a case. Economists and the Bureau of Economics have provided such services to the FTC for over 100 years proving that a sub-organization can survive while playing roles that sometimes conflict. Such a life is not, however, always easy or fun.

Details

Healthcare Antitrust, Settlements, and the Federal Trade Commission
Type: Book
ISBN: 978-1-78756-599-9

Keywords

Abstract

Details

A Machine Learning, Artificial Intelligence Approach to Institutional Effectiveness in Higher Education
Type: Book
ISBN: 978-1-78973-900-8

Book part
Publication date: 18 July 2022

Priti Rani Rajvanshi, Taranjeet Singh, Deepa Gupta and Mukul Gupta

Introduction: The frequency and complexity of cyber assaults have grown in recent years. Consequently, organisations have increased their expenditures in more robust…

Abstract

Introduction: The frequency and complexity of cyber assaults have grown in recent years. Consequently, organisations have increased their expenditures in more robust infrastructure to protect themselves from these cyber assaults. These organisations’ assets, data, and reputations are at risk due to rapidly increasing cybercrimes. However, complete protection from these many and ever-changing threats is very challenging as a result. To deal with them, companies are taking steps to reduce risks and limit company losses in their occurrence.

Purpose: Progressively, the insurance sector organisations are including digital protection as a component of the board’s general danger technique. Protection enterprises, then again, depend on accurately expecting risks, while a significant number of them depend on normalised approaches. Because of the exceptional attributes of the digital assaults, transporters now and again depend on subjective strategies dependent on master decisions. There is an unmistakeable absence of observational information on digital protection, specifically subjective examinations planning to comprehend and depict necessities, impediments, and cycles applicable for digital protection.

Methodology: There are various unanswered inquiries and worries about the oversight and legitimate and administrative assessment of network safety weaknesses in the protection business. In the wake-up of looking over all these worries and issues, steps to alleviate them are laid out after an extensive literature survey and secondary data sources. In this study, the authors have principally viewed the executive parts of the associations as the danger. While considering network protection, their insight of needs was taken as one among a few dangerous treatment systems, just as the necessities of the organisations’ protection in assessing the danger level of likely customers.

Findings: This section analyses past research in network safety and information security in the protection market. The danger of the executives’ strategies, the numerical models, and the forecasts of digital occassions are illustrated in this section. Lastly, the future headings are likewise expressed momentarily.

Practical implications: This review might be valuable for additional examination and logical discussion, yet additionally for down-to-earth applications. Moreover, it could be gainful to organisations as a supportive instrument for better agreement on what digital protection is and how to get ready to take on network safety and information security procedures in the association.

Significance: These associations’ resources, information, and notoriety are in danger because of quickly expanding cybercrimes. Cybercriminals are utilising more refined approaches to start digital assaults. Digital protection was anticipated to affect security conduct before any proof was gathered. Progressively, organisations are including digital protection as a feature of their general danger to the executive system. Because of the exceptional attributes of the digital assaults, transporters as often as possible depend on subjective methods dependent on master decisions. Thus, this space of network safety and information security is vital uniquely in the protection market.

Details

Big Data Analytics in the Insurance Market
Type: Book
ISBN: 978-1-80262-638-4

Keywords

Book part
Publication date: 4 December 2020

Hiral R. Patel, Ajay M. Patel and Satyen M. Parikh

The multimedia data are also known as interactive data. The multimedia is progressively turning into the “greatest big data” which are the most imperative and important hotspot…

Abstract

The multimedia data are also known as interactive data. The multimedia is progressively turning into the “greatest big data” which are the most imperative and important hotspot for bits of knowledge and data. The multimedia data also provide incredible open door for the multimedia computing in the big data centric as a functioning disciplinary research field. As per current technological usage in terms of Internet or smart devices, the data manipulate in the form of digital. Massive multimedia data have been produced in the different forms like text, image, video, and audio which is shared among vast number of people. The multimedia data are real-time unstructured, heterogeneous, and multimodal. It has vast scope to mine model, learn, and analyze the service provided by multimedia. Of course, some primarily level challenges need to be addressed like analysis, storage, retrieval, and data processing. The most complicated thing in multimedia big data (MMBD) analytics is that the computer cannot understand higher level of semantics. The quality of experience (QoE) is the most evolving part of MMBD which are directly intended with storage and performance. MMBD are highly resource intensive. They often require dedicated processing capabilities in terms of graphical processing unit (GPU). An advance-level storage-related mechanism is also needed for efficient parallel processing, transmission, and presentation. Generally, non-multimedia data are always forming in text which is normally understood by machine. The multimedia data always in the form of videos are easily understood by human compared to textual data, but it is more complex task to make it understandable to machines. The MMBD performs the task by converting the human language to computer language in an efficient manner. This chapter is also introducing salient features of MMBD. The main aim of this chapter is to cover the fundamentals for MMBD computing and feasibility study. The chapter explores the technical problems and challenges to be addressed. It also focuses on methodologies and approaches that are available from the perspectives of MMBD computing life cycle. The chapter may be beneficial for the readers to understand the features, importance and application of MMBD.

Book part
Publication date: 18 November 2022

Tobias Polzer and Dunli Li

Digitalisation, big data and data analytics are hot topics for today's economic sectors. Given these trends, developing information technology capabilities of those who wish to…

Abstract

Purpose

Digitalisation, big data and data analytics are hot topics for today's economic sectors. Given these trends, developing information technology capabilities of those who wish to join the public sector workforce has been emphasised in public administration teaching curricula. In this chapter, focusing on the public sector, we ask: What kind of data is published by governments and how can these data be used in teaching data analytics?

Design/Method

Against the backdrop of the growing importance of data analytics in public sector management curricula, this chapter uses the IMPACT cycle model to demonstrate how datasets from open government data portals can be used for teaching.

Findings

Several examples are shown to illustrate the different steps of the IMPACT cycle model. Concluding remarks include a reflection where potential caveats, dysfunctions and limits of data analytics are outlined.

Originality

The chapter explicitly focuses on ‘real world’ open government data published on open data portals. A holistic approach to data analytics ‘from start to finish’ is shown, including preparing datasets for the analysis and presenting results to line managers, whereas some of the previous work solely shows parts (e.g. testing the data).

Details

Reimagining Public Sector Management
Type: Book
ISBN: 978-1-80262-022-1

Keywords

1 – 10 of over 12000