With common borders of the population, total area, and GDP (PPP-based) of Economic Cooperation Organization (ECO) member states are estimated as 416 million persons, 7.9 million m2, and US$2.7 trillion respective...With common borders of the population, total area, and GDP (PPP-based) of Economic Cooperation Organization (ECO) member states are estimated as 416 million persons, 7.9 million m2, and US$2.7 trillion respectively (2010 data). Although heterogeneous in the extent, there is economic development, overall, with serious energy and transport-transit relations among countries that is reflected in growing trade turnover year-by-year. However, there are still rather unused resources and capacity in such areas of cooperation among countries as exchange of energy, transport services, agricultural and industrial goods, use of opportunities for tourism, promoting investment and innovation processes and other areas. Certainly, maximum and optimal use of these resources calls for availability of analytical means capable of accounting for relations both within member states and among them. The implementation of computable general equilibrium (CGE) modeling in each member state would thus be of great significance in resolution of these problems both in terms of accounting for input-output linkages within the countries as well as enabling impact of main trading partners and goods and services among countries. The analysis carried out indicates that there are a number of problems in application of CGE model in most of the member states. As such, input-output tables are not compiled in some countries, while in others despite the fact that these tables are compiled, there are no attempts to build the model, yet in other countries, even if the CGE model is implemented, there are difficulties in taking into account the real results in the face of serious problems related to improving national accounts system database. Summarizing these problems, it is possible to conclude that to ensure the application of a CGE model,there is a great need to work out procedures of compilation of a social accounts matrix (SAM) that lies on the basis of this model, for which the relevant statistics of a member state must be improved. Considering the above-mentioned, the presented research, makes procedures and proposals on compilation of SAM, improves statistical data for researching the extent of application of CGE Model in ECO member states, and identifies the degree of availability and organization of relevant data to develop input-output tables and respective SAM.展开更多
Are citizens morally obligated to obey and support their states? "Political Obligations and Authority" is perhaps A. John Simmons' most comprehensive summary of his mature views on this enduring philosophical prob...Are citizens morally obligated to obey and support their states? "Political Obligations and Authority" is perhaps A. John Simmons' most comprehensive summary of his mature views on this enduring philosophical problem. In this essay, Simmons critically engages Plato's dialogue Crito and culls from it three types of strategies for justifying political obligations: natural duty, associative, and transactional. Simmons argues that natural duty accounts are inherently incapable of providing moral grounding for political obligations, disqualifies both associative and transactional accounts on empirical grounds, and settles for a form of anarchism. I argue, assuming as Simmons does in this essay that natural duties imply obligations of support and obedience to political institutions, that the natural duty strategy promises to provide an escape route out of anarchism.展开更多
To better promote forest resource management and strengthen the development of forest carbon sink marketization, this paper studied the accounting of forest carbon sinks from 2003 to 2008 based on a system of national...To better promote forest resource management and strengthen the development of forest carbon sink marketization, this paper studied the accounting of forest carbon sinks from 2003 to 2008 based on a system of national accounts (SNA) and data from the latest forest resources inventory in China. The study calculated the value of forest carbon stocks at a total of RMB 817.13 × 10^9 yuan in 2003 and RMB 839.93×10^9 yuan in 2008, with an average annual increase of 0.55 % from an increase in physical carbon sinks. The total value of forest carbon sinks in 2003 and 2008 was RMB 26.73×10^9 yuan and RMB 29.77×10^9 yuan, respectively, with an average annual growth of 2.18 %. From 2003 to 2008, both stock and flow value of forest carbon sinks increased, but the total net flow value of carbon sinks decreased. The growth rate for the environmentally adjusted Gross Domestic Product (eaGDP) for China's forest carbon sinks was 17.23 %, outstripping the average growth rate of 9.5 % for the GDP during the same period. The study alsoindicates that China's forest carbon sinks affects the GDP in the range of 0.25-0.26 %, and its economic potential is not relatively huge.展开更多
A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino ...A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However,human memorability constrains the number of keys. Single sign-on server,key hashing,key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name,but numeric 4-digit passcode,key hashing,key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.展开更多
The Third Plenary Session of the 18 th Central Committee of the Communist Party of China has proposed an important national strategic decision: to explore and establish the balance sheet of natural resources, to imple...The Third Plenary Session of the 18 th Central Committee of the Communist Party of China has proposed an important national strategic decision: to explore and establish the balance sheet of natural resources, to implement leaders’ of-office auditing system about natural resources assets. Water is one of the most essential nature resources of human beings; water resources accounting, as an important water resources management tool, is an essential part of compiling the natural resources balance sheet. In this paper, we provide a summary of the historic evolution of water resources accounting and analyze its application in some typical countries. Although water resources accounting and water resources balance sheet reflect different implications and focus, both require water resources accounts as the basis in system establishment.展开更多
The value-added output of new industries,new types of business and new business models accounted for 15.7% of China’s GDP last year,up 0.4% from2016,the National Bureau of Statistics(NBS)said recently.
“New Accounts of Old Episodes”is a classic handed down in China,which reflects the personality image and charm of the scholars in the Wei and Jin dynasties with the original ecological narrative technique.The schola...“New Accounts of Old Episodes”is a classic handed down in China,which reflects the personality image and charm of the scholars in the Wei and Jin dynasties with the original ecological narrative technique.The scholars of the Wei and Jin Dynasties were detached,facing the world with an aesthetic attitude beyond secular utilitarianism,etiquette,and real life,establish a graceful social stage of vulgarity,create a unique personality beauty,providing valuable ideological wealth for the cultivation of poetic spirit,poetic dwelling,aesthetic style,transcend personality,and wisdom.展开更多
The People’s Bank of China promulgated andput in force days ago Regulation on Foreign Ex-change Accounts in China, according to which for-eign individuals or legal persons can open foreignexchange accounts to keep fo...The People’s Bank of China promulgated andput in force days ago Regulation on Foreign Ex-change Accounts in China, according to which for-eign individuals or legal persons can open foreignexchange accounts to keep foreign exchange fortrading B stock in China.As stipulated by the regulation, as to foreigncurrency stock accounts opened bydomestic insti-tutions with the income from issuing stocks, theirreceipt shall be income from issuing stocks anddisbursement shall be used for the purposes pro-vided for in the prospectus approved by securitiessupervising organs; as to foreign exchange ac-counts opened by foreign individuals or legal per-sons for trading B stocks in China.their receipt shallbe the income of trading stocks and foreign ex-change remitted or brought in from abroad, andtheir disbursement shall be used for buying andselling stocks.As provided in the regulation, for the purposeof opening B stock account to trade B stocks展开更多
Five years ago,Chinese government vowed to bring its energy consumption down by 20%against unit gross domestic product(GDP) during 2006 - 2010,an ambitious but realistic target laid down in a clear-cut term in its 11t...Five years ago,Chinese government vowed to bring its energy consumption down by 20%against unit gross domestic product(GDP) during 2006 - 2010,an ambitious but realistic target laid down in a clear-cut term in its 11th Five-Year Plan for Economic and Social Development.It’s time to finish the goal, but how?展开更多
The aim of this paper is to present different aspects of creativity in accounting. Firstly, since creative accounting allows to present a company's financial condition in a more favourable light, the "advantages" o...The aim of this paper is to present different aspects of creativity in accounting. Firstly, since creative accounting allows to present a company's financial condition in a more favourable light, the "advantages" of this creativity are identified. This is followed by the enumeration of negative aspects of creative accounting, to illustrate how creativity in accounting may help to falsify the true picture of a company's business. Next, the concept of creative accounting and aggressive accounting (the latter, identified rightly, with a financial and accounting fraud) is explained. Finally, methods that are commonly used to falsify accounts, as well as the premises for and the circumstances in which such criminal practices occur, are presented. The paper draws on the results of other scientific works (books and articles published in scientific journals) in which the main and most interesting views of other authors have been presented. A critical analysis method was employed, followed by a comparison of legal texts and legal acts. The scientific conclusion was conducted using the deduction, and, partially, the induction method. It has been shown that it is justified to differentiate in accounting between creativity that is allowable within the established legal limits and practice based upon the use of creativity in a manner contrary to law. Further, it has been concluded that where creativity in accounting goes beyond the limits unambiguously established by the law, it definitely carries attributes of an offence. It has been also noted that due to continuous changes in the functioning conditions of enterprises, the above mentioned limits cannot be fixed or rigid. Thus it is necessary to control and analyse the creativity of accounting and financial staff working in enterprises in order to adapt the binding regulations to the needs of current markets.展开更多
Accounting standardization in black African French-speaking countries is presented through two streams of research.The first stream presents the general chart of accounts common to all these countries as an accounting...Accounting standardization in black African French-speaking countries is presented through two streams of research.The first stream presents the general chart of accounts common to all these countries as an accounting model which reconciles the divergences between the Anglo-Saxon and continental approaches to accounting,and thereby satisfies the requirements of users of accounting information.The second stream considers that the convergence towards IAS/IFRS is a vital way of attracting international investors and increasing development.This article stands by the second perspective and analyzes the changes introduced in the PCG-OHADA(2017)compared to the PCG-OHADA(2000).It shows that the new provisions of the PCG-OHADA are mainly inspired by IAS 1,IAS 16,IAS 19,IAS 36,IAS 38,IAS 40,and IFRS 6.展开更多
Accounts receivables are amounts that customers owe on account, which resulting from sale goods and services. Compames generally expect to collect accounts receivable within 30 to 60 days. Sales and profits can be inc...Accounts receivables are amounts that customers owe on account, which resulting from sale goods and services. Compames generally expect to collect accounts receivable within 30 to 60 days. Sales and profits can be increased by granting customers the privileges of making payment a month or more after the date of sale. The accounts receivable play significant important role in company' s flow of funds, lots of companies was bankrupted and going bankrupt because capital turnover is so bad in reality, so that how to strength the management of the accounts receivable becomes the key in the process of making the industry survive and develop. Especially the construction industry, it will produce a large amount of the accounts receivable because of the it ' s own character of whole industry. This text will to come up with the corresponding countermeasure by analyzing accounts receivable management situation and the influence to companies and forming causes.展开更多
As large numbers of user information on various network services are becoming valuable resources for social computing,how to associate user information scattered in a variety of services turns to one of the key issues...As large numbers of user information on various network services are becoming valuable resources for social computing,how to associate user information scattered in a variety of services turns to one of the key issues of user identity mining.First this paper outlines the difficulties of dealing with account association,then describes the basis of account association method.After that,this paper sums up account association methods mainly from five aspects which are user naming conventions,user profiles,user writing styles,user online behavior,and user community relationship.Finally,this paper points out the development direction and prospects of account association.展开更多
Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution ...Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms.Specifically,a new owner of a reassigned number can access the application account with which the number is associated,and may perform fraudulent activities.Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users.Thus,alternative solutions that depend on only the information of the applications are imperative.In this work,we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers.Our analysis on Meituan's real-world dataset shows that compromised accounts have unique statistical features and temporal patterns.Based on the observations,we propose a novel model called temporal pattern and statistical feature fusion model(TSF)to tackle the problem,which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features.Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines,demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.展开更多
The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society.Detecting compromised email accounts is more challenging than in the social network field,where ema...The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society.Detecting compromised email accounts is more challenging than in the social network field,where email accounts have only a few interaction events(sending and receiving).To address the issue of insufficient features,we propose a novel approach to detecting compromised accounts by combining time zone differences and alternate logins to identify abnormal behavior.Based on this approach,we propose a compromised email account detection framework that relies on widely available and less sensitive login logs and does not require labels.Our framework characterizes login behaviors to identify logins that do not belong to the account owner and outputs a list of account-subnet pairs ranked by their likelihood of having abnormal login relationships.This approach reduces the number of account-subnet pairs that need to be investigated and provides a reference for investigation priority.Our evaluation demonstrates that our method can detect most email accounts that have been accessed by disclosed malicious IP addresses and outperforms similar research.Additionally,our framework has the capability to uncover undisclosed malicious IP addresses.展开更多
There is a broad acceptance to depicting the relationship between ecosystems and human well-being using the concept of ecosystem services,emanating in large from the findings and research published in the Millennium E...There is a broad acceptance to depicting the relationship between ecosystems and human well-being using the concept of ecosystem services,emanating in large from the findings and research published in the Millennium Ecosystem Assessment in 2005.While the generic concept of ecosystem services provides an excellent platform for discussion,the ongoing lack of clarity surrounding the definition,clas sification and measurement of ecosystem services,is emerging as a barrier to more extensive collaboration across disciplines.This paper applies the principles of national accounting to bring additional rigor and consistency to the discussion on ecosystem services.In this paper we revisit four fundamental aspects of the System of National Accounts(SNA)that underpin the measurement of the economy,namely,the definition of economic units;the definition of production;the recording of transactions and the recording assets.By considering each of these aspects in the context of the United Nations'System of Environmental-Economic Accounting,the paper presents a framework to describe the relationship between ecosystems and human aativity that can then be used to consistently define,classify,measure and account for ecosystem services.展开更多
Health care costs are high and continue to rise in most major economies,and the health savings account(HSA)is often viewed as an appealing way to contain health care costs because it can potentially solve the moral ha...Health care costs are high and continue to rise in most major economies,and the health savings account(HSA)is often viewed as an appealing way to contain health care costs because it can potentially solve the moral hazard spending caused by traditional health insurance.This study uses data from the China Household Finance Survey(CHFS)to empirically examine the effectiveness of HSAs in containing medical expenses and reducing moral hazard.The findings show that HSAs that restrict the use of funds may lead enrollees to discount the value and thus spend more on health care.In addition,the positive effect of HSAs on medical expenses is larger for the relatively healthier group,which may suggest that moral hazard exists regarding the use of HSA funds.The empirical estimates of the HSA effect on medical expenses are robust when a set of covariates are controlled,and HSA balances are instrumented using housing savings account balances.展开更多
In Decentralized Machine Learning(DML)systems,system participants contribute their resources to assist others in developing machine learning solutions.Identifying malicious contributions in DML systems is challenging,...In Decentralized Machine Learning(DML)systems,system participants contribute their resources to assist others in developing machine learning solutions.Identifying malicious contributions in DML systems is challenging,which has led to the exploration of blockchain technology.Blockchain leverages its transparency and immutability to record the provenance and reliability of training data.However,storing massive datasets or implementing model evaluation processes on smart contracts incurs high computational costs.Additionally,current research on preventing malicious contributions in DML systems primarily focuses on protecting models from being exploited by workers who contribute incorrect or misleading data.However,less attention has been paid to the scenario where malicious requesters intentionally manipulate test data during evaluation to gain an unfair advantage.This paper proposes a transparent and accountable training data sharing method that securely shares data among potentially malicious system participants.First,we introduce a blockchain-based DML system architecture that supports secure training data sharing through the IPFS network.Second,we design a blockchain smart contract to transparently split training datasets into training and test datasets,respectively,without involving system participants.Under the system,transparent and accountable training data sharing can be achieved with attribute-based proxy re-encryption.We demonstrate the security analysis for the system,and conduct experiments on the Ethereum and IPFS platforms to show the feasibility and practicality of the system.展开更多
文摘With common borders of the population, total area, and GDP (PPP-based) of Economic Cooperation Organization (ECO) member states are estimated as 416 million persons, 7.9 million m2, and US$2.7 trillion respectively (2010 data). Although heterogeneous in the extent, there is economic development, overall, with serious energy and transport-transit relations among countries that is reflected in growing trade turnover year-by-year. However, there are still rather unused resources and capacity in such areas of cooperation among countries as exchange of energy, transport services, agricultural and industrial goods, use of opportunities for tourism, promoting investment and innovation processes and other areas. Certainly, maximum and optimal use of these resources calls for availability of analytical means capable of accounting for relations both within member states and among them. The implementation of computable general equilibrium (CGE) modeling in each member state would thus be of great significance in resolution of these problems both in terms of accounting for input-output linkages within the countries as well as enabling impact of main trading partners and goods and services among countries. The analysis carried out indicates that there are a number of problems in application of CGE model in most of the member states. As such, input-output tables are not compiled in some countries, while in others despite the fact that these tables are compiled, there are no attempts to build the model, yet in other countries, even if the CGE model is implemented, there are difficulties in taking into account the real results in the face of serious problems related to improving national accounts system database. Summarizing these problems, it is possible to conclude that to ensure the application of a CGE model,there is a great need to work out procedures of compilation of a social accounts matrix (SAM) that lies on the basis of this model, for which the relevant statistics of a member state must be improved. Considering the above-mentioned, the presented research, makes procedures and proposals on compilation of SAM, improves statistical data for researching the extent of application of CGE Model in ECO member states, and identifies the degree of availability and organization of relevant data to develop input-output tables and respective SAM.
文摘Are citizens morally obligated to obey and support their states? "Political Obligations and Authority" is perhaps A. John Simmons' most comprehensive summary of his mature views on this enduring philosophical problem. In this essay, Simmons critically engages Plato's dialogue Crito and culls from it three types of strategies for justifying political obligations: natural duty, associative, and transactional. Simmons argues that natural duty accounts are inherently incapable of providing moral grounding for political obligations, disqualifies both associative and transactional accounts on empirical grounds, and settles for a form of anarchism. I argue, assuming as Simmons does in this essay that natural duties imply obligations of support and obedience to political institutions, that the natural duty strategy promises to provide an escape route out of anarchism.
基金supported by National Key Social Science Research Project(11&ZD042)Forestry Public Welfare Scientific Research Project of the State Forestry Administration in China(200904003)DAAD-K.C.Wong Postdoctoral Fellowship Programme,Germany
文摘To better promote forest resource management and strengthen the development of forest carbon sink marketization, this paper studied the accounting of forest carbon sinks from 2003 to 2008 based on a system of national accounts (SNA) and data from the latest forest resources inventory in China. The study calculated the value of forest carbon stocks at a total of RMB 817.13 × 10^9 yuan in 2003 and RMB 839.93×10^9 yuan in 2008, with an average annual increase of 0.55 % from an increase in physical carbon sinks. The total value of forest carbon sinks in 2003 and 2008 was RMB 26.73×10^9 yuan and RMB 29.77×10^9 yuan, respectively, with an average annual growth of 2.18 %. From 2003 to 2008, both stock and flow value of forest carbon sinks increased, but the total net flow value of carbon sinks decreased. The growth rate for the environmentally adjusted Gross Domestic Product (eaGDP) for China's forest carbon sinks was 17.23 %, outstripping the average growth rate of 9.5 % for the GDP during the same period. The study alsoindicates that China's forest carbon sinks affects the GDP in the range of 0.25-0.26 %, and its economic potential is not relatively huge.
文摘A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However,human memorability constrains the number of keys. Single sign-on server,key hashing,key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name,but numeric 4-digit passcode,key hashing,key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.
基金supported by the Chinese Science Academy STS Program: Natural Resources Balance Sheet Research and Application (KFJ-EW-STS-001)National Natural Science Funds Key Project (Grant No. 91125019)National Natural Science Youth Foundation (Grant No. 41401645)
文摘The Third Plenary Session of the 18 th Central Committee of the Communist Party of China has proposed an important national strategic decision: to explore and establish the balance sheet of natural resources, to implement leaders’ of-office auditing system about natural resources assets. Water is one of the most essential nature resources of human beings; water resources accounting, as an important water resources management tool, is an essential part of compiling the natural resources balance sheet. In this paper, we provide a summary of the historic evolution of water resources accounting and analyze its application in some typical countries. Although water resources accounting and water resources balance sheet reflect different implications and focus, both require water resources accounts as the basis in system establishment.
文摘The value-added output of new industries,new types of business and new business models accounted for 15.7% of China’s GDP last year,up 0.4% from2016,the National Bureau of Statistics(NBS)said recently.
文摘“New Accounts of Old Episodes”is a classic handed down in China,which reflects the personality image and charm of the scholars in the Wei and Jin dynasties with the original ecological narrative technique.The scholars of the Wei and Jin Dynasties were detached,facing the world with an aesthetic attitude beyond secular utilitarianism,etiquette,and real life,establish a graceful social stage of vulgarity,create a unique personality beauty,providing valuable ideological wealth for the cultivation of poetic spirit,poetic dwelling,aesthetic style,transcend personality,and wisdom.
文摘The People’s Bank of China promulgated andput in force days ago Regulation on Foreign Ex-change Accounts in China, according to which for-eign individuals or legal persons can open foreignexchange accounts to keep foreign exchange fortrading B stock in China.As stipulated by the regulation, as to foreigncurrency stock accounts opened bydomestic insti-tutions with the income from issuing stocks, theirreceipt shall be income from issuing stocks anddisbursement shall be used for the purposes pro-vided for in the prospectus approved by securitiessupervising organs; as to foreign exchange ac-counts opened by foreign individuals or legal per-sons for trading B stocks in China.their receipt shallbe the income of trading stocks and foreign ex-change remitted or brought in from abroad, andtheir disbursement shall be used for buying andselling stocks.As provided in the regulation, for the purposeof opening B stock account to trade B stocks
文摘Five years ago,Chinese government vowed to bring its energy consumption down by 20%against unit gross domestic product(GDP) during 2006 - 2010,an ambitious but realistic target laid down in a clear-cut term in its 11th Five-Year Plan for Economic and Social Development.It’s time to finish the goal, but how?
文摘The aim of this paper is to present different aspects of creativity in accounting. Firstly, since creative accounting allows to present a company's financial condition in a more favourable light, the "advantages" of this creativity are identified. This is followed by the enumeration of negative aspects of creative accounting, to illustrate how creativity in accounting may help to falsify the true picture of a company's business. Next, the concept of creative accounting and aggressive accounting (the latter, identified rightly, with a financial and accounting fraud) is explained. Finally, methods that are commonly used to falsify accounts, as well as the premises for and the circumstances in which such criminal practices occur, are presented. The paper draws on the results of other scientific works (books and articles published in scientific journals) in which the main and most interesting views of other authors have been presented. A critical analysis method was employed, followed by a comparison of legal texts and legal acts. The scientific conclusion was conducted using the deduction, and, partially, the induction method. It has been shown that it is justified to differentiate in accounting between creativity that is allowable within the established legal limits and practice based upon the use of creativity in a manner contrary to law. Further, it has been concluded that where creativity in accounting goes beyond the limits unambiguously established by the law, it definitely carries attributes of an offence. It has been also noted that due to continuous changes in the functioning conditions of enterprises, the above mentioned limits cannot be fixed or rigid. Thus it is necessary to control and analyse the creativity of accounting and financial staff working in enterprises in order to adapt the binding regulations to the needs of current markets.
文摘Accounting standardization in black African French-speaking countries is presented through two streams of research.The first stream presents the general chart of accounts common to all these countries as an accounting model which reconciles the divergences between the Anglo-Saxon and continental approaches to accounting,and thereby satisfies the requirements of users of accounting information.The second stream considers that the convergence towards IAS/IFRS is a vital way of attracting international investors and increasing development.This article stands by the second perspective and analyzes the changes introduced in the PCG-OHADA(2017)compared to the PCG-OHADA(2000).It shows that the new provisions of the PCG-OHADA are mainly inspired by IAS 1,IAS 16,IAS 19,IAS 36,IAS 38,IAS 40,and IFRS 6.
文摘Accounts receivables are amounts that customers owe on account, which resulting from sale goods and services. Compames generally expect to collect accounts receivable within 30 to 60 days. Sales and profits can be increased by granting customers the privileges of making payment a month or more after the date of sale. The accounts receivable play significant important role in company' s flow of funds, lots of companies was bankrupted and going bankrupt because capital turnover is so bad in reality, so that how to strength the management of the accounts receivable becomes the key in the process of making the industry survive and develop. Especially the construction industry, it will produce a large amount of the accounts receivable because of the it ' s own character of whole industry. This text will to come up with the corresponding countermeasure by analyzing accounts receivable management situation and the influence to companies and forming causes.
文摘As large numbers of user information on various network services are becoming valuable resources for social computing,how to associate user information scattered in a variety of services turns to one of the key issues of user identity mining.First this paper outlines the difficulties of dealing with account association,then describes the basis of account association method.After that,this paper sums up account association methods mainly from five aspects which are user naming conventions,user profiles,user writing styles,user online behavior,and user community relationship.Finally,this paper points out the development direction and prospects of account association.
基金supported by the National Natural Science Foundation of China(Nos.62072115,62202402,61971145,and 61602122)the Shanghai Science and Technology Innovation Action Plan Project(No.22510713600)+2 种基金the Guangdong Basic and Applied Basic Research Foundation,China(Nos.2022A1515011583 and 2023A1515011562)the One-off Tier 2 Start-up Grant(2020/2021)of Hong Kong Baptist University(Ref.RCOFSGT2/20-21/COMM/002)Startup Grant(Tier 1)for New Academics AY2020/21 of Hong Kong Baptist University and Germany/Hong Kong Joint Research Scheme sponsored by the Research Grants Council of Hong Kong,China,the German Academic Exchange Service of Germany(No.G-HKBU203/22),and Meituan。
文摘Phone number recycling(PNR)refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner.It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms.Specifically,a new owner of a reassigned number can access the application account with which the number is associated,and may perform fraudulent activities.Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users.Thus,alternative solutions that depend on only the information of the applications are imperative.In this work,we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers.Our analysis on Meituan's real-world dataset shows that compromised accounts have unique statistical features and temporal patterns.Based on the observations,we propose a novel model called temporal pattern and statistical feature fusion model(TSF)to tackle the problem,which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features.Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines,demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.
基金supported by the Youth Innovation Promotion Association CAS(No.2019163)the Strategic Priority Research Program of Chinese Academy of Sciences(No.XDC02040100)the Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences and Beijing Key Laboratory of Network security and Protection Technology.
文摘The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society.Detecting compromised email accounts is more challenging than in the social network field,where email accounts have only a few interaction events(sending and receiving).To address the issue of insufficient features,we propose a novel approach to detecting compromised accounts by combining time zone differences and alternate logins to identify abnormal behavior.Based on this approach,we propose a compromised email account detection framework that relies on widely available and less sensitive login logs and does not require labels.Our framework characterizes login behaviors to identify logins that do not belong to the account owner and outputs a list of account-subnet pairs ranked by their likelihood of having abnormal login relationships.This approach reduces the number of account-subnet pairs that need to be investigated and provides a reference for investigation priority.Our evaluation demonstrates that our method can detect most email accounts that have been accessed by disclosed malicious IP addresses and outperforms similar research.Additionally,our framework has the capability to uncover undisclosed malicious IP addresses.
文摘There is a broad acceptance to depicting the relationship between ecosystems and human well-being using the concept of ecosystem services,emanating in large from the findings and research published in the Millennium Ecosystem Assessment in 2005.While the generic concept of ecosystem services provides an excellent platform for discussion,the ongoing lack of clarity surrounding the definition,clas sification and measurement of ecosystem services,is emerging as a barrier to more extensive collaboration across disciplines.This paper applies the principles of national accounting to bring additional rigor and consistency to the discussion on ecosystem services.In this paper we revisit four fundamental aspects of the System of National Accounts(SNA)that underpin the measurement of the economy,namely,the definition of economic units;the definition of production;the recording of transactions and the recording assets.By considering each of these aspects in the context of the United Nations'System of Environmental-Economic Accounting,the paper presents a framework to describe the relationship between ecosystems and human aativity that can then be used to consistently define,classify,measure and account for ecosystem services.
文摘Health care costs are high and continue to rise in most major economies,and the health savings account(HSA)is often viewed as an appealing way to contain health care costs because it can potentially solve the moral hazard spending caused by traditional health insurance.This study uses data from the China Household Finance Survey(CHFS)to empirically examine the effectiveness of HSAs in containing medical expenses and reducing moral hazard.The findings show that HSAs that restrict the use of funds may lead enrollees to discount the value and thus spend more on health care.In addition,the positive effect of HSAs on medical expenses is larger for the relatively healthier group,which may suggest that moral hazard exists regarding the use of HSA funds.The empirical estimates of the HSA effect on medical expenses are robust when a set of covariates are controlled,and HSA balances are instrumented using housing savings account balances.
基金supported by the MSIT(Ministry of Science and ICT),Korea,under the Special R&D Zone Development Project(R&D)—Development of R&D Innovation Valley support program(2023-DD-RD-0152)supervised by the Innovation Foundation.It was also partially supported by the Ministry of Science and ICT(MSIT),Korea,under the Information Technology Research Center(ITRC)support program(IITP-2024-2020-0-01797)supervised by the Institute for Information&Communications Technology Planning&Evaluation(IITP).
文摘In Decentralized Machine Learning(DML)systems,system participants contribute their resources to assist others in developing machine learning solutions.Identifying malicious contributions in DML systems is challenging,which has led to the exploration of blockchain technology.Blockchain leverages its transparency and immutability to record the provenance and reliability of training data.However,storing massive datasets or implementing model evaluation processes on smart contracts incurs high computational costs.Additionally,current research on preventing malicious contributions in DML systems primarily focuses on protecting models from being exploited by workers who contribute incorrect or misleading data.However,less attention has been paid to the scenario where malicious requesters intentionally manipulate test data during evaluation to gain an unfair advantage.This paper proposes a transparent and accountable training data sharing method that securely shares data among potentially malicious system participants.First,we introduce a blockchain-based DML system architecture that supports secure training data sharing through the IPFS network.Second,we design a blockchain smart contract to transparently split training datasets into training and test datasets,respectively,without involving system participants.Under the system,transparent and accountable training data sharing can be achieved with attribute-based proxy re-encryption.We demonstrate the security analysis for the system,and conduct experiments on the Ethereum and IPFS platforms to show the feasibility and practicality of the system.