Search or add a thesis

Advanced Search (Beta)
Home > Islamic Concept and Corporate Social Responsibility in Banking Sector of Pakistan: Comparative Analysis

Islamic Concept and Corporate Social Responsibility in Banking Sector of Pakistan: Comparative Analysis

Thesis Info

Access Option

External Link

Author

Durrani, Bilal

Program

PhD

Institute

Qurtuba University of Science and Information Technology

City

Peshawar

Province

KPK

Country

Pakistan

Thesis Completing Year

2019

Thesis Completion Status

Completed

Subject

Management Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/14651/1/Bilal%20Durani%20mngt%20sci%202019%20qurtuba%20uni%20peshwar%20prr.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676724820344

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


The today‘s dynamic business environment demand organizations to meet expectations about good governance, business ethics and social responsibility. The research study aimed to describe the Islamic and conventional concept of Corporate Social Responsibility (CSR) by establishing their relationship with organization performance and draw comparison between the effectiveness of CSR in their performance. Top 3 Islamic and conventional banks were selected on the basis of superior performance as published in the year 2013. The secondary data were collected from annual reports, web sites and descriptive statistics revealed that conventional banks allocating increase amount on CSR practices, mostly in Education, Sports and Collaboration with Government. On other side, Islamic banks are found more inclined towards Health, Arts and Culture, Water purification, Special person, Relief & Disaster recovery & Social welfare. However both modes of banks are found mostly inclined towards philanthropic perspective. The primary data collected through survey from bank customers and employees and was tested through STATA. The finding of Regression analysis reveals that conventional banks were actively investing in dimensions like Human rights, fair labor practices, ethical conduct and community development initiatives. Almost similar findings were also found in Islamic banks. The results indicated that there is a significant relationship between CSR and organization performance in the context of customer satisfaction and employee performance. However, there is a need to develop a standard and comprehensive CSR framework for both banks regarding CSR practices in Pakistan.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

’’نیل کے سنگ‘‘پر ایک نظر

نیل کے سنگ ‘‘پر ایک نظر

                                                                                                                ایڈوکیٹ بشیر مراد

                                                                                                                                آزاد کشمیر

شاعری کے لیے کچھ نہیں کرنا پڑتا یہ کھڑے کھڑے ہو جاتی ہے۔ بعض اوقات تو سوئے سوئے بھی سر زد ہو جاتی ہے کہ اس کا تعلق آمد سے ہے جس کے لیے جامد ہونے کی قطعاً ضرورت نہیں۔ لیکن نثر کا معاملہ الگ ہے۔ اس کے لیے باقاعدہ اکڑوں ہو کے بیٹھنا پڑتا ہے۔ یعنی یہ وہ ریاضت ہے جو حالت رکوع میں کی جاتی ہے۔

نثری اصناف میں سفر نامہ تو اور بھی جوکھم کا کام ہے کہ اس کی طلب میں سفر بھی کرنا پڑتا ہے جو بسا اوقات انگریزی کا Suffer ثابت ہوتا ہے۔ گویا یہ ادب کی ایسی صنفِ گراں بار ہے جس کو صنفِ نازک کی طرح قابو کرنا آسان نہیں ہوتا۔ اس کے حصول کے لیے شدید مارا ماری اور بے تحاشا جتن کرنے پڑتے ہیں۔ پہلے سفر کرنے کا سلیقہ اور پھر اسے بیان کرنے کا قرینہ ہونا چاہیے۔

ہمارے دوست ڈاکٹر یوسف میر کی محبت کہ ڈاکٹر الطاف یوسف زئی کا مصری سفر نامہ ارسال کیا۔ مشاہدہ عام ہے کہ یوسف نام کے لوگ خوب صورت ہوتے ہیں۔ پھر بندہ ذات کا بھی یوسف زئی ہو اور مصر سے محبت نہ ہو یہ کیسے ممکن ہے۔ پس یہ طے ہے کہ یہ سفر نامہ سراسر فطری محبت کا شاخسانہ ہے۔ اگر یقین نہ آئے تو پڑھ کر دیکھ لیجیے۔

کچھ سفر نامے تو محض سفر کی صعوبت برادشت کرنے کی خاطر لکھے جاتے ہیں جن کے پڑھنے سے قاری کو بھی شدید تھکاوٹ ہوتی ہے۔ اس قبیل کے سفر نامے یوں شروع ہوتے ہیں۔

’’میں صبح سویرے جاگا ،...

Analysis Strategic of Ticket Purchase at Traveloka in Pangkalan Kerinci City Communities

The study is aimed at determining the influence of Trust, Customer Review, and Customer Rating on Buying Interest. The population of the study is a community of Kerinci Base City and the sampling method used in this study is non-probability sample. Primary and secondary data are used for analysis. The analysis was done with double linear regression and SPSS 25 program. The results of the research show that the Trust, Customer Review, and Customer Rating variables have a significant influence on Buy Interest in part, while the f test shows that the trust, customer review, and customer rating variables simultaneously exert a significant impact on buy interest, with the R square of 0.612. This shows that overall, the Trust variables, customer reviews and customer ratings exert significant influences on Buying Interest.

Cope With a Malicious Host in Mobile Adhoc Networks Manet

From a security perspective, a jamming attack is easy to launch and relatively hard to detect. Jamming attacks are generally directed towards seizing the medium completely by transmitting fake packets violating the medium access protocol, either constantly or periodically. This work analyzes the effects of different types of jammers using Conservation of Flow (CoF), which has been useful for detecting other attacks in wired networks. Additionally, simulation results are presented in justification of proposed methodology. With the miniaturization of wireless devices, the popularity and usage has increased in recent past, especially due to portability. Since the design of such devices does not primarily emphasize heavy computation and secure communication, these are treated as add-ons. In setting up an ad hoc network rather than choosing all or more than the channels offered by 802.11 standard, only a single channel is generally utilized to minimize delay and synchronization issues. However, by using additional available multiple channels, significant gain in terms of overall system performance can be achieved. This, and other limitations like a shared medium which is open to all, attracts intruders in wireless networks. Mainly, the use of a lone channel can become single point of failure in case of an attack, especially a jamming attack. In contrast to other security attacks, no special hardware and computation is required in launching jamming attacks. Additionally, even if the attacker does not get hold of the communication, he can emit radio signals periodically to jam legitimate conversation. Thus, legitimate nodes escape physically or logically to avoid a jammer at the cost of additional overhead involving coordination amongst nodes to resume communication. The overhead involved in either of the methods is considered worthy in terms of regaining the performance of the network. In this thesis, a couple of MAC layer-based algorithms are proposed to mitigate the effects of jamming attacks efficiently; the first is a reactive mechanism and the second is a proactive proposal. The work starts with an investigation of different jamming types and their effects on wireless communication. For this purpose, a simulation model was developed and the resulting data set was verified using AI algorithms, which predicted 98% accuracy. Next, a reactive technique namely packet-feed is proposed to keep the jammer busy on the jammed channel. Once the nodes detect the existence of the jammer and hop to another channel, they alternatively visit the earlier channel to feed the jammer with valid packets. This way, the nodes pretend to the jammer that the earlier channel is still in use. Finally, a proactive channel hopping protocol is proposed where each node has a separate and dynamically selected control channel. Additionally, rather than each of them feeding the other its channel hopping sequence, both parties coordinate to come up with a new channel where data transfer can take place. Thus, provision of redundant channels is provided to each node. Following on from this, the proposed idea is analyzed with the existence of a jammer.