Search or add a thesis

Advanced Search (Beta)
Home > Risk Management Issues in Coventional and Islamic Banking in Pakistan

Risk Management Issues in Coventional and Islamic Banking in Pakistan

Thesis Info

Access Option

External Link

Author

Khan, Muhammad Kashif

Program

PhD

Institute

Preston University

City

Kohat

Province

KPK

Country

Pakistan

Thesis Completing Year

2019

Thesis Completion Status

Completed

Subject

Management Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/11847/1/Muhammad%20Kashif_Mngt%20Sci%20%28Fin%29_2019_Preston_PRR.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676724992524

Similar


The basic thrust of current study is to measure the magnitude and to gauge the severity of financial risk on profitability associated with the Islamic and conventional banking in Pakistan. To realize the magnitude and enormity of financial risk the credit, liquidity, interest rate and market risks are considered as major constituent of risk management practices. The magnitude of credit risk was calculated through conventionally recognized quantitative models (Z-Score, Altman Z-score, NPL ratio and Distance to Default and Default Probabilities for Black Schole Merton’s Model) whereas, the enormity of liquidity risk calculated through ratios including; cash and cash equivalent to total assets, investment to total assets and provision for net advances to total assets. Likewise, interest rate risk was computed by applying historical Gap Identification Model. The market risk was estimated through Value at Risk (VaR) Model at 90%, 95% and 99% confidence intervals. To gauge the combined effect of risk management practices on profitability and to realize the appropriate applicability of fixed or random effect model the Hauseman test was applied. The computed results of credit risk found Islamic banks hold more risk whereas the probability of bankruptcy in near future felt more in conventional banks relative to Islamic banks. The overall findings of liquidity risk revealed conventional banks possess a sound liquidity arrangement than Islamic banks. The sensitivity of interest rate on the volatility of interest income and the variability of liabilities as compared with assets were bit high among conventional banks. By and large, the calculated results of market risk inferred the volatility and potential to loss investment remained high in Islamic banks. Though, severity of financial crisis-2008 profusely hit the profitability of both banking systems but the Islamic banks felt more aggressively. The enormity of the credit risk accentuate management of the Islamic banks to give more emphasis on the credit risk whereas, the State Bank of Pakistan will have to keenly think on the changing paradigm of the interest rate sensitivity on the conventional banks and formulate unified strategies which may widely adopted by the conventional banks and prevent from future trauma.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

دل محمد دلشاد

دل محمد دلشاد (۱۸۰۰ء پ) گلی حکیماں محلہ سیداں (کوچہ بند) پسرور میں پیدا ہوئے۔ آپ اپنے فارسی اشعار میں ایک جگہ اس کی طرف اشارہ بھی کرتے ہیں :

یکے دو دست عجب تال آپس شش پہلو                        بشش جہات بہ پنجاب گو کہ ثانی آں است   

دلیل شادی دلشاد نام ایں شہراست                             کہ پر سرور طرب بخش عالم دل و جاں است  (۱۱)

آپ فارسی اور اردو کے بہترین شاعر ہونے کے علاوہ عالمِ دین بھی تھے۔ دلشاد کے کلام میں حد درجے کی پختگی اور سادگی عیاں ہے۔ وہ اپنی تشبیہات اور استعارے حالاتِ حاضرہ اور دیگر نشیب و فرازِ حیات سے اخذ کرتے ہیں۔ ان کے کلام میں بے حد جاذبیت اور شرینی موجزن ہے۔ اُن کا زیادہ کلام قصائد اور غزلیات پر مشتمل ہے۔

قاضی عطاء اﷲ اپنی کتاب ’’شعرائے پسرور‘‘ میں دلشاد کے بارے میں رقمطراز ہیں:

دل محمد دلشاد پسروری انیسویں صدی کے معروف فارسی اور اردو شاعر ہیں۔ آپ نے متداولہ علوم و فنون اغلباً سیالکوٹ جیسے علم و حکمت کے شہر سے حاصل کئے۔ منطق ‘ سلوک‘ اخلاق‘ فقہ اور شعری علم میں کمال حاصل کیا۔ (۱۲)

مذکورہ بالا علوم میں مہارت دلشاد کے ایک فارسی شعر سے واضح ہوتی ہے:

از علم شعر و منطق‘ فقہ و سلوک و اخلاص                    دارد تمام لیکن دلشاد زر نہ داد       (۱۳)

آپ کا زیادہ تر اردو کلام مفقود ہے۔ مختلف اردو تذکروں میں آپ کا کلام ملتا ہے۔ آپ کا فارسی دیوان ادارہ تحقیقاتِ پاکستان دانشگاہ پنجاب لاہور نے ۱۹۷۰ء میں شائع کیا۔ (۱۴) عشقِ مجازی‘ محبوب کی بے اعتنائی‘ بے وفائی‘ عشوہ وغمزہ وادا دلشاد کی اردو غزلوں کے موضوعات ہیں۔ حافظ محمود شیرانی نے اپنی تالیف ’’پنجاب میں اردو‘‘ میں دلشاد کی چند غزلیں نقل کی ہیں۔ ان اشعار میں دلشاد اپنے محبوب سے شکوہ کرتے نظر آتے ہیں۔ کلاسیکی اردو شاعری کے روایتی محبوب کی طرح...

تفسیر در منثور اور موضوعی روایات: ایک تحقیقی جائزہ

Abstract: Jalal-al-Din Al-Suyuti is famus scholar who has compiled a full fledge and long tafsir known as Al-Durr Al-Ma'thurfit al-tafsir Al-Ma'thur. This work is a masterpiece and is of the unique nature, but unfortunately he has quoted some fabricated narrations in his Tafseer. This article deals with below points: Introductions of Jalal-al-Din al Suyuti Deflation of fabricated Narration Introduction ofAl-Durr Al-Ma'thurfi al-Tafsir Al-Ma'thur Technical analysis of fabricated narrations Outputs of the research based article. The aim of the article is to protect the great narrations of Prophet (SA W) not to devalue the great work of Imam al-Suyutti.

Cope With a Malicious Host in Mobile Adhoc Networks Manet

From a security perspective, a jamming attack is easy to launch and relatively hard to detect. Jamming attacks are generally directed towards seizing the medium completely by transmitting fake packets violating the medium access protocol, either constantly or periodically. This work analyzes the effects of different types of jammers using Conservation of Flow (CoF), which has been useful for detecting other attacks in wired networks. Additionally, simulation results are presented in justification of proposed methodology. With the miniaturization of wireless devices, the popularity and usage has increased in recent past, especially due to portability. Since the design of such devices does not primarily emphasize heavy computation and secure communication, these are treated as add-ons. In setting up an ad hoc network rather than choosing all or more than the channels offered by 802.11 standard, only a single channel is generally utilized to minimize delay and synchronization issues. However, by using additional available multiple channels, significant gain in terms of overall system performance can be achieved. This, and other limitations like a shared medium which is open to all, attracts intruders in wireless networks. Mainly, the use of a lone channel can become single point of failure in case of an attack, especially a jamming attack. In contrast to other security attacks, no special hardware and computation is required in launching jamming attacks. Additionally, even if the attacker does not get hold of the communication, he can emit radio signals periodically to jam legitimate conversation. Thus, legitimate nodes escape physically or logically to avoid a jammer at the cost of additional overhead involving coordination amongst nodes to resume communication. The overhead involved in either of the methods is considered worthy in terms of regaining the performance of the network. In this thesis, a couple of MAC layer-based algorithms are proposed to mitigate the effects of jamming attacks efficiently; the first is a reactive mechanism and the second is a proactive proposal. The work starts with an investigation of different jamming types and their effects on wireless communication. For this purpose, a simulation model was developed and the resulting data set was verified using AI algorithms, which predicted 98% accuracy. Next, a reactive technique namely packet-feed is proposed to keep the jammer busy on the jammed channel. Once the nodes detect the existence of the jammer and hop to another channel, they alternatively visit the earlier channel to feed the jammer with valid packets. This way, the nodes pretend to the jammer that the earlier channel is still in use. Finally, a proactive channel hopping protocol is proposed where each node has a separate and dynamically selected control channel. Additionally, rather than each of them feeding the other its channel hopping sequence, both parties coordinate to come up with a new channel where data transfer can take place. Thus, provision of redundant channels is provided to each node. Following on from this, the proposed idea is analyzed with the existence of a jammer.