Search or add a thesis

Advanced Search (Beta)
Home > Effective Risk Management in Commercial Banks

Effective Risk Management in Commercial Banks

Thesis Info

Author

Riaz-ul-Islam

Department

Department of Management Sciences

Program

Mphil

Institute

National University of Modern Languages

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2013

Subject

Management Sciences

Language

English

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676728778676

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


This research study was conducted to find out the factors and indicators of risks in commercial banks and their effective risk management. It may be helpful to the stockholders who are concerned with the risk level: a bank faces and the management may use it to get a clear view of institution's standing and can decide future action plan for managing their financial risk. This study also provides a clear view of financial factors that by managing will lead to reduce the ultimate financial risk. The source of data collection for this study is primary and secondary. Questionnaire is used for primary data collection and annual reports of the banks are used for secondary data collection. The sample consists of banks from Rawalpindi and Islamabad. Ten (10) commercial Banks from both cities were chosen at random. 30 different branches of all banks were selected for this study. There were hundred (100) respondents who have completed the questionnaire. The extent of interest shown by outside parties is a very basic factor that leads to financial risk. The more is the interest of outside parties higher will be the risk. The data of the survey depicts that a lot of interest is shown by the outside parties in the banks. Another factor is Regulatory / Contractual of the bank have an affect on the overall risk management. The banks in the survey are facing a high level of regulatory / contractual requirements. These increase the complexity and diversity of the banking system. The ratio analysis indicates an in consistency of the banks in their focusing areas.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

طاقت کا زور

طاقت کا زور ،حاکم اور محکوم میں فاصلہ

                ہمارا ہمیشہ سے یہ المیہ رہا ہے کہ ہم اس حقیقت کو بھول جاتے ہیں کہ دنیا فانی  ہے۔ ہر شے زوال پذیر ہو جائے گی۔ پھر بھی قوت و اقتدار کے ملتے ہی ہم خود کو طاقتور گردانتے ہوئے اپنی زندگی کو حقیقت سے دور لے جاتے ہیں۔ ماضی کے دریچوں سے اگر جھانکیں تو بے شمار ایسے واقعات ملیں گے مگر عصر حاضر میں بھی اس  میں شدت بڑھتی ہی گئی۔ خاص طور پر مشرقی ممالک میں حاکم اور محکوم کے درمیان بڑھتے ہوئے فاصلے ہیں کہ جس کے نتیجے میں عام عوام کے خواب کانچ کی مانند ریزہ ریزہ ہو جاتے ہیں۔ ایسے چکنا چور کے جن کے شیشے آنکھوں اور ہاتھوں کو مزید چھلنی کر جاتے ہیں۔ دل میں نئی نئی امنگیںامیدیں سر اٹھاتی ہیں اوربالآخر گمنامی میں گم ہوجاتی ہیں۔ دل میں ہمیشہ یہ احساس ہوتا ہے ، کاش یہ اقتدار رکھنے والی قوتیں اس احساس کو ہمیشہ دامن گیر رکھتیں کہ اقتدار صرف اور صرف ایک ڈھلتے سائے کا نام ہے۔اقتدار نہ رہے گا تو خود کی زندگی بھی پھر دل میں آخری خواہش کی طرح سسکی کے ساتھ دم توڑ دے گی۔کاش وہ دن جان پاتے کہ اقتدار ایک آفتاب لب کوہ کا نام ہے۔ یہ حاکم و محکوم کے درمیان فاصلے آشوب قیامت برپا کیے ہوئے ہیں۔اقتدار رکھنے  والی مقتدر قوتوں کو یہ علم ہونا چاہیے کہ عوام کی فلاح و اصلاح ہی ان کے اقتدار کا واحد جواز ہے۔انہوں نے بھی کہانی میں کچھ اس طرح  ہی حاکم و محکوم کے فاصلے کا ذکر کیا ہے کہ کس طرح انگریزوں کی حکومت رہی ، ہندو اور مسلمان  جو کہ آپس کے جھگڑوں میں بھی انگریز حکومت کے پابند تھے اور انگریز حکومت فیصلہ صادر کرنے...

A Study of Pakistan’s Various Reform Policies Regarding Islamic Seminaries

ABSTRACT: Pakistan is an Islamic country based on Islamic ideology where society has an emotional attachment with religion, hence an expanded network of Dini Modaris [traditional institutions of Islamic learning] is prevailing in urban as well as in rural areas of the country; where the teaching- learning process remains continue in a traditional way. While on other hand, at the same time, modern education system is followed by government and non-government run institutions. These two different systems with different ideologies and pedagogical techniques have produced two different social classes with different world views about the way Pakistan should be managed. This situation of education system is worrying. In an Islamic welfare state, ideally speaking, serious efforts are required to be done in order to eliminate the gulf between the two systems entirely having antagonistic approaches. In such perspective, this paper is aimed to study the efforts and practical steps, taken for the reforms and development of Dini Modaris by various governments of Pakistan as per their policies.

A Specification-Based Distributed Intrusion Detection Framework for Wireless Sensor Network

Wireless Sensor Networks (WSNs) have a great potential to assist in storing and processing data collected from tiny sensors placed in various environments such as smart homes, vehicles, hospitals, enemy surveillance areas, volcanoes, oceans, etc. The sensors may be implanted to inspect the physical aspects of the external environment such as temperature, moisture, humidity, pressure, motion, magnetic fields, light, sound, gravity, vibration, electrical fields, and others or inspect the physical aspects of the internal environments such as motion of the organism, glucose level, oxygen level and others. The data recorded by these sensors can further be used for several applications as well as services. Here, the data is acquired from sensors through the wireless medium. Recent studies show that WSNs are vulnerable to various kinds of security threats and there is a requirement of a security solution that can safeguard them from lethal attacks. Several security schemes have been proposed in the recent past to counter the attacks launched at different layers of WSNs. Intrusion detection systems (IDS) focus on the detection of malicious activity at the network layer. Most of the proposed IDS based security approaches for WSNs lack completeness with respect to data acquisition, detection policy and the way actions should be taken once the malicious behavior is detected. Further, they lack the proper testing of the proposed schemes with respect to the performance metrics such as energy consumption, throughput, false positive rate, intrusion detection rate, and accuracy etc. Hence, there is a requirement of a purely distributed security scheme that works independently and communicates the anomalous behavior of sensor nodes with the base station (BS). The scheme should be lightweight and is able to perform efficiently with respect to energy efficiency and throughput. Moreover, it should be able to achieve low false positive rate and high detection rate. In this thesis, a novel intrusion detection framework is proposed for securing WSNs from routing attacks. The proposed system works in a distributed environment to detect intrusions by collaborating with the neighboring nodes. It works in two modes: online prevention allows safeguarding from those abnormal nodes that are already declared as malicious, while offline detection finds those nodes that are being compromised by an adversary during the next epoch of time. The proposed framework is a specification-based detection framework that works for a flat WSN scenario. To test the performance of the proposed framework, a simulator is implemented, and results are produced. The results show that a centralized distributed approach cannot properly figure out the actual condition of the network. Therefore, a purely distributed security system is more appropriate for WSNs. The results also show that the specification-based detection scheme achieves higher detection rate and low false positive rate. These results also guide that each node should be treated independently in WSNs, and centralized distributed detection schemes may fail to identify the network behavior whether it is normal or is under any attack. As a second contribution, the low-energy adaptive clustering hierarchy (LEACH) protocol for WSNs is modified by adding the functionality of the proposed intrusion detection framework to secure it from sink-hole, black-hole, and selective forwarding attacks. The modified protocol is called LEACH++. We performed two types of analyses: (1) numerical analysis to check the effect on vi throughput and energy, and (2) simulations in Network Simulator-2 (NS-2) to prove the results found from the numerical analysis. The results are quite promising and favor LEACH++ over LEACH under attack with respect to throughput and energy consumption. The third contribution is to perform a security analysis of the LEACH++ protocol to validate the proposed specification-based detection scheme with respect to accuracy, false positive rate, and detection rate. For this purpose, we simulate LEACH++ by launching various numbers of attacks in different patterns for different configurations. The experiments are carried out against the LEACH++ protocol for black hole and sinkhole attacks in different patterns. The results show that the proposed scheme achieves high accuracy and detection rate for LEACH++ and shows very low false positive rate.