Science topics: Computer Security and ReliabilitySecurity
Science topic
Security - Science topic
Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition.
Questions related to Security
What are the implications of the ongoing war in Ukraine for European security and global governance?
if you want you can give me examples, they would help me in writing mythesis
thank you
Can deep learning be harnessed to predict and prevent zero-day attacks in cloud environments, bolstering overall security posture?
Hello Folks!
IoT security is becoming a key area of research these days. However, to move into a certain direction of research is hard to decide before knowing its value in the future.
What do you think? What are the new trends and hot topics in IoT security?
How are food and nutrition security important and factors on which food security depends and what are the pillars of food security?
The use of AI and mapping technologies in laboratory settings raises a number of security concerns that must be addressed in order to ensure the integrity, confidentiality, and availability of data and resources. Data privacy and confidentiality, data integrity, access controls, network security, and so on are some of the security challenges.
What is the system of food security in India and why nutrition security is more important than food security?
While integrating manufacturing design, Industrial Revolution 4.0, and Lean Manufacturing can bring significant benefits but there are also challenges and problems that can arise in the process in term of Data Privacy and Security. How we can solve this problems?
what kind of securities are provided by the network providers and how much security does the common people received
Currently, I am exploring federated learning (FL). FL seems going to be in trend soon because of its promising functionality. Please share your valuable opinion regarding the following concerns.
- What are the current trends in FL?
- What are the open challenges in FL?
- What are the open security challenges in FL?
- Which emerging technology can be a suitable candidate to merge with FL?
Thanks for your time.
Nowdays, the machine learning techniques and deep learning techniques have been employed in tackling with various of kinds of security problems, such as malware mitigation. Is the difference of their performance obvious? Which is better?
How do you think artificial intelligence can improve cybersecurity?
What are the risks and benefits?
We have successfully implemented several solar projects with a combined capacity of around 2 MW. Furthermore, we are in the process of devising plans for additional installations of solar and renewable energy projects. However, we are uncertain about the avenues available for securing international financial assistance for projects located within Iraq, such as through the utilization of carbon credits. If anyone possesses knowledge or can offer guidance in this regard, we would greatly appreciate the support.
Udawalawa is a large reservoir constructed in 1960s, mainly for the purpose of irrigation. Later, around 1990s, hydropower reservoir was constructed at the upstream of the same catchment intercepting a large portion of inflows to Udawalawe. Now, due to prevailing drought, Udawalawa farmers are facing severe shortage of water for their ongoing rice cultivation. Electrical authorities are refusing to release water from the upstream reservoir and trying to secure the uninterrupted power production. What are the laws and regulations, national or international, available to tackle this situation and secure water rites of farmers.
How is user data handled and secured within ChatGPT to ensure privacy and prevent breaches?
How can blockchain technology best help securing identity data and how blockchain can help security of the information security triad?
Yes, hacking a vehicle and causing an accident through internet technology is theoretically possible, although it's important to note that modern vehicles have multiple layers of security measures in place to prevent such events and ensure the safety of passengers.
Modern vehicles are equipped with various electronic control units (ECUs) that manage different systems, such as engine control, brakes, steering, and more. These ECUs are connected through a Controller Area Network (CAN) bus, which allows them to communicate and share information. If a hacker gains unauthorized access to a vehicle's CAN bus through internet technology, they might potentially manipulate the vehicle's systems and cause a malfunction that could lead to an accident.
However, the reality is more complex:
- Security Measures: Vehicle manufacturers implement robust security measures to prevent unauthorized access and hacking. These include encryption, secure coding practices, intrusion detection systems, and more.
- Physical Controls: Many critical vehicle systems, such as brakes and steering, are designed with redundant physical controls that can override electronic commands. This makes it difficult for hackers to completely take control of a vehicle remotely.
- Ethical and Legal Constraints: Hacking a vehicle and causing harm is illegal and unethical. Anyone attempting such actions could face serious legal consequences.
- Rapid Response: In the event of unusual or malicious activity, vehicles often have mechanisms that trigger warnings and alerts to the driver, and manufacturers can remotely update or patch software to address vulnerabilities.
- Complexity: Hacking a vehicle's systems requires a deep understanding of its architecture and software. While researchers and hackers have demonstrated vulnerabilities in the past, it's not a simple task to carry out successfully.
- Public Awareness: As hacking risks have become more widely known, both vehicle manufacturers and the public are more vigilant about potential threats, which contributes to the implementation of stronger security measures.
It's crucial for vehicle manufacturers to continue improving security measures and staying ahead of potential threats. If you have concerns about vehicle security or hacking vulnerabilities, it's best to consult with experts in the field or contact the vehicle manufacturer for information on the security features and measures they have implemented.
Which authentication schemes would perform better than improved Feige–Fiat–Shamir (IFFS) for modeling a secure IoT-integrated WBAN framework for e-healthcare?
Do we need Central cooling by CFC and Renewable Energy in an open-door and more secure cooling system?
I am currently working on my master's thesis in the field of security, focusing on detecting malware in server environments.
What are the steps that can be taken to avoid privacy related issues?
How much personal data is safe on online social networking sites?
How to solve these privacy and security issues?
Unethical business practices operate in different countries to varying degrees and participate in economic processes.
For many entities, market participants, business partners and consumers, they generate additional costs.
They can also be a source of gray economy growth, including avoiding paying taxes.
Thus, there are social costs for individual entities and financial for the entire economy.
On the capital markets, one of unethical business practices is, for example, insider trading, ie the use of confidential information by decision-makers with access to confidential information used to conduct transactions to purchase or sell financial instruments, including securities or other securities or other capital markets.
In individual countries, there are various instruments to combat the use of unethical business practices, the shadow economy, etc.
The effectiveness of individual normative solutions, the scale of restrictions applied, and the business mentality of market participants, entrepreneurs and businessmen are different.
Another mentality is related to the level of awareness regarding corporate social responsibility.
In individual countries, social campaigns are carried out suggesting the legitimacy of developing concepts based on corporate social responsibility.
In view of the above, please answer the following question: Is unethical business practices a negative external effect of non-ideal market structures or imperfection of the social market economy?
Please, answer, comments. I invite you to the discussion.
Authors are solicited to contribute to the book series by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas related to IoT, but are not limited to
- IoT Communication Technologies
- IoT Architectures & Platforms
- IoT Performance & Management
- IoT Privacy & Security
- IoT Embedded Systems, Sensors, Actuators
- Practical and Innovative Applications of IoT & IoT Networks (smart cities, smart mobility, smart home, smart health, smart grid, etc.)
- IoT for the industry and Business
- IoT operations & Interoperability
- Augmented Reality and virtual reality
- IoT & Artificial intelligence
go to www.iipseries.org for submission.
last date for submission is 31 july, 2023
Book Series Id: IIPV3EBS08_G2
kindly enter my reference id: IIPER1673412413 while submitting the chapter.
Discuss the constraints and challenges faced in implementing millet-based integrated farming systems for food and nutritional security.
We wish to invite members of the public to submit certain types of videos for a research project. The videos are likely to be too large for people to be able to email to us. Has anyone found a good solution? Any online submission area would need to be secure such that only the researcher could see the submitted videos, for ethical reasons.
Ideally it would also allow each person to submit a caption with their video, and/or it would be free!
Thanks, Charlotte
Abstract MANET is a wireless network that lacks infrastructural support. Most operations they perform are coordinated between nodes because of their limited transmission range. Assess the secure MANET routing protocol in a malicious environment. However, in the MANET environment security is an important constraint that affects the data transmission rate and cause data loss. This paper developed an Intrusion Detection System Conditional RandomField (IDS – CRF) model for security. The developed model uses the hashing function integrated with the Conditional Random Field model. The IDS – CRF model uses the label sequences for data security in the MANET environment. The model uses the DSR protocol with the discriminative field to process the secure data in the MANET. The proposed IDS-CRF model uses the hashing function for improved data transmission security in the MANET environment. The performance of the proposed IDS – CRF model is comparatively examined with the conventional DSR protocol. The comparative analysis expressed that the proposed IDS – CRF model achieves the ~4% reduction in the delay and ~2% reduction in the routing overhead. Similarly, the proposed IDS – CRF model achieves the ~4% reduced energy consumption. In terms of the Packet delivery ratio and throughput the proposed IDS – CRF model achieves the ~4% - ~6% improved performance than DSR model.
Challenges confronting CISOs are evolving beyond technology, cybersecurity, and controls, as Gartner predictions for 2023 reveal. “By 2025, lack of talent or human failure will be responsible for over half of significant cyber incidents."
How can modern cybersecurity leaders strengthen their programs in the face of these challenges?
“By 2025, the consumerization of AI-enabled fraud will fundamentally change enterprise attack surface driving more outsourcing of enterprise trust and focus on security education and awareness.”
We believe, in this report you will learn key findings, market implications, and recommendations on:
- Designing a cybersecurity program that leverages data to improve decision making
- Demonstrating how a strong security performance is relevant to winning business
- Integrating cybersecurity into the overall business with shareable results
- Effectively allocating budget to both technology and education to establish program consistency
The first 5G radio networks are now live. This generation of telecommunication system aims to deliver
- Enhanced mobile broadband,
- Massive machine-type communications,
- Ultra-reliable and low latency communications.
The purpose is to be faster, more reliable and manage the scale of devices predicted for the Mobile Internet of Things (MIoT). Enabling the digital transformation of our society, business processes and manufacturing. To enable this, 5G will deliver multi-network slicing, multi-level of services and multi-connectivity network capabilities. To allow the required flexibility, agility and economies of scale these technologies will be delivered via virtual and containerised environments. This is a revolutionary way of working for the industry. 5G has designed in security controls to address many of the threats faced in today’s 4G/3G/2G networks. These controls include new mutual authentication capabilities, enhanced subscriber identity protection, and additional security mechanisms. 5G offers the mobile industry an unprecedented opportunity to uplift network and service security levels. 5G provides preventative measures to limit the impact to known threats, but the adoption of new network technologies introduces potential new threats for the industry to manage.
A Chaotic-Based Encryption/Decryption for Secure Communications
I am attempting to show the significance of the Risk Management Framework to securing SMEs in Jamaica. Special focus is being placed on ISO 27001
This question explores the role of the consensus mechanism in ensuring the security of blockchain networks, discussing concepts such as proof-of-work, proof-of-stake, and their impact on network security.
The question revolves around exploring the potential benefits of integrating blockchain technology into cloud computing environments, specifically focusing on enhancing security and trustworthiness of data storage and transactions.
This question aims to highlight the fundamental distinctions between traditional cybersecurity approaches, which often rely on centralized control and trusted third
This research question focuses on the specific domain of cybersecurity, namely the Internet of Things (IoT). IoT devices are becoming increasingly prevalent in various sectors, including healthcare, transportation, and smart homes, but they also pose unique security risks. Investigating the emerging threats and challenges associated with securing IoT devices and networks can provide valuable insights into the vulnerabilities and potential countermeasures needed to protect these interconnected systems. This research inquiry can contribute to the development of robust security frameworks, protocols, and strategies for IoT deployments, ultimately enhancing the overall cybersecurity landscape.
Hello everyone,
I'm currently using veins Inet project to simulate a vanet and its security attacks. I want to find the documentation of some of the veins modules like In the inet framework but I can't. Any help?
AI ADVANCEMENTS SAVE THE DAY
With AI being used across all market areas, this technology, together with machine learning, has resulted in significant improvements in cybersecurity. In the development of automated security devices, natural language, facial identification, and autonomous advanced threat, AI has played a critical role.
It is also being used to create smart ransomware and assaults in order to get around the most up-to-date data security mechanisms. Threat detection systems using AI can forecast new assaults and immediately inform administrators of any data breaches. At last, AI advanced innovations are going to save the day.
These are all the top 5 trends that we are going to come across in the future. Change is always for the best. I hope the latest inventions in ethical hacking will resolve all the issues and provide better security.
Physical security
Network security
Software security
These days VAS are playing important roles in mobile networks, so without their security nobody can rely on them. In these instances cryptography plays an important role in securing these issues. I want to know the best way to apply cryptography VAS. Also any references would be appreciated.
The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has chosen the first group of encryption tools that are designed to withstand the assault of a future quantum computer, which could potentially crack the security used to protect privacy in the digital systems we rely on every day — such as online banking and email software. The four selected encryption algorithms will become part of NIST’s post-quantum cryptographic standard, expected to be finalized in about two years.
Quantum computers are expected to be capable of breaking existing cryptographic algorithms, threatening the security of our data. The aim of post-quantum cryptography is to address this issue, devising new ways of protecting data and communications against the threat posed by super powerful quantum computers.
I am currently studying safe control of power systems and I am interested in finding out whether the security region constraints of power systems can be approximated by a set of linear constraints. The security region is defined as the set of all feasible operating points that satisfy the power balance and the thermal limits of the transmission lines. Linearizing the security region constraints can simplify the optimization and control problems of power systems, but it may also introduce errors and conservatism. I would like to know if there are any existing methods or results that can provide some insights or guidance on how to approximate the security region constraints by linear constraints. Any references or suggestions would be greatly appreciated.
Could the central bank's historical record net loss for 2022, in the context of its monetary policy and speculative transactions in international financial markets, mean a decrease in security in the banking system?
The main purpose of a central bank's activities is to take care of the value of money, its stability against other currencies and the security of the banking system. However, since the 1970s, since the period of the rise of monetarism developed in accordance with Milton Fredman's concept of monetarism, the increase in the scale of economic globalisation, the transition of international monetary systems from the USD-based system, the system established after the Second World War in Bretton Woods to a system of free market exchange rates, the abandonment in the USA of gold parity with the USD currency, the growth of multinational corporations, the increased importance of speculative financial transactions carried out on foreign capital markets, including securities markets, etc. Central banks are also involved in the processes of stabilising the economy as part of anti-crisis programmes and protecting national labour markets, with the aim of limiting the scale of the increase in unemployment. In some countries, these new, additional central bank functions are added to the legal regulations shaping the functioning of the central bank. In some countries, the issue of linking the central bank's monetary policy is implemented informally.
For years, the central bank in Poland has also been conducting speculative transactions on international financial markets using various currencies and securities. For many previous years, the bank generated a net profit of PLN 9-10 billion of which 95 per cent of this profit was transferred to the state budget by the politically connected central bank to the government, instead of feeding the central bank's reserves and increasing the security of the financial system. For 2021, the central bank in Poland, i.e. the National Bank of Poland, generated as much as PLN 11 billion in net profit thanks to speculative transactions on the international financial markets, almost all of which went to the state budget rather than to central bank reserves, as usual. The annual profit generated by the central bank in Poland until 2021 was a consequence of, among other things, the monetary policy pursued by the bank, which consisted in successive depreciation of the domestic currency PLN against other currencies. However, for 2022, the National Bank of Poland unexpectedly raked in a historically record loss of PLN 17 billion. Could it be that the speculative transactions carried out in 2022 on the international financial markets turned out to be wrong this time? In addition, another key question arises: to what extent will this kind of situation result in a decrease in the level of security of the entire banking system?
In view of the above, I address the following question to the esteemed community of scientists and researchers:
Could the historically record net loss of the central bank for 2022, in the context of the monetary policy pursued and the speculative transactions carried out on the international financial markets, mean a decrease in security in the banking system?
And what is your opinion on this?
What is your opinion on this subject?
Please respond,
I invite you all to discuss,
Thank you very much,
Best wishes,
Dariusz Prokopowicz

I want to pick a published dataset (after giving proper citation and securing copyright also) from one article and after that I want to solve it with different software and compare it with the published results. Is it ethically fine or there is some violation of ethics?
Please suggest me Ph.D. topic on cybersecurity particularly considering either app security, context-aware systems, and small devices including but not limited to embedded control systems, IoT applications, and sensor networks. Or a topic relates to AI & Machine Learning.
Is the increasing scale of populist short-sighted economic state interventionism and the growing influence of the state in the economy generating emerging economic and/or financial and social crises that are increasingly serious, increasingly severe for society?
It has happened on more than one occasion that attempts to significantly increase the scale of "manual control" of the economy, economic state interventionism, expansion of public sectors, the system of central institutions, government-controlled public institutions and enterprises operating as state-owned companies, etc., have ended in the occurrence of another economic and/or financial crisis, larger than the previous ones. Economic crises, including raw material crises, were more than once initiated by the unexpected occurrence of certain external factors such as a sudden and rapid increase in the price of raw materials and/or also other production factors. This happened during the raw material crises of the 1970s. The government, in the situation of the development of a raw material crisis, in an attempt to limit the scale of this crisis and the scale of the also developing economic crisis, the increasing level of unemployment and the decrease in economic activity of companies and enterprises, changes its economic policy by introducing certain additional, interventionist, anti-crisis solutions and instruments of fiscal, monetary policy, etc.
The scale of the state's influence in the economy has been growing in Poland in recent years. An increase in the scale of the so-called anti-crisis economic state interventionism; an increase in the scale of the introduction by the government into the economy of additional money not bound by the parity of produced economic goods as an element of interventionist shaping of economic processes; an increase in the scale of the participation of the state treasury in the shareholding of companies and enterprises of some, including strategic sectors of the economy; an increase in the scale of monopolisation of markets by sectors in which corporations dominated by the state treasury operate; the creation by people working in the government of new institutions, agencies, foundations, institutes, etc., which pursue the combined interests of decision-makers, political parties and sometimes also informally linked to business. pursuing the combined interests of decision-makers with the objectives of political party functioning and sometimes also informally linked to business; the increasing scale of the use of central banking monetary policy instruments and fiscal policy instruments in government economic programmes pursuing specific objectives in the increased scale of state influence in economic processes; the increasing scale of the state's system of public finances in the context of the overall finances realised in the economy; the increasing scale of indebtedness of the state's system of public finances without an analogous scale of the increase in investments realised within the framework of the public and commercial sectors of the economy are only some of the key aspects of the increase in the scale of economic state interventionism that has taken place in recent years.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
Is the increasing scale of populist short-sighted economic state interventionism and the growing influence of the state in the economy generating the emerging economic and/or financial and social crises that are becoming more and more severe for society?
And what is your opinion on this?
What is your opinion on this subject?
Please respond,
I invite you all to discuss,
Thank you very much,
Best wishes,
Dariusz Prokopowicz

How can the use of blockchain increase security and transparency in real estate transactions carried out by a real estate company and how can this technology be applied viably and efficiently?
the question answers itself
Greetings everyone!
I am conducting a research on security. So that I am doing a survey on different existing public datasets on security. In recent years some papers are published using CCC (Cyber Clean Center) dataset. But I can't find any public link to download the dataset.
Is there anyone who can help me to find the CCC (Cyber Clean Center) dataset in any extension?
I will be thankful.
Thanks.
#specialissue #CallforPapers
CMC-Computers, Materials & Continua new special issue “Innovative Security for the Next Generation Mobile Communication and Internet Systems”is open for submission now.Submit your research now and contribute to advancing mobile communication security!👉 At link: https://www.techscience.com/cmc/special_detail/MCIS

Micro Focus provides software for code testing, code security, application delivery, content management and Visual Cobol free of charge to enable teachers and researchers to use this software within their work. For students of course this is very valuable as it gives exposure to real world applications without any associated cost to the institution.
Further details on this particular program can be found at: https://www.microfocus.com/en-us/academic-software-program
Does anyone know of any other companies that make similar offers to academics and if so for what software.
Thanks for your input.
Kind regards
Peter
The Security Council has primary responsibility, under the United Nations Charter, for the maintenance of international peace and security. Today the P5 (permanent members) or simply speaking just 5 countries determine the fate of millions during a seize, war or invasion. -by their "veto power by nullifying any attempt to join a conflict or break down an invasion. These countries being the United States, China, France, Russia, and the United Kingdom. However this group has now become polarized due to which most actions are vetoed out by either group A or B.
Group A: China, Russian Fed
Group B: USA, UK, France
Other countries who have nuclear capability but do not have a permanent seat being Pakistan, India, Israel, and North Korea. So should some of these countries also be included in the P5 to make it P7 and bring more stability and rationality to the powers given to P5, who in most cases cannot really work together and oppose each other using their Veto card.
Gig workers is type of worker community who work on contract basis and Employer is not guaranteed on job security.
How can artificial intelligence help improve cyber security systems and techniques in online and mobile banking?
In recent years, technologies that play an important role in the field of Industry 4.0, technologies that determine the current fourth technological revolution, including machine learning technologies, deep learning and artificial intelligence are finding their way into improving cyber security systems. Financial institutions, including commercial banks, are implementing a certain generation of artificial intelligence technologies into specific areas of banking in order to increase process efficiency, economic efficiency, etc. Artificial intelligence is already being used by banks to improve remote communication processes with customers, in call centre departments as part of the creation of automated remote communication systems and digitised adviser avatars, in the process of managing credit risk and other risk categories, and also in the area of cyber-security.Therefore, opportunities are emerging for the application of artificial intelligence technologies in improving cyber-security techniques and systems in various areas of cyber-security in online and mobile banking, including issues such as:
1. improving cyber-security techniques to protect the information systems of financial institutions, including banks, from external cyber-attacks via email and ransomware viruses.
2. improving cybercrime risk management systems for integrated internal information systems connected to the Internet.
3. Improving cyber security techniques implemented through the implementation of new Industry 4.0 technologies, including artificial intelligence, machine learning, Blockchain, multi-criteria simulation models, etc., and advanced analytical techniques such as Big Data Analytics, Business Intelligence.
4. improving the anti-spam systems used to protect email inboxes in order to increase the filtering out of emails where cybercriminals use phishing techniques and/or send malware and ransomware viruses in the background of the email.
5. Improving cyber-security techniques for online and mobile banking systems with a particular focus on mobile banking implemented on the bank's customer side using smartphones equipped with specific operating systems and web applications.
6. Analysis of the level of effectiveness and cyber security for biometric techniques for encoding access to information systems as an important factor in cyber security.
7. perfecting cyber-security techniques in integrated, internal, intranet information systems operating in financial institutions, including commercial banks characterised by a complex organisational structure and companies forming interconnected business entities.
In view of the above, financial institutions, including commercial banks, are implementing a certain generation of artificial intelligence technologies in various areas of banking, including in the improvement of cyber-security techniques and systems.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How can artificial intelligence help improve cyber-security systems and techniques in online and mobile banking?
What do you think about this topic?
What is your opinion on this subject?
Please respond,
I invite you all to discuss,
Thank you very much,
Best regards,
Dariusz Prokopowicz

I'm pursuing Ms in Computer science. I'm search for research topic.
I've come across following areas. Can someone review and let me know if these can be research candidates?
1. Comparison of different full stack frameworks
2. Progressive web applications
3. Security in Full stack applications
Also, can someone help me narrow down to a topic in these?
Despite making significant investments in security technologies, organizations continue to struggle with security breaches: Their adversaries are quick to evolve tactics and stay ahead of the technology curve. Humans may soon be overwhelmed by the sheer volume, sophistication, and difficulty of detecting cyberattacks. People are already challenged to efficiently analyze the data flowing into the security operations center (SOC) from across the security tech stack. This doesn’t include the information feeds from network devices, application data, and other inputs across the broader technology stack that are often targets of advanced attackers looking for new vectors or using new malware. And as the enterprise increasingly expands beyond its firewalls, security analysts are charged with protecting a constantly growing attack surface.
source: The future of cybersecurity and AI | Deloitte Insights
Applied Sciences | Special Issue: Smart Cyberspace and IoT Systems: Challenges and Future Trends (mdpi.com)
I need the protocols for tagging tropical mangrove seedings. They need to be numbered and last for at least 10 years (3-4 year censuses). The only tapes I've been able to find are Dymo tapes and I can control the length and punch a hole for securing it to the seedling. We were looking for something to secure it to the mangrove seedling like zip ties or something similar. We also need to purchase over 1000 of them, so price is a key issue. Any suggestion would be greatly appreciated. If you have experience with long term mangrove seedlings surveys, other suggestions would be welcomed too.
Thanks to all,
Alia.
What is the value of biological diversity in food and ecological security and does increased biodiversity increase food production?
Thanks to those who respond in detail to my need for several opinions
Does lending denominated in a foreign currency, taking into account currency risk, generate a significantly higher overall level of credit risk compared to lending in domestic currency?
For example, lending denominated in foreign currency generates additional currency risk so it may increase the overall level of credit risk compared to lending in domestic currency. In addition, sometimes commercial banks also use abusive clauses in their loan agreements when granting business, investment or mortgage loans in foreign currency, which are the result of unethical business practices by the bank and can result in a strong asymmetry of information between the bank and the borrower, the bank taking advantage of a much weaker negotiating position of its clients and hidden, additional costs being charged to the borrower. Such practices were used by a significant part of commercial banks in Poland in the period of several years just before the onset of the global financial crisis of 2007-2099. At that time some commercial and investment banks predicted the occurrence of this crisis on the basis of an analysis of their lending activity, the determinants of the macroeconomic environment and the situation and changes in trends on capital markets. The banks operating in a developing country such as Poland, a country characterised by its own characteristics, knew that by applying unreliable, unethical business practices towards borrowers, by having incompletely secured credit positions, the highly and historically overvalued market valuations of real estate and securities would soon start to fall, that the trend of several years of a bull market in capital markets would change to a stock market crash, which would result in a significant change in trends on currency markets as well. In contrast, borrowers taking out such mortgages denominated in foreign currencies, especially CHF, did not have this kind of knowledge. This is due to the fact that most borrowers do not deal on a daily basis with the analysis of banks' lending activities, the procedures for examining the borrower's creditworthiness and the bank's credit risk, the problems of credit risk management, both on an individual basis with regard to a single credit transaction and on a portfolio basis, i.e. in terms of managing the credit risk of entire portfolios of loans granted by the bank. Banks, on the other hand, are familiar with this issue because they deal with it on a daily basis and are obliged to do so by banking supervisory institutions. However, apparently these banking supervisory institutions as well as consumer and competition protection authorities, bank arbitrage institutions, central banks, etc. are not able to fully verify on an ongoing basis, as part of their ongoing monitoring, the issue of the integrity of commercial and investment banks' application of banking practices in lending, including the application of business ethics, the non-application of abusive clauses in loan agreements, the application of too much asymmetry of information to customers, the use of their advantage at the negotiating level. In order for these mortgages denominated in a foreign currency, in CHF, to sell well, so banks constructed models for calculating the creditworthiness of a potential, individual borrower in such a way that mortgages granted in a foreign currency turned out to be cheaper for borrowers than analogous loans granted in the domestic currency, i.e. in Poland in PLN. The results of the calculated creditworthiness presented to potential borrowers were such that the calculated creditworthiness for a loan granted in CHF was set at a significantly higher maximum loan amount that could be granted compared to an analogous loan granted in the domestic currency of PLN.
In view of the above, I would like to address the following question to the esteemed community of scientists and researchers:
Does the granting of loans denominated in a foreign currency, taking into account currency risk, generate a significantly higher overall level of credit risk compared to loans granted in domestic currency?
What do you think about it?
What is your opinion on this subject?
Please respond,
I invite you all to discuss,
Thank you very much,
Best regards,
Dariusz Prokopowicz

Hello,
I find a certain Rohola MIRI as a co-author in my work that I put on researchgate. He is a usurper who put his name in place of the late Professor Rachid MIRI, the real co-author of my work. I don't know how such a thing happened on the researchgate platform. This means that, from a security point of view, the flaws are enormous. I urge you to do what is necessary to resolve this situation.
Hey friends, a week ago, I received a notification from the ResearchGate team that they will be retiring projects by 31st march. Has anyone of you received a such a notification? What should I o to secure my account?
When talking about human security, we are talking of aspects such as
Economic security.
- Food security.
- Health security.
- Environmental security.
- Personal security.
- Community security.
- Political security.
Therefore, what would be needed is to scrutinize the above mentioned aspects, then trying to see how the second republic is doing, in terms of delivering those.
I want to be able to keep record, track expire date, send and receive notification on security clearance from an app that can do this.
Any that can help with any link that speak to this?
Earthquakes are now causing fear and unstability in most iraqi and jordanion citizens who live in big building ,How can we secure building and check the standards of constructions?