INFORMATION ECONOMICS CONFERENCE


Information Economics Conference is one of the leading research topics in the international research conference domain. Information Economics is a conference track under the Economics Conference which aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Economics.

internationalconference.net provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of (Economics).

Information Economics is not just a call for academic papers on the topic; it can also include a conference, event, symposium, scientific meeting, academic, or workshop.

You are welcome to SUBMIT your research paper or manuscript to Information Economics Conference Track will be held at .

Information Economics is also a leading research topic on Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, Elsevier, Scopus, Web of Science.

FINISHED

I. INTERNATIONAL ECONOMICS CONFERENCE

MARCH 19 - 20, 2019
ISTANBUL, TURKEY

FINISHED

II. INTERNATIONAL ECONOMICS CONFERENCE

JUNE 26 - 27, 2019
PARIS, FRANCE

FINISHED

III. INTERNATIONAL ECONOMICS CONFERENCE

AUGUST 21 - 22, 2019
LONDON, UNITED KINGDOM

FINISHED

IV. INTERNATIONAL ECONOMICS CONFERENCE

OCTOBER 08 - 09, 2019
NEW YORK, UNITED STATES

FINISHED

V. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 12 - 13, 2019
ROME, ITALY

FINISHED

VI. INTERNATIONAL ECONOMICS CONFERENCE

FEBRUARY 13 - 14, 2020
LONDON, UNITED KINGDOM

FINISHED

VII. INTERNATIONAL ECONOMICS CONFERENCE

APRIL 15 - 16, 2020
BARCELONA, SPAIN

FINISHED

VIII. INTERNATIONAL ECONOMICS CONFERENCE

MAY 11 - 12, 2020
ISTANBUL, TURKEY

FINISHED

IX. INTERNATIONAL ECONOMICS CONFERENCE

JUNE 05 - 06, 2020
SAN FRANCISCO, UNITED STATES

FINISHED

X. INTERNATIONAL ECONOMICS CONFERENCE

JULY 20 - 21, 2020
PARIS, FRANCE

FINISHED

XI. INTERNATIONAL ECONOMICS CONFERENCE

AUGUST 10 - 11, 2020
NEW YORK, UNITED STATES

FINISHED

XII. INTERNATIONAL ECONOMICS CONFERENCE

SEPTEMBER 10 - 11, 2020
TOKYO, JAPAN

FINISHED

XIII. INTERNATIONAL ECONOMICS CONFERENCE

SEPTEMBER 16 - 17, 2020
ZÜRICH, SWITZERLAND

FINISHED

XIV. INTERNATIONAL ECONOMICS CONFERENCE

OCTOBER 21 - 22, 2020
BARCELONA, SPAIN

FINISHED

XV. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 02 - 03, 2020
SAN FRANCISCO, UNITED STATES

FINISHED

XVI. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 12 - 13, 2020
ISTANBUL, TURKEY

FINISHED

XVII. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 19 - 20, 2020
SINGAPORE, SINGAPORE

FINISHED

XVIII. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 15 - 16, 2020
BANGKOK, THAILAND

FINISHED

XIX. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 28 - 29, 2020
PARIS, FRANCE

FINISHED

XX. INTERNATIONAL ECONOMICS CONFERENCE

FEBRUARY 13 - 14, 2021
LONDON, UNITED KINGDOM

FINISHED

XXI. INTERNATIONAL ECONOMICS CONFERENCE

APRIL 15 - 16, 2021
BARCELONA, SPAIN

FINISHED

XXII. INTERNATIONAL ECONOMICS CONFERENCE

MAY 11 - 12, 2021
ISTANBUL, TURKEY

FINISHED

XXIII. INTERNATIONAL ECONOMICS CONFERENCE

JUNE 05 - 06, 2021
SAN FRANCISCO, UNITED STATES

FINISHED

XXIV. INTERNATIONAL ECONOMICS CONFERENCE

JULY 20 - 21, 2021
PARIS, FRANCE

FINISHED

XXV. INTERNATIONAL ECONOMICS CONFERENCE

AUGUST 10 - 11, 2021
NEW YORK, UNITED STATES

FINISHED

XXVI. INTERNATIONAL ECONOMICS CONFERENCE

SEPTEMBER 10 - 11, 2021
TOKYO, JAPAN

FINISHED

XXVII. INTERNATIONAL ECONOMICS CONFERENCE

SEPTEMBER 16 - 17, 2021
ZÜRICH, SWITZERLAND

FINISHED

XXVIII. INTERNATIONAL ECONOMICS CONFERENCE

OCTOBER 21 - 22, 2021
BARCELONA, SPAIN

FINISHED

XXIX. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 02 - 03, 2021
SAN FRANCISCO, UNITED STATES

FINISHED

XXX. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 12 - 13, 2021
ISTANBUL, TURKEY

FINISHED

XXXI. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 19 - 20, 2021
SINGAPORE, SINGAPORE

FINISHED

XXXII. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 15 - 16, 2021
BANGKOK, THAILAND

FINISHED

XXXIII. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 28 - 29, 2021
PARIS, FRANCE

Economics Conference Call For Papers are listed below:

Previously Published Papers on "Information Economics Conference"

  • Online Think–Pair–Share in a Third-Age ICT Course
    Authors: Daniele Traversaro, Keywords: Collaborative learning, information technology education, lifelong learning, older adult education, think-pair-share. DOI:10.5281/zenodo. Abstract: Problem: Senior citizens have been facing a challenging reality as a result of strict public health measures designed to protect people from the COVID-19 outbreak. These include the risk of social isolation due to the inability of the elderly to integrate with technology. Never before have Information and Communication Technology (ICT) skills become essential for their everyday life. Although third-age ICT education and lifelong learning are widely supported by universities and governments, there is a lack of literature on which teaching strategy/methodology to adopt in an entirely online ICT course aimed at third-age learners. This contribution aims to present an application of the Think-Pair-Share (TPS) learning method in an ICT third-age virtual classroom with an intergenerational approach to conducting online group labs and review activities. Research Question: Is collaborative learning suitable and effective, in terms of student engagement and learning outcomes, in an online ICT course for the elderly? Methods: In the TPS strategy a problem is posed by the teacher, students have time to think about it individually, and then they work in pairs (or small groups) to solve the problem and share their ideas with the entire class. We performed four experiments in the ICT course of the University of the Third Age of Genova (University of Genova, Italy) on the Microsoft Teams platform. The study cohort consisted of 26 students over the age of 45. Data were collected through online questionnaires. Two have been proposed, one at the end of the first activity and another at the end of the course. They consisted of five and three close-ended questions, respectively. The answers were on a Likert scale (from 1 to 4) except two questions (which asked the number of correct answers given individually and in groups) and the field for free comments/suggestions. Results: Groups achieve better results than individual students (with scores greater than one order of magnitude) and most students found TPS helpful to work in groups and interact with their peers. Insights: From these early results, it appears that TPS is suitable for an online third-age ICT classroom and useful for promoting discussion and active learning. Despite this, our work has several limitations. First of all, the results highlight the need for more data to be able to perform a statistical analysis in order to determine the effectiveness of this methodology in terms of student engagement and learning outcomes as future direction.
  • Domestic Violence against Children and Trafficking in Human Beings: Two Worrying Phenomena in Kosovo
    Authors: Adile Shaqiri, Arjeta Shaqiri Latifi, Keywords: Awareness, education, information, society, violence. DOI:10.5281/zenodo. Abstract: Domestic violence, trafficking with human beings especially violence against children, is a worldwide problem. Hence, it remains one of the most widespread forms of violence in Kosovo and which often continues to be described as a "closed door issue". Recognition, acceptance and prioritization of cases of domestic violence definitely require a much greater awareness of individuals in institutions for the risks, consequences and costs that the lack of such a well-coordinated response brings to the country. Considering that children are the future and the wealth of the country, violence and neglect against them should be treated as carefully as possible. The purpose of this paper is to identify steps towards prevention of the domestic violence and trafficking with human beings, so that the reflection of the consequences and the psychological flow do not reflect to a large extent in society. In this study is described: How is the phenomenon of domestic violence related to trafficking in human beings? The methods used are: historical, comparative, qualitative. Data derived from the relevant institutions were presented, i.e., by the actors who are the first reactors as well as the policy makers. Although these phenomena are present in all countries of the world, Kosovo is no exception and therefore comparisons of the development of child abuse have been made with other countries in the region as well. Since Kosovo is a country in transition, a country with a relatively high level of education, low economic development, high unemployment, political instability, dysfunctional legal infrastructure, it can be concluded that the potential for the development of negative phenomena is present and inevitable. Thus, during the research, the stages of development of these phenomena are analyzed, determining the causes and consequences which come from abuse, neglect of children and the impact on trafficking in human beings. The Kosovar family (parental responsibility), culture and religion, social services, the dignity of the abused child, etc. were analyzed. The review was also done on the legislation, educational institutions (curricula), governmental and non-governmental institutions their responsibilities and cooperation towards combating child abuse and trafficking. It is worth noting that during the work on paper, recommendations and conclusions have been drawn where it is concluded that we need an environment with educational reforms, stability in the political environment, economic development, a review of social policies, greater awareness of society, more adequate information through media, so that information and awareness could penetrate even in the most remote places of Kosovo society.
  • A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance
    Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug, Keywords: information system risk, operational risk, microfinance performance, DR Congo DOI:10.5281/zenodo. Abstract: Well organized digitalization and information systems have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are to be identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, with a focus on information system risks.
  • Exploring the Effect of Accounting Information on Systematic Risk: An Empirical Evidence of Tehran Stock Exchange
    Authors: Mojtaba Rezaei, Elham Heydari, Keywords: Accounting information, market risk, systematic risk, efficient market hypothesis, EMH, Tehran Stock Exchange, TSE. DOI:10.5281/zenodo. Abstract: This paper highlights the empirical results of analyzing the correlation between accounting information and systematic risk. This association is analyzed among financial ratios and systematic risk by considering the financial statement of 39 companies listed on the Tehran Stock Exchange (TSE) for five years (2014-2018). Financial ratios have been categorized into four groups and to describe the special features, as representative of accounting information we selected: Return on Asset (ROA), Debt Ratio (Total Debt to Total Asset), Current Ratio (current assets to current debt), Asset Turnover (Net sales to Total assets), and Total Assets. The hypotheses were tested through simple and multiple linear regression and T-student test. The findings illustrate that there is no significant relationship between accounting information and market risk. This indicates that in the selected sample, historical accounting information does not fully reflect the price of stocks.
  • A Research on Determining the Viability of a Job Board Website for Refugees in Kenya
    Authors: Prince Mugoya, Collins Oduor Ondiek, Patrick Kanyi Wamuyu, Keywords: Information technology, refugee, skills, utilization, economy, jobs. DOI:10.5281/zenodo. Abstract: Refugee Job Board Website is a web-based application that provides a platform for organizations to post jobs specifically for refugees. Organizations upload job opportunities and refugees can view them on the website. The website also allows refugees to input their skills and qualifications. The methodology used to develop this system is a waterfall (traditional) methodology. Software development tools include Brackets which will be used to code the website and PhpMyAdmin to store all the data in a database.
  • The Fake News Impact on the Public Policy Cycle: A Systemic Analysis through Documentary Survey
    Authors: Aron Miranda Burgos, Ergon Cugler de Moraes Silva, Keywords: Firehosing of falsehood, governance, misinformation, post-truth. DOI:10.5281/zenodo. Abstract: In the present article, it is observed that the constant advancement of issues related to misinformation impacts the guarantee of the public policy cycle. Thus, it is found that the dissemination of false information has a direct influence on each of the component stages of this cycle. Therefore, in order to maintain scientific and theoretical credibility in the qualitative analysis process, it was necessary to logically interpose the concepts of firehosing of falsehood, fake news, public policy cycle, as well as using the epistemological and pragmatic mechanism at the intersection of such academic concepts, such as the scientific method. It was found, through the analysis of official documents and public notes, how the multiple theoretical perspectives evidence the commitment of the provision and elaboration of public policies, verifying the way in which the fake news impact each part of the process in this atmosphere.
  • School and Teacher Level Predictors for Students’ Information Literacy in Chinese Rural and Urban Education
    Authors: Liqin Yu, Di Wu, Sha Zhu, Keywords: Information literacy, Chinese secondary school students, rural school, urban school. DOI:10.5281/zenodo. Abstract: This study aimed to investigate the level of secondary school students’ information literacy in China and examine the contribution of school and teacher level factors on students’ information literacy between rural and urban schools. A total of 598 schools, 56415 students and 18286 teachers participated in this study. The findings of this study were as follows: (1) the overall of secondary schools students’ information literacy only reached an average level and urban school students’ information literacy were significantly higher than that of rural school students; (2) In rural schools, teachers’ ICT collaboration was a positive predictor for students’ information literacy, while teachers’ ICT use for learning was identified as a negative predictor of students’ information literacy; (3) In urban schools, ICT management, ICT operation and teachers’ ICT self-efficacy were found to be significantly associated with students’ information literacy. Based on the findings, suggestions for improving students’ information literacy between rural and urban schools were discussed.
  • Knowledge Management in Academic: A Perspective of Academic Research Contribution to Economic Development of a Nation
    Authors: Hilary J. Watsilla, Narasimha R. Vajjhala, Keywords: Knowledge creation, academic research, knowledge management, information and communication technology, research, university. DOI:10.5281/zenodo. Abstract: Information and Communication Technology (ICT) has made information access easier and affordable. Academic research has also benefited from this, with online journals and academic resource readily available by the click of a button. However, there are limited ways of assessing and controlling the quality of the academic research mostly in public institution. Nigeria is the most populous country in Africa with a significant number of universities and young population. The quality of knowledge created by academic researchers, however, needs to be evaluated due to the high number of predatory journals published by academia. The purpose of this qualitative study is to look at the knowledge creation, acquisition, and assimilation process by academic researchers in public universities in Nigeria. Qualitative research will be carried out using in-depth interviews and observations. Academic researchers will be interviewed and absorptive capacity theory will be used as the theoretical framework to guide the research. The findings from this study should help understand the impact of ICT on the knowledge creation process in academic research and to understand how ICT can affect the quality of knowledge produced by researchers. The findings from this study should help add value to the existing body of knowledge on the quality of academic research, especially in Africa where there is limited availability of quality academic research. As this study is limited to Nigerian universities, the outcome may not be generalized to other developing countries.
  • CybeRisk Management in Banks: An Italian Case Study
    Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini, Keywords: Bank, CybeRisk, information technology, risk management. DOI:10.5281/zenodo. Abstract: The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.
  • Identification of Risks Associated with Process Automation Systems
    Authors: J. K. Visser, H. T. Malan, Keywords: Distributed control system, identification of risks, information technology, process automation system. DOI:10.5281/zenodo. Abstract: A need exists to identify the sources of risks associated with the process automation systems within petrochemical companies or similar energy related industries. These companies use many different process automation technologies in its value chain. A crucial part of the process automation system is the information technology component featuring in the supervisory control layer. The ever-changing technology within the process automation layers and the rate at which it advances pose a risk to safe and predictable automation system performance. The age of the automation equipment also provides challenges to the operations and maintenance managers of the plant due to obsolescence and unavailability of spare parts. The main objective of this research was to determine the risk sources associated with the equipment that is part of the process automation systems. A secondary objective was to establish whether technology managers and technicians were aware of the risks and share the same viewpoint on the importance of the risks associated with automation systems. A conceptual model for risk sources of automation systems was formulated from models and frameworks in literature. This model comprised six categories of risk which forms the basis for identifying specific risks. This model was used to develop a questionnaire that was sent to 172 instrument technicians and technology managers in the company to obtain primary data. 75 completed and useful responses were received. These responses were analyzed statistically to determine the highest risk sources and to determine whether there was difference in opinion between technology managers and technicians. The most important risks that were revealed in this study are: 1) the lack of skilled technicians, 2) integration capability of third-party system software, 3) reliability of the process automation hardware, 4) excessive costs pertaining to performing maintenance and migrations on process automation systems, and 5) requirements of having third-party communication interfacing compatibility as well as real-time communication networks.

Conferences by Location