Contemporary Works in Economic SciencesLegal Informatics, Economics, OR and Mathematics

Series
Series of Monographs of Contemporary Social Systems Solutions; volume 7
Author
Munenori Kitahara & Hiroaki Teramoto eds.
Price
5,000 yen (excl. tax)
ISBN
978-4-7985-0179-6
Format
19.1 x 1.4 x 26.4 cm (7.5 x 0.6 x 10.4 inches), Hardback, 130 pages
Published
February 2016
Order
  • amazon

Introduction

 This book consists of six chapters as follows:
Chapter 1, by Munenori Kitahara, refers to an audit for compliance in an electronic commerce. Legal states would require the residents and the entities of both lawful individual behaviors and business activities. The residents could receive online administrative, financial, commercial and educational services from the Web 24/7 on the Internet or the Cloud. It goes without saying that the entities have been developed the enterprises on the based upon the hi-powered information processing systems on the Internet or the Cloud.
 Therefore, the systems should guarantee both the legality of behaviors and the compliance of enterprises. That is a problem of system architecture. That is, the systems have to be equipped with an architecture which can guarantee the legality and the compliance.
 The architecture can be defined based on the ideas of “privacy by design,&rdqup; “security by default,” and “IAM (identity and access management).” The concept is that the various requirements of laws, regulations and policies could be reached by an engineering method. That is, the systems would be designed upon those requirements. In other words, the requirements would be embedded into the architecture of systems.
 To protect system, application, and information from internal and external threats and to comply with various regulatory, privacy and data protection requirements, organizations implement industry standard frameworks. IAM is as much an aspect of architecture as it is a collection of information technology components processes, and standard practices. As much as cloud IAM architecture and practices impact the efficiency of internal IT processes, they also play a major role in managing compliance within the enterprise.
 There are left some unsolved problems. The one is a relationship between law and information technology. In fact, information technologies would control human's behaviors in spite of human's intention. The other is that whether it is right or not, that legal justice would be maintained by information technologies.
 Chapter 2, by Chris Czerkawski and Osamu Kurihara, will deal with the macroeconomic policies of the present prime minister. That is, this chapter is on macroeconomic policies known as Abenomics implemented in Japanese economy under so-called three arrows policy. The paper summarizes the nature of Japanese economic crisis, the instruments implemented to foster economic growth and stimulate demand, the empirical consequences of the measures applied in the last ten years. The effectiveness of these measures is discussed in context of economic theories of crisis, the empirical results confirmed by statistics and in international comparative context. The failures and shortcomings of these policies are presented and conclusions drawn on existing potential for resolving the crisis.
 Chapter 3, by Hiroaki Teramoto will research on health economics. This chapter introduces and considers three representative articles on health economics, particularly medical expenditure. A consumer's behavior is affected by his or her level of health. If one's health declines (illness), the consumer changes his or her behavior. In industrialized countries or aging societies, overall expenditure for medical care is increasing and becoming an imminent problem. The field of economics has a significant amount of research on this field, some of which was reviewed for this study. The first two studies on cost-effective analysis were by Garber and Phelps, and Meltzer. The third study is the work of Graff Zivin and Neidell, who analyzed the effects of medical care when environmental pollution occurs. These three works depend on the consumer's (expected) utility maximization. The author believes that these three studies are pioneering in their field and deserve introduction and consideration.
 Chapter 4, by Nan Zhang will examine the theoretical framework of global flow of funds. The main purpose of this chapter is a trial to measure Global Flow of Funds (GFF), it includes four portions. Firstly, the paper will give a definition on GFF, based on the definition to decide the statistical domains of GFF, and build a statistical monitoring system for GFF using economic concepts and theoretical frameworks. Secondly, the paper sets out the concepts and existing data sources and integrates the data sources for measure GFF which are reflected in the Balance of Payments, International Investment Position (IIP), the Coordinated Direct Investment Survey (CDIS), the Coordinated Portfolio Investment Survey (CPIS), Consolidated Banking Statistics (CBS), and in the “rest-of-the-world” account of the national accounts. These datasets provide valuable information for the analysis of GFF. Thirdly, The Balance Sheet Approach is used to break down the rest of the world by components of IIP. An external statistics' matrix (metadata) exercise shows what external sector financial data are available by IIP concept. As the outcome of the study, this paper compiled Global Flow of Find Matrix with the pattern of “Country by Country” matrix. Fourthly, as well as an example illustrating how the GFF matrix operates.
 Chapter 5, by Setsuko Sakai and Tetsuyuki Takahama will research on detecting ridge structure for population-based optimization algorithms. There exist many studies on solving optimization problems using population-based optimization algorithms (POAs). POAs such as evolutionary algorithms have been proved to be powerful function optimization algorithms and outperform conventional optimization algorithms. However, there exist some difficult optimization problems such as problems with ridge structure. In problems with ridge structure, search points will move through a narrow path to find better points, the diversity of search points will be lost, and the search process will be slowed down or even be stopped at a local solution. If ridge structure can be detected, the efficiency and robustness of the search process can be improved by selecting proper algorithm parameters to keep the diversity. In this study, we propose three methods of detecting ridge structure and also propose a method of controlling algorithm parameters adaptively for ridge structure. The performances of the methods are compared by optimizing several functions with controlling algorithm parameters.
 Chapter 6, by Ryogo Wada and Yoshio Agaoka will deal with harmonic polynomials of more degree. Concerning classical harmonic polynomials on Cp, many results have been obtained from several standpoints. For example, Kostant-Rallis treated this subject from the Lie algebraic viewpoint, and considered the classical harmonic polynomials on Cp as polynomials on some specific vector space, which is canonically associated with the Lie algebra 𝔰𝔬(p, 1). In the series of papers we further investigate harmonic polynomials from their standpoint for the Lie algebras 𝔰𝔲(p, 1), 𝔰𝔭(p, 1) and 𝔣4(-20). In particular in the previous paper we considered harmonic olynomials for the real rank 2 case 𝔰𝔬(p, 2), and obtained the formula of irreducible decomposition in the character level. In this paper we explain a method to decompose the space of harmonic polynomials into irreducible factors, and we explicitly give its decomposition for low degree cases.

Contents

Preface
 
Chapter 1 Audit and Compliance through Proactive Engineering Method  Munenori Kitahara
 
 1.Introduction
 2.The Clowd 24/7
 3.Guarantee of Legality through Technology
 4.Audit and Compliance
 5.Information Systems and Regulations
 6.Compliance through Information Technology
 7.Architecture and Security Standard of Information Technology
 8.Conclusion
 
Chapter 2 Some Notes on Macroeconomic Policies: Abenomics in Japan  Chris Czerkawski and Osamu Kurihara
 
 1.Introduction
 2.Three Arrows of Abenomics
 3.Abenomics and the Empirical Responses
 4.Why Abenomics May Not Be a Proper Policy for Japanese Economic Problems?
 
Chapter 3 Health and Consumer Behavior  Hiroaki Teramoto
 
 1.Introduction
 2.Analysis of Cost-effectiveness in Medical Care
 3.Pollution and Health Production
 4.Conclusion
 
Chapter 4 Measuring Global Flow of Funds: Theoretical Framework, Data Sources and Approaches  Nan Zhang
 
 1.Introduction
 2.An Integrated Framework for Global Flow of Funds
 3.The Data Sources for Global Flow of Funds
 4.Global Flow of Funds Matrix on a From-Whom-to-Whom Basis
 5.An Example for Setting up a Global Flow of Funds Matrix
 6.Concluding Remarks
 
Chapter 5 A Comparative Study on Detecting Ridge Structure for Population-Based Optimization Algorithms  Setsuko Sakai and Tetsuyuki Takahama
 
 1.Introduction
 2.Related Works
 3.Detecting Ridge Structure
 4.Differential Evolution with Detecting Ridge Structure
 5.Numerical Experiments
 6.Conclusion
 
Chapter 6 Explicit Irreducible Decomposition of Harmonic Polynomials in the Case of 𝔰𝔬(p, 2)  Ryoko Wada and Yoshio Agaoka
 
 1.Introduction
 2.Preliminaries
 3.Irreducible Decomposition of Sn
 4.An Algorithm to Obtain the Explicit Irreducible Decomposition
 5.Tables of Generators of Sn and n for n ≤ 5
 6.Reproducing Formulas of the Principal Part of Irreducible Subspaces of n for n ≤ 5
 
Contributors

お勧めBOOKS

Eugenics in Japan

Eugenics in Japan

Eugenics and its place in the modernizat...

詳細へ

Kyushu University Press

3-8-34-305
Momochihama,Sawara-ku,
Fukuoka, JAPAN 814-0001
Phone: +81-92-833-9150
Fax: +81-92-833-9160
E-mail : info@kup.or.jp

Page Top