Premium Essay

To Login to This

In:

Submitted By ThomasLim
Words 11161
Pages 45
The effect of the board of directors’ characteristics on corporate social responsibility disclosure by Islamic banks: evidence from Gulf Cooperation Council countries
Abdullah Awadh Bukair and Azhar Abdul Rahman
Abstract
Corporate social activities have become major subjects because of their effects on the quality life of citizens, in particular, and on the society at large. Therefore, today, there is an increase awareness of social responsibility due to the challenges meeting the financial institutions (particularly, Islamic banking) around the world. This paper examines the influence of the board of directors’ characteristics, consisting of board size, board composition, and the separation roles of CEO and chairman, on corporate social responsibility (CSR) disclosure in 53 annual reports of Islamic banks of Gulf Cooperation Council (GCC) countries after controlling of bank size, financial performance and relevant public. Based on the framework of legitimacy theory, the findings show that CSR disclosure has a negative and insignificant relationship with board composition. On contrast, the study found insignificantly and positive association between CSR disclosure and other characteristics of board of directors (board size and the separation roles of CEO and chairman). With regards control variables, the study indicates that bank size and financial performance have a positive and significant influence on CSR disclosure, while relevant public has no effect. Therefore, the results indicate that corporate governance structure of board of directors within Islamic banks of GCC region does not play a major role on CSR disclosure, because of family control. These findings suggest the need for improving the existence of the best practice of corporate governance for Islamic financial institutions by imposing additional constraints on the board of directors’

Similar Documents

Premium Essay

Employee Management System

...A Project Presentation On Employee Management System Submitted By: Patel Sona B. Patel Payal J. [E.No-13084231201] [E.No-13084231170] M.Sc. (CA & IT) Semester-III Submitted To: Department of Computer Science, Ganpat University,Ganpat Vidyanagar – 384012. July/Dec-2014 1 Project Profile:Project Title Employee Management System Objectives System is used to Manage Employees, In Recruitment process choose candidate, Project Management, Client Management at one place. Platform Web Application Front End .NET Framework 4.0 with VB Back End Microsoft SQL Server 2008 Tools Visual Studio 2010, Ajax Control Toolkit 4,Crystal Report 2008 Students Name Sona Patel (13084231201) Payal Patel (13084231170) Internal Guide Hiral R. Patel Developed By Sona Patel Payal Patel Existing System:• Existing system requires manual integration of data and management of different-different processes. • Company requires different systems for Human Resource Information management, Project management and client & Product management. • Searching and tracking of information becomes complex and time consuming. Need for New System:• The new system requires to integrate systems for Human Resource Information , Client management and Project management at one place. • It makes data manipulation of projects & employees easy and fast. Its Less time consuming and provide efficient searching. FUNCTIONAL SPECIFICATION:•...

Words: 4574 - Pages: 19

Free Essay

Project 9 Unix Linux Admin1

...ever) does the account expire? There’s no expireation for the account What files were modified on your system as a result of the user account creation?  Passwd , group, gshadow, shadow 4- A. Set new accounts default shell to /bin/bash. useradd -s /bin/bash auser1 B. Set new accounts to expire on December 15 (of this year). useradd -e 2016-12-15 auser2 C. Set new account passwords to expire after 3 months. useradd –f 45 D. Set new accounts to be disabled one week after the password has expired.  (That is, after one week of inactivity after the password has expired.) useradd –e 2016-08-05 –f 45 auser3 What were the options used for each command? 5- create a new user account buser with real name Bob User.  Make sure the account is initially disabled (locked).  Be sure to set a password What is actually different in the configuration file(s) for locked/disabled accounted versus unlocked/enabled accounts? There’s no change in configuration I just put old date at the expire date option so the user will be disable . GUI option Command option we just need to type this command useradd buser -c...

Words: 924 - Pages: 4

Premium Essay

Employee Management

...A Project Presentation On Employee Management System Submitted By: Patel Sona B. Patel Payal J. [E.No-13084231201] [E.No-13084231170] M.Sc. (CA & IT) Semester-III Submitted To: Department of Computer Science, Ganpat University,Ganpat Vidyanagar – 384012. July/Dec-2014 1 Project Profile:Project Title Employee Management System Objectives System is used to Manage Employees, In Recruitment process choose candidate, Project Management, Client Management at one place. Platform Web Application Front End .NET Framework 4.0 with VB Back End Microsoft SQL Server 2008 Tools Visual Studio 2010, Ajax Control Toolkit 4,Crystal Report 2008 Students Name Sona Patel (13084231201) Payal Patel (13084231170) Internal Guide Hiral R. Patel Developed By Sona Patel Payal Patel Existing System:• Existing system requires manual integration of data and management of different-different processes. • Company requires different systems for Human Resource Information management, Project management and client & Product management. • Searching and tracking of information becomes complex and time consuming. Need for New System:• The new system requires to integrate systems for Human Resource Information , Client management and Project management at one place. • It makes data manipulation of projects & employees easy and fast. Its Less time consuming and provide efficient searching. FUNCTIONAL SPECIFICATION:•...

Words: 4574 - Pages: 19

Free Essay

Sql Server Security Best Practise

...SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other...

Words: 15647 - Pages: 63

Premium Essay

Nt2580 Unit 3 Lab 3.2.1

...3.2.1 Registration Module When user access the application on web user will be first face sign up/login process. If it’s new user the new user Signup first for creating the account. In registration module the user has to enter his/her own personal data or information for the account creation. The data may contain first name of the user, second name of the user, email address of the user, password, confirm password again and also the user image and etc. these all the information are required for profile creating. Data such as user name and use password required to login into the system software. The description is summarized in the table 3.1, which is given blow. Table 3.1 Registration Module Sr. No. Description R1.0 This module will allow user to create his/her account profile. User will fill the registration form correctly. R1.1 Information of the user such as user name, password, confirm password, E mail address, Images etc. 3.2.2 Login Management module...

Words: 541 - Pages: 3

Premium Essay

Network Security

...[pic] [pic] |School of Science and Technology | |Department of Information Technology | |ISSC361: IT Security: Information Assurance | |3 Credit Hours | |8 Week Course | |Prerequisite(s) :None | |Table of Contents | |Instructor Information |Evaluation Procedures | |Course Description |Grading Scale | |Course Scope |Course Outline | |Course Objectives |Policies | |Course Delivery Method |Academic Services | |Resources |E-Book Links | |Instructor Information ...

Words: 4918 - Pages: 20

Premium Essay

Wikileak

...     About us Advertise Contact Us Send Comments/Tips Home My FDL Firedoglake News TBogg La Figa Book Salon FDL Action The Dissenter Pam's House Blend Elections FDL TV Just Say Now Password Remember Me Login              Username: « Is the UK Torture Inquiry an Attempt to Limit Further Disclosure? Another Obama Recess Appointment For Someone Not Named Johnsen » Wikileaks Leaker Bradley Manning Finally Charged By: emptywheel Tuesday July 6, 2010 12:14 pm submit Tweet 93 The government has finally charged Bradley Manning, the Wikileaks leaker. He is charged with two counts of violating the UCMJ, one related to loading onto his own unsecure computer a set of information and adding unauthorized software to a military network computer, and the other related to accessing and passing information onto someone not entitled to have it. I find the charge sheet particularly interesting for two reasons. What the government says that Manning did with the material he accessed, and an apparent discrepancy between the government’s depiction of the timing and Wired’s depiction of it. What the government knows about what Manning did with the information First, it describes the information he accessed differently as follows:   The video of the July 12, 2007 Apache killing of Reuters journalists (obtained via unauthorized access, loaded onto his unsecured computer, transmitted to someone unauthorized to receive it) The Rejkjavik State Department...

Words: 8363 - Pages: 34

Free Essay

Chf Tsunami

...home contributors store glossary archive rss donate End of CB Power - SNB Folds Posted by : Bruce Krasting Post date: 01/15/2015 - 08:20 Anyone who continues to believes in the all powerful CB after today is a fool. The Next Round of the Great Crisis as Begun Posted by: Phoenix Capital... Post date: 01/15/2015 - 17:10 At this point, the writing is on the wall: nothing can be taken for granted. No assurances or promises or proclamations will hold. MiSSioN ACCoMPLiCe... Posted by: williambanzai7 Post date: 01/15/2015 - 16:06 Je Suis _________ User login Username: * Home "It's Carnage" - Swiss Franc Soars Most Ever After SNB Abandons EURCHF Floor; Macro Hedge Funds Crushed Submitted by Tyler Durden on 01/15/2015 06:07 -0500 Search Password: * C reate new account Request new password Log in Bank of England Soros LIBOR National Bank Bond Crude Equity Markets None Reuters Twitter Fail France George Swiss Monetary Policy Switzerland Swiss Franc Twitter Volatility Tw eet 489 Like 382 Share 143 31 "As if millions of macro hedge funds suddenly cried out in terror and were suddenly silenced" Over two decades ago, George Soros took on the Bank of England, and won. Just before lunch local time, the Swiss National Audio Commentary From RanSquawk: open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com Bank took on virtually every single macro...

Words: 5112 - Pages: 21

Free Essay

Gygtyjtuy

...Application Thumbnails Customized Help Pages for Applications Test the Customization Customize Login Page Start with Your Own HTML File Modify the Links to Image Location Rename the HTML File Add Code to the login.inc File Upload the login.inc and the Image Files as Web Content to ASA Select the login.inc to be the File for Full Customization Test the Full Customization CLI Support Backup the Customizations Conclusion Troubleshoot Related Information Introduction Cisco Adaptive Security Appliance (ASA) 5500 series software version 8.0 introduces advanced customization features which enable the development of attractive web portals for clientless users. This document details the many options available to customize the login page, or welcome screen, and the web−portal page. Prerequisites Requirements Cisco recommends that you have knowledge of how to use the Cisco Adaptive Security Device Manager (ASDM) in order to configure group−policies and connection profiles on ASA. Refer to these documents for general information: • The Configuring Clientless SSL VPN section of Cisco Security Appliance Command Line Configuration Guide, Version 8.0 • ASDM 6.0 User Guide Prior to setting up a customized web−portal, you must complete some basic ASA configuration steps. See the Configuration Requirements section of this document for more information. Components Used The information in this document is based on these software and...

Words: 3116 - Pages: 13

Free Essay

Chf Tsunami

...home contributors store glossary archive rss donate End of CB Power - SNB Folds Posted by : Bruce Krasting Post date: 01/15/2015 - 08:20 Anyone who continues to believes in the all powerful CB after today is a fool. The Next Round of the Great Crisis as Begun Posted by: Phoenix Capital... Post date: 01/15/2015 - 17:10 At this point, the writing is on the wall: nothing can be taken for granted. No assurances or promises or proclamations will hold. MiSSioN ACCoMPLiCe... Posted by: williambanzai7 Post date: 01/15/2015 - 16:06 Je Suis _________ User login Username: * Home "It's Carnage" - Swiss Franc Soars Most Ever After SNB Abandons EURCHF Floor; Macro Hedge Funds Crushed Submitted by Tyler Durden on 01/15/2015 06:07 -0500 Search Password: * C reate new account Request new password Log in Bank of England Soros LIBOR National Bank Bond Crude Equity Markets None Reuters Twitter Fail France George Swiss Monetary Policy Switzerland Swiss Franc Twitter Volatility Tw eet 489 Like 382 Share 143 31 "As if millions of macro hedge funds suddenly cried out in terror and were suddenly silenced" Over two decades ago, George Soros took on the Bank of England, and won. Just before lunch local time, the Swiss National Audio Commentary From RanSquawk: open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com Bank took on virtually every single macro...

Words: 5112 - Pages: 21

Free Essay

Miss

...http://helicon.vuw.ac.nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=96090677&site=ehost-live * Wasik, B. (2013, 06). Welcome to the programmable world. Wired, 21, 140.http://helicon.vuw.ac.nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=89374642&site=ehost-live | Week 2 – 21 July | Social Media StrategyBefore class read: * Wilson, H. J., Guinan, P. J., Parise, S., & Weinberg, B. D. (2011). What’s your social media strategy? Harvard Business Review, 89(7/8), 23-25. http://helicon.vuw.ac.nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=61870888&site=ehost-live * Social Media Marketing Report 2015 Available: http://www.socialmediaexaminer.com/report/ | Week 3 – 28 July | Cyber Security | PrivacyBefore class read: * Ferguson, A. (2014). Future tech. Acuity, 1(4), 36-38.http://helicon.vuw.ac.nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=101950726&site=ehost-live | Week 4 – 4 August | Online Infrastructure | The Social, Business and Government Cloud (Jay Gattuso)Before class read: * Durkee, D. (2010). Why cloud computing will never be free. Queue, 8(4), 20.http://helicon.vuw.ac.nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=50281775&site=ehost-live * Katz, R. H. (2009). Tech titans building boom. Spectrum, IEEE, 46(2), 40-54.http://helicon.vuw.ac.nz/login?auth=vuwbb&url=http://dx...

Words: 998 - Pages: 4

Premium Essay

Internet Hacking

... * * BY JESTER SLUGGO * * (NOTE: THIS IS WRITTEN IN 40 COL.) * * WRITTEN 10/08/85 * ************************************** IN THE FOLLOWING FILE, ALL REFERENCES MADE TO THE NAME UNIX, MAY ALSO BE SUBSTITUTED TO THE XENIX OPERATING SYSTEM. BRIEF HISTORY: BACK IN THE EARLY SIXTIES, DURING THE DEVELOPMENT OF THIRD GENERATION COMPUTERS AT MIT, A GROUP OF PROGRAMMERS STUDYING THE POTENTIAL OF COMPUTERS, DISCOVERED THEIR ABILITY OF PERFORMING TWO OR MORE TASKS SIMULTANEOUSLY. BELL LABS, TAKING NOTICE OF THIS DISCOVERY, PROVIDED FUNDS FOR THEIR DEVELOPMENTAL SCIENTISTS TO INVESTIGATE INTO THIS NEW FRONTIER. AFTER ABOUT 2 YEARS OF DEVELOPMENTAL RESEARCH, THEY PRODUCED AN OPERATING SYSTEM THEY CANLMD "UNIX". SIXTIES TO CURRENT: DURING THIS TIME BELL SYSTEMS INSTALLED THE UNIX SYSTEM TO PROVIDE THEIR COMPUTER OPERATORS WITH THE ABILITY TO MULTITASK SO THAT THEY COULD BECOME MORE PRODUCTIVE, AND EFFICIENT. ONE OF THE SYSTEMS THEY PUT ON THE UNIX SYSTEM WAS CALLED "ELMOS". THROUGH ELMOS MANY TASKS (I.E. BILLING,AND INSTALLATION RECORDS) COULD BE DONE BY MANY PEOPLE USING THE SAME MAINFRAME. NOTE: COSMOS IS ACCESSED THROUGH THE ELMOS SYSTEM. CURRENT: TODAY, WITH THE DEVELOPMENT OF MICRO COMPUTERS, SUCH MULTITASKING CAN BE ACHIEVED BY A SCALED DOWN VERSION OF UNIX (BUT JUST AS POWERFUL). MICROSOFT,SEEING THIS DEVELOPMENT, OPTED TO DEVELOP THEIR OWN UNIX LIKE SYSTEM FOR THE IBM LINE...

Words: 950 - Pages: 4

Premium Essay

Employer Facebook Ethics Issue

...screen prospective employees in recent years. However, now many companies are going a step further and requiring potential candidates to provide their Facebook login. Those who refuse to provide this information are often turned away immediately and those who comply place their profiles in the hands of the interviewer. The employer uses the individual’s login to search through their messages, comments, and pictures, looking for anything controversial that reflects negatively on the user. This has caused controversy and debate across the nation as more become aware of this issue. The legal and moral implications of requiring potential employees to provide this information are serious. Many argue that this is an invasion of individual rights to privacy and even Facebook itself condemns this practice. Overall, demanding private login information is unethical and a violation of citizens’ rights in the United States. The reasons that some companies ask for logins are understandable. In recent years, social networking sites have become increasingly popular and users often post personal information that could be valuable in assessing interviewees. Having access to their potential hire’s profile would be helpful to a corporation and would enable them to sift out those who represented themselves poorly on Facebook. However, this is also an invasion of the individual’s rights. A person may have private conversations using a social networking website that they do not want to disclose to...

Words: 607 - Pages: 3

Free Essay

Nothing

...Attached to this document you will find the new internships for the week of March 23, 2015. The first portion of the listing are for internships that can be found on the Fogelman Internship Network and those internships can be located by going to the following link Fogelman Internship Network. The second portion of this listing you will find internships that are listed on the Career Services website, for those internships you will need to access E-recruiting through the following link https://memphis.experience.com/experience/login. The last portion of the internship listing contains internships that are not listed on either website, if you are interested in any of these internships please contact Carolyn Cates at ccates2@memphis.edu . Fogelman Internship Network Waddell & Reed – Financial Advisor/Financial Planner Intern This company is looking for multiple undergraduate and graduate students who are interested in working as a paid part-time Intern and entry level full-time position. The closing date for this opportunity is 1/29/2016. All interested parties, please apply by going to the following link Fogelman Internship Network Silver Tree Residential, LLC – Junior Acquisition Associate Intern This company is looking for (2) undergraduate or graduate students who are interested in a paid flexible internship. The closing date for this opportunity is 4/30/2015. All interested parties, please apply by going to the following link Fogelman Internship Network Germantown...

Words: 1874 - Pages: 8

Premium Essay

Nursing Plan

...Terms have the same force and effect as an Agreement signed in writing. If you do not agree to these Terms, you may not use TermPaperWarehouse.com. This Agreement is subject to change by TermPaperWarehouse.com at any time; therefore, you are responsible to review these terms regularly to learn about any changes. We will post an updated version of these Terms if we modify them. You understand and agree that your ongoing use of TermPaperWarehouse.com after we post or provide notice of the changes to this Agreement means that you accept and confirm that the updated terms apply to you. This Agreement is governed by the laws of the State of California and you hereby irrevocably consent to the exclusive jurisdiction and venue of the courts in Los Angeles County, California U.S.A. in all disputes arising out of or relating to the use of TermPaperWarehouse.com's services. 1. Legal definitions We will use the following definitions in this Agreement: "You" means the entity or person who access or uses the Site as an end user. "Login" means the combination of unique username and password that is used to access a site. A login is a license to use a site for a period of time that is specified. "Membership" or "Members" means a single registration and/or subscription account per user of a valid username and password (login) for the site during the term of membership. "Site" or...

Words: 3233 - Pages: 13