Behavioral Pattern Detection Using Compact and Fast Methods

Total Page:16

File Type:pdf, Size:1020Kb

Behavioral Pattern Detection Using Compact and Fast Methods UNIVERSIDADE TÉCNICA DE LISBOA INSTITUTO SUPERIOR TÉCNICO Behavioral Pattern Detection using Compact and Fast Methods Nuno Filipe Lopes Homem Supervisor: Doctor João Paulo Baptista de Carvalho Thesis approved in public session to obtain the PhD Degree in Electrical and Computer Engineering Jury final classification: Pass with Merit Jury Chairperson: Chairman of the IST Scientific Board Members of the Committee: Doctor THOMAS ALFRED RUNKLER, Honorary Professor, Technical University of Munich, Germany Doctor PEDRO MANUEL URBANO DE ALMEIDA LIMA, Professor Associado (Com Agregação), Insituto Superior Técnico, Universidade Técnica de Lisboa Doctor JOÃO MIGUEL DA COSTA SOUSA, Professor Associado (Com Agregação), Insituto Superior Técnico, Universidade Técnica de Lisboa Doctor PEDRO ALEXANDRE MOGADOURO DO COUTO, Professor Auxiliar, Escola de Ciência e Tecnologia, Universidade de Trás-os-Montes e Alto Douro Doctor NUNO CAVACO GOMES HORTA, Professor Auxiliar, Insituto Superior Técnico, Universidade Técnica de Lisboa Doctor JOÃO PAULO BAPTISTA DE CARVALHO, Professor Auxiliar, Instituto Superior Técnico, Universidade Técnica de Lisboa November 2011 Behavioral Pattern Detection using Compact and Fast Methods Abstract This work proposes algorithms and methods for individual behavior detection within very large populations. One will consider domains where individual behavior presents some stable characteristics over time, and where the individual actions can be observed through events in a data stream. Event patterns will be characterized and used as a proxy to individual behavior and actions. As in many domains, behavior does not remain static but evolves over time; one will therefore consider the sliding window model, making the assumption that behavior is stable during the considered time window. This work will cover the detection of the specific characteristics of the individual and what distinguishes his behavior from that of all other individuals. Algorithms must have minimal memory footprint and scalability to cope with huge number of individuals. Providing and keeping results up to date in near real time is also a goal, as information is only useful for limited periods in many situations. Fortunately, approximate answers are usually adequate for most problems. Some fast and compact methods for diversity analysis will be introduced both for unlimited time and for the sliding window model. Innovative algorithms will be proposed to describe and characterize the individual event patterns. Those algorithms will then be used to create an individual event fingerprint. Using that fingerprint one will be able to identify the individual even when the identification information is not available. Distinct uses of the fuzzy fingerprint concept will be presented for individual identification that might also be extended to specific behavior identification, classification, profiling, etc., with examples in several domains such as internet traffic analysis, telecommunications fraud detection and text authorship analysis. Key-words : approximate algorithms, distinct counts, frequent elements, top-k elements, behavior patterns, fuzzy fingerprints, similarity, behavior identification iii Detecção de Padrões de Comportamento com Métodos Rápidos e Compactos Resumo Este trabalho propõe métodos e algoritmos para detecção de comportamentos individuais em populações de grande dimensão. São considerados domínios em que o comportamento individual apresenta características relativamente estáveis ao longo do tempo e onde as acções de cada indivíduo podem ser observadas como eventos sucessivos. O padrão individual de eventos será utilizado como uma aproximação ao comportamento e acções do indivíduo. Dado que em diversos domínios o comportamento não se mantém inalterado ao longo do tempo, será considerado o modelo de janela temporal, assumindo que durante essa janela o comportamento se mantém estável. As características específicas do padrão de eventos de cada indivíduo serão aqui determinantes, dado que são essas diferenças e não os aspectos em comum que o distinguem dos demais indivíduos. Os algoritmos propostos apresentam uma utilização mínima de espaço e a escalabilidade necessária a lidar com populações de grandes dimensões. Os resultados são calculados e mantidos actualizados, tanto quanto possível, quase em tempo real. São consideradas respostas aproximadas dado que estas são suficientes na generalidade das situações. Apresentam-se alguns métodos rápidos e compactos de análise de diversidade para tempo ilimitado e para janelas temporais. São introduzidos novos algoritmos para descrever e caracterizar os padrões individuais de eventos e proposto um método de criação de impressões digitais difusas. Utilizando esta impressão digital será possível identificar o indivíduo pelo seu comportamento mesmo quando a sua identificação não está disponível. São apresentadas diversas utilizações destas impressões digitais para identificação de indivíduos que poderão depois ser estendidas à identificação de comportamentos específicos, classificação, caracterização de perfis, etc, em diversos domínios tais como; análise de tráfego Internet, detecção de fraude em telecomunicações e análise de autoria de textos. Palavras-chave : algoritmos aproximados, contagem de elementos distintos, elementos frequentes, elementos top-k, padrões de comportamento, impressões digitais difusas, semelhança, identificação comportamental v Agradecimentos Aos meus pais pela educação que me proporcionaram, à Susana pelo suporte, animo e paciência que sempre me deu e ao João Paulo por me ter lançado e ajudado neste desafio. vii Contents 1 Introduction ..................................................................................................................................... 1 1.1 Motivation ............................................................................................................................... 6 1.1.1 Approximate and fuzzy answers ..................................................................................... 7 1.1.2 Large scale individual behavior challenge ....................................................................... 8 1.1.3 The behavior pattern model ......................................................................................... 11 1.2 Areas of Interest .................................................................................................................... 12 1.3 Structure of the Thesis .......................................................................................................... 13 1.4 Contributions of this work ..................................................................................................... 15 2 State of the Art .............................................................................................................................. 17 2.1 Feature extraction using approximate algorithms ................................................................ 19 2.2 Behavioral pattern identification .......................................................................................... 21 2.3 Nearest Neighbor and Fingerprints ....................................................................................... 24 2.4 Summary ............................................................................................................................... 27 3 Optimizing a Detection Process .................................................................................................... 29 3.1 Concrete case ........................................................................................................................ 30 3.2 Detection system representation .......................................................................................... 33 3.3 The full system representation ............................................................................................. 36 3.4 Solving this problem .............................................................................................................. 38 3.5 Examples ................................................................................................................................ 41 3.5.1 Single decision problem ................................................................................................ 41 3.5.2 Multiple decision problem ............................................................................................ 42 3.6 Conclusions ............................................................................................................................ 42 4 Dispersion Analysis with Compact Algorithms .............................................................................. 45 4.1 Introduction ........................................................................................................................... 45 ix 4.2 Typical behavior of mobile phone users ............................................................................... 48 4.3 Using a Probabilistic Counter (PC) for a fixed time window dispersion indicator ................ 51 4.4 Bloom Counters ..................................................................................................................... 52 4.5 Evaluating Distinct Count Estimators .................................................................................... 55 4.6 The need for sliding window indicators ................................................................................ 56 4.7 Decaying Probabilistic Counter (PD) ....................................................................................
Recommended publications
  • New Initiative Seeks to Boost Traffic Safety
    BUSINESS | Page 1 SPORT | Page 1 Jankovic targets top-10 INDEX DOW JONES QE NYMEX QATAR 2-6, 24 COMMENT 22, 23 REGION 7 BUSINESS 1-12 fi nish Barwa Bank posts 2016 20,419.21 10,670.51 52.88 ARAB WORLD 7, 8 CLASSIFIED 8 +149.84 +7.02 -0.98 INTERNATIONAL 9-21 SPORTS 1 – 12 net profi t of QR738.8mn in 2017 +0.74% +0.07% -1.82% Latest Figures published in QATAR since 1978 TUESDAY Vol. XXXVII No. 10364 February 14, 2017 Jumada I 17, 1438 AH GULF TIMES www. gulf-times.com 2 Riyals PM reviews National Action Plan for Autism Expats must In brief carry ID cards ARAB WORLD | Confl ict at all times, Syria peace talks to resume next week: UN Delayed UN-sponsored peace talks aimed at ending Syria’s civil says ministry war will resume on February 23 in Geneva, a few days later HE the Prime Minister and Interior Minister Sheikh Abdullah bin Nasser bin Khalifa al-Thani yesterday chaired a meeting on QNA He referred to article No15 of the than previously planned, the UN the National Action Plan for Autism. The meeting was attended by ministers concerned with the implementation of the plan, Doha Law which states that “in the event envoy’s off ice said yesterday. The members of the Qatar Autism Families Association, and the working group in charge of preparing the plan. The meeting that his (resident) passport, travel announcement came a day after reviewed the draft plan, the proposed governance structure, in addition to the main recommendations related to the objectives document, or residency permit is lost Syria’s opposition announced its of the plan.
    [Show full text]
  • False Statements and Perjury: an Overview of Federal Criminal Law
    False Statements and Perjury: An Overview of Federal Criminal Law Charles Doyle Senior Specialist in American Public Law May 11, 2018 Congressional Research Service 7-5700 www.crs.gov 98-808 False Statements and Perjury: An Overview of Federal Criminal Law Summary Federal courts, Congress, and federal agencies rely upon truthful information in order to make informed decisions. Federal law therefore proscribes providing the federal courts, Congress, or federal agencies with false information. The prohibition takes four forms: false statements; perjury in judicial proceedings; perjury in other contexts; and subornation of perjury. Section 1001 of Title 18 of the United States Code, the general false statement statute, outlaws material false statements in matters within the jurisdiction of a federal agency or department. It reaches false statements in federal court and grand jury sessions as well as congressional hearings and administrative matters but not the statements of advocates or parties in court proceedings. Under Section 1001, a statement is a crime if it is false, regardless of whether it is made under oath. In contrast, an oath is the hallmark of the three perjury statutes in Title 18. The oldest, Section 1621, condemns presenting material false statements under oath in federal official proceedings. Section 1623 of the same title prohibits presenting material false statements under oath in federal court proceedings, although it lacks some of Section 1621’s traditional procedural features, such as a two-witness requirement. Subornation of perjury, barred in Section 1622, consists of inducing another to commit perjury. All four sections carry a penalty of imprisonment for not more than five years, although Section 1001 is punishable by imprisonment for not more than eight years when the offense involves terrorism or one of the various federal sex offenses.
    [Show full text]
  • Where Does Europe's Money
    JULY 2015 WHERE DOES EUROPE’S MONEY GO? A GUIDE TO EU BUDGET DATA SOURCES ELISABETH DRUEL, PIERRE CHRZANOWSKI, RUFUS POLLOCK & JONATHAN GRAY WITH SUPPORT FROM This report was researched and written by Elisabeth Druel and Pierre Chrzanowski on behalf of Open Knowledge, with input and guidance from Rufus Pollock and Jonathan Gray. Support was provided by the Adessium Foundation. Open Knowledge is a global civil society organisation dedicated to opening up public information, research and culture to benefit the lives of citizens around the world. Find out more at: okfn.org. Adessium Foundation aspires to a society that encourages people to live in harmony with each other and with their environments. The Foundation works to achieve a balanced society characterized by integrity, a balance between people and nature, and social harmony. Find out more at: adessium.org. Thanks to the following people who provided input, feedback and support at various stages: ● Nick Aiossa, EU Policy Officer, Transparency International EU Office ● Brigitte Alfter, Europe Editor, JournalismFund.eu and Lecturer, Roskilde University ● Caelainn Barr, Data Journalist, The Guardian ● Cynthia O’Murchu, Reporter, Financial Times CONTENTS Executive Summary ................................................................................................................................... 2 Summary of Recommendations .......................................................................................................... 3 List of Acronyms .......................................................................................................................................
    [Show full text]
  • Auction Fraud Detection Using SVM-Based Supervised Learning
    AUCTION SHILL DETECTION FRAMEWORK BASED ON SVM A Thesis Submitted to the Faculty of Graduate Studies and Research In Partial Fulfillment of the Requirements For the Degree of Master of Science in Computer Science University of Regina By Swati Ganguly Regina, Saskatchewan December, 2016 Copyright 2016: Swati Ganguly UNIVERSITY OF REGINA FACULTY OF GRADUATE STUDIES AND RESEARCH SUPERVISORY AND EXAMINING COMMITTEE Swati Ganguly, candidate for the degree of Master of Science in Computer Science, has presented a thesis titled, Auction Shill Detection Framework Based on SWM, in an oral examination held on December 9, 2016. The following committee members have found the thesis acceptable in form and content, and that the candidate demonstrated satisfactory knowledge of the subject material. External Examiner: Dr. Eman Almehdawe, Faculty of Business Administration Supervisor: Dr. Samira Sadaoui, Department of Computer Science Committee Member: Dr. Malek Mouhoub, Department of Computer Science Committee Member: Dr. Lisa Fan, Department of Computer Science Chair of Defense: Dr. Yang Zhao, Department of Mathematcis and Statistics ABSTRACT Online auctioning has attracted serious in-auction fraud, such as shill bidding, given the huge amount of money involved and the anonymity of users. Due to the fact that shill bidding is difficult to detect as well as to prove, very few researchers have been successful in designing online shill detection systems that can be adopted by auction sites. We introduce an efficient SVM-based two-phased In-Auction Fraud Detection (IAFD) model. This supervised model is first trained offline for identifying ‘Normal’ and ‘Suspicious’ bidders. For this process, we identify a collection of the most relevant fraud classification features rather than uncertain or general features, like feedback ratings.
    [Show full text]
  • Data Protection Notice
    DATA PROTECTION NOTICE Last updated September 2020 The protection of your personal data is important to the BNP Paribas Group1, which has adopted strong principles in that respect for the entire Group. The BNP Paribas Group is made up of many different legal entities. If you would like to know which entity/ies within the BNP Paribas Group process your personal data, please contact us at the address given under section 9 below. To the extent that the European General Data Protection Regulation and/or any other data protection laws apply, this Data Protection Notice provides you (as further defined in section 2) with transparent and detailed information relating to the protection of your personal data by BNP Paribas and its subsidiaries, primarily in relation to our Corporate & Institutional Banking Business, and services of BNP Paribas Securities Services, but as fully detailed below (“we”). We are responsible, as a controller, for collecting and processing your personal data in relation to our activities. The purpose of this Data Protection Notice is to let you know which personal data we collect about you, the reasons why we use and share such data, how long we keep it, what your rights are and how you can exercise them. There may be other notices or policies detailing how we process your personal data applicable in certain territories outside of the EEA. In the event that the provisions of such notices or policies conflict with those within this Data Protection Notice, the former notices or policies shall take precedence. Further information may be provided where necessary when you apply for a specific product or service.
    [Show full text]
  • How Moral Concepts Inform the Law of Perjury, Fraud, and False Statements Stuart P
    Hastings Law Journal Volume 53 | Issue 1 Article 2 1-2001 Lying, Misleading, and Falsely Denying: How Moral Concepts Inform the Law of Perjury, Fraud, and False Statements Stuart P. Green Follow this and additional works at: https://repository.uchastings.edu/hastings_law_journal Part of the Law Commons Recommended Citation Stuart P. Green, Lying, Misleading, and Falsely Denying: How Moral Concepts Inform the Law of Perjury, Fraud, and False Statements, 53 Hastings L.J. 157 (2001). Available at: https://repository.uchastings.edu/hastings_law_journal/vol53/iss1/2 This Article is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. Lying, Misleading, and Falsely Denying: How Moral Concepts Inform the Law of Perjury, Fraud, and False Statements by STUART P. GREEN* Introduction The term "legal moralism" has traditionally referred to the view that it is permissible to use government sanctions, including criminal sanctions, to enforce prohibitions on conduct that is immoral but not directly harmful (or even offensive) to others or self. Legal moralists of this stripe thus embrace the anti-liberal view that the state may legitimately criminalize acts such as adultery, incest, and prostitution, even when performed in private by consenting adults.' In recent years, however, "legal moralism" has also come to mean something else. The term is now frequently used to refer to the view that, as Dan Kahan has put it, "law is suffused with morality and, ' Associate Professor of Law, Louisiana State University.
    [Show full text]
  • Search Rank Fraud Prevention in Online Systems
    Florida International University FIU Digital Commons FIU Electronic Theses and Dissertations University Graduate School 10-31-2018 Search Rank Fraud Prevention in Online Systems Md Mizanur Rahman [email protected] Follow this and additional works at: https://digitalcommons.fiu.edu/etd Part of the Other Computer Engineering Commons Recommended Citation Rahman, Md Mizanur, "Search Rank Fraud Prevention in Online Systems" (2018). FIU Electronic Theses and Dissertations. 3909. https://digitalcommons.fiu.edu/etd/3909 This work is brought to you for free and open access by the University Graduate School at FIU Digital Commons. It has been accepted for inclusion in FIU Electronic Theses and Dissertations by an authorized administrator of FIU Digital Commons. For more information, please contact [email protected]. FLORIDA INTERNATIONAL UNIVERSITY Miami, Florida SEARCH RANK FRAUD PREVENTION IN ONLINE SYSTEMS A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY in COMPUTER SCIENCE by Md Mizanur Rahman 2018 To: Dean John L. Volakis College of Engineering and Computing This dissertation, written by Md Mizanur Rahman, and entitled Search Rank Fraud Prevention in Online Systems, having been approved in respect to style and intellec- tual content, is referred to you for judgment. We have read this dissertation and recommend that it be approved. Geoffrey Smith Shu-Ching Chen Mark Finlayson Selcuk Uluagac Bogdan Carbunar, Major Professor Date of Defense: October 31, 2018 The dissertation of Md Mizanur Rahman is approved. Dean John L. Volakis College of Engineering and Computing Andres G. Gil Vice President for Research and Economic Development and Dean of the University Graduate School Florida International University, 2018 ii © Copyright 2018 by Md Mizanur Rahman All rights reserved.
    [Show full text]
  • Data Protection Notice
    DATA PROTECTION NOTICE Last updated March 2020 The protection of your personal data is important to the BNP Paribas Group1, which has adopted strong principles in that respect for the entire Group. The BNP Paribas Group is made up of many different legal entities. If you would like to know which entity/ies within the BNP Paribas Group process your personal data, please contact us at the address given under section 9 below. To the extent that the European General Data Protection Regulation and/or any other data protection laws apply, this Data Protection Notice provides you (as further defined in section 2) with transparent and detailed information relating to the protection of your personal data by BNP Paribas and its subsidiaries, primarily in relation to our Corporate & Institutional Banking Business, and services of BNP Paribas Securities Services, but as fully detailed below (“we”). We are responsible, as a controller, for collecting and processing your personal data in relation to our activities. The purpose of this Data Protection Notice is to let you know which personal data we collect about you, the reasons why we use and share such data, how long we keep it, what your rights are and how you can exercise them. There may be other notices or policies detailing how we process your personal data applicable in certain territories outside of the EEA. In the event that the provisions of such notices or policies conflict with those within this Data Protection Notice, the former notices or policies shall take precedence. Further information may be provided where necessary when you apply for a specific product or service.
    [Show full text]
  • Adv. Richa Kumari Singh)
    www.whiteblacklegal.co.in ISSN: 2581-8503 VOLUME 2 : ISSUE 3 || July 2020 || Email: [email protected] Website: www.whiteblacklegal.co.in 1 www.whiteblacklegal.co.in ISSN: 2581-8503 DISCLAIMER No part of this publication may be reproduced or copied in any form by any means without prior written permission of Editor-in-chief of White Black Legal – The Law Journal. The Editorial Team of White Black Legal holds the copyright to all articles contributed to this publication. The views expressed in this publication are purely personal opinions of the authors and do not reflect the views of the Editorial Team of White Black Legal. Though all efforts are made to ensure the accuracy and correctness of the information published, White Black Legal shall not be responsible for any errors caused due to oversight or otherwise. 2 www.whiteblacklegal.co.in ISSN: 2581-8503 EDITORIAL TEAM EDITOR IN CHIEF Name - Mr. Varun Agrawal Consultant || SUMEG FINANCIAL SERVICES PVT.LTD. Phone - +91-9990670288 Email - [email protected] EDITOR Name - Mr. Anand Agrawal Consultant|| SUMEG FINANCIAL SERVICES PVT.LTD. EDITOR (HONORARY) Name - Smt Surbhi Mittal Manager || PSU EDITOR(HONORARY) Name - Mr Praveen Mittal Consultant || United Health Group MNC EDITOR Name - Smt Sweety Jain Consultant||SUMEG FINANCIAL SERVICES PVT.LTD. EDITOR Name - Mr. Siddharth Dhawan Core Team Member || Legal Education Awareness Foundation 3 www.whiteblacklegal.co.in ISSN: 2581-8503 ABOUT US WHITE BLACK LEGAL is an open access, peer-reviewed and refereed journal provide dedicated to express views on topical legal issues, thereby generating a cross current of ideas on emerging matters.
    [Show full text]
  • Guidance Note on Refugee Claims Relating to Crimes of Lèse Majesté and Similar Criminal Offences
    GUIDANCE NOTE ON REFUGEE CLAIMS RELATING TO CRIMES OF LÈSE MAJESTÉ AND SIMILAR CRIMINAL OFFENCES United Nations High Commissioner for Refugees (UNHCR) Division of International Protection Geneva September 2015 The Office of the United Nations High Commissioner for Refugees (UNHCR) issues Guidance Notes on thematic legal issues pursuant to its mandate, as contained in the Statute of the Office of the United Nations High Commissioner for Refugees, and subsequent General Assembly resolutions in conjunction with Article 35 of the 1951 Convention relating to the Status of Refugees and Article II of its 1967 Protocol. Guidance Notes seek to provide guidance in the particular thematic area concerned, by analyzing international legal standards, jurisprudence and other relevant documents. Guidance Notes are in the public domain and are available on Refworld, http://www.refworld.org. 2 TABLE OF CONTENTS I. INTRODUCTION .................................................................................................................... 4 II. LÈSE MAJESTÉ AND SIMILAR CRIMES IN THE CONTEXT OF REFUGEE CLAIMS .................................................................................................................................... 4 III. INTERNATIONAL HUMAN RIGHTS LAW AND LÈSE MAJESTÉ .............................. 4 IV. FRAMEWORK FOR ANALYSIS ......................................................................................... 7 A. WELL-FOUNDED FEAR ..............................................................................................................
    [Show full text]
  • 9 FAM 40.21(A) Crimes Involving Moral Turpitude
    U.S. Department of State Foreign Affairs Manual Volume 9 - Visas 9 FAM 40.21(A) N2 MORAL TURPITUDE 9 FAM 40.21(a) N2.1 Evaluating Moral Turpitude Based Upon Statutory Definition of Offense and U.S. Standards (CT:VISA-753; 06-29-2005) To render an alien ineligible under INA 212(a)(2)(A)(i)(I), the conviction must be for a statutory offense, which involves moral turpitude. The presence of moral turpitude is determined by the nature of the statutory offense for which the alien was convicted, and not by the acts underlying the conviction. Therefore, evidence relating to the underlying act, including the testimony of the applicant, is not relevant to a determination of whether the conviction involved moral turpitude except when the statute is divisible (see 9 FAM 40.21(a) N5.2) or a political offense (see 9 FAM 40.21(a) N10). The presence of moral turpitude in a statutory offense is determined according to United States law. 9 FAM 40.21(a) N2.2 Defining “Moral Turpitude” (CT:VISA-753; 06-29-2005) Statutory definitions of crimes in the United States consist of various elements, which must be met before a conviction can be supported. Some of these elements have been determined in judicial or administrative decisions to involve moral turpitude. A conviction for a statutory offense will involve moral turpitude if one or more of the elements of that offense have been determined to involve moral turpitude. The most common elements involving moral turpitude are: (1) Fraud; (2) Larceny; and (3) Intent to harm persons or thing.
    [Show full text]
  • Tax Havens Against World Democracy Jacques Fontanel
    Tax Havens against World democracy Jacques Fontanel To cite this version: Jacques Fontanel. Tax Havens against World democracy. Economie de la Sécurité internationale, Nov 2016, Paris, France. hal-02545502 HAL Id: hal-02545502 https://hal.univ-grenoble-alpes.fr/hal-02545502 Submitted on 17 Apr 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Tax Havens against World democracy Jacques Fontanel Seminar, UNECON (State University of Economy of Saint-Petersbourg), Russia, April 2016. Seminar, Institut Libre d’Etudes de Recherche Internationale (ILERI), Paris November 2016 CESICE, Grenoble, 2016 Summary: Globalization has enabled some unscrupulous countries to market their sovereignty. These states pursue a policy of the “beggar-thy-neighbour” type, which allows them to receive a number of multinational firms registered offices after particularly attractive financial tax negotiations with governments in place. What are their methods, the guilty States, the multinational firms concerned, the cost for public service, the violence of inequality, the new insecurity for international health and protection of citizen? Tax havens threat democracy. Résumé : La mondialisation a permis à certains pays peu scrupuleux de commercialiser leur souveraineté. Ces États mènent une politique du type "beggar-thy-neighbour", qui leur permet d'accueillir un certain nombre de sièges sociaux de multinationales après des négociations fiscales particulièrement intéressantes avec les gouvernements en place.
    [Show full text]