Search results

1 – 10 of over 78000
Article
Publication date: 1 February 1979

Armin Töpfer

Introduction Within the framework of an empirical study the structure and the developmental stage of planning and control systems in 355 companies of different branches…

Abstract

Introduction Within the framework of an empirical study the structure and the developmental stage of planning and control systems in 355 companies of different branches and sizes in German industry were investigated. In so doing planning and control, with the help of data processing, were analysed throughout industry as a whole as well as in sectional classes.

Details

Management Decision, vol. 17 no. 2
Type: Research Article
ISSN: 0025-1747

Article
Publication date: 6 July 2012

Hendi Yogi Prabowo

The purpose of this paper, which is based on author's PhD study, is to assess the efficacy of Indonesia's credit card fraud prevention from a strategic point of view…

2897

Abstract

Purpose

The purpose of this paper, which is based on author's PhD study, is to assess the efficacy of Indonesia's credit card fraud prevention from a strategic point of view, using a model of payments fraud prevention practice developed by the author based on similar practices in the USA, the UK and Australia.

Design/methodology/approach

Primary and secondary data, particularly from the payments system of the USA, the UK, Australia and Indonesia were used. Such data were collected by means of literature reviews and in‐depth interviews with payments system professionals.

Findings

The author establishes that credit card fraud prevention practice in Indonesia is still at a lower level of robustness than those in the USA, the UK and Australia. Deficiencies in the credit card fraud prevention practice in Indonesia are indicated, inter alia, by a lack of reliable fraud data collection, management and distribution mechanisms as well as a lack of effective and efficient identity management practice. Deficiencies and weaknesses in the system should be identified and action taken to make it more consistent with credit card fraud prevention practices of other countries.

Originality/value

The paper sees credit card fraud prevention practice in Indonesia as a function of many factors which influence one another, based on which the analysis is built.

Details

Journal of Money Laundering Control, vol. 15 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 January 1990

Ketil Fjerdingen

Developing new tools for improving the quality and efficiency ofthe audit work should be a central part of all internal auditdepartments. If efficiency is to be realised…

Abstract

Developing new tools for improving the quality and efficiency of the audit work should be a central part of all internal audit departments. If efficiency is to be realised, the role of technology in the audit function needs to grow. The audit database has been developed over two to three years and has so far proved to be a practical tool for the whole department.

Details

Managerial Auditing Journal, vol. 5 no. 1
Type: Research Article
ISSN: 0268-6902

Keywords

Abstract

Details

Rutgers Studies in Accounting Analytics: Audit Analytics in the Financial Industry
Type: Book
ISBN: 978-1-78743-086-0

Article
Publication date: 2 May 2017

Kannan S. and Somasundaram K.

Due to the large-size, non-uniform transactions per day, the money laundering detection (MLD) is a time-consuming and difficult process. The major purpose of the proposed…

Abstract

Purpose

Due to the large-size, non-uniform transactions per day, the money laundering detection (MLD) is a time-consuming and difficult process. The major purpose of the proposed auto-regressive (AR) outlier-based MLD (AROMLD) is to reduce the time consumption for handling large-sized non-uniform transactions.

Design/methodology/approach

The AR-based outlier design produces consistent asymptotic distributed results that enhance the demand-forecasting abilities. Besides, the inter-quartile range (IQR) formulations proposed in this paper support the detailed analysis of time-series data pairs.

Findings

The prediction of high-dimensionality and the difficulties in the relationship/difference between the data pairs makes the time-series mining as a complex task. The presence of domain invariance in time-series mining initiates the regressive formulation for outlier detection. The deep analysis of time-varying process and the demand of forecasting combine the AR and the IQR formulations for an effective outlier detection.

Research limitations/implications

The present research focuses on the detection of an outlier in the previous financial transaction, by using the AR model. Prediction of the possibility of an outlier in future transactions remains a major issue.

Originality/value

The lack of prior segmentation of ML detection suffers from dimensionality. Besides, the absence of boundary to isolate the normal and suspicious transactions induces the limitations. The lack of deep analysis and the time consumption are overwhelmed by using the regression formulation.

Details

Journal of Money Laundering Control, vol. 20 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 April 2006

Kari Pikkarainen, Tero Pikkarainen, Heikki Karjaluoto and Seppo Pahnila

Although research into the adoption and use of online banking services has grown in many parts of the world, the centre of attention has been largely on determinants of…

6323

Abstract

Purpose

Although research into the adoption and use of online banking services has grown in many parts of the world, the centre of attention has been largely on determinants of online banking adoption, not on users' satisfaction with use. This paper aims to test and validate the End‐User Computing Satisfaction (EUCS) model in order to investigate online banking users' satisfaction with the service.

Design/methodology/approach

A survey (n=268) was carried out using convenience sampling. An exploratory factor analysis followed by a confirmatory factor analysis run in LISREL 8.7 is used to test the validity of the model in an online banking context.

Findings

The survey results support three constructs (content, ease of use, accuracy) from the original model, indicating that the modified EUCS model labelled EUCS2 can be utilized in analyzing user satisfaction with online banking among private customers.

Research limitations/implications

The obtained model suffered from two cross‐loadings between individual items. Another limitation concerns the sample obtained. Therefore, future studies should test the model with larger samples to verify the model in this context.

Practical implications

Findings of the study indicate that banks could improve end‐user computing satisfaction with online banking by concentrating on the three constructs obtained from the analyses. Moreover, the results indicate that banks can increase satisfaction of online banking services by personalising the service, allowing easier and more convenient use experience.

Originality/value

The paper makes a significant contribution by testing and modifying the EUCS model in the online banking context.

Details

International Journal of Bank Marketing, vol. 24 no. 3
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 1 March 1980

S. Leslie Anderson

“A Canadian company required information on a process in Switzerland. Since data were too complicated to obtain by mail a vice‐president of the company was assigned to…

82

Abstract

“A Canadian company required information on a process in Switzerland. Since data were too complicated to obtain by mail a vice‐president of the company was assigned to make a trip. The company librarian hearing of this situation accidentally made a search and produced the information from the company's own files.”

Details

Library Management, vol. 1 no. 3
Type: Research Article
ISSN: 0143-5124

Article
Publication date: 1 June 2003

Philip O’Reilly and Pat Finnegan

Since 1995, Internet banking has allowed consumers to utilise the Internet as a platform to interact with their bank. Initially, the hype surrounding Internet banking was…

1189

Abstract

Since 1995, Internet banking has allowed consumers to utilise the Internet as a platform to interact with their bank. Initially, the hype surrounding Internet banking was immense. However, more realistic expectations about the value of Internet channels and changes in the financial services sector are affecting opinions of Internet banking systems. This study examines contemporary Internet banking systems in five leading ‘clicks and mortar’ banks operating in the North‐Eastern part of the United States. The findings reveal a move towards viewing Internet banking as an operational rather than a competitive instrument, with consequential changes in how banks evaluate their Internet banking systems. The paper concludes by proposing some changes to expectations on how Internet banking is likely to develop.

Details

Journal of Systems and Information Technology, vol. 7 no. 1/2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 10 May 2011

Martijn van der Steen

The purpose of this paper is to explore the dynamics involved in the emergence and change of management accounting routines. It seeks to provide an understanding of the…

7432

Abstract

Purpose

The purpose of this paper is to explore the dynamics involved in the emergence and change of management accounting routines. It seeks to provide an understanding of the ways in which these complex routines foster stability and change in management accounting practices.

Design/methodology/approach

A longitudinal case study was conducted at the Rabobank Groningen – an autonomous member of the cooperative Rabobank group – over a period of four years. The emergence of a new routine of planning and control was traced, which evolved substantially over the period of study.

Findings

It was found that the cognitive representations of the routine studied, i.e. the way it was subjectively understood, provided a temporarily stable basis for the routine. Change arose from improvisations through its recurrent performances. It was also found that change could result from complex dynamics in the routine, as opposed to viewing them as static and stable entities that react to “external” stimuli.

Research limitations/implications

The research findings contribute to an understanding of the reproduction of management accounting routines and the ways in which change can arise in these routines. It provides a means to study the micro‐processes of reproduction of routines, which play an important part in institutional theories of management accounting change.

Originality/value

This paper places management accounting routines and their processes of reproduction at the centre of the argument to provide an understanding of the role of routines in accounting change. Since the notion of management accounting routines has not been developed extensively, this understanding contributes to studies into the nature of routines and their role in management accounting change.

Details

Accounting, Auditing & Accountability Journal, vol. 24 no. 4
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 18 October 2011

Bhushan Kapoor, Pramod Pandya and Joseph S. Sherif

This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data

3157

Abstract

Purpose

This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network‐based attacks.

Design/methodology/approach

The paper introduces the necessary mathematics of cryptography: integer and modular arithmetic, linear congruence, Euclidean and extended Euclidean algorithm, Fermat's theorem, and Elliptic curve.

Findings

The results indicate that encryption has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs, and secure computation.

Practical implications

The results of this research show that all forms of e‐commerce activities such as online credit card processing, purchasing stocks, and banking data processing, if compromised, would lead to businesses losing billions of dollars in lost revenues as well as losing confidence in e‐commerce. In the last few years, it had been reported that organizations that store and maintain customers' private and confidential records were compromised on many occasions by hackers breaking into the data networks and stealing the records from the storage media.

Originality/value

This paper tackles one of the most critical problems of securing data networks. Security problems arise among other things to resource and workload sharing; complexity of interconnected networks; authentication of users; fast expandability of networks; threats to networks such as wiretapping and violations of the seven pillars of security: authentication, authorization, privacy, integrity, non‐repudiation, availability, and audit.

1 – 10 of over 78000