Search results
1 – 10 of over 72000Introduction Within the framework of an empirical study the structure and the developmental stage of planning and control systems in 355 companies of different branches and sizes…
Abstract
Introduction Within the framework of an empirical study the structure and the developmental stage of planning and control systems in 355 companies of different branches and sizes in German industry were investigated. In so doing planning and control, with the help of data processing, were analysed throughout industry as a whole as well as in sectional classes.
The purpose of this paper, which is based on author's PhD study, is to assess the efficacy of Indonesia's credit card fraud prevention from a strategic point of view, using a…
Abstract
Purpose
The purpose of this paper, which is based on author's PhD study, is to assess the efficacy of Indonesia's credit card fraud prevention from a strategic point of view, using a model of payments fraud prevention practice developed by the author based on similar practices in the USA, the UK and Australia.
Design/methodology/approach
Primary and secondary data, particularly from the payments system of the USA, the UK, Australia and Indonesia were used. Such data were collected by means of literature reviews and in‐depth interviews with payments system professionals.
Findings
The author establishes that credit card fraud prevention practice in Indonesia is still at a lower level of robustness than those in the USA, the UK and Australia. Deficiencies in the credit card fraud prevention practice in Indonesia are indicated, inter alia, by a lack of reliable fraud data collection, management and distribution mechanisms as well as a lack of effective and efficient identity management practice. Deficiencies and weaknesses in the system should be identified and action taken to make it more consistent with credit card fraud prevention practices of other countries.
Originality/value
The paper sees credit card fraud prevention practice in Indonesia as a function of many factors which influence one another, based on which the analysis is built.
Details
Keywords
Developing new tools for improving the quality and efficiency ofthe audit work should be a central part of all internal auditdepartments. If efficiency is to be realised, the role…
Abstract
Developing new tools for improving the quality and efficiency of the audit work should be a central part of all internal audit departments. If efficiency is to be realised, the role of technology in the audit function needs to grow. The audit database has been developed over two to three years and has so far proved to be a practical tool for the whole department.
Details
Keywords
Due to the large-size, non-uniform transactions per day, the money laundering detection (MLD) is a time-consuming and difficult process. The major purpose of the proposed…
Abstract
Purpose
Due to the large-size, non-uniform transactions per day, the money laundering detection (MLD) is a time-consuming and difficult process. The major purpose of the proposed auto-regressive (AR) outlier-based MLD (AROMLD) is to reduce the time consumption for handling large-sized non-uniform transactions.
Design/methodology/approach
The AR-based outlier design produces consistent asymptotic distributed results that enhance the demand-forecasting abilities. Besides, the inter-quartile range (IQR) formulations proposed in this paper support the detailed analysis of time-series data pairs.
Findings
The prediction of high-dimensionality and the difficulties in the relationship/difference between the data pairs makes the time-series mining as a complex task. The presence of domain invariance in time-series mining initiates the regressive formulation for outlier detection. The deep analysis of time-varying process and the demand of forecasting combine the AR and the IQR formulations for an effective outlier detection.
Research limitations/implications
The present research focuses on the detection of an outlier in the previous financial transaction, by using the AR model. Prediction of the possibility of an outlier in future transactions remains a major issue.
Originality/value
The lack of prior segmentation of ML detection suffers from dimensionality. Besides, the absence of boundary to isolate the normal and suspicious transactions induces the limitations. The lack of deep analysis and the time consumption are overwhelmed by using the regression formulation.
Details
Keywords
Kari Pikkarainen, Tero Pikkarainen, Heikki Karjaluoto and Seppo Pahnila
Although research into the adoption and use of online banking services has grown in many parts of the world, the centre of attention has been largely on determinants of online…
Abstract
Purpose
Although research into the adoption and use of online banking services has grown in many parts of the world, the centre of attention has been largely on determinants of online banking adoption, not on users' satisfaction with use. This paper aims to test and validate the End‐User Computing Satisfaction (EUCS) model in order to investigate online banking users' satisfaction with the service.
Design/methodology/approach
A survey (n=268) was carried out using convenience sampling. An exploratory factor analysis followed by a confirmatory factor analysis run in LISREL 8.7 is used to test the validity of the model in an online banking context.
Findings
The survey results support three constructs (content, ease of use, accuracy) from the original model, indicating that the modified EUCS model labelled EUCS2 can be utilized in analyzing user satisfaction with online banking among private customers.
Research limitations/implications
The obtained model suffered from two cross‐loadings between individual items. Another limitation concerns the sample obtained. Therefore, future studies should test the model with larger samples to verify the model in this context.
Practical implications
Findings of the study indicate that banks could improve end‐user computing satisfaction with online banking by concentrating on the three constructs obtained from the analyses. Moreover, the results indicate that banks can increase satisfaction of online banking services by personalising the service, allowing easier and more convenient use experience.
Originality/value
The paper makes a significant contribution by testing and modifying the EUCS model in the online banking context.
Details
Keywords
Deepak Kumar, B.V. Phani, Naveen Chilamkurti, Suman Saurabh and Vanessa Ratten
The review examines the existing literature on blockchain-based small and medium enterprise (SME) finance and highlights its trend, themes, opportunities and challenges. Based on…
Abstract
Purpose
The review examines the existing literature on blockchain-based small and medium enterprise (SME) finance and highlights its trend, themes, opportunities and challenges. Based on these factors, the authors create a framework for the existing literature on blockchain-based SME financing and lay down future research paths.
Design/methodology/approach
The review follows a systematic approach. It includes 53 articles encompassing multiple dimensions of blockchain-based SME finance, including peer-to-peer lending platforms, supply chain finance (SCF), decentralized lending protocols and tokenization of assets. The review critically evaluates these approaches' theoretical underpinnings, empirical evidence and practical implementations.
Findings
The review demonstrates that blockchain-based SME finance holds significant promise in addressing the credit gap by leveraging blockchain technology's decentralized and transparent nature. Benefits identified include reduced information asymmetry, improved access to financing, enhanced credit assessment processes and increased financial inclusion. However, the literature acknowledges several challenges and limitations, such as regulatory uncertainties, scalability issues, operational complexities and potential security risks.
Originality/value
The article contributes to the growing knowledge of blockchain-based SME finance by synthesizing and evaluating the existing literature. It also provides a framework for the existing literature in the area and future research paths. The study offers insights for researchers, policymakers and practitioners seeking to understand the potential of blockchain technology in filling the SME credit gap and fostering economic development through improved access to finance for SMEs.
Details
Keywords
“A Canadian company required information on a process in Switzerland. Since data were too complicated to obtain by mail a vice‐president of the company was assigned to make a…
Abstract
“A Canadian company required information on a process in Switzerland. Since data were too complicated to obtain by mail a vice‐president of the company was assigned to make a trip. The company librarian hearing of this situation accidentally made a search and produced the information from the company's own files.”
Philip O’Reilly and Pat Finnegan
Since 1995, Internet banking has allowed consumers to utilise the Internet as a platform to interact with their bank. Initially, the hype surrounding Internet banking was immense…
Abstract
Since 1995, Internet banking has allowed consumers to utilise the Internet as a platform to interact with their bank. Initially, the hype surrounding Internet banking was immense. However, more realistic expectations about the value of Internet channels and changes in the financial services sector are affecting opinions of Internet banking systems. This study examines contemporary Internet banking systems in five leading ‘clicks and mortar’ banks operating in the North‐Eastern part of the United States. The findings reveal a move towards viewing Internet banking as an operational rather than a competitive instrument, with consequential changes in how banks evaluate their Internet banking systems. The paper concludes by proposing some changes to expectations on how Internet banking is likely to develop.
Details
Keywords
The purpose of this paper is to explore the dynamics involved in the emergence and change of management accounting routines. It seeks to provide an understanding of the ways in…
Abstract
Purpose
The purpose of this paper is to explore the dynamics involved in the emergence and change of management accounting routines. It seeks to provide an understanding of the ways in which these complex routines foster stability and change in management accounting practices.
Design/methodology/approach
A longitudinal case study was conducted at the Rabobank Groningen – an autonomous member of the cooperative Rabobank group – over a period of four years. The emergence of a new routine of planning and control was traced, which evolved substantially over the period of study.
Findings
It was found that the cognitive representations of the routine studied, i.e. the way it was subjectively understood, provided a temporarily stable basis for the routine. Change arose from improvisations through its recurrent performances. It was also found that change could result from complex dynamics in the routine, as opposed to viewing them as static and stable entities that react to “external” stimuli.
Research limitations/implications
The research findings contribute to an understanding of the reproduction of management accounting routines and the ways in which change can arise in these routines. It provides a means to study the micro‐processes of reproduction of routines, which play an important part in institutional theories of management accounting change.
Originality/value
This paper places management accounting routines and their processes of reproduction at the centre of the argument to provide an understanding of the role of routines in accounting change. Since the notion of management accounting routines has not been developed extensively, this understanding contributes to studies into the nature of routines and their role in management accounting change.
Details
Keywords
Bhushan Kapoor, Pramod Pandya and Joseph S. Sherif
This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data and…
Abstract
Purpose
This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network‐based attacks.
Design/methodology/approach
The paper introduces the necessary mathematics of cryptography: integer and modular arithmetic, linear congruence, Euclidean and extended Euclidean algorithm, Fermat's theorem, and Elliptic curve.
Findings
The results indicate that encryption has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs, and secure computation.
Practical implications
The results of this research show that all forms of e‐commerce activities such as online credit card processing, purchasing stocks, and banking data processing, if compromised, would lead to businesses losing billions of dollars in lost revenues as well as losing confidence in e‐commerce. In the last few years, it had been reported that organizations that store and maintain customers' private and confidential records were compromised on many occasions by hackers breaking into the data networks and stealing the records from the storage media.
Originality/value
This paper tackles one of the most critical problems of securing data networks. Security problems arise among other things to resource and workload sharing; complexity of interconnected networks; authentication of users; fast expandability of networks; threats to networks such as wiretapping and violations of the seven pillars of security: authentication, authorization, privacy, integrity, non‐repudiation, availability, and audit.
Details