Search results

1 – 10 of over 97000
Article
Publication date: 1 February 1993

Martin Kurth

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the…

Abstract

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the use of online information retrieval systems. Because, among other reasons, transaction log databases contain relatively few fields and lack sufficient retrieval tools, students of transaction log data have begun to ask as many questions about what transaction logs cannot reveal as they have asked about what transaction logs can reveal. Researchers have conducted transaction monitoring studies to understand the objective phenomena embodied in this statement: “Library patrons enter searches into online information retrieval systems.” Transaction log data effectively describe what searches patrons enter and when they enter them, but they don't reflect, except through inference, who enters the searches, why they enter them, and how satisfied they are with their results.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Thomas A. Peters

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…

Abstract

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Thomas A. Peters, Martin Kurth, Patricia Flaherty, Beth Sandore and Neal K. Kaske

To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces…

Abstract

To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces some of the issues involved in the methodology.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 19 March 2018

Paolo Tasca, Adam Hayes and Shaowen Liu

This paper aims to gather together the minimum units of users’ identity in the Bitcoin network (i.e. the individual Bitcoin addresses) and group them into representations of…

2519

Abstract

Purpose

This paper aims to gather together the minimum units of users’ identity in the Bitcoin network (i.e. the individual Bitcoin addresses) and group them into representations of business entities, what we call “super clusters”. While these clusters can remain largely anonymous, the authors are able to ascribe many of them to particular business categories by analyzing some of their specific transaction patterns (TPs), as observed during the period from 2009 to 2015. The authors are then able to extract and create a map of the network of payment relationships among them, and analyze transaction behavior found in each business category. They conclude by identifying three marked regimes that have evolved as the Bitcoin economy has grown and matured: from an early prototype stage; to a second growth stage populated in large part with “sin” enterprise (i.e. gambling, black markets); to a third stage marked by a sharp progression away from “sin” and toward legitimate enterprises.

Design/methodology/approach

Data mining.

Findings

Four primary business categories are identified in the Bitcoin economy: miners, gambling services, black markets and exchanges. Common patterns of transaction behavior between the business categories and their users are a “one-day” holding period for bitcoin transactions is somewhat typical. That is, a one-day effect where traders, gamblers, black market participants and miners tend to cash out on a daily basis. There seems to be a strong preference to do business within the bitcoin economy in round lot amounts, whether it is more typical of traders exchanging for fiat money, gamblers placing bets or black market goods being bought and sold. Distinct patterns of transaction behavior among the business categories and their users are flows between traders and exchanges average just around 20 BTC, and traders buy or sell on average every 11 days. Meanwhile, gamblers wager just 0.5 BTC on average, but re-bet often within the same day. Three marked regimes have evolved, as the Bitcoin economy has grown and matured: from an early prototype stage, to a second growth stage populated in large part with “sin” enterprises (i.e. gambling, black markets), to a third stage marked by a sharp progression away from “sin” and toward legitimate enterprises. This evolution of the Bitcoin economy suggests a trend toward legitimate commerce.

Originality/value

The authors propose a new theoretical framework that allows investigating and exploring the network of payment relationships in the Bitcoin economy. This study starts by gathering together the minimum units of Bitcoin identities (the individual addresses), and it goes forward in grouping them into approximations of business entities, what is called “super clusters”, by using tested techniques from the literature. A super cluster can be thought of as an approximation of a business entity in that it describes a number of individual addresses that are owned or controlled collectively by the same beneficial owner for some special economic purposes. The majority of these important clusters are initially unknown and uncategorized. The novelty of this study is given by the pure user group and the TP analyses, by means of which the authors are able to ascribe the super clusters into specific business categories and outline a map of the network of payment relationships among them.

Details

The Journal of Risk Finance, vol. 19 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Book part
Publication date: 18 March 2014

Michael D. Hausfeld, Gordon C. Rausser, Gareth J. Macartney, Michael P. Lehmann and Sathya S. Gosselin

In class action antitrust litigation, the standards for acceptable economic analysis at class certification have continued to evolve. The most recent event in this evolution is…

Abstract

In class action antitrust litigation, the standards for acceptable economic analysis at class certification have continued to evolve. The most recent event in this evolution is the United States Supreme Court’s decision in Comcast Corp. v. Behrend, 133 S. Ct. 1435 (2013). The evolution of pre-Comcast law on this topic is presented, the Comcast decision is thoroughly assessed, as are the standards for developing reliable economic analysis. This article explains how economic evidence of both antitrust liability and damages ought to be developed in light of the teachings of Comcast, and how liability evidence can be used by economists to support a finding of common impact for certification purposes. In addition, the article addresses how statistical techniques such as averaging, price-dispersion analysis, and multiple regressions have and should be employed to establish common proof of damages.

Details

The Law and Economics of Class Actions
Type: Book
ISBN: 978-1-78350-951-5

Keywords

Article
Publication date: 1 August 1996

Jill E. Hobbs

Observes that supply chain management is a rapidly‐evolving subject which offers many insights into how industries are organized and into the efficiency gains which can be made…

17214

Abstract

Observes that supply chain management is a rapidly‐evolving subject which offers many insights into how industries are organized and into the efficiency gains which can be made under different organizational structures, pointing out that it is an interdisciplinary concept, drawing on aspects of marketing, economics, logistics, organizational behaviour, etc. Presents a framework from the economics literature which may be useful for those interested in understanding and exploring the concept of supply chain management. Describes the origins and development of transaction cost analysis and explains the key concepts of the framework. Discusses the potential effects of transaction costs on vertical co‐ordination within an industry and, hence, on supply chain management. Finally, suggests methods for empiricizing transaction cost analysis, resulting in recommendations for closer co‐operation between researchers and business managers.

Details

Supply Chain Management: An International Journal, vol. 1 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 4 May 2010

Jeffrey P. Wallman

The purpose of this paper is to demonstrate the importance of institutional innovation in managing the future. Peter Drucker has encouraged managers to develop institutional…

2114

Abstract

Purpose

The purpose of this paper is to demonstrate the importance of institutional innovation in managing the future. Peter Drucker has encouraged managers to develop institutional innovations in order to reach organizational objectives. These institutional innovations revolve round the value created by the organization for its customers over time. Considering Drucker's insight from the perspective of institutional theory, this paper aims to describe how innovations in transaction institutions may lead to strategic transactions and provide a fundamental transformation in the way transactions are conducted in the market.

Design/methodology/approach

Using a case study of the development of the American clock industry, it is shown that institutional innovations may provide a leadership position for an organization. By trading direct exchange for an innovative transaction model, management innovation occurred within and well beyond the confines of the American clock market.

Findings

The historical case empirically illustrates and extends Drucker's notion of customer‐centric management and the advantage of innovation. Strategically, management must understand how institutional innovations can be used to create a leadership position in the future. This occurs when management uses innovations in transaction rules, termed transaction “institutions”, to create a contrast between the values exchanged between the customer and the organization and the values exchanged between the customer and competing organizations.

Research limitations/implications

Peter Drucker's work is quite broad and, perhaps to his credit, he was never a traditional academic. As a result, evaluating his work is more difficult than evaluating research in one specific theoretical domain. However, it is clear that institutional thinking influenced Drucker. Analytically, this places him at odds with traditional economic and strategic analysis. Accordingly, this research is also somewhat at odds with traditional economic and strategic analysis.

Practical implications

The implications for management are clear. The entrepreneurial role of each type of organisation in solving problems is critical. Only through entrepreneurship can long‐term solutions to problems be developed. This requires a deep understanding of the costs involved, even on a small scale. When the details of costs are understood, entrepreneurial innovations can be developed in response.

Originality/value

This is the first paper that utilizes an institutional framework for strategy analysis based on Peter Drucker's work. This helps managers manage the future by understanding how to systematically take and share risk.

Details

Management Decision, vol. 48 no. 4
Type: Research Article
ISSN: 0025-1747

Keywords

Book part
Publication date: 23 September 2005

Ronald K. Mitchell

Most of us believe that entrepreneurs are special. We do this because both scholars and practitioners tell us so.

Abstract

Most of us believe that entrepreneurs are special. We do this because both scholars and practitioners tell us so.

Details

International Entrepreneurship
Type: Book
ISBN: 978-0-76231-227-6

Open Access
Article
Publication date: 6 December 2022

Pieter Lagerwaard

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core…

2367

Abstract

Purpose

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core practices of collecting, analysing and disseminating financial intelligence.

Design/methodology/approach

Because FIU practices are often secret and its transaction data classified as state secrets, the FIU’s daily operational activities remain obscure. Drawing on interviews, public reports and an online training course, this study encircles secrecy and offers a fine-grained analysis of the FIU's core activities.

Findings

The article finds that the FIU plays a pivotal role in financial surveillance because it can operate at various intersections. An FIU operates at the intersection of finance and security, in between the public and private sector and at the national and international domain. This pivotal role makes the FIU indispensable in the surveillance of payment systems and spending behavior.

Social implications

The article poses that the desirability and effectiveness of financial surveillance has to date not received sufficient consideration, while it affects (the privacy of) anyone with a bank account. The article asks: is it ethically justifiable that transaction information is declared suspect, investigated, and shared nationally and internationally, without the individual or entity concerned officially being notified and legally named a suspect?

Originality/value

This case-study is not only relevant for the study of finance/security, AML/CFT and financial surveillance, but also to policy makers and the broader public who merit an understanding of how their financial behaviour is being surveilled.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 13 July 2022

Paweł Mielcarz and Dmytro Osiichuk

The study aims at inquiring into the relationship between acquirer–target business similarity and mergers and acquisitions (M&A) transaction outcomes.

Abstract

Purpose

The study aims at inquiring into the relationship between acquirer–target business similarity and mergers and acquisitions (M&A) transaction outcomes.

Design/methodology/approach

Relying on textual analysis of acquirers' and targets' business descriptions from M&A transaction synopses, the authors establish that posttransaction operating outcomes are negatively associated with acquirer–target business similarity.

Findings

While similar business profiles allow for optimization of overheads, sales growth and margins demonstrate better dynamics when acquirers and targets are more dissimilar, which allows for greater competitive gains. On average, targets are more dissimilar from acquirers than acquirers are from their competitors. The degree of competition within acquirers' industries and acquirer–competitors' business similarity are found to be positively associated with the likelihood of engaging in serial horizontal acquisitions involving more similar targets, mostly from the domestic market. Competitive pressure is evidenced to push acquirers for a faster completion of acquisition process. Cross-border acquisitions are found to be associated with lower acquirer–target and acquirer–competitors' similarity, which suggests that Chinese companies expand overseas primarily for strategic reasons of gaining a competitive edge rather than to simply improve sales.

Originality/value

The paper contributes to the limited pool of empirical literature relying on text mining techniques to establish the determinants of M&A transaction outcomes. The methodology used in the study outperforms the conventional techniques of operationalization of business similarities through General Industry Classification Standard (GICS) industry matching. The study investigates the intermediating role of intraindustry competition in fostering firms' acquisitiveness.

Details

Managerial Finance, vol. 48 no. 12
Type: Research Article
ISSN: 0307-4358

Keywords

1 – 10 of over 97000