Search results

1 – 10 of over 87000
Article
Publication date: 16 January 2024

Arief Rijanto

Know your customer (KYC), accounting standards, issuance, clearing, and trade settlement became the major barrier to implement accounting, accountability and assurance process in…

Abstract

Purpose

Know your customer (KYC), accounting standards, issuance, clearing, and trade settlement became the major barrier to implement accounting, accountability and assurance process in supply chain finance (SCF). Blockchain technology features have the potential to solve accounting problems. This research focuses on exploring how blockchain technology provides solutions to overcome the barriers of accounting process in SCF. The benefits, opportunities, costs and risks related to blockchain adoption are also explored.

Design/methodology/approach

Multi-case study and qualitative methods are used with a framework based on blockchain role to overcome the accounting process barriers. Ten blockchain projects in SCF and 29 interviews of participants as a unit of analysis are considered.

Findings

The findings indicate that blockchain technology offers solutions to solve accounting, accountability and assurance problems in SCF. Validity, verification, smart contracts, automation and enduring data on trade transactions potentially solve those barriers. However, it is also necessary to consider costs such as implementation, technology, education and integration costs. Then there are possible risks such as regulatory compliance, operational, code development and scalability risk. This finding reflects the current status of blockchain technology roles in SCF.

Research limitations/implications

This study unveils blockchain's SCF accounting potential, emphasizing multi-case method limitations and future research prospects. Diverse contexts challenge findings' applicability, warranting cross-industry studies for deeper insights. Addressing selection bias and integrating quantitative measures can enhance understanding of blockchain's accounting impact.

Practical implications

Accounting professionals can get an idea of the future direction and impact of blockchain technology on accounting, accountability and assurance processes.

Originality/value

This study provides initial findings on the potential, costs and risks of blockchain that is beneficial for parties involved in SCF, especially for banks and insurance underwriters. In addition, the findings also provide direction for the contribution of blockchain technology to accounting theory in the future.

Details

Asian Review of Accounting, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1321-7348

Keywords

Article
Publication date: 27 June 2008

Daein Kim and Buhyun Hwang

Recently the advances in wireless communication technology and the popularity of portable computers have rendered mobile computing environments from which mobile users with…

Abstract

Purpose

Recently the advances in wireless communication technology and the popularity of portable computers have rendered mobile computing environments from which mobile users with battery‐operated palmtops can access the information via wireless channels, without space and time restriction. In mobile computing environments, mobile users cache the data items to use the bandwidth efficiently and improve the response time of mobile transactions. If the data items cached in mobile users are updated at the server, the server broadcasts an invalidation report for maintaining the cache consistency of mobile users. However, this method has an obstacle that does not guarantee the serializable execution of mobile transactions. The purpose of this paper is to propose the four types of reports for mobile transaction (FTR‐MT) method for ensuring the serializable execution of mobile transactions.

Design/methodology/approach

The paper describes the FTR‐MT method, which is composed of four types of algorithms, e.g. group report composition algorithm, immediate commit decision algorithm, cache consistency algorithm, and disconnection cache consistency algorithm. FTR‐MT method for improving the response time of mobile transactions makes a commit decision by using the four types of reports.

Findings

With the FTR‐MT method, mobile users can make a commit decision by using the four types of reports. The response time of mobile transactions can be reduced. Furthermore, the FTR‐MT method can improve the cache efficiency in the case that the disconnection of mobile users is longer than the broadcast interval of the window report.

Originality/value

This paper proposes a new method for guaranteeing the serializable execution of mobile transactions, called FTR‐MT, using four types of reports. Also, it can prevent the entire cache dropping, even though the disconnection of a mobile host is longer than the broadcast interval of a window report. Through the analytical model, this method is felt to be superior to other methods, in terms of the average response time and the commit rate of mobile transactions, and bandwidth usage.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 January 2016

Kishore Singh and Peter Best

The purpose of this paper is to demonstrate the technical feasibility of implementing multi-view visualization methods to assist auditors in reviewing the integrity of high-volume…

2066

Abstract

Purpose

The purpose of this paper is to demonstrate the technical feasibility of implementing multi-view visualization methods to assist auditors in reviewing the integrity of high-volume accounting transactions. Modern enterprise resource planning (ERP) systems record several thousands of transactions daily. This makes it difficult to find a few instances of anomalous activities among legitimate transactions. Although continuous auditing and continuous monitoring systems perform substantial analytics, they often produce lengthy reports that require painstaking post-analysis. Approaches that reduce the burden of excessive information are more likely to contribute to the overall effectiveness of the audit process. The authors address this issue by designing and testing the use of visualization methods to present information graphically, to assist auditors in detecting anomalous and potentially fraudulent accounts payable transactions. The strength of the authors ' approach is its capacity for discovery and recognition of new and unexpected insights.

Design/methodology/approach

Data were obtained from the SAP enterprise (ERP) system of a real-world organization. A framework for performing visual analytics was developed and applied to the data to determine its usefulness and effectiveness in identifying anomalous activities.

Findings

The paper provides valuable insights into understanding the use of different types of visualizations to effectively identify anomalous activities.

Research limitations/implications

Because this study emphasizes asset misappropriation, generalizing these findings to other categories of fraud, such as accounts receivable, must be made with caution.

Practical implications

This paper provides a framework for developing an automated visualization solution which may have implications in practice.

Originality/value

This paper demonstrates the need to understand the effectiveness of visualizations in detecting accounting fraud. This is directly applicable to organizations investigating methods of improving fraud detection in their ERP systems.

Details

Managerial Auditing Journal, vol. 31 no. 1
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 11 September 2007

Ruey‐Kei Chiu, S.C. Lenny Koh and Chi‐Ming Chang

The purpose of this paper is to provide a data framework to support the incremental aggregation of, and an effective data refresh model to maintain the data consistency in, an…

Abstract

Purpose

The purpose of this paper is to provide a data framework to support the incremental aggregation of, and an effective data refresh model to maintain the data consistency in, an aggregated centralized database.

Design/methodology/approach

It is based on a case study of enterprise distributed databases aggregation for Taiwan's National Immunization Information System (NIIS). Selective data replication aggregated the distributed databases to the central database. The data refresh model assumed heterogeneous aggregation activity within the distributed database systems. The algorithm of the data refresh model followed a lazy replication scheme but update transactions were only allowed on the distributed databases.

Findings

It was found that the approach to implement the data refreshment for the aggregation of heterogeneous distributed databases can be more effectively achieved through the design of a refresh algorithm and standardization of message exchange between distributed and central databases.

Research limitations/implications

The transaction records are stored and transferred in standardized XML format. It is more time‐consuming in record transformation and interpretation but it does have higher transportability and compatibility over different platforms in data refreshment with equal performance. The distributed database designer should manage these issues as well assure the quality.

Originality/value

The data system model presented in this paper may be applied to other similar implementations because its approach is not restricted to a specific database management system and it uses standardized XML message for transaction exchange.

Details

Journal of Manufacturing Technology Management, vol. 18 no. 7
Type: Research Article
ISSN: 1741-038X

Keywords

Article
Publication date: 1 February 1993

Patricia Flaherty

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people…

Abstract

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people within a library are aware of its existence, and even fewer have access to the transaction log data. This is unfortunate, since the concrete data garnered by transaction logs can provide bibliographic instructors, reference staff members, systems librarians, and system designers with unique and valuable insights into the patron/system interaction.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Book part
Publication date: 22 July 2021

Chien-Hung Chang

This chapter introduces a risk control framework on credit card fraud instead of providing a solely binary classifier model. The anomaly detection approach is adopted to identify…

Abstract

This chapter introduces a risk control framework on credit card fraud instead of providing a solely binary classifier model. The anomaly detection approach is adopted to identify fraud events as the outliers of the reconstruction error of a trained autoencoder (AE). The trained AE shows fitness and robustness on the normal transactions and heterogeneous behavior on fraud activities. The cost of false-positive normal transactions is controlled, and the loss of false-negative frauds can be evaluated by the thresholds from the percentiles of reconstruction error of trained AE on normal transactions. To align the risk assessment of the economic and financial situation, the risk manager can adjust the threshold to meet the risk control requirements. Using the 95th percentile as the threshold, the rate of wrongly detecting normal transactions is controlled at 5% and the true positive rate is 86%. For the 99th percentile threshold, the well-controlled false positive rate is around 1% and 83% for the truly detecting fraud activities. The performance of a false positive rate and the true positive rate is competitive with other supervised learning algorithms.

Details

Advances in Pacific Basin Business, Economics and Finance
Type: Book
ISBN: 978-1-80043-870-5

Keywords

Book part
Publication date: 15 October 2016

Abstract

Details

A. C. Littleton’s Final Thoughts on Accounting: A Collection of Unpublished Essays
Type: Book
ISBN: 978-1-78635-389-4

Article
Publication date: 26 November 2020

Muhammad Al-Abdullah, Izzat Alsmadi, Ruwaida AlAbdullah and Bernie Farkas

The paper posits that a solution for businesses to use privacy-friendly data repositories for its customers’ data is to change from the traditional centralized repository to a…

Abstract

Purpose

The paper posits that a solution for businesses to use privacy-friendly data repositories for its customers’ data is to change from the traditional centralized repository to a trusted, decentralized data repository. Blockchain is a technology that provides such a data repository. However, the European Union’s General Data Protection Regulation (GDPR) assumed a centralized data repository, and it is commonly argued that blockchain technology is not usable. This paper aims to posit a framework for adopting a blockchain that follows the GDPR.

Design/methodology/approach

The paper uses the Levy and Ellis’ narrative review of literature methodology, which is based on constructivist theory posited by Lincoln and Guba. Using five information systems and computer science databases, the researchers searched for studies using the keywords GDPR and blockchain, using a forward and backward search technique. The search identified a corpus of 416 candidate studies, from which the researchers applied pre-established criteria to select 39 studies. The researchers mined this corpus for concepts, which they clustered into themes. Using the accepted computer science practice of privacy by design, the researchers combined the clustered themes into the paper’s posited framework.

Findings

The paper posits a framework that provides architectural tactics for designing a blockchain that follows GDPR to enhance privacy. The framework explicitly addresses the challenges of GDPR compliance using the unimagined decentralized storage of personal data. The framework addresses the blockchain–GDPR tension by establishing trust between a business and its customers vis-à-vis storing customers’ data. The trust is established through blockchain’s capability of providing the customer with private keys and control over their data, e.g. processing and access.

Research limitations/implications

The paper provides a framework that demonstrates that blockchain technology can be designed for use in GDPR compliant solutions. In using the framework, a blockchain-based solution provides the ability to audit and monitor privacy measures, demonstrates a legal justification for processing activities, incorporates a data privacy policy, provides a map for data processing and ensures security and privacy awareness among all actors. The research is limited to a focus on blockchain–GDPR compliance; however, future research is needed to investigate the use of the framework in specific domains.

Practical implications

The paper posits a framework that identifies the strategies and tactics necessary for GDPR compliance. Practitioners need to compliment the framework with rigorous privacy risk management, i.e. conducting a privacy risk analysis, identifying strategies and tactics to address such risks and preparing a privacy impact assessment that enhances accountability and transparency of a blockchain.

Originality/value

With the increasingly strategic use of data by businesses and the contravening growth of data privacy regulation, alternative technologies could provide businesses with a means to nurture trust with its customers regarding collected data. However, it is commonly assumed that the decentralized approach of blockchain technology cannot be applied to this business need. This paper posits a framework that enables a blockchain to be designed that follows the GDPR; thereby, providing an alternative for businesses to collect customers’ data while ensuring the customers’ trust.

Details

Digital Policy, Regulation and Governance, vol. 22 no. 5/6
Type: Research Article
ISSN: 2398-5038

Keywords

Book part
Publication date: 15 October 2016

Current prices, future estimates, and price statistics cannot reflect specific transaction experience generated by enterprise management. Instead, overt transaction data in…

Abstract

Current prices, future estimates, and price statistics cannot reflect specific transaction experience generated by enterprise management. Instead, overt transaction data in accounts continue to constitute evidence of management decision-actions, even after apportioned among fiscal periods. And the interrelation of enterprise capital employed productively, and the income generated by its use, will continue whether or not accounts are kept. Yet, the significance of factual integrity for enterprise transaction experience is strongly influenced by the functional logic inherent in accounting.

Details

A. C. Littleton’s Final Thoughts on Accounting: A Collection of Unpublished Essays
Type: Book
ISBN: 978-1-78635-389-4

1 – 10 of over 87000