Search results
1 – 10 of over 92000Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the…
Abstract
Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the use of online information retrieval systems. Because, among other reasons, transaction log databases contain relatively few fields and lack sufficient retrieval tools, students of transaction log data have begun to ask as many questions about what transaction logs cannot reveal as they have asked about what transaction logs can reveal. Researchers have conducted transaction monitoring studies to understand the objective phenomena embodied in this statement: “Library patrons enter searches into online information retrieval systems.” Transaction log data effectively describe what searches patrons enter and when they enter them, but they don't reflect, except through inference, who enters the searches, why they enter them, and how satisfied they are with their results.
Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people…
Abstract
Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people within a library are aware of its existence, and even fewer have access to the transaction log data. This is unfortunate, since the concrete data garnered by transaction logs can provide bibliographic instructors, reference staff members, systems librarians, and system designers with unique and valuable insights into the patron/system interaction.
Piera Centobelli, Roberto Cerchione, Pasquale Del Vecchio, Eugenio Oropallo and Giustina Secundo
This paper aims to design, build and evaluate a blockchain platform in the accounting domain, taking an ecosystem perspective. To achieve this aim, the research provides evidence…
Abstract
Purpose
This paper aims to design, build and evaluate a blockchain platform in the accounting domain, taking an ecosystem perspective. To achieve this aim, the research provides evidence for developing a decentralised architecture rooted on blockchain technology, designing a proof of concept and modelling an accounting blockchain-based system.
Design/methodology/approach
Moving from the analysis of previous literature and leveraging on the design science approach, this paper provides a framework grounded on the main pillars of blockchain and accounting functions, identifying technical and non-technical issues that must be addressed embrace blockchain technology's full potential.
Findings
We propose and discuss a conceptual framework for a blockchain-based accounting context, moving from the identification of a typical accounting scenario. The framework is organised around three scalable levels: the first level is a technological infrastructure based on a distributed database with peer-to-peer storage; second, in the intermediate level, increasing control levels are assured through permissions and validation and third, in the higher level, the system provides the integration of business and security applications. The deployment of this system relies on a private network of nodes that validates transactions.
Practical implications
The proposed conceptual framework about blockchain development in accounting allows closing the knowledge gap between blockchain developers and accounting experts by suggesting technological and strategic issues for practitioners.
Originality/value
We provide practical guidelines to design and adopt blockchain in the accounting domain.
Details
Keywords
Thomas A. Peters, Martin Kurth, Patricia Flaherty, Beth Sandore and Neal K. Kaske
To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces…
Abstract
To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces some of the issues involved in the methodology.
Yanjun Zuo and Brajendra Panda
Damage assessment and recovery play key roles in the process of secure and reliable computer systems development. Post‐attack assessment in a distributed database system is rather…
Abstract
Purpose
Damage assessment and recovery play key roles in the process of secure and reliable computer systems development. Post‐attack assessment in a distributed database system is rather complicated due to the indirect dependencies among sub‐transactions executed at different sites. Hence, the damage assessment procedure in these systems must be carried out in a collaborative way among all the participating sites in order to accurately detect all affected data items. This paper seeks to propose two approaches for achieving this, namely, centralized and peer‐to‐peer damage assessment models.
Design/methodology/approach
Each of the two proposed methods should be applied immediately after an intrusion on a distributed database system was reported. In the category of the centralized model, three sub‐models are further discussed, each of which is best suitable for a certain type of situations in a distributed database system.
Findings
Advantages and disadvantages of the models are analyzed on a comparative basis and the most suitable situations to which each model should apply are presented. A set of algorithms is developed to formally describe the damage assessment procedure for each model (sub‐model). Synchronization is essential in any system where multiple processes run concurrently. User‐level synchronization mechanisms have been presented to ensure that the damage assessment operations are conducted in a correct order.
Originality/value
The paper proposes two means for damage assessment.
Details
Keywords
This paper introduces a new mathematical model for analyzing the economic benefits of incorporating the fourth party logistics (4PL), which is a contractor (i.e. agent) for the…
Abstract
This paper introduces a new mathematical model for analyzing the economic benefits of incorporating the fourth party logistics (4PL), which is a contractor (i.e. agent) for the supply chain coordination and construction based on the division of community and the outsourcing development. Based on the physical theory and the wave-particle duality, a supply chain is the special organization whose characteristic has wave-particle duality. The mathematical model enriches the connotation of 4PL and it broadens the thought for 4PL development. Secondly, the proposed mathematical model predicated on transaction costs, is supported by Transaction Cost Theory (TCT) and acts as the theoretical analysis tool of 4PL for coordinating 3-party generic supply chain. Through the model, some trendy conclusions can be drawn to provide theoretical support for 4PL’s practices. Finally, a case illustrates our conclusions.
Details
Keywords
With two official standards available for requesting an item, a rather confusing picture arises when planning the automation of interlibrary loan and document delivery facilities…
Abstract
With two official standards available for requesting an item, a rather confusing picture arises when planning the automation of interlibrary loan and document delivery facilities for libraries, commercial document suppliers, and patrons. Which standard should be implemented: the ILL Protocol or Z39.50 Extended Services for Item Order? There was substantial concern within the ISO community that Item Order was moving into a domain already covered by the ILL protocol standard and that these two standards would be competing. Even though there is an overlap in the functions these standards perform, they are unique and meet different operational requirements. In a distributed communications environment, they can be used to complement rather than compete with each other.
This paper proposes to use system integration between customer relationship management (CRM) and anti‐money laundering (AML) suspicious data reporting in commercial banks to…
Abstract
Purpose
This paper proposes to use system integration between customer relationship management (CRM) and anti‐money laundering (AML) suspicious data reporting in commercial banks to increase the initiative of suspicious transaction identification, reduce the false reporting rates, and improve the intelligence quality.
Design/methodology/approach
This paper introduces the structure of CRM in commercial banks, discusses deficiencies of the current AML data reporting system, and designs the layering of CRM and AML transaction identification module.
Findings
This paper finds that the functions of customer behavior analysis and customer background investigation of CRM system can be redesigned and used for increasing the quality of AML suspicious transaction reporting in commercial banks.
Originality/value
This paper creatively proposes that system integration of CRM and AML suspicious transaction reporting can make a contribution to reducing the AML cost for commercial banks.
Details
Keywords
The purpose of this paper is to systematically study the research and development history of suspicious transaction reporting (STR) system in China, and introduce the core…
Abstract
Purpose
The purpose of this paper is to systematically study the research and development history of suspicious transaction reporting (STR) system in China, and introduce the core elements in constructing an intelligent surveillance system which could provide a solution to the situation of low effectiveness and efficiency in Chinese Financial Institutions (FIs) STR procedure nowadays. The solution outputs those falling out of the normal customer behavior profiles instead of only extracting data by the rules issued by authorities.
Design/methodology/approach
This paper reviews the latest literature, regulations and guidelines of STR gathered domestically and overseas, and hands out questionnaire surveys to hundreds of software vendors, regulators and FIs, details the current situation of poor deployment of intelligent in China and tells the difficulties of subjective STR decision procedures.
Findings
Few Chinese FIs have deployed real intelligent STR systems, most are using rule-based filtering systems conformed to the objective STR supervisory regulations. To change the embarrassing situation, the regulators have tried to introduce self-regulatory mode which allows the FIs to define STR decision procedures themselves. Limited by the FIs’ ability of information sharing and investigation scope, FIs could hardly unveil the whole schema of a money laundering organization. The pursuant objective FIs can reach is to construct a system that could tell what the normal customer behaviors look like and extract all those falling out of the system’s expectations as suspicious activities.
Research limitations/implications
Only the core elements of the total intelligent STR system are discussed, that is, what, why and how about the customer behavior pattern recognition system. Besides this, a total solution should also use a watch list, reporting decision, cases management, risk control, etc.
Originality/value
This paper for the first time argues that the orientation of regulatory rules in China has actually hindered the spreading of really effective intelligent system for these years. The author creatively puts forward a solution to the difficult problem for FIs to spot criminal schema directly, instead the FIs should only be required to determine whether the transactions carrying out currently are falling within the expected behavior pattern scopes, which is under the FIs’ capabilities due to the internationally accepted obligations of “Know Your Customer”.
Details
Keywords
Five prominent consultants—James Rush, Richard Smith, Susan Baerg Epstein, Jose‐Marie Griffiths, and Rob McGee—address the issues that most effect system performance. They note…
Abstract
Five prominent consultants—James Rush, Richard Smith, Susan Baerg Epstein, Jose‐Marie Griffiths, and Rob McGee—address the issues that most effect system performance. They note that virtually every phase of planning for a system involves issues related to performance. No single topic is more essential to the successful implementation of a system. Guidelines and advise are provided.