Search results

1 – 10 of over 92000
Article
Publication date: 1 February 1993

Martin Kurth

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the…

Abstract

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the use of online information retrieval systems. Because, among other reasons, transaction log databases contain relatively few fields and lack sufficient retrieval tools, students of transaction log data have begun to ask as many questions about what transaction logs cannot reveal as they have asked about what transaction logs can reveal. Researchers have conducted transaction monitoring studies to understand the objective phenomena embodied in this statement: “Library patrons enter searches into online information retrieval systems.” Transaction log data effectively describe what searches patrons enter and when they enter them, but they don't reflect, except through inference, who enters the searches, why they enter them, and how satisfied they are with their results.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Patricia Flaherty

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people…

Abstract

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people within a library are aware of its existence, and even fewer have access to the transaction log data. This is unfortunate, since the concrete data garnered by transaction logs can provide bibliographic instructors, reference staff members, systems librarians, and system designers with unique and valuable insights into the patron/system interaction.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 10 December 2021

Piera Centobelli, Roberto Cerchione, Pasquale Del Vecchio, Eugenio Oropallo and Giustina Secundo

This paper aims to design, build and evaluate a blockchain platform in the accounting domain, taking an ecosystem perspective. To achieve this aim, the research provides evidence…

3195

Abstract

Purpose

This paper aims to design, build and evaluate a blockchain platform in the accounting domain, taking an ecosystem perspective. To achieve this aim, the research provides evidence for developing a decentralised architecture rooted on blockchain technology, designing a proof of concept and modelling an accounting blockchain-based system.

Design/methodology/approach

Moving from the analysis of previous literature and leveraging on the design science approach, this paper provides a framework grounded on the main pillars of blockchain and accounting functions, identifying technical and non-technical issues that must be addressed embrace blockchain technology's full potential.

Findings

We propose and discuss a conceptual framework for a blockchain-based accounting context, moving from the identification of a typical accounting scenario. The framework is organised around three scalable levels: the first level is a technological infrastructure based on a distributed database with peer-to-peer storage; second, in the intermediate level, increasing control levels are assured through permissions and validation and third, in the higher level, the system provides the integration of business and security applications. The deployment of this system relies on a private network of nodes that validates transactions.

Practical implications

The proposed conceptual framework about blockchain development in accounting allows closing the knowledge gap between blockchain developers and accounting experts by suggesting technological and strategic issues for practitioners.

Originality/value

We provide practical guidelines to design and adopt blockchain in the accounting domain.

Details

Accounting, Auditing & Accountability Journal, vol. 35 no. 7
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 1 February 1993

Thomas A. Peters, Martin Kurth, Patricia Flaherty, Beth Sandore and Neal K. Kaske

To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces…

Abstract

To provide a background for this special section on transaction log analysis, the following discussion proposes a definition of transaction log analysis and briefly introduces some of the issues involved in the methodology.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 March 2006

Yanjun Zuo and Brajendra Panda

Damage assessment and recovery play key roles in the process of secure and reliable computer systems development. Post‐attack assessment in a distributed database system is rather…

Abstract

Purpose

Damage assessment and recovery play key roles in the process of secure and reliable computer systems development. Post‐attack assessment in a distributed database system is rather complicated due to the indirect dependencies among sub‐transactions executed at different sites. Hence, the damage assessment procedure in these systems must be carried out in a collaborative way among all the participating sites in order to accurately detect all affected data items. This paper seeks to propose two approaches for achieving this, namely, centralized and peer‐to‐peer damage assessment models.

Design/methodology/approach

Each of the two proposed methods should be applied immediately after an intrusion on a distributed database system was reported. In the category of the centralized model, three sub‐models are further discussed, each of which is best suitable for a certain type of situations in a distributed database system.

Findings

Advantages and disadvantages of the models are analyzed on a comparative basis and the most suitable situations to which each model should apply are presented. A set of algorithms is developed to formally describe the damage assessment procedure for each model (sub‐model). Synchronization is essential in any system where multiple processes run concurrently. User‐level synchronization mechanisms have been presented to ensure that the damage assessment operations are conducted in a correct order.

Originality/value

The paper proposes two means for damage assessment.

Details

Information Management & Computer Security, vol. 14 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Open Access
Article
Publication date: 30 June 2009

Guojun Ji

This paper introduces a new mathematical model for analyzing the economic benefits of incorporating the fourth party logistics (4PL), which is a contractor (i.e. agent) for the…

Abstract

This paper introduces a new mathematical model for analyzing the economic benefits of incorporating the fourth party logistics (4PL), which is a contractor (i.e. agent) for the supply chain coordination and construction based on the division of community and the outsourcing development. Based on the physical theory and the wave-particle duality, a supply chain is the special organization whose characteristic has wave-particle duality. The mathematical model enriches the connotation of 4PL and it broadens the thought for 4PL development. Secondly, the proposed mathematical model predicated on transaction costs, is supported by Transaction Cost Theory (TCT) and acts as the theoretical analysis tool of 4PL for coordinating 3-party generic supply chain. Through the model, some trendy conclusions can be drawn to provide theoretical support for 4PL’s practices. Finally, a case illustrates our conclusions.

Details

Journal of International Logistics and Trade, vol. 7 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Article
Publication date: 1 March 1995

Fay Turner

With two official standards available for requesting an item, a rather confusing picture arises when planning the automation of interlibrary loan and document delivery facilities…

Abstract

With two official standards available for requesting an item, a rather confusing picture arises when planning the automation of interlibrary loan and document delivery facilities for libraries, commercial document suppliers, and patrons. Which standard should be implemented: the ILL Protocol or Z39.50 Extended Services for Item Order? There was substantial concern within the ISO community that Item Order was moving into a domain already covered by the ILL protocol standard and that these two standards would be competing. Even though there is an overlap in the functions these standards perform, they are unique and meet different operational requirements. In a distributed communications environment, they can be used to complement rather than compete with each other.

Details

Library Hi Tech, vol. 13 no. 3
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 5 July 2013

Jun Tang and Lishan Ai

This paper proposes to use system integration between customer relationship management (CRM) and anti‐money laundering (AML) suspicious data reporting in commercial banks to…

1438

Abstract

Purpose

This paper proposes to use system integration between customer relationship management (CRM) and anti‐money laundering (AML) suspicious data reporting in commercial banks to increase the initiative of suspicious transaction identification, reduce the false reporting rates, and improve the intelligence quality.

Design/methodology/approach

This paper introduces the structure of CRM in commercial banks, discusses deficiencies of the current AML data reporting system, and designs the layering of CRM and AML transaction identification module.

Findings

This paper finds that the functions of customer behavior analysis and customer background investigation of CRM system can be redesigned and used for increasing the quality of AML suspicious transaction reporting in commercial banks.

Originality/value

This paper creatively proposes that system integration of CRM and AML suspicious transaction reporting can make a contribution to reducing the AML cost for commercial banks.

Details

Journal of Money Laundering Control, vol. 16 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 3 May 2016

Jun Tang

The purpose of this paper is to systematically study the research and development history of suspicious transaction reporting (STR) system in China, and introduce the core…

303

Abstract

Purpose

The purpose of this paper is to systematically study the research and development history of suspicious transaction reporting (STR) system in China, and introduce the core elements in constructing an intelligent surveillance system which could provide a solution to the situation of low effectiveness and efficiency in Chinese Financial Institutions (FIs) STR procedure nowadays. The solution outputs those falling out of the normal customer behavior profiles instead of only extracting data by the rules issued by authorities.

Design/methodology/approach

This paper reviews the latest literature, regulations and guidelines of STR gathered domestically and overseas, and hands out questionnaire surveys to hundreds of software vendors, regulators and FIs, details the current situation of poor deployment of intelligent in China and tells the difficulties of subjective STR decision procedures.

Findings

Few Chinese FIs have deployed real intelligent STR systems, most are using rule-based filtering systems conformed to the objective STR supervisory regulations. To change the embarrassing situation, the regulators have tried to introduce self-regulatory mode which allows the FIs to define STR decision procedures themselves. Limited by the FIs’ ability of information sharing and investigation scope, FIs could hardly unveil the whole schema of a money laundering organization. The pursuant objective FIs can reach is to construct a system that could tell what the normal customer behaviors look like and extract all those falling out of the system’s expectations as suspicious activities.

Research limitations/implications

Only the core elements of the total intelligent STR system are discussed, that is, what, why and how about the customer behavior pattern recognition system. Besides this, a total solution should also use a watch list, reporting decision, cases management, risk control, etc.

Originality/value

This paper for the first time argues that the orientation of regulatory rules in China has actually hindered the spreading of really effective intelligent system for these years. The author creatively puts forward a solution to the difficult problem for FIs to spot criminal schema directly, instead the FIs should only be required to determine whether the transactions carrying out currently are falling within the expected behavior pattern scopes, which is under the FIs’ capabilities due to the internationally accepted obligations of “Know Your Customer”.

Details

Journal of Money Laundering Control, vol. 19 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 March 1986

Jon Drabenstott

Five prominent consultants—James Rush, Richard Smith, Susan Baerg Epstein, Jose‐Marie Griffiths, and Rob McGee—address the issues that most effect system performance. They note…

Abstract

Five prominent consultants—James Rush, Richard Smith, Susan Baerg Epstein, Jose‐Marie Griffiths, and Rob McGee—address the issues that most effect system performance. They note that virtually every phase of planning for a system involves issues related to performance. No single topic is more essential to the successful implementation of a system. Guidelines and advise are provided.

Details

Library Hi Tech, vol. 4 no. 3
Type: Research Article
ISSN: 0737-8831

1 – 10 of over 92000