Search results

1 – 10 of 96
Article
Publication date: 28 August 2009

Manuel Wimmer

The definition of modeling languages is a key‐prerequisite for model‐driven engineering. In this respect, Domain‐Specific Modeling Languages (DSMLs) defined from scratch in terms…

Abstract

Purpose

The definition of modeling languages is a key‐prerequisite for model‐driven engineering. In this respect, Domain‐Specific Modeling Languages (DSMLs) defined from scratch in terms of metamodels and the extension of Unified Modeling Language (UML) by profiles are the proposed options. For interoperability reasons, however, the need arises to bridge modeling languages originally defined as DSMLs to UML. Therefore, the paper aims to propose a semi‐automatic approach for bridging DSMLs and UML by employing model‐driven techniques.

Design/methodology/approach

The paper discusses problems of the ad hoc integration of DSMLs and UML and from this discussion a systematic and semi‐automatic integration approach consisting of two phases is derived. In the first phase, the correspondences between the modeling concepts of the DSML and UML are defined manually. In the second phase, these correspondences are used for automatically producing UML profiles to represent the domain‐specific modeling concepts in UML and model transformations for transforming DSML models to UML models and vice versa. The paper presents the ideas within a case study for bridging ComputerAssociate's DSML of the AllFusion Gen CASE tool with IBM's Rational Software Modeler for UML.

Findings

The ad hoc definition of UML profiles and model transformations for achieving interoperability is typically a tedious and error‐prone task. By employing a semi‐automatic approach one gains several advantages. First, the integrator only has to deal with the correspondences between the DSML and UML on a conceptual level. Second, all repetitive integration tasks are automated by using model transformations. Third, well‐defined guidelines support the systematic and comprehensible integration.

Research limitations/implications

The paper focuses on the integrating direction DSMLs to UML, but not on how to derive a DSML defined in terms of a metamodel from a UML profile.

Originality/value

Although, DSMLs defined as metamodels and UML profiles are frequently applied in practice, only few attempts have been made to provide interoperability between these two worlds. The contribution of this paper is to integrate the so far competing worlds of DSMLs and UML by proposing a semi‐automatic approach, which allows exchanging models between these two worlds without loss of information.

Details

International Journal of Web Information Systems, vol. 5 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 14 March 2024

Zabih Ghelichi, Monica Gentili and Pitu Mirchandani

This paper aims to propose a simulation-based performance evaluation model for the drone-based delivery of aid items to disaster-affected areas. The objective of the model is to…

171

Abstract

Purpose

This paper aims to propose a simulation-based performance evaluation model for the drone-based delivery of aid items to disaster-affected areas. The objective of the model is to perform analytical studies, evaluate the performance of drone delivery systems for humanitarian logistics and can support the decision-making on the operational design of the system – on where to locate drone take-off points and on assignment and scheduling of delivery tasks to drones.

Design/methodology/approach

This simulation model captures the dynamics and variabilities of the drone-based delivery system, including demand rates, location of demand points, time-dependent parameters and possible failures of drones’ operations. An optimization model integrated with the simulation system can update the optimality of drones’ schedules and delivery assignments.

Findings

An extensive set of experiments was performed to evaluate alternative strategies to demonstrate the effectiveness for the proposed optimization/simulation system. In the first set of experiments, the authors use the simulation-based evaluation tool for a case study for Central Florida. The goal of this set of experiments is to show how the proposed system can be used for decision-making and decision-support. The second set of experiments presents a series of numerical studies for a set of randomly generated instances.

Originality/value

The goal is to develop a simulation system that can allow one to evaluate performance of drone-based delivery systems, accounting for the uncertainties through simulations of real-life drone delivery flights. The proposed simulation model captures the variations in different system parameters, including interval of updating the system after receiving new information, demand parameters: the demand rate and their spatial distribution (i.e. their locations), service time parameters: travel times, setup and loading times, payload drop-off times and repair times and drone energy level: battery’s energy is impacted and requires battery change/recharging while flying.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-6747

Keywords

Book part
Publication date: 30 March 2023

William F. Miller and Steven M. Mintz

EY's audit of German company Wirecard raises many questions about the quality of its audit. The scope and depth of the audit deficiencies have led some to call it: Germany's

Abstract

EY's audit of German company Wirecard raises many questions about the quality of its audit. The scope and depth of the audit deficiencies have led some to call it: Germany's Enron. The authors review the facts of the case and raise broad-based questions that address EY's audit: what it did wrong, what other steps it might have taken to enhance the audit, and whether it can be characterized as a failed audit. The case provides learning objectives, implementation guidance, and answers to these questions. The authors believe that it can be used at both the undergraduate and graduate levels in courses dealing with accounting ethics, fraud in financial statements, and auditing.

Details

Research on Professional Responsibility and Ethics in Accounting
Type: Book
ISBN: 978-1-80455-792-1

Keywords

Article
Publication date: 7 October 2014

Cenap Ilter

The purpose of this paper is to explore the type of accounting scandals reported in Wikipedia which have occurred in different countries on different continents. It also explores…

Abstract

Purpose

The purpose of this paper is to explore the type of accounting scandals reported in Wikipedia which have occurred in different countries on different continents. It also explores the frequency and the dollar amount of the type of accounting scams that have been committed by the companies.

Design/methodology/approach

The paper analyses each company‘’s committed accounting scandal(s). It then classifies the companies on a country, type of scandal and industry basis. It further analyses the distribution of accounting scandals and explains the major ones in its category.

Findings

The paper concludes that within the confines of the information reported in Wikipedia, the majority of accounting scandals have occurred in USA both in number of scams and in USD amount. The most frequent type of accounting scam is overstatement of assets and understatement of liabilities including roundtrip sales. Another inference from the paper is that the accounting scams can occur anywhere at any amount. It is not a country-specific issue.

Practical implications

Auditors, accounting and auditing instructors and accountants talk about accounting scandals. Auditors, in particular, are required to issue audit reports that are free of material errors either deliberately or innocently made. This paper sheds light onto the issue, as it shows what major type of accounting scandals have been committed in the literature, as they had devastating repercussions on the shareholders.

Social implications

Resources are scarce. Public’s savings must be sourced to the companies that produce the value added to the society. Misrepresentation of financial statements is an issue which distorts this relationship. The paper, by showing the type and amount of scandals, is opening up the issue to public that people be aware of what type of company they are investing in and what potential risks they are undertaking that may be leading them to be more selective in their investments.

Originality/value

The paper covers the original stories that have occurred throughout the world since 1970s. The names of the companies are original and the amounts of scams have either been collected as USD from the story itself or converted to USD at time of the event. All USD figures have then been restated to the 2011 year-end purchasing power. Thus, the cases are reflecting the approximate USD value as of 2011 year-end derived from its historical original value. The paper reshuffles the data in certain ways so that the reader will have a better view of the cases than that of presented in Wikipedia.

Details

Journal of Money Laundering Control, vol. 17 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 9 May 2008

M. Imtiaz Mazumder, Edward M. Miller and Atsuyuki Naka

The purpose of this paper is to examine the predictability of the US‐based international mutual fund returns by investigating 2,479 daily observations for all categories of…

Abstract

Purpose

The purpose of this paper is to examine the predictability of the US‐based international mutual fund returns by investigating 2,479 daily observations for all categories of international equity, bond and hybrid mutual funds. Further, trading strategies are proposed and tested under different scenario including a proposed regulation by the Security and Exchange Commission (SEC).

Design/methodology/approach

The sample is split and the initial sub sample is used to investigate return patterns of international funds and to develop trading rules based on the predictable return patterns. Trading rules are then tested on the holdout sample.

Findings

Empirical results demonstrate statistically significant predictabilities. Various trading strategies show that the returns of both load and no‐load funds are economically significant beating a buy‐and‐hold strategy. Empirical findings are consistent across the fund categories irrespective of sizes and styles. The tested strategies are profitable even with various limits on frequency of trading, minimum holding periods and even under a recent SEC's proposed regulation. Further, possible contracting and regulatory changes are proposed to improve the efficiency in the mutual fund industry.

Originality/value

The results confirm previous findings of statistically and economically significant regularities from trading strategies that involve following the US markets. A test of SEC's proposed regulation documents that short‐term investors may benefit from active trading strategy even if the SEC's rule is implemented.

Details

Journal of Financial Regulation and Compliance, vol. 16 no. 2
Type: Research Article
ISSN: 1358-1988

Keywords

Article
Publication date: 2 September 2014

John R. Nofsinger and Abhishek Varma

The purpose of this paper is to explore some commonly held beliefs about individuals investing in over-the-counter (OTC) stocks (those traded on Over-the-counter Bulletin Board…

1708

Abstract

Purpose

The purpose of this paper is to explore some commonly held beliefs about individuals investing in over-the-counter (OTC) stocks (those traded on Over-the-counter Bulletin Board (OTCBB) and Pink Sheets), a fairly pervasive activity. The authors frame the analysis within the context of direct gambling, aspirational preferences in behavioral portfolios, and private information.

Design/methodology/approach

Contrary to popular perceptions, the modeling of the deliberate act of buying OTC stocks at a discount brokerage house finds that unlike the typical lottery buyers/gamblers, OTC investors are older, wealthier, more experienced at investing, and display greater portfolio diversification than their non-OTC investing counterparts.

Findings

Behavioral portfolio investors (Shefrin and Statman, 2000) invest their money in layers, each of which corresponds to an aspiration or goal. Consistent with sensation seeking and aspirations in behavioral portfolios, OTC investors also display higher trading activity. Penny stocks seem to have different characteristics and trading behavior than other OTC stocks priced over one dollar. Irrespective of the price of OTC stocks, the authors find little evidence of information content in OTC trades.

Originality/value

The paper provides insight into individual investor decision making by empirically exploring the demographic and portfolio characteristics of individuals trading in OTC stocks.

Details

Review of Behavioral Finance, vol. 6 no. 1
Type: Research Article
ISSN: 1940-5979

Keywords

Book part
Publication date: 1 January 2012

Manuel A. Hernandez, Anirban Sengupta and Steven N. Wiggins

Firms with linear pricing offer their customers the same price for each unit of a good or service. Anything else is nonlinear pricing. Nonlinear pricing in imperfect markets…

Abstract

Firms with linear pricing offer their customers the same price for each unit of a good or service. Anything else is nonlinear pricing. Nonlinear pricing in imperfect markets indicates a fundamental asymmetry in information between firms and consumers. Consumers are commonly expected to exhibit quality- or quantity-preference differences and have different reservation values for different product attributes. The firms, however, cannot observe consumers' preferences. When complete information regarding preferences is not observable, nonlinear pricing strategies with firms offering a menu or schedule of prices allow consumers to sort themselves according to their own preferences, resulting in market segmentation.

Details

Pricing Behavior and Non-Price Characteristics in the Airline Industry
Type: Book
ISBN: 978-1-78052-469-6

Article
Publication date: 10 October 2008

Sandip C. Patel and Pritimoy Sanyal

Supervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and…

2348

Abstract

Purpose

Supervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public safety and health. The purpose of this paper is to survey the literature on the cyber security of SCADA systems and then suggest two categories of security solutions.

Design/methodology/approach

The paper proposes the use of secure socket layer/transport layer security (SSL/TLS) and IP security (IPsec) solutions, implemented on the test‐bed at the University of Louisville, as the optimal choices when considering the level of security a solution can provide and the difficulty of implementing such a security measure. The paper analyzes these two solution choices, discuss their advantages and disadvantages, and present details on efficient ways of implementing these solutions.

Findings

The SSL/TLS solution to the protocol security using public domain toolkits such as OpenSSL may provide a fast, effective, and economical solution. However, the SSL/TLS protocol and its implementation toolkits have their limitations so this approach may need another enhancement.

Practical implications

IPsec can be used to provide IP‐level security in addition to SSL/TLS.

Originality/value

The use of these enhanced security approaches in SCADA systems should effectively reduce the vulnerability of these critical systems to malicious cyber attacks, and thereby potentially avoiding the serious consequences of such attacks.

Details

Information Management & Computer Security, vol. 16 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 12 September 2016

Chiara Paltriccia and Lorenzo Tiacci

The purpose of this paper is to present a new outsourcing model for materials management related to the operating theatre of hospitals. Two distinguishing features characterize…

1572

Abstract

Purpose

The purpose of this paper is to present a new outsourcing model for materials management related to the operating theatre of hospitals. Two distinguishing features characterize the model: the long-term collaborative network established among the supplying companies (the “Network factor”), and the implementation of the RFID technology along the supply chain (the “RFID factor”). The network factor allows sharing transportation costs, while the RFID factor allows implementing a continuous review policy, instead of the periodic review policy normally utilized in hospitals. In the paper the effect of these two factors on the minimization of total materials management costs is investigated.

Design/methodology/approach

An analytical model, validated through a simulation study, is proposed to calculate total management costs of materials, depending on the presence of the network and the RFID factors. Throughout the model it is possible to perform a scenario analysis and individuate the inventory management policy that allows minimizing total costs. The procedure has been applied to a real case study of a long-term collaborative network of supplying companies in the healthcare sector that operates in Central Italy.

Findings

The optimal inventory management policy strongly depends on the mutual distances of supplying companies and the hospital. Both of the two factors have an impact on the reduction of total annual costs. The analysis of the scenario shows that a positive interaction effect exists between the two factors, so that higher savings are obtained when both factors are present.

Originality/value

The outsourcing model presented in the paper is new, and the managerial insights that can be drawn from the application of the model to the healthcare sector can be extended to many other industries.

Details

Industrial Management & Data Systems, vol. 116 no. 8
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 February 2006

Daniel Schall, Marco Aiello and Schrahram Dustdar

The capabilities of embedded devices such as smartphones are steadily increasing and provide the great flexibility of data access and collaboration while being mobile. From the…

Abstract

The capabilities of embedded devices such as smartphones are steadily increasing and provide the great flexibility of data access and collaboration while being mobile. From the distributed computing point of view, fundamental issues in mobile computing include heterogeneity in terms of varying device capabilities (i.e., operating systems and various hardware platforms), performance characteristics and real‐time behavior, and the ability to discover and interact with peers seamlessly. Web services are a family of XML based protocols to achieve interoperability among loosely coupled networked applications. We propose the use of Web services on embedded devices in order to solve interoperability issues in distributed mobile systems. We discuss various toolkits available for embedded devices and investigate performance characteristics of embedded Web services on smartphones. Our goal is to guide the design of Web services based applications on mobile devices, and provide estimates of performance that can be expected.

Details

International Journal of Web Information Systems, vol. 2 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of 96