Journal articles on the topic 'Transactive attention system'

To see the other types of publications on this topic, follow the link: Transactive attention system.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Transactive attention system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Peltokorpi, Vesa. "Organizational Transactive Memory Systems." European Psychologist 17, no. 1 (January 1, 2012): 11–20. http://dx.doi.org/10.1027/1016-9040/a000044.

Full text
Abstract:
The transactive memory system (TMS) concept has been extended from dyads and groups to organizations. While organizational TMS literature helps to understand how employees locate and utilize information based on their awareness of “who knows what” and “who knows who,” conceptual development is beneficial because TMS has been extended to organizations without clear definitions and levels-of-analysis rationale. Drawing from the social psychology and network literature, this paper identifies several aspects requiring further conceptual attention, and defines organizational TMS as overlapping networks of interdependent work groups that use each other as external cognitive aids to accomplish shared tasks. Suggestions for managing and measuring organizational TMS are provided.
APA, Harvard, Vancouver, ISO, and other styles
2

Gupta, Pranav, and Anita Williams Woolley. "Articulating the Role of Artificial Intelligence in Collective Intelligence: A Transactive Systems Framework." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (September 2021): 670–74. http://dx.doi.org/10.1177/1071181321651354c.

Full text
Abstract:
Human society faces increasingly complex problems that require coordinated collective action. Artificial intelligence (AI) holds the potential to bring together the knowledge and associated action needed to find solutions at scale. In order to unleash the potential of human and AI systems, we need to understand the core functions of collective intelligence. To this end, we describe a socio-cognitive architecture that conceptualizes how boundedly rational individuals coordinate their cognitive resources and diverse goals to accomplish joint action. Our transactive systems framework articulates the inter-member processes underlying the emergence of collective memory, attention, and reasoning, which are fundamental to intelligence in any system. Much like the cognitive architectures that have guided the development of artificial intelligence, our transactive systems framework holds the potential to be formalized in computational terms to deepen our understanding of collective intelligence and pinpoint roles that AI can play in enhancing it.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Ruilin, Jun Wang, and Jin-Xing Hao. "How does knowledge heterogeneity affect transactive memory system in innovation? Evidence from a field study." Journal of Knowledge Management 24, no. 8 (July 23, 2020): 1965–85. http://dx.doi.org/10.1108/jkm-01-2020-0008.

Full text
Abstract:
Purpose The dispute over the benefit of diversity on the transactive memory system (TMS) has attracted the attention with the development of global collaboration. This paper aims to discover how knowledge heterogeneity (KH), categorized as explicit and tacit KH, affects TMS and to test the mediation effect of innovation climate (IC). Design/methodology/approach Data from a 6-month field study of 207 research and development (R&D) members and 7 expertize observers were analyzed by partial least squares structure equation model. Robustness check and Barron and Kenny mediation test were used to evaluate the model and confirm the mediation effect. Findings Tacit KH of R&D team negatively influences the development of TMS. Furthermore, IC partially mediates tacit KHs’ negative influence on the development of TMS. Research limitations/implications These results distinguish the different influence of explicit and tacit KH on TMS and explore the mediating role of IC that has been confirmed affecting the development of TMS. Practical implications These results could motivate practitioners to address more attention to tacit KH, IC and the development of TMS in the R&D team members composition. Originality/value This study contributes not only to elucidate the different influence of explicit and tacit KH on TMS but also to the appropriate members composition of R&D team by considering the relationships among KH, IC, TMS and innovation performance.
APA, Harvard, Vancouver, ISO, and other styles
4

Cho, Kwangsu, Sehee Han, Ting-Ting Rachel Chung, and Patrick J. Bateman. "The Influence of an Integrated View of Source’s Expertise on Knowledge Transfer." Journal of Information & Knowledge Management 16, no. 04 (November 23, 2017): 1750033. http://dx.doi.org/10.1142/s0219649217500332.

Full text
Abstract:
Many studies focus on the effect of a source’s expertise, but little attention has been paid to what happens in the event of a misalignment between who is knowledgeable (cognitive expertise) and who is regarded as being knowledgeable (social expertise). The emphasis on expertise alignment in this study suggests the importance not of simply having a transactive memory system, but rather, of having an accurate transactive memory system in place. Using experimental data from a sample of 134 participants, the results indicate that the knowledge transfer is greater in the source’s cognitive-social expertise alignment than in the misalignment, but the source’s cognitive expertise could be a more significant criterion for the knowledge transfer in the expertise misalignment. In the view of source-recipient dynamics, knowledge transfer is greater in the low cognitive expertise gap condition than in the high cognitive expertise gap condition. The results contribute to the understanding of the role of a source’s expertise in knowledge transfer from a socio-cognitive perspective.
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Yuan, Xinjie Zhou, Anand Jeyaraj, Rong-An Shang, and Feng Hu. "The impact of enterprise social media platforms on knowledge sharing." Journal of Enterprise Information Management 32, no. 2 (April 30, 2019): 233–50. http://dx.doi.org/10.1108/jeim-10-2018-0232.

Full text
Abstract:
PurposeEnterprise social media platforms (ESMPs) are web 2.0-based computer media tools that facilitate knowledge sharing by employees. The purpose of this paper is to outline the potential of ESMPs in both enabling and hindering knowledge sharing from the perspective of affordances.Design/methodology/approachThis is a conceptual paper which integrates the literature on ESMPs’ affordances and knowledge sharing.FindingsThis paper finds that prior research on affordances only considered artifacts without much attention on the role of individual goals and organizational context. ESMPs may both enable and hinder knowledge sharing by affording different user behaviors contingent on artifacts, individual goals and organizational context.Practical implicationsThe results of the paper will help managers and ESMPs designers to better understand the potential of ESMPs and pay attention to the positive and negative impacts of ESMPs in the process of knowledge sharing.Originality/valueThe paper derives a new categorization of affordances based on individual goals and organization context and portrays a model to describe how and when these affordances enable knowledge sharing through the development of transactive memory system and social capital and hinder knowledge sharing through overload, groupthink and privacy invasion.
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Hamzah, and Tariq Masood. "Impact of Blockchain Technology on Smart Grids." Energies 15, no. 19 (September 29, 2022): 7189. http://dx.doi.org/10.3390/en15197189.

Full text
Abstract:
Energy systems are transforming due to the incorporation of multiple distributed energy resources, such as renewable energy and battery storage systems. This transformation has triggered a need to shift power distribution from a low efficiency centralized model with high coordination costs to a decentralized distribution system comprising smart grids. Researchers have discovered a number of uses for blockchain technology in the energy sector because of its decentralized structure and possibility for safe transactions. In order to pinpoint current trends and important research directions in this area, this article thoroughly examines the effects of blockchain technology on smart grids and distributed energy resources. The aim of this paper is also to identify research gaps and future research initiatives in the area of blockchain-based energy distribution. To do this, 92 research publications were subjected to a comprehensive literature review based on predetermined criteria. Transactive Energy, Electric Vehicle Integration, Privacy and Security, and Demand Response, together with some other relatively fresh and unexplored topics, were, therefore, highlighted as four major focal areas of blockchain energy research. We have also drawn attention to the gaps in the research that has already been done and the constraints imposed by present systems that must be removed before blockchain technology can be widely used.
APA, Harvard, Vancouver, ISO, and other styles
7

Sakharova, Tatiyana N., Nina V. Tamarskaya, Olga V. Stremilova, and Mariya D. Bataeva. "Competence development strategies for youth workers." Yaroslavl Pedagogical Bulletin 2, no. 119 (2021): 26–32. http://dx.doi.org/10.20323/1813-145x-2021-2-119-26-32.

Full text
Abstract:
The article examines the strategic directions of the competence development of specialists in work with youth, determined by modern trends in the development of society and the state's requests for organizing activities with youth. It is shown that, since young people, as one of the most problematic and socially vulnerable groups of the population, require appropriate organization of activities aimed at the formation of their socially significant needs, trajectories of self-improvement and self-realization, the development of their creative potential in the interests of society and the state, a professional standard of a specialist in work with youth. The target guidelines of this professional standard are given, the possibilities of additional educational content for specialists in working with youth, applying for the position of adviser to the head of an educational organization for educational work and work with children's associations, are considered. The most promising areas of competence development of a specialist related to improving knowledge and skills in the field of youth policy, socio-psychological development of the modern digital generation, gamification of the educational process, project activities are indicated. In the content of additional education, an emphasis is needed on the problems of cyber socialization, the peculiarities of socialization of urbanized youth, and knowledge of young science. It is shown that for a specialist developing a strategy for educational work, modern knowledge about the neurocognitivefeatures of the digital generation is also needed, associated with such a conceptual series as web surfing, selective visual attention, clip thinking, simultaneous perception, and transactive memory. Along with the neurocognitive features of the digital generation, it has a special value-semantic perception of information and reality, which should also be taken into account in the competence development of specialists in the field of working with youth, applying for new positions in the education system.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Qing Hua, Dong Mei Shi, Guo Quan Cheng, Zhuan Wang, and Jia Qin Sun. "Research on G2V and V2G Trade Modes and Information System Development." Applied Mechanics and Materials 556-562 (May 2014): 5848–51. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5848.

Full text
Abstract:
In the energy crisis environment, V2G and G2V energy exchange is an important issue for attention. We studied the V2G and G2V energy exchange process and electric energy transaction mode. The design of an energy transaction management system for V2G and G2V is given, and the management system is developed. This system is an information system for V2G and G2V two-way mode trading platform, which include two parts: the first is the system management and basic information management module, the second is V2G and G2V transaction module. Based on transactions between electric vehicles and the grid, the system realizes the plan and arrangement for the electric automobile to charge and discharge orderly.
APA, Harvard, Vancouver, ISO, and other styles
9

Betancourt, Carlos, and Wen-Hui Chen. "Reinforcement Learning with Self-Attention Networks for Cryptocurrency Trading." Applied Sciences 11, no. 16 (August 11, 2021): 7377. http://dx.doi.org/10.3390/app11167377.

Full text
Abstract:
This work presents an application of self-attention networks for cryptocurrency trading. Cryptocurrencies are extremely volatile and unpredictable. Thus, cryptocurrency trading is challenging and involves higher risks than trading traditional financial assets such as stocks. To overcome the aforementioned problems, we propose a deep reinforcement learning (DRL) approach for cryptocurrency trading. The proposed trading system contains a self-attention network trained using an actor-critic DRL algorithm. Cryptocurrency markets contain hundreds of assets, allowing greater investment diversification, which can be accomplished if all the assets are analyzed against one another. Self-attention networks are suitable for dealing with the problem because the attention mechanism can process long sequences of data and focus on the most relevant parts of the inputs. Transaction fees are also considered in formulating the studied problem. Systems that perform trades in high frequencies cannot overlook this issue, since, after many trades, small fees can add up to significant expenses. To validate the proposed approach, a DRL environment is built using data from an important cryptocurrency market. We test our method against a state-of-the-art baseline in two different experiments. The experimental results show the proposed approach can obtain higher daily profits and has several advantages over existing methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Sim, Jungsub, Minsoo Kim, Dongjoo Kim, and Hongseok Kim. "Cloud Energy Storage System Operation with Capacity P2P Transaction." Energies 14, no. 2 (January 9, 2021): 339. http://dx.doi.org/10.3390/en14020339.

Full text
Abstract:
Research on energy storage systems (ESS) is actively aiming to mitigate against the unreliability of renewable energy sources (RES), and ESS operation and management has become one of the most important research topics. Since installing ESS for each user requires high investment cost, a study on cloud ESS gains attention recently. Cloud ESS refers to an ESS that is logically shared by multiple users as if they have their own ESS in their premises. In this paper, we propose a new cloud ESS sharing technique that allows capacity P2P transactions among users. Since cloud ESS is a virtual facility that is linked to an actual ESS, it is easy for users to sell the unused storage capacity to other users or to buy additional capacity from other users during operation. We also propose a system that encourages users to completely entrust the cloud ESS operator and share the extra benefit with the operator and other users. To verify the proposed method, we demonstrate the benefit of capacity P2P transaction based on real year-round data of users.
APA, Harvard, Vancouver, ISO, and other styles
11

Sim, Jungsub, Minsoo Kim, Dongjoo Kim, and Hongseok Kim. "Cloud Energy Storage System Operation with Capacity P2P Transaction." Energies 14, no. 2 (January 9, 2021): 339. http://dx.doi.org/10.3390/en14020339.

Full text
Abstract:
Research on energy storage systems (ESS) is actively aiming to mitigate against the unreliability of renewable energy sources (RES), and ESS operation and management has become one of the most important research topics. Since installing ESS for each user requires high investment cost, a study on cloud ESS gains attention recently. Cloud ESS refers to an ESS that is logically shared by multiple users as if they have their own ESS in their premises. In this paper, we propose a new cloud ESS sharing technique that allows capacity P2P transactions among users. Since cloud ESS is a virtual facility that is linked to an actual ESS, it is easy for users to sell the unused storage capacity to other users or to buy additional capacity from other users during operation. We also propose a system that encourages users to completely entrust the cloud ESS operator and share the extra benefit with the operator and other users. To verify the proposed method, we demonstrate the benefit of capacity P2P transaction based on real year-round data of users.
APA, Harvard, Vancouver, ISO, and other styles
12

Bambang Irawan. "Blockchain Technology as an Alternative Method of Payment Transaction Proof." International Journal of Science, Technology & Management 2, no. 5 (September 28, 2021): 1769–74. http://dx.doi.org/10.46729/ijstm.v2i5.309.

Full text
Abstract:
Today, the development of information technology allows all needs in the payment system to conduct safely and reliably with the support of blockchain technology. Blockchain technology is currently a concept getting more attention in financial technology (Fintech). This technology combines several computer technologies, including distributed data storage, point-to-point transmission, consensus mechanisms, and encryption algorithms often referred to as cryptography. Currently, various payment methods are available, Direct payment methods via the website, credit cards, automatic debit (Autopay), Mobile / Internet Banking, Non-bank, E-commerce, and E-wallet. All of the above payment systems still require a third party as a guarantor for the transactions made. Another problem that arises is a notification of bill dues to consumers, using conventional media in letters, emails, and notices of short message service (SMS), which allows consumers to miss the given deadline. It could cause the service to terminate. Blockchain technology is currently still considered an innovation that disrupts the world of banking and the internet. However, because this technology is a breakthrough major in data storage and information transmission, it will fundamentally change the global financial and economic operating model towards new technologies and industrial transformation in the financial industry. Current consumer bill payment methods use conventional banking systems, and notification systems for payment deadlines are less efficient; we propose a payment system with blockchain technology and the internet of things (IoT) to solve the current problem.
APA, Harvard, Vancouver, ISO, and other styles
13

Kleiner, Georgе B. "Coase’s Transactional Principle in The Light of System Economic Theory." Journal of Institutional Studies 13, no. 3 (September 25, 2021): 006–19. http://dx.doi.org/10.17835/2076-6297.2021.13.3.006-019.

Full text
Abstract:
The problem of optimization of transaction costs is investigated in the article from system economic theory. The concept of a transaction is interpreted as an interaction that affects the products’ seller and the products’ buyer and the immediate system environment of each of them. The representation of such an environment in the form of a tetrad, which is a relatively stable complex of four basic subsystems of object, project, process, and environmental types, makes it possible to trace the consequences of the transaction impulse in the economic zone of the seller and the buyer. Based on the systemic expansion of the concept of transaction, we analyze the transaction costs and benefits arising from the transaction in all four subsystems of the internal space of the firm and its immediate external environment. When formulating the modified Coase’s transactional principle, which determines the optimal size of a firm depending on the ratio between transactional (external) and administrative (internal) costs, we take into account the change in the firm’s “effect of influence” on the immediate environment as boundaries of the firm expand. Considering the “effect of influence” becomes especially important in the context of the growing development of the ecosystem form of organizing economic interaction, characterized by an increased density and tightness of intersubjective relations within the ecosystem. Attention is drawn to the positive aspects of “institutional friction” in the economy, which allows a new approach to determining the optimal level of transaction costs. The expediency of considering the “double tetrad” as a combination of the seller’s tetrad and the buyer’s tetrad as a system unit of market analysis is substantiated.
APA, Harvard, Vancouver, ISO, and other styles
14

Gu, Yonggen, Dingding Hou, Xiaohong Wu, Jie Tao, and Yanqiong Zhang. "Decentralized Transaction Mechanism Based on Smart Contract in Distributed Data Storage." Information 9, no. 11 (November 17, 2018): 286. http://dx.doi.org/10.3390/info9110286.

Full text
Abstract:
Distributed data storage has received more attention due to its advantages in reliability, availability and scalability, and it brings both opportunities and challenges for distributed data storage transaction. The traditional transaction system of storage resources, which generally runs in a centralized mode, results in high cost, vendor lock-in and single point failure risk. To overcome the above shortcomings, considering the storage policy with erasure coding, in this paper we propose a decentralized transaction method for cloud storage based on a smart contract, which takes into account the resource cost for distributed data storage. First, to guarantee the availability and decrease the storing cost, a reverse Vickrey-Clarke-Groves (VCG) based auction mechanism is proposed for storage resource selection and transaction. Then we deploy and implement the proposed mechanism by designing a corresponding smart contract. Especially, we address the problem of how to implement a VCG-like mechanism in a blockchain environment. Based on the private chain of Ethereum, we make the simulation for the proposed storage transaction method. The results of simulation show that the proposed transaction model can realize competitive trading of storage resources and ensure the safe and economic operation of resource trading.
APA, Harvard, Vancouver, ISO, and other styles
15

Hwangbo, Hyunwoo, Jonghyuk Kim, Zoonky Lee, and Soyean Kim. "Store layout optimization using indoor positioning system." International Journal of Distributed Sensor Networks 13, no. 2 (February 2017): 155014771769258. http://dx.doi.org/10.1177/1550147717692585.

Full text
Abstract:
Indoor positioning systems have attracted considerable attention from practitioners and firms seeking to optimize the consumer shopping experience with the goal of attaining increased revenue and profitability. Acknowledging the importance of indoor positioning systems in store layout optimization, we conducted a field experiment for 11 months in order to develop algorithms for connecting indoor positioning data with customer transaction data. Using fingerprinting as a primary data collection technique, we compared positioning and transaction data before and after critical store layout optimization decisions in order to identify which customer movement patterns generated the highest sales. In contrast to previous works on indoor positioning systems, which focused solely on developing algorithms or techniques to increase accuracy rates, our algorithms in principle integrate computing and marketing perspectives. Our findings can be applied to store layout optimization and personalized marketing.
APA, Harvard, Vancouver, ISO, and other styles
16

Gaćeša, Radmila. "Her majesty the transaction." Bankarstvo 50, no. 2 (2021): 178–85. http://dx.doi.org/10.5937/bankarstvo2102178g.

Full text
Abstract:
The transaction is one of the unavoidable phenomena of the modern world. The transaction is accessible, ubiquitous, global, and necessary, hence the number of transactions and the number of users is constantly increasing, as statistics regularly confirm. Generators of further development of transactions in the world of financial and especially banking services are certainly ICT companies together with numerous providers that develop and improve information and communication technologies, and make available reliable information transmission systems without which the world of transactions we know today would not be possible. Banks pay special attention to the further development and improvement of each individual type of transaction. In doing so, banks actively cooperate with ICT companies, sending initiatives and giving ratings, and appropriate support, as they are vitally interested in providing innovative services and types of transactions to their existing and potential clients.
APA, Harvard, Vancouver, ISO, and other styles
17

Fadhiela, Keumala, Dwi Rachmina, and Ratna Winandi. "BIAYA TRANSAKSI DAN ANALISIS KEUNTUNGAN PETANI PADA SISTEM RESI GUDANG KOPI ARABIKA GAYO DI KABUPATEN ACEH TENGAH." Jurnal Agribisnis Indonesia 6, no. 1 (June 1, 2018): 49–60. http://dx.doi.org/10.29244/jai.2018.6.1.49-60.

Full text
Abstract:
The purpose of this study was to analyze the structure of transaction cost and analyze farmers profit on Arabica Gayo Coffee Warehouse Receipt System (WRS) in Central Aceh District. Transaction Costs Analysis (TCA) was used to analize transaction cost structure at selling delay activity and financing activity on WRS. While the ratio of transaction costs to farmers' profit was used to determine the level of effectiveness of WRS. The research was conducted at PT. Ketiara Warehouse, West Aceh district, Aceh. The selected samples were all 4o farmers of Arabica Gayo WRS in Central Aceh Regency. The highest transction cost was on delay selling activity (64,07%) than transaction cost on warehouse receipt financing activity (35,93%). Implementation of the warehouse receipt system in PT. Ketiara provided more benefits to the participants because average percentage ratio between the cost of the transaction with the benefit of <10 percent. Transaction costs and effectiveness of WRS need more attention and focus on the improvement of these two things to maximize the implementation and sustainability of Gayo Arabica Coffee WRS in Central Aceh District.
APA, Harvard, Vancouver, ISO, and other styles
18

Godłów-Legiędź, Janina. "The Coase theorem and idea of transaction costs – their significance for the development of economics." Comparative Economic Research. Central and Eastern Europe 12, no. 4 (December 30, 2009): 61–76. http://dx.doi.org/10.2478/v10103-009-0022-7.

Full text
Abstract:
Ronald Coase drew the attention of main stream economists to the significance of social coordination in the economic system. The key role was played here by much-disputed political conclusions drawn from Coase’s idea as well as by his famous theorem and the zero transaction costs theory. The study focuses on the division of labor as a starting point for analysis of zero transaction costs. From this vantage point, the best example of the world of zero transaction costs is Robinson Crusoe’s island. However, very often the concept of zero transaction costs is associated with the assumption of perfect information. If we stretch this assumption to its logical limits, then there is no market mechanism and all impediments related to the central planning system disappear. This interpretation is in line with the Hayekian interpretation of the market as a mechanism for acquiring knowledge.
APA, Harvard, Vancouver, ISO, and other styles
19

Guo, Si Wen. "E-Commerce Information Management System Data Security Research." Advanced Materials Research 971-973 (June 2014): 1924–27. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1924.

Full text
Abstract:
with the popularity of electronic commerce, its security problem is more and more attention. As unsafe incidents occurred frequently, people for the security of e-commerce is becoming more and more attention. E-commerce security is a core and the key problem of e-commerce development, the development of efficient and safe electronic commerce management system is very necessary. According to the electronic commerce security architecture, this paper studies and analyzes the network service layer, layer encryption technology, security authentication, transaction protocol layer, potential danger in business system and so on various layers and safety technology, according to the security of the encrypted data and the data transmission performance problems, applying the appropriate encryption algorithm to improve the security and speed of the system.
APA, Harvard, Vancouver, ISO, and other styles
20

Fadhiela, Keumala, Dwi Rachmina, and Ratna Winandi. "BIAYA TRANSAKSI DAN ANALISIS KEUNTUNGAN PETANI PADA SISTEM RESI GUDANG KOPI ARABIKA GAYO DI KABUPATEN ACEH TENGAH." Jurnal Agribisnis Indonesia 6, no. 1 (June 1, 2018): 49. http://dx.doi.org/10.29244/jai.2018.6.1.35-46.

Full text
Abstract:
<em>The purpose of this study was to analyze the structure of transaction cost and analyze farmers profit on Arabica Gayo Coffee Warehouse Receipt System (WRS) in Central Aceh District. Transaction Costs Analysis (TCA) was used to analize transaction cost structure at selling delay activity and financing activity on WRS. While the ratio of transaction costs to farmers' profit was used to determine the level of effectiveness of WRS. The research was conducted at PT. Ketiara Warehouse, West Aceh district, Aceh. The selected samples were all 4o farmers of Arabica Gayo WRS in Central Aceh Regency. The highest transction cost was on delay selling activity (64,07%) than transaction cost on warehouse receipt financing activity (35,93%). Implementation of the warehouse receipt system in PT. Ketiara provided more benefits to the participants because average percentage ratio between the cost of the transaction with the benefit of &lt;10 percent. Transaction costs and effectiveness of WRS need more attention and focus on the improvement of these two things to maximize the implementation and sustainability of Gayo Arabica Coffee WRS in Central Aceh District.</em>
APA, Harvard, Vancouver, ISO, and other styles
21

Guo, Wenbo, Detmar Straub, Pengzhu Zhang, and Zhao Cai. "How Trust Leads to Commitment on Microsourcing Platforms: Unraveling the Effects of Governance and Third-Party Mechanisms on Triadic Microsourcing Relationships." MIS Quarterly 45, no. 3 (September 1, 2021): 1309–48. http://dx.doi.org/10.25300/misq/2021/14349.

Full text
Abstract:
IS research has extensively examined the role of trust in client-vendor relationships, as well as the role of governance in information technology (IT) outsourcing, but little research has been carried out on the latest manifestation of outsourcing—namely, microsourcing, i.e., the sourcing of smaller scale projects. To extend the literature on the traditional IT outsourcing literature—a stream that largely focuses on medium-to-large scale offline projects—we investigate how to develop trust and commitment in a triadic microsourcing relationship which includes the microsourcer, the microsourcee, and the microsourcing platform (MP). We draw on transaction cost economics (TCE) to theorize a model specifically adapted to the microsourcing phenomenon to scrutinize the influences of formal contractual mechanisms, relational mechanisms, and third-party mechanisms. Combining data from a matched sample of microsourcers and microsourcees on the leading Chinese MP, Zbj.com, the paper deploys degree-symmetric modeling (DSM) for construct conceptualization, measurement, and data analysis. DSM is consistent with the holistic view used to develop the research model for triadic relationships. Findings confirm that the MP is critical in delivering governance mechanisms to ensure the development of triadic trust and commitment. The results suggest that researchers and practitioners should pay closer attention to triadic trust and commitment building through proper governance mechanisms in the online microsourcing marketplace. We argue that this work could be extended to other online digital platforms that involve multiple transacting parties.
APA, Harvard, Vancouver, ISO, and other styles
22

Fathoni, Nur. "ANALISIS NORMATIF-FILOSOFIS FATWA DEWAN SYARI’AH NASIONAL MAJELIS ULAMA’ INDONESIA (DSN-MUI) TENTANG TRANSAKSI JUAL BELI PADA BANK SYARI’AH." Al-Ahkam 25, no. 2 (October 24, 2015): 139. http://dx.doi.org/10.21580/ahkam.2015.25.2.596.

Full text
Abstract:
DSN-MUI uses trade transactions in Islamic financial institutions in order to avoid interest rate system. Moral and legal issues had became the important thing in the formulation of trade transaction in syariah banking, since the concern about the system of interest that still exist in syariah banking’s trade transaction. This means that the trade transaction on syariah banking according to fatwa DSN-MUI still contains usury (riba). This paper intends to explore the important things about the rules and practices of trade transaction on the syariah banking according to DSN-MUI. This study concluded that DSN-MUI performs ijtihād taṭbīqī to facilitate the concept of trade operations on syariah banking. DSN-MUI’s fatwa about trade transaction appears to correspond to a normative concept of fiqh. It's just that there is ambiguity in the salam and istithnā' contract and less attention to the philosophy of trade. The trade transactions were reduced as provision of funds for purchasing of goods, with multi contract institutions. The use of supporting contracts that are not true will potentially lead to morality inconsistencies in trade transactions.
APA, Harvard, Vancouver, ISO, and other styles
23

Collentine, D. "Including non-point sfources in a water quality trading permit program." Water Science and Technology 51, no. 3-4 (February 1, 2005): 47–53. http://dx.doi.org/10.2166/wst.2005.0574.

Full text
Abstract:
There has been overwhelming interest in addressing water quality issues through the use of economic instruments. Much of this attention has focused on the cost efficiencies offered by Transferable Discharge Permit (TDP) systems. Unfortunately, the attempts to start up permit markets which are able to exploit abatement cost differences between sources have not met with the success expected. Two of the reasons for the lack of success that have been taken up in analysis of these programs have been the problem of transaction costs and in the case of non-point sources (NPS), undefined property rights. The composite market design is a proposal for a TDP system which specifically includes agricultural non-point source (NPS) dischargers and addresses both property rights and transaction cost problems. The composite market consists of three interrelated markets each serving a particular function. When the composite market is mature, the total number of permits issued represents the cap on discharges allowed in the catchment. The structure of the composite market allows this system to be phased in over time with existing institutions and limited demands on financing.
APA, Harvard, Vancouver, ISO, and other styles
24

Techapanupreed, Chian, and Werasak Kurutach. "Enhancing Transaction Security for Handling Accountability in Electronic Health Records." Security and Communication Networks 2020 (September 1, 2020): 1–18. http://dx.doi.org/10.1155/2020/8899409.

Full text
Abstract:
Electronic healthcare systems have received extensive attention during the last decade due to the advancement of digital technology. Using these systems in the healthcare industry can improve the quality of healthcare services tremendously. However, a major issue that needs to be concerned, when utilizing this kind of system, is accountability. Employments of electronic health records, the core of the systems, without accountability can be a big risk to both patients and service personals and, consequently, to the entire society. Accountability in electronic health records is essential to creating trust among parties. Many researchers have been introduced to the accountability protocol. However, most of them still lack some essential security property that is mutual authentication. This leads to both information traceability and nonrepudiation which are necessary for resolving any conflict that may arise. In this paper, we propose accountability protocol for electronic health records; the protocol employs both asymmetric and symmetric encryptions to ensure that the electronic health records are having confidentiality, integrity, authentication, and authorization. The accountability analysis and performance analysis show that the proposed protocol is more capable and effective than others. The novel aspect of this idea lies in the inclusion of certain forms of security that are necessary to protect the patient’s electronic health records. To the best of our knowledge, the proposed protocol consumes less cost, energy, and time compared with the existing protocols. A proof of concept of our protocol is also presented in this paper by using BAN logic, an automated security protocol proof tool named Scyther, and AVISPA
APA, Harvard, Vancouver, ISO, and other styles
25

Kurniati, Paramita Nur, and Bernardus Yuliarto Nugroho. "CASHLESS GOVERNMENT: A CORRUPTION PREVENTION STRATEGY IN GOVERNMENT AGENCIES." Asia Pacific Fraud Journal 5, no. 2 (December 23, 2020): 171. http://dx.doi.org/10.21532/apfjournal.v5i2.154.

Full text
Abstract:
The phenomenon of corruption cases continues to increase from year to year, both from the number of cases that occur and the amount of state financial losses incurred. The criminal acts of corruption committed are also increasingly systematic and massive in all aspects of society's lives. To respond to this phenomenon, the Government, in this case the Ministry of Finance, issued a "breakthrough" in the system of government expenditure transactions, by issuing cashless government system with modern payment instruments. The cashless payment system is expected to close the potential gaps of corruption arising from conventional payment systems using physical money. Transactions carried out with non-cash payment systems can be traced in full and in detail, starting from who the user is, when and where the transaction is conducted, what is the purpose of using the transaction, and what is the nominal value. The use of cashless payment instruments is also expected to be able to fulfill the principles of (1) flexibility, (2) safety in transactions and fraud avoidance, (3) effectiveness, and (4) accountability while paying attention to the precautionary principles in the use of state budget. The cashless government system is expected to be a solution to the acceleration of government performance and public services within the framework of presenting clean, transparent and accountable governance. In the end, improving the working system of government organizations is expected to be able to encourage economic growth and provide benefits for improving the welfare of the community.
APA, Harvard, Vancouver, ISO, and other styles
26

CURRAN, KEVIN, NEIL McCAUGHLEY, and XUELONG LI. "ADDRESSING THE PROBLEMS OF DETECTING FACES WITH NEURAL NETWORKS." International Journal of Image and Graphics 07, no. 04 (October 2007): 617–40. http://dx.doi.org/10.1142/s0219467807002830.

Full text
Abstract:
The face is the most distinctive and widely used key to a person's identity. The area of face detection has attracted considerable attention in the advancement of human-machine interaction as it provides a natural and efficient way to communicate between humans and machines. The problem of facial parts in image sequences has become a popular area of research due to emerging applications in intelligent human-computer interface, surveillance systems, content-based image retrieval, video conferencing, financial transaction, forensic applications, pedestrian detection, image database management system and so on. This paper presents the results of an image based neural network face detection system which seeks to address the problem of detecting faces under gross variations.
APA, Harvard, Vancouver, ISO, and other styles
27

Marifati, Imam Soleh, and Ubaidillah Ubaidillah. "Sistem Informasi Akuntansi Siklus Pendapatan Pada Usaha Bengkel Budi Barokah Sokaraja." Indonesian Journal on Software Engineering (IJSE) 5, no. 1 (June 28, 2019): 44–51. http://dx.doi.org/10.31294/ijse.v5i1.5863.

Full text
Abstract:
Abstract: Computer-based accounting information systems can be used by companies to improve the efficiency, effectiveness and accuracy of the processes of business transactions that occur in the company. The income accounting cycle which is one of the cycles in an accounting information system needs attention because this cycle produces revenue transactions which are a financial source for the company. The use of computer-based systems in this cycle can also provide added value in the form of improving services to customers. To implement a computer-based accounting information system, a software is needed to process revenue transactions. In this study, the authors developed an application of accounting information systems to process transactions in the income cycle found in vehicle workshop businesses. This application processes transaction data starting from ordering repair services, recording spare parts usage, repair service fees, bill payments and and making income reports on workshop business activities. Keywords: revenue cycle, repairation service, accounting information system
APA, Harvard, Vancouver, ISO, and other styles
28

Xu, Zhe, and Chang Tang. "Challenges and Opportunities in the Application of China’s Central Bank Digital Currency to the Payment and Settle Account System." Financial Forum 9, no. 4 (January 28, 2021): 233. http://dx.doi.org/10.18282/ff.v9i4.1553.

Full text
Abstract:
<p>With the advancement of the Internet and big data technology, currency has gradually developed in the direction of virtualization and digitization. The governments and central banks of various countries have gradually begun to pay attention to the role of digital currencies, and central bank digital currencies have emerged as the times require. As one of the first countries to study digital currency, China will devote itself to applying central bank digital currency to actual transactions in the future.</p><div>This article focuses on how China’s CBDC is used in the transaction settlement system. The opportunity is that the central bank’s digital currency technology improves the security, flexible operation and diversified application scenarios of the overall transaction settlement system, and further safeguards China’s national financial sovereignty. The challenge is that the current technology is still uncertain and different from the traditional RMB. In the future, China’s CBDC will also compete fiercely with other sovereign currencies. It is recommended to strengthen technological innovation, improve the relevant systems and regulations of the central bank’s digital currency operation, and make relevant policies to prevent the United States from imposing political and economic sanctions on China. This article will provide</div><div>suggestions on the challenges that the People’s Bank of China may face in the future application of digital currency to the transaction settlement system.</div>
APA, Harvard, Vancouver, ISO, and other styles
29

Li, Honglei, and Weilian Xue. "A Blockchain-Based Sealed-Bid e-Auction Scheme with Smart Contract and Zero-Knowledge Proof." Security and Communication Networks 2021 (May 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/5523394.

Full text
Abstract:
e-Auction improves the efficiency of bid transaction. However, the protection of bidders’ privacy, transaction fairness and verifiability, transaction data security, high cost of third-party auction center, and other issues have attracted more attention. According to the transaction process and basic principles of the sealed auction, we explored the problems existing in the current sealed-bid e-auction schemes. Based on the blockchain technology, we proposed a sealed-bid e-auction scheme with smart contract technology, Bulletproofs zero-knowledge proof protocols, and Pedersen commitment algorithm. The proposed scheme constructed an auction mechanism without the third-party auctioneer so as to restrict the behaviors of auction parties for the sake of auction security, reliability, fairness, and privacy protection. Compared with the related sealed e-auction schemes based on blockchain technologies in six metrics, we conducted the experiment to show that the proposed scheme protected the bid information from leakage well and successfully verified the winning bid price and the related bidder by all transaction participants without the third-party auctioneer.
APA, Harvard, Vancouver, ISO, and other styles
30

Khan, Imran. "The Electronic Payment Systems in a Developing Economy with Reference to Guyana." TEXILA INTERNATIONAL JOURNAL OF MANAGEMENT 8, no. 1 (February 28, 2022): 26–35. http://dx.doi.org/10.21522/tijmg.2015.08.01.art003.

Full text
Abstract:
The general intention of this Publication is to feature Electronic Payment Systems in a Developing Economy with reference to Guyana and the bearing comprising the advantages in cultivating payment systems while heightening safety, the efficiency of payments, and cost savings. The continuous transformation of a developing economy’s payments system will support monetary growth through the fiscal system for its sustainability and enables proficient financial interposition. This publication further highlights the need for frequent evaluation and supervision for the continuous modernization of electronic payment systems to the benefit and referencing to the developing economy of Guyana. Critical areas that are essential which emphasis have been placed upon but needs further attention in addressing, are as follows: 1. Increase the rate of finalizing a transaction through its related operations within actual or rapid time, as time is money. Currently, the rate of one transaction varies (by hours). 2. Decrease of paper materials and handling costs which generally eases functional cost. 3. Payment assurance and dependable guard against illegal entry to the client’s account in ensuring safe dispensation. This publication has formed the basis to associate investors behind the target to endorse a modern payments system infrastructure that is required for a developing economy with reference to Guyana with the objective of restructuring, empowering discussion and the propelling effect in generating inventive and country-specific electronic payment solutions. It should be noted that a substantial amount of transformation has occurred to date with reference to Guyana.
APA, Harvard, Vancouver, ISO, and other styles
31

Kępa, Marcin. "Central ICT system SL2014: the way to reduce the transaction costs of European projects." Ekonomia i Prawo 21, no. 2 (June 30, 2022): 449–61. http://dx.doi.org/10.12775/eip.2022.025.

Full text
Abstract:
Motivation: European funds are these kinds of goods for which effective demand exceeds supply. The market value of European projects in Poland is estimated at approximately PLN 1125,44 bn, of which the EU co-financing is PLN 664,29 bn. Their effective use depends on the quality of the institutions responsible for their aggregation, allocation and proper expenditure (in accordance with the EU policies). Aim: The analysis of mechanisms determining the market game on the European project market in Poland in the light of the new institutional economics. Particular attention will be paid to the administrative tools that facilitate efficient long-distance communication between the parties to a project co-financing contract (central ICT system SL2014). Results: ICT systems constitute a part of a wider phenomenon commonly referred to as e-administration. It may be regarded as an institution in the meaning of the new institutional economics. This institution reduces the transaction costs related to handling European projects as well as the transaction costs in other areas connected with public governance. Wherever the e-administration can be applied (e-administration may be found useful in the case of public health emergencies that were triggered by the SARS-CoV-2 pandemic). Central ICT system SL2014 (as an element of e-administration) significantly reduced transaction costs in the field of handling European projects in the 2014–2020 financial perspective.
APA, Harvard, Vancouver, ISO, and other styles
32

Zhong, Zhen Kui. "Design and Implementation of Software Architecture of Manufacturing Execution System Based on Middleware Technology." Applied Mechanics and Materials 443 (October 2013): 526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.443.526.

Full text
Abstract:
Manufacturing execution system is the software system that is used most widely for manufacturing enterprises to realize informatization. In order to solve the problem of distributed heterogeneous environment, MES introduces the concept of middleware. It is in the middle of the operation system software and MES and above the operation system, network and database and below the MES. It helps the software developers to flexibly and high effectively develop and integrate complicated all modules in MES as well as complicated application and communications in enterprises. This design adopts two kinds of middleware. The first kind is Message Oriented Middleware (MOM). Message Oriented Middleware hides the details of interaction between all kinds of machine equipment and MES data under the unified data specifications. It makes in-time, high-efficient and stable data transmission as well as easily copes with the complicated production environment. The second kind is common transaction processing middleware. It enclosures the details of transaction processing and offers a stable transaction platform, enabling the developers to pay attention to the development of business logic. It ensures the development qualities and the development costs.
APA, Harvard, Vancouver, ISO, and other styles
33

Khan, Kashif Mehboob, and Shafaque Mehboob Khan. "Investigating the Impact of Delayed Mining upon Scaling Blockchain Applications under Malleability Attack—An e-Voting Scenario." Pakistan Journal of Engineering and Technology 5, no. 2 (May 11, 2022): 1–10. http://dx.doi.org/10.51846/vol5iss2pp1-10.

Full text
Abstract:
Blockchain is a disruptive technology and has attracted significant attention with prominent applications across finance, medical and many other systems. Electronic voting or e-voting is one of the emerging applications of blockchain leveraging benefits such as integrity, and non-repudiation of data. Whilst existing research has focused on using blockchain for e-voting applications to achieve transparent and verifiable solutions, there exists a gap in study with respect to an in-depth investigation for the challenges surrounding the trade-off for scalability versus security in the context of transaction malleability attack when mining capability is compromised for the blockchain network. In order to present our research, we have used e-voting as an example application to demonstrate our investigations regarding the mentioned gap. The paper does not focus on building a blockchain based e-voting system. The study carries out empirical analysis by establishing blockchain networks with varying mining strength under an extreme load of incoming transactions to achieve a real world scenario of large blockchain based system. The developed system has then been exposed to transaction malleability attack while scaling throughput up to thousands of transactions. The findings reveal that blockchain networks upon scaling, are more vulnerable to transaction malleability attack while operating under lower mining strength as compared to the networks having higher mining power under same conditions. These research outcomes would help researchers and application architect to build highly secured and large scaled applications. To the best of our knowledge, there has not been any published empirical investigation present in the given context.
APA, Harvard, Vancouver, ISO, and other styles
34

Gunawan, I. Ketut, Ninda Lutfiani, Qurotul Aini, Fitria Marwati Suryaman, and Abas Sunarya. "Smart Contract Innovation and Blockchain-Based Tokenization in Higher Education." Journal of Education Technology 5, no. 4 (November 26, 2021): 636. http://dx.doi.org/10.23887/jet.v5i4.40665.

Full text
Abstract:
Blockchain which includes smart contract and tokenization features is the latest technology in the world, especially Indonesia. Smart contracts and tokenization make it very easy for users and can maintain valid data security, but there are still many universities that have not implemented the system so they have to involve many parties and costs. The problem taken in this study is the payment process for transactions such as credit and data processing that is vulnerable to illegal data leakage. This study aims to develop a smart contract system and blockchain tokenization in universities in the payment transaction process. The method used in this research is literature review analysis and testing method. The implementation of smart contracts and tokenization can replace third parties as security guards of transaction data with all Blockchain users paying attention and ensuring the integrity of the entire process and activity. This of course can avoid problems that arise from the presence of third parties in the transaction process. So it can be concluded that the implementation of smart contracts and Blockchain tokenization in payment transactions is the right solution to be applied in the payment transaction process at universities.
APA, Harvard, Vancouver, ISO, and other styles
35

Zheng, Yong Qian, Jie Li, Ya Ling Zhao, and Deng Jun Wang. "Research on Powertrain Production Line Modeling and Design." Advanced Materials Research 225-226 (April 2011): 1250–53. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.1250.

Full text
Abstract:
Nowadays in automotive industry JIT production mode is an overwhelming trend. And it resulted in an unprecedented challenge to the traditional mode of production designing, operation and information transaction. To solve the problems mentioned above a novel method is proposed to establish planning system models with tree discrete view structure, to visualize control and optimization in designing production line based on processing work flow. This model gave attention to various paths to access and control the production line, and also to communications with other systems among enterprises. Finally, this paper proposed a prototype system and took a production line of 5V engine cylinder head for example to examine the planning method. The results show it helps a lot in improving the efficiency and accuracy of production line planning.
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Chun Ying, and Jun Zhang. "Key Technology Research Based on the Smart Home BSNs." Advanced Materials Research 981 (July 2014): 542–45. http://dx.doi.org/10.4028/www.scientific.net/amr.981.542.

Full text
Abstract:
In recent years, Mobile computing and intelligent household hot topic, more and more get the attention of people. The current smart home systems for self-help to collect information about the indoor environment, at the same time can also interact with the user, but the system when the user needs to send control commands always spend time learning about the current state of household environment, manual control will become a kind of bondage. So this paper using a user activity recognition system based on smart phone, its main function is based on the current user on sensor information to obtain the user's current activity, the current environment control command. Combining the system and smart home system, family equipment according to the user's activities independently adjust to cooperate with users, users are more focused on the main transaction processing. This paper will be focused on energy saving problem, smart home system based on smart phone user activity recognition and the coordination between them.
APA, Harvard, Vancouver, ISO, and other styles
37

Bano, Shumaila, and Abid Ghafoor Chaudhry. "Barriers and Cultural Issues of Land Transaction." Global Sociological Review II, no. I (December 30, 2017): 18–22. http://dx.doi.org/10.31703/gsr.2017(ii-i).03.

Full text
Abstract:
Land is an important part of nature. In Pakistan the main issue is the transaction of land. The researchers heed rare attention towards this sensitive issue. This issue of land has always been considered. alarming for the people of Pakistan. The distribution of property is playing a pivotal role to strengthen and weaken the relationships since long. The lands devoured the old, loved and precious relationships in a moment. The property has been the root of dispute which compelled.a son to fight with his father and a brother with. brother. Land administration systems are established to eliminate these issues, ...for the native people of Muzaffargarh. A reasonable number of respondents were selected from Muzaffargarh by using the technique of random sampling. Case study method was helpful to contract intensive data.. Other themes were fares allocated by the government for reducing poverty. Related revenue office could play an integral role in land transaction to reduce their land problems.
APA, Harvard, Vancouver, ISO, and other styles
38

Narayan Rane, Trupti. "System and Risk Analysis of Cloud-Manufacturing System." International Journal of Computer Science & Engineering Survey 13, no. 3 (June 30, 2022): 13–27. http://dx.doi.org/10.5121/ijcses.2022.13302.

Full text
Abstract:
The Cloud manufacturing(C-Mfg) system involves remote distributed manufacturing resources and capabilities collaborating as a single virtual entity. The system receives orders for custom products and provides manufacturing as a service to the end customers. The primary activities of the system, among others, are transaction control, resource allocation and monitoring, distributed manufacturing, quality control, and delivery of consignments to the customers. The actual manufacturing is done by a network of third-party partner manufacturers providing the services to end customers, helping them with cost reduction, shorter time-to-market, and enabling efficient collaboration between manufacturers in the CMfg network. This paper aims to deep dive into C-Mfg as a system and perform a risk analysis to assess and mitigate the risks associated with the system. While cybersecurity and data security-related concerns are deemed the most serious and need immediate management for the system to succeed, the control of data, compliance with manufacturing standards and guidelines, and lack of accountability and ownership are other serious risks that need significant attention. Identifying these factors will help channel the focus on the management and resolution of these risks to establish digital trust in the C-Mfg system leading to the system’s success.
APA, Harvard, Vancouver, ISO, and other styles
39

Danilyants, G. G., and M. V. Volik. "Prospects for the use of cryptocurrency in public monetary circulation." Vestnik Universiteta, no. 7 (September 9, 2021): 187–92. http://dx.doi.org/10.26425/1816-4277-2021-7-187-192.

Full text
Abstract:
The modern world is changing rapidly. Digitalization is becoming more and more important and penetrates into all spheres of society. The digital transformation of financial and monetary processes and systems deserves special attention. It is important to determine the place and role of the state in the regulation of these processes. This paper examines the current state and prospects of using cryptocurrency as an element of monetary circulation. Analysis of the dynamics of the bitcoin rate showed that the use of cryptocurrencies is promising. However, it is necessary to improve the regulatory framework. The introduction and use of the national cryptocurrency in Russia will stabilize the state of the financial system in relation to the dollar, ensure the safety of economic development and reduce transaction costs.
APA, Harvard, Vancouver, ISO, and other styles
40

Halim, Nurfadhlina Abdul, and Moch Panji Agung Saputra. "Estimation of Reserve Funds for E-Banking Transactions using Operational Value-at-Risks." International Journal of Global Operations Research 3, no. 1 (February 8, 2022): 31–36. http://dx.doi.org/10.47194/ijgor.v3i1.124.

Full text
Abstract:
The “New Normal” state during the pandemic has made digital financial transactions important as an effort to reduce direct human interaction, to prevent the spread of the pandemic. The rate of financial transactions at banks has automatically increased, but in practice, several risks may occur about failed or incorrect digital transactions. Examples of digital transaction system risks are downtime and timeout services due to system failures, cyber-attacks, and system usage errors. These risks need attention from banking companies. One way to anticipate digital financial transaction failure happen is the readiness of a reserve fund that is used to cover the wrong amount of fund error in the bank's digital system. This research will discuss the estimation of operational reserve funds for digital banking financial transactions (e-banking) using the Operational Value-at-Risk (OpVaR) method, based on operational risk data for digital financial transactions to obtain the largest potential loss value from digital financial transaction activities at a bank. Based on calculations using the OpVaR method, it is known that the reserve fund required for the operational risk of digital financial transactions is IDR135,465,044,269.741. The results of this study show that the e-banking operational reserve fund is quite large due to the possibility of extreme losses. This provides a view to avoiding the worst risk of collapse due to an imbalance in the required reserve funds.
APA, Harvard, Vancouver, ISO, and other styles
41

Kovar, Stacy E., Kimberly Gladden Burke, and Brian R. Kovar. "Consumer Responses to the CPA WEBTRUST™ Assurance." Journal of Information Systems 14, no. 1 (March 1, 2000): 17–35. http://dx.doi.org/10.2308/jis.2000.14.1.17.

Full text
Abstract:
With the advent of WEBTRUST™, accountants are providing assurances about online transactions to consumers who may otherwise hesitate to engage in electronic commerce. This study explores the influence of assurance services on consumers' online transaction expectations and intent to purchase online. In short, the study supports the notion that many of the marketing efforts associated with WEBTRUST™ can have desirable effects on consumer behavior. Results suggest that consumers who pay more attention to the WEBTRUST™ seal and disclosures at the web site or who have been exposed to WEBTRUST™ advertising have higher online transaction expectations and stronger intent to purchase online than their counterparts. Similarly, consumers' knowledge about CPAs positively influences their online transaction expectations, but not intent to purchase online. However, the study also indicates areas of concern for practitioners and researchers. Only 56 percent of subjects noticed the seal, 27 percent clicked on the seal, and 8.5 percent had seen ads related to WEBTRUST™, indicating a need to investigate more effective marketing. In addition, these results suggest that consumers believe the WEBTRUST™ service should and does provide assurances that are clearly beyond its scope.
APA, Harvard, Vancouver, ISO, and other styles
42

Khomenko, E. G. "Legal Framework for Clearing and Settlement in the Banking System of Russia." Actual Problems of Russian Law 17, no. 10 (August 24, 2022): 117–23. http://dx.doi.org/10.17803/1994-1471.2022.143.10.117-123.

Full text
Abstract:
The paper analyzes the legal framework for the clearing system in the Russian Federation and its place in the system of cashless transactions and formulates the main characteristics of clearing. The distinctive features of the process are identified. It is noted that clearing is not a contract, but a set of consistently performed actions aimed at identifying and calculating the mutual obligations of the parties. It is important to mention the stages of clearing and settlement identified by the author that result in charging/crediting the payment clearing position as to the bank accounts of the settlement participants. The importance of clearing of wire transfers between banks participating in gross and clearing payment systems is emphasized. The advantages and disadvantages of clearing and settlement systems are noted. The author pays attention to the institution of the central counterparty, the central clearing counterparty and their functions in the framework of the settlement transaction between payers and recipients, the role of the central counterparty, the central clearing counterparty in minimizing the risks of defaults in payments.
APA, Harvard, Vancouver, ISO, and other styles
43

Rojszczak, Marcin. "Compliance of Automatic Tax Fraud Detection Systems with the Right to Privacy Standards Based on the Polish Experience of the STIR System." Intertax 49, Issue 1 (January 1, 2021): 39–52. http://dx.doi.org/10.54648/taxi2021005.

Full text
Abstract:
According to the EC estimates presented in November 2018, the so-called VAT gap amounted to approximately EUR 150 billion with organized crime groups largely responsible for its creation. Therefore, it is not surprising that states, while protecting their economic interests, are implementing new measures aimed at detecting and preventing tax crime. Poland is also pursuing this type of activity, and a number of innovative measures in the field of tax law have been introduced over the last few years. One such solution is the automatic system of analysing transaction data from financial institutions (System Teleinformatyczny Izby Rozliczeniowej, STIR). The way this system works – combining the collection of enormous sets of personal data including sensitive information with confidential analytics and composing reports for tax authorities and law enforcement purposes – must raise doubts as to its compliance with human rights standards. In terms of its operation, STIR resembles electronic surveillance systems in other EU Member States; the difference is that, instead of capturing telecommunications data, it aggregates bulk amounts of information on financial transactions. The purpose of this article is to discuss the regulations that establish the legal framework of STIR and to present recommendations on how to ensure its compliance with the privacy and data protection model functioning in the EU. Special attention will be paid to assessing the proportionality and quality of legal safeguards implemented to limit the risk of abuse of power according to standards established in the case law of the European Court of Human Rights (ECtHR) and the Court of Justice of the European Union (CJEU). Conclusions drawn from this analysis are not only important from the perspective of the Polish legislature but are also relevant to other countries and EU institutions implementing systems similar to STIR that are interested in developing cooperation between Member States in the area of combatting tax fraud. Right to privacy, tax fraud, transaction network analysis, automated decision-making, VAT gap.
APA, Harvard, Vancouver, ISO, and other styles
44

Mohamed Asaad El Banna, Sara, and Nevine Makram Labib. "Using Big Data Analytics to Develop Marketing Intelligence Systems for Commercial Banks in Egypt." MATEC Web of Conferences 292 (2019): 01011. http://dx.doi.org/10.1051/matecconf/201929201011.

Full text
Abstract:
Nowadays, Big Data (BD) Analytics is receiving great attention in banking industry, considering the worthy data that have been stored for several decades, to reach the main targets of marketing by increasing the bank’s efficiency of studying their clients, knowing their feedback, in addition to promoting active and passive security systems. This study focuses on utilizing BD analytics to develop marketing intelligence systems. It aims to explore the big data as a valuable resource for Egyptian commercial banks, to improve the customer experience, customer segmentation and profiling, selling products based on profiling, and describing customer behavior. In order to develop the proposed system, data were collected from several banks of transaction performed in 2016, including a report on customer satisfaction, a procedure of analyzing customer satisfaction data, consisting of about 39,000 records of transactions for customers and a collection of about 4,000 records of transaction data for cardholders. These data were analyzed using Apache Hadoop to perform many tasks such as profiling the bank's clients to groups, customer segmentation based on client’s history, interest and habits, predicting customer behavior based on profiling, designing a new marketing strategy, and presenting the right offers to the bank's clients as individuals or as groups. It was concluded that BD analytics were very beneficial for achieving Marketing Intelligence in Banks.
APA, Harvard, Vancouver, ISO, and other styles
45

Budiarti, I., R. Andrian, and A. W N Falah. "Application of Web Communication Relationship Management in Small and Medium Enterprises." International Journal of Research and Applied Technology 1, no. 1 (June 25, 2021): 49–54. http://dx.doi.org/10.34010/injuratech.v1i1.5611.

Full text
Abstract:
Small and Medium Enterprises (UKM) in Indonesia are still managed traditionally since the touch of information technology is not optimal. On the other hand, the number of customers or transactions made by UKM may no longer be of small value. One modern business approach is to pay attention to customer factors, not only before the transaction but also after the transaction. Applications in the field of information technology in this domain are called Customer Relationship Management (CRM). This research tries to develop a CRM model adapted to the community's culture and the SME business model in Indonesia and considers the penetration of information technology in general. The approach used is to use the Prototype model in which the system creation process is structured and has several stages that must be passed so that the information system becomes better and easier. The results show the small and medium businesses can make CRM simpler and more generic
APA, Harvard, Vancouver, ISO, and other styles
46

Coase, Ronald H. "La struttura istituzionale della produzione *." Journal of Public Finance and Public Choice 9, no. 3 (October 1, 1991): 163–73. http://dx.doi.org/10.1332/251569298x15668907345360.

Full text
Abstract:
Abstract During the two centuries following the publication of Adam Smith’s Wealth of Nations the economists’ main objective has been to improve his analysis and in particular his basic statement that government regulation and economic planning are not necessary for the functioning of an efficient economy, since the price system (the «invisible hand») can successfully coordinate the economy.However, the excessive attention to prices deviated research from other aspects of the economic system. Coase’s effort, through his articles on «The nature of the firm» (1937) and «The problem of social cost» (1960), was to introduce in the traditional economic theory some institutional elements. The contribution of the first article was essentially the introduction into economic analysis of transaction costs. In the second article it was shown that contracting in absence of transaction costs maximizes the wealth, quite apart from the assignment of property rights.The introduction of institutional elements can be very helpful for reforms in Eastern European countries, because market economy can only work through appropriate institutions.
APA, Harvard, Vancouver, ISO, and other styles
47

Effendi, Rustam, Yasin Efendi, Ainun Najib, Ainun Najib, and Ainun Najib. "PERANCANGAN SISTEM INFORMASI PENJUALAN BERBASIS WEB PADA BENGKEL KARUNIA BAN PAMULANG." Journal of Innovation And Future Technology (IFTECH) 3, no. 1 (February 4, 2021): 49–55. http://dx.doi.org/10.47080/iftech.v3i1.1153.

Full text
Abstract:
The use of technology in the company not only supports business processes but also very important on corporate earning. Business ownerhave always pay attention to the development of the existing technology in order to improve their business success. Therefore many companies want to implement the technology edgein every aspect ofits business processes. Karunia Ban machine shop is a trading company that sells a wide range of tires, especially for goods and service fees. Sales transactions that occur on Karunia Ban shop are still being done manually. Companies often find it difficult to know which sales transaction that are for spare parts or for repair services, so we need an information system tosolve the problem. Information systems is expected to optimize the sales in Karunia Ban machine shop. The methodology that we used to analysis and to develop the structured system are using UML (Unified Modelling Laguage). The expected results from this paper is to establisha procedure that describes a system using UML analysis and design a system that runs the system, the draft also produced a web-based sales application using php and my sql.
APA, Harvard, Vancouver, ISO, and other styles
48

Murthy, Uday S., and Guido L. Geerts. "An REA Ontology-Based Model for Mapping Big Data to Accounting Information Systems Elements." Journal of Information Systems 31, no. 3 (May 1, 2017): 45–61. http://dx.doi.org/10.2308/isys-51803.

Full text
Abstract:
ABSTRACT The term “Big Data” refers to massive volumes of data that grow at an increasing rate and encompass complex data types such as audio and video. While the applications of Big Data and analytic techniques for business purposes have received considerable attention, it is less clear how external sources of Big Data relate to the transaction processing-oriented world of accounting information systems. This paper uses the Resource-Event-Agent Enterprise Ontology (REA) (McCarthy 1982; International Standards Organization [ISO] 2007) to model the implications of external Big Data sources on business transactions. The five-phase REA-based specification of a business transaction as defined in ISO (2007) is used to formally define associations between specific Big Data elements and business transactions. Using Big Data technologies such as Apache Hadoop and MapReduce, a number of information extraction patterns are specified for extracting business transaction-related information from Big Data. We also present a number of analytics patterns to demonstrate how decision making in accounting can benefit from integrating specific external Big Data sources and conventional transactional data. The model and techniques presented in this paper can be used by organizations to formalize the associations between external Big Data elements in their environment and their accounting information artifacts, to build architectures that extract information from external Big Data sources for use in an accounting context, and to leverage the power of analytics for more effective decision making.
APA, Harvard, Vancouver, ISO, and other styles
49

Lovebbi, Lovebbi, and Dodick Z. Sudirman. "Rancang Bangun Aplikasi Steganografi dengan Metode Least Significant Bit di Audio pada Sistem Operasi Android." Jurnal ULTIMATICS 4, no. 1 (June 1, 2012): 7–16. http://dx.doi.org/10.31937/ti.v4i1.303.

Full text
Abstract:
Easy access to information this day, has increase the importance of security, especially private and secret information. the big amount of data transaction via smartphone without a proper data security has become a problem that needs attention. This paper’s goal is to implements steganography with least significant bit method for audio as alternative to data security. The implementations is done in Android operating system and produce an application for hiding message. This research proves that least significant bit in Android operating system fulfill the criteria of good steganography method. Keywords—data security, steganography, least significant bit, android
APA, Harvard, Vancouver, ISO, and other styles
50

Hanafiah, Dwi Putri Melati Januri. "IMPLEMENTASI UPAYA PENANGGULANGAN TINDAK PIDANA CYBER DI ERA TEKNOLOGI." Muhammadiyah Law Review 6, no. 2 (August 26, 2022): 32. http://dx.doi.org/10.24127/lr.v6i2.2213.

Full text
Abstract:
Abuse of the internet is also proven by the frequent finding of crimes through the internet network. The existence of social media which also functions as an online buying and selling transaction, but is used by unscrupulous persons to commit crimes, one of the crimes is fraud. Crimes related to the confidentiality, integrity and existence of data and computer systems receive special attention, because these crimes have a different character from conventional crimes. The legal system in Indonesia does not specifically regulate computer crime through the internet. Obstacles found in investigating cybercrime include issues related to legal instruments, the ability of investigators, evidence, and inadequate computer facilities. Efforts that can be made to overcome obstacles found in investigating cybercrime include improving legal instruments, educating investigators, building adequate facilities, increasing investigative efforts and international cooperation, as well as making efforts to combat cybercrime prevention
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography