189 research outputs found
Real Option Applications to Information Security
Real options present advantages over the standard discounting methods. In this paper we analyze them briefly and examine their potential applications on information security. The applications of real options on valuation of information assets, information security investment and capital budgeting provide considerable benefits. Finally portfolios of real options and other financial products can reduce information security risk.Real options, information security, valuation, information security investment, capital budgeting, portfolio theory, information security risk.
Lifelong Competence Development: Towards a Common Metadata Model for Competencies Description – The Case Study of Europass Language Passport
Competence-based approaches in the field of formal or non-formal education and training are becoming more common and appear to offer the opportunity to develop programmes that meet needs of learners, trainers and potential employers. To support the provision of competence-based learning services, it is necessary to maintain a record of an individual’s competences in a persistent and standard way. In this paper, we investigate the problem of defining a common metadata model for the description of competencies based on the application of the current state-of-the-art specification (namely, the IMS RDCEO) in describing competencies, in a real case study, that is, the EuroPass Language Passport. To this end, we identify four open issues on the description capabilities of the IMS RDCEO specification, and propose possible extensions to its information model, demonstrating their application in practice.This work has been sponsored by the EU project TENCompetenc
Developing a Common Metadata Model for Competencies Description
Competence-based approaches are frequently adopted as the key paradigm in both formal or non-formal education and training. To support the provision of competence-based learning services, it is necessary to be able to maintain a record of an individual’s competences in a persistent and standard way. In this paper, we investigate potential issues related with the definition of a common metadata model for competencies description. This is done by applying the current state-of-the-art specification, IMS Reusable Definition of Competency or Educational Objective(IMSRDCEO), in a real case study, that is,the EuroPass Language Passport. We, then, identify four open issues with the description capabilities of the IMSRDCEO specification, and propose possible extensions to its information model, demonstrating their application in practice.The work on this publication has been sponsored by the TENCompetence Integrated Project that is funded by the European Commission's 6th Framework Programme, priority IST/Technology Enhanced Learning. Contract 027087 [http://www.tencompetence.org
Triple-Entry Accounting and System Integration
Triple Entry Accounting (TEA) provides an opportunity for fundamental change in accounting. TEA is a foundational development of Blockchain technology, which is considered a pillar of the Fourth Industrial Revolution. Nevertheless, in order to augment its impact, TEA should be integrated with other systems. This paper aims to examine the relationship of TEA with system integration (SI) and how it can affect integration. This study reviews the SI literature in the context of accounting, examines how the literature on TEA has evolved over the years, and finally contributes to the analysis of how TEA is related to integration. A key theme is the connection of accounting controls and system integration. The methodology of the four design principles of control in system integration is adopted. Transparency is the main perspective of these principles. It was found that TEA promotes transparency, reduces the risk of fraud, and facilitates system integration
Big Data Applications in Accounting Information Systems
This article examines the extensive impact of big data applications within Accounting Information Systems (AIS), demonstrating how their integration significantly transforms financial management practices. It focuses on the substantial enhancements big data brings to predictive analytics, especially through AI and machine learning, which markedly improve strategic planning and risk management. The paper also assesses the improved precision in financial reporting and the efficacy of identifying and preventing fraud, highlighting big data's role in maintaining financial integrity.Additionally, the discussion extends to the crucial applications of big data in customer and market analysis, risk management, and operational efficiency, underlining how these technologies streamline processes and facilitate informed decision-making. The significance of big data in ensuring adherence to increasingly rigorous regulatory requirements is also explored, illustrating its role in preserving corporate reputation and compliance with legal standards.Moreover, the article elaborates on the expanded applications of big data in areas such as financial planning and analysis, audit quality enhancement, and supply chain management. It also explores the growing importance of big data in environmental, social, and governance (ESG) reporting and its contribution to more effective communication with stakeholders and continuous improvement of business processes.The article offers a comprehensive view of big data's diverse applications and profound impact on AIS, presenting it as an essential tool for contemporary accounting and financial management businesses. This analysis reflects the current applications of big data in AIS and anticipates potential future developments, suggesting an evolving landscape of accounting technology influenced by ongoing big data innovations
Blockchain, enterprise resource planning (ERP) and accounting information systems (AIS):Research on e-procurement and system integration
Accounting information systems (AISs), the core module of any enterprise resource planning (ERP) system, are usually designed as centralised systems. Nowadays, the continuous development and applications of blockchain, or more broadly—distributed ledger technology (DLT), can change the architecture, overcome and improve some limitations of centralised systems, most notably security and privacy. An increasing number of authors are suggesting the application of blockchain technologies in management, accounting and ERPs. This paper aims to examine the emerging literature on this field, and an immediate result is that blockchain applications can have significant benefits. The paper’s innovative contribution and considerable objective are to examine if blockchain can be successfully integrated with AIS and ERPs. We find that blockchain can facilitate integration at multiple levels and better serve various purposes as auditing compliance. To demonstrate that, we analyse e-procurement systems and operations using case study research methodology. The findings suggest that DLT, decentralised finance (DeFI), and financial technology (FinTech) applications can facilitate integrating AISs and ERP systems and yield significant benefits for efficiency, productivity and security
Big Data Applications in Accounting Information Systems
This article examines the extensive impact of big data applications within Accounting Information Systems (AIS), demonstrating how their integration significantly transforms financial management practices. It focuses on the substantial enhancements big data brings to predictive analytics, especially through AI and machine learning, which markedly improve strategic planning and risk management. The paper also assesses the improved precision in financial reporting and the efficacy of identifying and preventing fraud, highlighting big data's role in maintaining financial integrity.Additionally, the discussion extends to the crucial applications of big data in customer and market analysis, risk management, and operational efficiency, underlining how these technologies streamline processes and facilitate informed decision-making. The significance of big data in ensuring adherence to increasingly rigorous regulatory requirements is also explored, illustrating its role in preserving corporate reputation and compliance with legal standards.Moreover, the article elaborates on the expanded applications of big data in areas such as financial planning and analysis, audit quality enhancement, and supply chain management. It also explores the growing importance of big data in environmental, social, and governance (ESG) reporting and its contribution to more effective communication with stakeholders and continuous improvement of business processes.The article offers a comprehensive view of big data's diverse applications and profound impact on AIS, presenting it as an essential tool for contemporary accounting and financial management businesses. This analysis reflects the current applications of big data in AIS and anticipates potential future developments, suggesting an evolving landscape of accounting technology influenced by ongoing big data innovations
Fake news, misinformation, disinformation and supply chain risks and disruptions: risk management and resilience using blockchain
Will Central Bank Digital Currencies (CBDC) and Blockchain Cryptocurrencies Coexist in the Post Quantum Era?
This paper explores the coexistence possibilities of Central Bank Digital Currencies (CBDCs) and blockchain-based cryptocurrencies within a post-quantum computing landscape. It examines the implications of emerging quantum algorithms and cryptographic techniques such as Multi-Party Computation (MPC) and Oblivious Transfer (OT). While exploring how CBDCs and cryptocurrencies might integrate defenses like post-quantum cryptography, it highlights the substantial hurdles in transitioning legacy systems and fostering widespread adoption of new standards. The paper includes comprehensive evaluations of CBDCs in a quantum context. It also features comparisons to alternative cryptocurrency models. Additionally, the paper provides insightful analyses of pertinent quantum methodologies. Examinations of interfaces between these methods and blockchain architectures are also included. The paper carries out considered appraisals of quantum threats and their relevance for cryptocurrency schemes. Furthermore, it features discussions of the influence of anticipated advances in quantum computing on algorithms and their applications. The paper renders the judicious conclusion that long-term coexistence is viable provided challenges are constructively addressed through ongoing collaborative efforts to validate solutions and guide evolving policies
PERSONAL HYGIENE REMAJA PUTRI KETIKA MENSTRUASI
Adolescence is a transitional period from childhood to adulthood. In the transition, there are three stages that include growth process, development, and maturation of genital hormones, namely the primary and secondary change. Male and female adolescent also happen to experience these changes. However, the female adolescents are in a higher risk for having reproductive tract infection. The continuous reproductive tract infection can result in infertility until pregnancy occurs outside the womb. The causes of reproductive tract infection vary, such as improper personal hygiene behavior. Such behavior includes replacing sanitary napkin less than four times in a day, using inappropriate pad material, often using antiseptics to treat genetal, not replacing underwear twice a day, not changing sanitary napkin for each 1-hour to 2-hour usagein the first day of menstruation, and not replacing sanitary napkin after urinating, defecate, and bathing.The study aims at describing the behaviour of female adolesenctsaboutpersonal hygiene during menstruation in SMPN 2 Kras, Kediri district. The study uses descriptive research design. The population of the study is female adolescents at class VII and VIII with the total of 191 students. The study collects data from 130 respondents by using Simple Random Sampling. The result of general behaviour of female adolescents’ personal hygiene during menstruationshows 47 percentsalready meet the criteria, while 26 percents sufficiently meet the criteria, and 27 percentsdo not meet the criteria. It is suggested thatschool collaborates with local area health institutionsin providing basic activities to overcome such health problem. These activities can be done through communication, information and education (IEC) along with the distribution ofposter and leaflet about reproductive health especially personal hygiene during menstruation.
Keywords: female adolescents’ behaviour, personal hygiene menstruatio
- …
