2,511 research outputs found

    Continuous monitoring of enterprise risks: A delphi feasibility study

    Get PDF
    A constantly evolving regulatory environment, increasing market pressure to improve operations, and rapidly changing business conditions are creating the need for ongoing assurance that organizational risks are continually and adequately mitigated. Enterprises are perpetually exposed to fraud, poor decision making and/or other inefficiencies that can lead to significant financial loss and/or increased levels of operating risk. Increasingly, Information Systems are being harnessed to reinvent the risk management process. One promising technology is Continuous Auditing, which seeks to transform the audit process from periodic reviews of a few transactions to a continuous review of all transactions. However, the highly integrated, rapidly changing and hypercompetitive business environment of many corporations spawns numerous Enterprise Risks that have been excluded from standard risk management processes. An extension of Continuous Auditing is Continuous Monitoring, which is used by management to continually review business processes for unexpected deviations. Using a Delphi, the feasibility and desirability of applying Continuous Monitoring to different Enterprise Risks is studied. This study uncovers a significant relationship between the perceived business value of Continuous Monitoring and years of experience in Risk Management and Auditing, determines that all key architectural components for a Continuous Monitoring system are known, and indicates that Continuous Monitoring may be better suited for monitoring computer crime than monitoring strategic risks such as the loss of a competitive position

    A Human-Centric Approach to Group-Based Context-Awareness

    Full text link
    The emerging need for qualitative approaches in context-aware information processing calls for proper modeling of context information and efficient handling of its inherent uncertainty resulted from human interpretation and usage. Many of the current approaches to context-awareness either lack a solid theoretical basis for modeling or ignore important requirements such as modularity, high-order uncertainty management and group-based context-awareness. Therefore, their real-world application and extendability remains limited. In this paper, we present f-Context as a service-based context-awareness framework, based on language-action perspective (LAP) theory for modeling. Then we identify some of the complex, informational parts of context which contain high-order uncertainties due to differences between members of the group in defining them. An agent-based perceptual computer architecture is proposed for implementing f-Context that uses computing with words (CWW) for handling uncertainty. The feasibility of f-Context is analyzed using a realistic scenario involving a group of mobile users. We believe that the proposed approach can open the door to future research on context-awareness by offering a theoretical foundation based on human communication, and a service-based layered architecture which exploits CWW for context-aware, group-based and platform-independent access to information systems

    Thwarting market specific attacks in cloud

    Get PDF

    Analysis and modeling a distributed co-operative multi agent system for scaling-up business intelligence

    Get PDF
    Modeling A Distributed Co-Operative Multi Agent System in the area of Business Intelligence is the newer topic. During the work carried out a software Integrated Intelligent Advisory Model (IIAM) has been develop, which is a personal finance portfolio ma

    Relative Importance, Specific Investment and Ownership in Interorganizational Systems.

    Get PDF
    Author's post-print on any open access repository after 12 months after publication. Must link to publisher version http://www.ucalgary.ca.ezproxy.lib.ucalgary.ca/bnault/files/bnault/itm_sep_2008.pdfImplementation and maintenance of interorganizational systems (IOS) require investments by all the participating firms. Compared with intraorganizational sys- tems, however, there are additional uncertainties and risks. This is because the benefits of IOS investment depend not only on a firm’s own decisions, but also on those of its business partners. Without appropriate levels of investment by all the firms participating in an IOS, they cannot reap the full benefits. Drawing upon the literature in institutional economics, we examine IOS ownership as a means to induce value-maximizing noncontractible investments. We model the impact of two factors derived from the theory of incomplete contracts and transaction cost economics: relative importance of investments and specificity of investments. We apply the model to a vendor-managed inventory system (VMI) in a supply chain setting. We show that when the specificity of investments is high, this is a more critical determinant of optimal ownership structure than the relative importance of investments. As technologies used in IOS become increasingly redeployable and reusable, and less specific, the relative importance of investments becomes a dominant factor. We also show that the bargaining mechanism—or the agreed upon approach to splitting the incremental payoffs—that is used affects the relationship between these factors in determining the optimal ownership structure of an IOS.Ye
    • …
    corecore