Avi Rushinek's research while affiliated with University of Miami and other places

Publications (82)

Article
This paper describes Business Intelligence Systems and Engineering of Profits from trading. This paper discusses a system (The System) that includes regressed profits on Total Trades, Winners, Size, and Intraday drawdown of Commodities, Equities, Fixed Income, and Trade duration Exit Days. The System uses the S&P-500; including a variety of traded...
Article
The aim of this article is to describe the repurposing of classroom video surveillance and on-screen archives (RCVSOSA) model, which is an innovative, technology-enabled approach to continuing education in nursing. The RCVSOSA model leverages network Internet-protocol, high-definition surveillance cameras to record videos of classroom lectures that...
Article
This study deals with live and silent auctions of domain names. It develops a domain name appraisal model for decisions related to marketability, brand, traffic, industry e-commerce value trademark assessment. It focuses on ICANN NAF WIPO IRS type of resolution dispute cost benefit analysis and thereby lets plaintiffs, defendants, and courts budget...
Article
This study describes forensic-free Audio Video (AV) surveillance audit podcasts. Since the surveillance systems are typically funded for security reasons, any additional applications such as e-learning and training are of minimal additional expense. To facilitate this capability, it is a matter of 'splitting' the video cable of a surveillance camer...
Article
This paper studies the sub-prime mortgages, credit default swaps (CDS) and collateralised synthetic obligations (CSOs) cooking the books of the financial services industries at a global level. The paper uses the case of the Bank of Barclays to develop a methodology of uncooking the books from material misstatements of the financial industry. This r...
Article
Computer & Internet Security is very important but sometimes it is so confusing and frustrating that it makes users very unhappy to a point where the system is so secure that it cannot be used by its most legitimate users, like system administrators
Article
Universities and training organizations increasingly use technology to record and distribute original material, bringing on a new class of technological and legal issues.
Article
Universities and training organizations increasingly use technology to record and distribute original material, bringing on a new class of technological and legal issues.
Article
Maximum of Internet Citations Methodology
Article
Maximum of Internet Citations Methodology
Article
Cost benefits of the security and systems management of electronic publishing Internet Web server subscription services and e-commerce.
Article
Cost benefits of the security and systems management of electronic publishing Internet Web server subscription services and e-commerce.
Article
Managerial auditors (MAs) are frequently relying on mistaken mixed costs (MC) forecasting assumptions. Two such assumptions are that MC are linear within the relevant range and variable costs vary proportionately with activity levels. Departure from these assumptions can lead to understating expenses, overstating profits, and even to fraud, litigat...
Article
Illustrates the selection of accounting software packages (AP) by correlating user needs to system specifications. A recommendation report ranks the software in descending order of their correlations to user needs. As a by-product the system educates the consultant or user by explaining the specifications, making their expectations more realistic a...
Article
Presents a case study demonstrating financial statement ratio analysis (FSRA). This analysis matches company to industry data and builds sales forecasting models. FSRA imputes forecast standards of sales and costs, and applies them to a budgeted financial statement variance analysis for the EE (electronic and electrical) industry. Develops the conc...
Article
Suggests that, though local area networking is one of the fastest growing segments in the computer industry, the selection of appropriate features for inclusion in local area networks (LANs) can be confusing for both vendors and end-users. Describes a system that measures the degree to which specific LAN features meet end-user needs and contribute...
Article
Whilst the development of a crime-proof computer operating system seems very unlikely, more could be done to deter, discover, litigate and punish computer criminals. Because of the limited sophistication of security devices, experts shy away from them, while managers and attorneys (unaware of their limited sophistication) refrain from using securit...
Article
This study finds that the most profitable short-term, add-on Terminal Emulator (TE) products are Data-Stream-To-Disk, Multi-Session, and Net-Work Printer capabilities. In the longer term, as fixed costs become avoidable, the same products remain the most profitable, only their rank changes. In the long term Multi-Session is the first, Net-Work Prin...
Article
The use of encryption to protect sensitive data has existed in one form or another throughout history. Today, the massive amounts of data transmitted regularly make it more important than ever to ensure the integrity of important information during transmission by means of data encryption. The selection of appropriate features for inclusion in data...
Article
The selection of computer systems can be a frustrating process. The overall satisfaction derived from a system depends on matching system specifications to user needs. This case study describes a product evaluation and selection system (PESS) that correlates user needs to system specifications. This case illustrates the selection of Training and Ed...
Article
Professional power and professional effectiveness in hospitals is a little investigated but very critical phenomenon. The problem with any investigation on power is the many variables which are involved and the complex way in which they manifest themselves. This paper tests the hypothesis of potential redundancy among these variables. The null hypo...
Article
Matching the user's needs to the available supply of Accelerator Boards can be methodically time-consuming and difficult. If it is not done it may be short of satisfactory. This paper presents a method of matching user needs with the available variety of Accelerator Boards (AS). It describes a method of developing and using a Product Evaluation and...
Article
Studies in the area of evaluating asset safeguarding and data integrity have usually dealt with evidential evaluation procedures and the judgement decisions taken by the auditors during initial and subsequent audits. The qualities, measures and techniques of asset safeguarding and data integrity when examined jointly relate a degree of concern for...
Article
The selection of computer systems can be a frustrating process. The overall satisfaction derived from a system depends on matching system specifications to user needs. This case study describes a Product Evaluation and Selection System (PESS) that correlates user needs to system specifications. This case illustrates the selection of LN. A recommend...
Article
The selection of appropriate features for inclusion in microcomputer systems can be very frustrating for both hardware and software manufacturers, as well as for end-users. This study describes an interactive microcomputer based feature selection system (FSS). The feature price contribution margin (FPCM) measures to what degree a specific feature m...
Article
In a recent issue of EVALUATION AND THE HEALTH PROFESSIONS, Fottler and Smith (1982) developed a theory for determining the influence of Budgetary Evaluating the Effectiveness of Nursing Home Administration (EENA). The present study offers an extension to their multivariable theory, which is otherwise viewed as an excellent attempt at presenting a...
Article
Selecting the most profitable features and determining the prices of microcomputer products can be a difficult process. Several factors are involved in this process including retail strategy, competition, current market price, expense and profit goals, consumer perceptions, psychological issues, leader offerings and environmental influences. Resear...
Article
This study analyzes the influence of System Replacement (SR) on overall computer user satisfaction. The following are found to be the most significant variables effecting overall satisfaction: System Replacement and User Responses. The Average Life in Months has the least significant effect in the user satisfaction model. An interactive Decision Su...
Article
This paper describes a Product Evaluation and Selection System for Computer Aided Design and Manufacturing (CM) that correlates user needs to system specifications. A recommendation report ranks the CM in descending order of their correlations to user needs. Implications for users, consultants and vendors are discussed and illustrated.
Article
The purpose of this study is to explore the feasibility of using financial ratios as an analytical technique to predict financial insolvency. Using discriminant analysis, a credit-risk score was calculated to determine if a lender should accept or reject a prospective borrower. This study reveals that 80% of the cases were correctly predicted by th...
Article
The selection of an insurance software (IS) system is a complicated process. The overall satisfaction derived from a system depends on many variables. This study analyzes the influence of IS predictor variables on overall satisfaction as determined by multiple regression. This study suggests that IS ease of operation, computer reliability, and trou...
Article
This study analyzes the influence of communication monitors (CM) on overall computer user satisfaction as determined by multiple regression. The variables user expectations, manufacturers and vendors are found to be the most significant variables affecting overall satisfaction, whereas the variables number of systems represented and not using commu...
Article
The question of the location of computers, i.e. whether to have a centralised or decentralised processing system, is of particular concern to managers. A study carried out to measure the impact of computer location on user satisfaction shows that overall satisfaction with computer systems is greatly affected by user expectations, the number of syst...
Article
This research is an investigation of the relationship between computer assisted instruction (CAI) and students' performance. A diagnostic model is constructed from evaluative computer-collected data. Scores are generated by a diagnostic function during the use of CAI. It is concluded that built-in continuous analysis and communication, to users and...
Article
The selection of computer systems can be a frustrating process. The overall satisfaction derived from a system depends on matching system specifications to user needs. This case study describes a Product Evaluation and Selection System (PESS) that correlates user needs to system specifications. This case illustrates the selection of LD. A recommend...
Article
The results of a user questionnaire are used to determine the effects of 17 different independent variables on user satisfaction.
Article
The selection of a statistical/mathematical software (SMS) system is complicated. The satisfaction derived from a system depends on many variables. This study analyses the influence of SMS predictor variables on satisfaction as determined by multiple regression. The null hypothesis, that multiple correlation coefficient is zero, is rejected. The al...
Article
The selection of a purchasing software (PS) system is a complicated process. The overall satisfaction derived from a system depends on many variables. This study analyzes the influence of PS predictor variables on overall satisfaction. This study confirms the theories that suggest that ease of operation, computer reliability, and technical support...
Article
User ratings of production and inventory management software packages (PIMSP) could be very useful to buyers and sellers who would like to see some type of rating scale about these systems before deciding which type of system to buy or sell. This article presents tabulated user ratings from questionnaires distributed to computer users. The data are...
Article
The influence of a number of technical support (TS) independent variables on overall computer user satisfaction is analyzed. The variables troubleshooting, user expectations, and documentation are found to be the most significant variables affecting overall satisfaction, whereas the variables number of computer systems and the microcomputer (as the...
Article
This study analyzes the influence of Data Base Management Systems (DBMS) on overall end-user satisfaction. The variables, user expectations, mainframe, and using data base management systems (DBMS)arefound to be the most significant variables affecting overall satisfaction, whereas, the variables, number of user responses and minio computer systems...
Article
Performance monitors are devices used by system analysts and industrial engineers to measure the efficiency of a computer system. Their nature and applications in a computerized information system is the concern of this study.A description is given of the characteristics of monitors, the types of measurement they perform and their four basic catego...
Article
The selection of an engineering and scientific software (ESS) system is a complicated process. The overall user satisfaction derived from a system depends on many variables. This study analyzes the influence of ESS predictor variables on overall satisfaction as determined by multiple regression. This study confirms the theories that suggest that ES...
Article
The selection of an accounting and billing software (ABS) system is a complicated process. The overall satisfaction derived from a system depends on many variables. This study analyzes the influence of ABS (predictor) variables on overall satisfaction. It confirms our hypotheses that ease of operation, computer reliability, and ease of programming...
Article
The influence of manufacturer's software on overall computer user satisfaction, as determined by multiple regression, is analysed. Operating systems, number of systems and number of users are found to be the most significant variables affecting overall user satisfaction. The average life of a computer system (in months) and the microcomputer (as th...
Article
The present study evaluates the learning curve of students who are learning to program in BASIC via classroom instruction supplemented by the use of Computer Assisted Instruction (CAI) software tutorials. This study identifies the “difficult to understand” areas. It concludes that some topics are significantly more difficult to understand as compar...
Article
This research will explain the innovations in gathering and communicating data, outside the traditional role of the accounting function, which are required to adequately fulfill the information needs of all levels of management. Data Base Management Systems (DBMS) and their respective administration offer a good basis for collecting and utilizing a...
Article
This paper examines the necessity of backup and recovery techniques in accounting information systems. The first point is that both large and small-scale systems need to implement these techniques to some degree. The different types of failures are software, hardware, and environmental. Ancestral files can be used for backup and recovery. Offsite s...
Article
The selection of a health and medical software (HMS) system is a complicated process. The overall satisfaction derived from a system depends on many variables. This study analyzes the influence of HMS predictor variables on overall satisfaction as determined by multiple regression. The null hypothesis, that multiple correlation coefficient is zero,...
Article
In this study an attempt was made to clarify conflicting results in the learner control literature. The learner control concept was redefined in order to include both choice and self investment variables. The combined effects of choice and self investment variables were considered in this study to be motivational variables which affect the learner'...
Article
This study analyzes the influence of sources of applications programs (SAP) on overall computer user satisfaction as determined by multiple regression. The variables, proprietary software packages, vendor customized application programs, and average system, life in months are found to be the most significant variables affecting overall satisfaction...
Article
The selection of an order processing and inventory control (OPICS) system is a complicated process. The overall satisfaction derived from a system depends on many variables. This study analyzes the influence of OPICS predictor variables on overall satisfaction as determined by multiple regression. This study confirms the theories that suggest that...
Article
The selection of a payroll and personnel software (PPS) system is a complicated process. The overall satisfaction derived from a system depends on many variables. This study analyzes the influence of PPS predictor variables on overall satisfaction as determined by multiple regression. The null hypothesis, that multiple correlation coefficient is ze...
Conference Paper
This study is both a replication and an extension of prior work on system development. By expanding on the previous information with more updated information, a better description of the system development process is obtained. First, the audit of system development is explained. Then two normative models of the process are described, pointing out...
Article
This paper deals with the problems faced by both internal and external auditors as a result of the development of computer-based accounting systems, and describes how these problems were overcome as the need arose. One very interesting point seems to pervade the entire field of Electronic Data Processing (EDP) auditing. Auditors, and the authors wh...
Article
The selection of a manufacturing software (MS) system is a complicated process. The overall satisfaction derived from a system depends on many variables. This study analyzes the influence of MS predictor variables on overall satisfaction as determined by multiple regression. The null hypothesis, that multiple correlation coefficient is zero, is rej...
Article
The rapid advances in technology with declining costs of hardware is expected to widen the market for computers. One of the interesting balances for vendors to achieve is keeping users happy with increases in price performance, usually with lower unit costs. One way to achieve this objective is by satisfying users and meeting their needs. Users hav...
Article
In a recent issue of Information and Management, Neumann and Segev developed a correlation analysis of user evaluation of information characteristics (IC) for system improvement. The purpose of this note is to offer a modest extension to their theory which is otherwise viewed as an excellent attempt at modeling realistic aspects of the user IC eval...
Article
This study deals with identifying primary factors which determine the usefulness of computer-assisted instruction (CAI). Usefulness is defined as user performance score. The study establishes linear models which explain the effects of CAI modifications designed to improve the utilization of computer facilities as well as users' performance.
Article
The present study suggests a method of integrating user performance and attitudes toward the computer system into the quality control procedures (QCP). The objective of this approach is to enable the decision makers to manage by exceptions (MBE) and thus be more effective and more efficient. Accordingly, this study computes the correlations between...
Article
This paper is an up-to-date revision and extension of a prior work on code review, test data and code comparison. The objectives of code review has not changed significantly, but the methods today require the auditor to be proficient in using the computer and to have a more detailed knowledge of the system being tested. Code review involves the aud...
Article
Selection of a computer system which meets the necessary requirements is a complicated process. The overall satisfaction derived from a system depends on many variables. This case study analyzes the influence of thirteen predictor (independent) variables on overall satisfaction as determined by multiple regression. The null hypothesis that multiple...
Article
This research studies factor analysis of traditional survey- questionnaires for interactive software evaluation in order to construct a Principal Factor Conversion Function (PFCF). Such a PFCF may be used in several ways: first, for exploratory purposes, to discover the principal factors of the traditional questionnaire; second to test the potentia...
Article
Although the utility of corporate published forecasted financial reports to investors has been investigated, the findings are inconclusive. These inconclusive findings may have resulted from the ambiguity of defining the forecasted financial reports or its components. The clarification of the definition of forecasted financial reports or its compon...
Article
This paper involves the exploration of two very important security controls in a computerized accounting information system: (1) access controls, and (2) communication controls. The various specific access and communication controls are examined, analyzing their roles in an accounting information system's computer network. The growing use of comput...
Article
This study deals with identifying primary factors which determine the usefulness of computer-assisted instruction (CAI). Usefulness is defined as user performance score. The study establishes linear models which explain the effects of CAI modifications designed to improve the utilization of computer facilities as well as users' performance.
Article
This paper presents a method of integrating user attitudes toward computer software into the quality control procedures (QCP). The objective of this approach is to enable the decision makers to manage by exceptions and thus be more effective and more efficient. Accordingly, this study determines the confidence interval for users' attitudes toward c...
Article
Many variables are important in determining the performance of computer systems. Potential buyers and current users of these systems would like to know more about these variables or factors which can help them decide about a computer system they would like to acquire for their organization. Large numbers of variables could confuse the manager or de...
Article
This study is a summary of the various relevant aspects related to evaluating system efficiency in computerized accounting information systems. During recent years a vast body of knowledge central to the problem of computer performance evaluation has accumulated. Unfortunately, however, the work on the subject demonstrates enormous disparity. On th...
Article
This research is an investigation of the relationship between computer-assisted instruction (CAI) and students' attitudes toward the instructor and the course in the teaching of undergraduate electronic data processing. These relationships are evaluated by comparing the attitudes of a group of students who used the CAI programs to the attitudes of...
Article
In this study an attempt was made to clarify conflicting results in the learner control literature. The learner control concept was redefined in order to include both choice and self investment variables. The combined effects of choice and self investment variables were considered in this study to be motivational variables which affect the learner'...
Article
This study deals with live and silent auctions of domain names. It develops a domain name appraisal model for decisions related to marketability, brand, traffic, industry e-commerce value trademark assessment. It focuses on ICANN NAF WIPO IRS type of resolution dispute cost benefit analysis, letting plaintiffs' defendants and courts budget the wort...

Citations

... Technical capabilities allow analyzing what opinions the students have and their wishes for improving the learning process. This makes it possible to improve the 375 Audiovisual aids application audiovisual aids application methods (Rushinek and Rushinek, 2010). The audiovisual aids were especially relevant in the context of accelerated business development that required a rapid learning of modern information technologies used in business. ...
... General applications of data integrity could exist in many domains, including e-government, e-commerce, e-financial services, e-business, e-banking, e-learning, e-healthcare, mobile communications, heterogeneous networks, digital factories, multi-agent systems, and grid computing [1][2][3][4][5][6][7][8][9][10][11][12][13][14]. For example, Wu and Chen described the need for data integrity when official documents are being transmitted between government agencies for e-government in Taiwan [1,2]. ...
... Schewe (1976) Decision making effectiveness, managerial capabilities, job productivity, personal prestige, management control, information usefulness, quality of information, corporate costs, clerical costs, corporate procedures Larcker and Lessig (1980) Perceived usefulness (importance and usableness) regarding 6 aspects of information in the decision making process King and Epstein (1983) Reporting cycle, sufficiency, understandability, freedom from bias, reporting delay, reliability, decision relevance, cost efficiency, comparability, quantitativeness Baroudi and Orlikowski (1988) Information product; EDP staff and services; user knowledge and involvement Doll and Torkzadeh (1988) Information content; accuracy; format; ease of use; timeliness Bergeron and Berube (1988) Presence of user support structure (steering committee, information center and support group); frequency of consulting with support structures; establishment of microcomputer plan and establishment of policies Igbaria and Nachman (1990) Leadership style of IS manager; hardware/software accessibility and availablity; computer background of users; user attitudes toward end-user computing and system utilization Top management involvement, organizational competition with the EDP unit; charge-back method of payment for services, relationship with the EDP staff, communication with the EDP staff; technical competence of the EDP staff; attitude of EDP staff; schedule of product and services; time required for new development; processing of change requests; vendor support; response time; means of input/output with EDP center; convenience of access; accuracy; timeliness; reliability; completeness; relevancy; precision; currency; format of output; language; volume of output; error recovery; data security; documentation; expectations; understanding of the system; perceived utility; confidence in the systems; feeling of participation; feeling of control; degree of training; job effects; organizational position of the EDP function; flexibility of systems; integration of systems. Rushinek and Rushinek (1985) # of users; # of computer systems at the site; average life of system; type of system; ease of operation; reliability; maintenance service responsiveness and effectiveness; technical support; documentation; operation system; ease of programming; ease of conversion; expectation ...
... The Delone-McLean model was originally developed in 1992 [6]. This model identifies that success in information systems can be measured by technical success, namely system quality, semantic success, information quality and system use, while the success of effectiveness can be measured by user satisfaction, individual impact and organizational impact [7][8][9][10][11]4]. This model was later updated in 2003, the quality of information systems has three main dimensions, namely system quality, information quality, and service quality [12]. ...
... For instance, e-mail spam and scams are the utmost hideous phenomena between the cybercrime, these are the coloration, which have been discovered to bean untrue financial investment. Nigeria's reputation is no doubt in question, because it has been degraded as a result of her citizens' involment in the cybercrime (Rushinek, A, Rushinek, SF, 1993). The criminals often send email stating that the victim is the named beneficiary to a will of estranged relative and stands to benefit the estate or the trust fund. ...
... Portfolio -when we keep in mind investment -is a set of kinds of assets, depending to some kind of institution or individual, formation principles of which are directed to variety assets and use of set proportions, to reach usefulness for the portfolio owners [2]. Financial portfolio -is a set of financial assets. ...
... The application of segmentation strategy can be regarded as a panacea for improving the company's performance that can be applied in all industry sectors, including the banking sector (Wind, 1978, Cheron et al., 1989Rushinek et al., 1994;Worthington & Welch, 2011). Previous research related to segmentation in the banking sector discusses how to improve customer acquisition through the development of products and services tailored to the needs of each segment that can ultimately improve the performance of the bank (Anderson et al., 1976;Storbacka, 1997;Chéron et al., 1989;Machauer & Morgner 2001;Stanley et al., 1985). ...
... Managerial auditors (MAs) frequently review cost forecasting methods. As Rushinek and Rushinek (1997) suggest, "managerial auditors' mixed cost forecasting assumption departure error estimates for litigation and…" in Managerial Auditing Journal, the forecaster may make certain assumptions that sometimes are not perfectly met. Such departure from the assumptions can be corrected by the MAs' mixed cost forecasting, by assumption departure error estimates for litigation purposes. ...
... A red team consists of members outside the organisation that stage adversarial attacks on the system to attempt unveiling its vulnerabilities or resilience [33]. Audit trails are another fundamental practice that can clarify accountability, by recording who was responsible for what, and at which stage [32,43]. Moreover, audit trails can record the history of the development of an AI system and provide an overview of the important processes that were taken to develop the system, and keep track of the failures registered in the pipeline [32]. ...
... In addition to the quantitative research data, qualitative data was also used. In [29], the interviewees were selected by key contact persons from each company, who were asked to nominate experts from Product Management, R&D, Validation&Verification and Sales&Marketing. All interviewees had a lot of experience in working in companies for long periods of time and in multiple projects. ...