Difference between revisions of "A computable framework for accountable data assets"

From PKC
Jump to navigation Jump to search
Line 10: Line 10:
Since the appearance of [[World Wide Web]] in 1995, world affairs have been transformed by ever-faster electronic data transaction activities. This data-driven phenomenon created an unprecedented global supply network that can be considered as a singular inter-connected web of data transaction activities. Up to year 2022<ref>This document is revised on {{REVISIONMONTH1}} {{REVISIONDAY}}, {{REVISIONYEAR}}</ref>, this data-driven supply network favors organizations or persons who have deep pockets and access to more advanced Information Technologies. The advantages distinguished by wealth and technology literacy induced many unfair practices and even un-ethical and/or illegal transaction activities at a global scale. To resolve this issue, a globally-shared data transaction-processing platform, that reduces this unfair advantages and reduces the cost of system participation or system operation would be necessary to address many fundamental issues caused by [[information asymmetry]].  
Since the appearance of [[World Wide Web]] in 1995, world affairs have been transformed by ever-faster electronic data transaction activities. This data-driven phenomenon created an unprecedented global supply network that can be considered as a singular inter-connected web of data transaction activities. Up to year 2022<ref>This document is revised on {{REVISIONMONTH1}} {{REVISIONDAY}}, {{REVISIONYEAR}}</ref>, this data-driven supply network favors organizations or persons who have deep pockets and access to more advanced Information Technologies. The advantages distinguished by wealth and technology literacy induced many unfair practices and even un-ethical and/or illegal transaction activities at a global scale. To resolve this issue, a globally-shared data transaction-processing platform, that reduces this unfair advantages and reduces the cost of system participation or system operation would be necessary to address many fundamental issues caused by [[information asymmetry]].  


Recent development in [[blockchain]] and [[Decentralized identifier]] technologies coupled with web-based applications and 4G/5G connected devices created a technical infrastructure that could significantly reduce the degree of unfairness/[[information asymmetry]] in the global marketplace. Anyone with access to an Internet-connected web-browsing device have been able to not just participate in the global supply network, but also learn and operate their own business with minimal entry barrier. To continuously introduce late-breaking Information Technologies to the broadest possible range of participants, it would be necessary to package data content, operating workflow instructions, and [[self-sovereign]] account security in a coherent framework. This framework should provide intuitive user interfaces for entry-level users through popularly-available<ref>Most browsers, including Edge, Chrome, and Firefox, even Safari are converging on the implementation of [[Chromium]] browser core.</ref> [[web browser]]-based interfaces. in a features offered freely on the Web-enabled Internet, operate their  possible to create an open source turn-key solution, that allow almost every person on the web, a [[self-sovereign]] [[Enterprise Resource Planning]] ,  This revolutionary software artifact presented many business opportunities and inspired many new technologies, however methods and tools to ensure their system integrity have not yet caught up with these changes.
Recent development in [[blockchain]] and [[Decentralized identifier]] technologies coupled with web-based applications and 4G/5G connected devices created a technical infrastructure that could significantly reduce the degree of unfairness/[[information asymmetry]] in the global marketplace. Anyone with access to an Internet-connected web-browsing device have been able to not just participate in the global supply network, but also learn and operate their own business with minimal entry barrier. To continuously introduce late-breaking Information Technologies to the broadest possible range of participants, it would be necessary to package data content, operating workflow instructions, and [[self-sovereign]] account security in a coherent framework. This framework should provide intuitive user interfaces for entry-level users through [[popular web browsers|popularly-available]] [[web browser]]-based interfaces. in a features offered freely on the Web-enabled Internet, operate their  possible to create an open source turn-key solution, that allow almost every person on the web, a [[self-sovereign]] [[Enterprise Resource Planning]] ,  This revolutionary software artifact presented many business opportunities and inspired many new technologies, however methods and tools to ensure their system integrity have not yet caught up with these changes.
# Complex software applications and business processes that have been serving a large portion of the society are searching for systematic ways to migrate to modern technical infrastructures.
# Complex software applications and business processes that have been serving a large portion of the society are searching for systematic ways to migrate to modern technical infrastructures.
  these algebraic formulation of accounting systems has  
  these algebraic formulation of accounting systems has  

Revision as of 09:53, 12 May 2022

Synoposis

This article prescribes a systematic approach to manipulate data content in a unifying data abstraction framework. It unifies multiple domains of data representable knowledge in an extensible, yet universal data type: lattice, which includes the following:

  1. A computational framework that demonstrates algebraic closure properties (sound and complete) in three classes of data assets: information content, compilable source code, and executable binary files.
  2. A software architecture that maps industry-standard tools to the above-mentioned three data asset classes, information content, source code, and executable binaries.
  3. A web-based workflow that ensures only authenticated participants and machine-executable contracts may conduct changes to a cryptographically verified ledger for any ownership transactions.

This computational framework is modeled as an automated accounting system for transacting data assets on the web. In other words, this article will define the data capture and data verification procedure as an algebraically-formulated accounting process, so that it can leverage the mathematical rigor to reason about data integrity. Moreover, this article prescribes an implementation roadmap to construct an open source and self-owned Enterprise Resource Planning (ERP) system utilizing decentralized security system, so that small and large organizations can utilize the same data processing infrastructure to conduct business activities. This will significantly reduce the cost and accelerated the cycles of business transactions, therefore enabling more people to participate in the supply chain of data, products, and service on the Internet.

Background

Since the appearance of World Wide Web in 1995, world affairs have been transformed by ever-faster electronic data transaction activities. This data-driven phenomenon created an unprecedented global supply network that can be considered as a singular inter-connected web of data transaction activities. Up to year 2022[1], this data-driven supply network favors organizations or persons who have deep pockets and access to more advanced Information Technologies. The advantages distinguished by wealth and technology literacy induced many unfair practices and even un-ethical and/or illegal transaction activities at a global scale. To resolve this issue, a globally-shared data transaction-processing platform, that reduces this unfair advantages and reduces the cost of system participation or system operation would be necessary to address many fundamental issues caused by information asymmetry.

Recent development in blockchain and Decentralized identifier technologies coupled with web-based applications and 4G/5G connected devices created a technical infrastructure that could significantly reduce the degree of unfairness/information asymmetry in the global marketplace. Anyone with access to an Internet-connected web-browsing device have been able to not just participate in the global supply network, but also learn and operate their own business with minimal entry barrier. To continuously introduce late-breaking Information Technologies to the broadest possible range of participants, it would be necessary to package data content, operating workflow instructions, and self-sovereign account security in a coherent framework. This framework should provide intuitive user interfaces for entry-level users through popularly-available web browser-based interfaces. in a features offered freely on the Web-enabled Internet, operate their possible to create an open source turn-key solution, that allow almost every person on the web, a self-sovereign Enterprise Resource Planning , This revolutionary software artifact presented many business opportunities and inspired many new technologies, however methods and tools to ensure their system integrity have not yet caught up with these changes.

  1. Complex software applications and business processes that have been serving a large portion of the society are searching for systematic ways to migrate to modern technical infrastructures.
these algebraic formulation of accounting systems has 

According to Rambaud and Pérez[2][3], an algebraically-defined accounting (data capture and verification) practice may systematically automate the decision procedures for the following activities:

  1. Decide how to classify the data collected and send the collected data to relevant data processing workflows.
  2. Whether a given data set is considered admissible or not. This is judged in terms of its data formats and legal value ranges.
  3. Whether a transaction process is allowable, or not. This include whether a given transaction is feasible, in relevant operational/business logics.


Ownership associated with Accounts

Data Content that represent Decision Procedures

The Control Structure(If/Then/Else)

Computable Data Types

It is been defined axiomatically that all computable data types are Partially-ordered sets.

Lattices and Partially Ordered Sets

Composition and Decomposition

The Notion of Closure offered by Algebra

Applications in ICT System Development

Conclusion

Ensure System Integrity at multiple temporal cycles

Rigorous practice in Constructing and Deconstructing Data-Intensive Systems

Boosting producitivy in Software Development

Direct societal-scale applications as Integrated Data Processing Workflows

References

  1. This document is revised on 5 12, 2022
  2. Rambaud, Salvador Cruz; Pérez, José García; Nehmer, Robert A.; Robinson, Derek J S Robinson (2010). Algebraic Models for Accounting Systems. local page: Cambridge at the University Press. ISBN 978-981-4287-11-1. 
  3. Rambaud, Salvador Cruz; Pérez, José García (2005). "The Accounting System as an Algebraic Automaton". INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS. local page: Wiley Periodicals, Inc. 20: 827–842. 

Related Pages