Professional Documents
Culture Documents
FINANCIAL SERVICES
Also by Dimitris N. Chorafas and Heinrich Steinmann
HIGH TECHNOLOGY AT UBS- FOR EXCELLENCE IN CUSTOMER SERVICE
M
MACMILLAN
PRESS
© Dimitris N. Chorafas and Heinrich Steinmann 1988
Softcover reprint of the hardcover 1st edition 1988
Published by
THE MACMILLAN PRESS LTD
Houndmills, Basingstoke, Hampshire RG21 2XS
and London
Companies and representatives
throughout the world
Glossary 233
Index 237
Foreword
Banking used to be centred on money. Now it is financial service. In the
last five years, deregulation, technology, and aggressive competition
fostered more changes in the banking industry than it has experienced in
its entire history. Precisely because of competition, providing financial
services in an able manner requires a first-class computers and
communications network. Yet most banking organisations are still
information poor. Management has not yet got the message. Eventually
it will, but by then it may be too late.
The objective of this book is to provide banks and the financial
industry at large with an analysis of what is and what is not a network at
their service. The background is electronic banking. The foreground
brings into perspective what has been done by forward-looking financial
industries and the benefits they achieved.
Banking is an industry today, but it is not like every other industry. It
operates on its own rules. Therefore only banking examples have been
taken: specifically, the four generations ofonline financial networks which
evolved over twenty years in Japan.
This book is a study addressed to the management of financial
institutions. Computers and communications technologists can also gain
from it insight and foresight. In chapters, the book analyses:
e what is happening to electronic funds transfer today;
e where current developments are leading;
e what options and choices are presently open to a bank;
e what are the alternative courses of action, the prerequisites, the
basic steps - and the timetable.
Chapter 1 introduces the concept of high technology in banking. The goal
is to give the reader a strategic perspective. The evolution of money,
from coins to electronics is discussed in Chapter 2. The text is written in a
pragmatic manner and it is service-oriented. It focuses on successive
generations of strategic banking products and the profits they bring to
the financial institution, and also on the risks management takes by
falling behind in the development of new services.
Successive technological solutions in the form of generations of online
systems are outlined in Chapter 3. Practical examples are presented with
emphasis on how to implement a modern financial network. Key choices
are outlined in Chapter 4. Chapter 5 is a case study based on Ubinet, the
lX
X Foreword
this book- to our colleagues for their advice; to the organisations visited
in the research, for their insight; to Dr Herbert Huschke and Ulrich E.
Rimensberger for their contributions in Chapter 5 on UBINET. All the
quotations which are included come from personal meetings, working
seminars and conferences, either initiated by the authors or to which the
authors have been invited. To Eva-Maria Binder goes the credit for
typing the manuscript, doing the artwork and compiling the index.
DIMITRIS N. CHORAFAS
HEINRICH STEINMANN
1 High Technology in
Banking: a Strategic
Perspective
Banks are providers of financial services, insurers of deposits, financial
intermediaries, and key participants in a nation's payment system. As
such, banks play a major role in the economy and in the financial well-
being of a nation. To contribute in an able manner in this mission, the
banking system must operate under efficient conditions, rendering its
services in a reliable way. The costs to the economy, the clients, and the
banks themselves must be low, hence, affordable. Bank management
becomes increasingly conscious of cost effectiveness.
At the same time, and for evident reasons, banks wish to exploit new
opportunities to serve corporations and the general public. Competititve
equity and soundness demand this. To materialise their business plans,
the financial industries increasingly depend on technology. A great deal
of the existing banking services and practically all of the new banking
products revolve, in one way or another, around a technological
infrastructure. This has rapidly become the most actively sought-after
banking instrument. The last years have seen a revolution in techniques
and systems available to financial institutions. At the same time,
deregulation and aggressive competition have fostered more changes in
the banking industry than it has experienced in its entire history.
The goal of dynamic organisations is to become premier financial
service enterprises. This effort is market driven, but the motor is
technology. Harnessing the technology which will lead us into the
twenty-first century is a commitment made by the management of banks
destined to survive in this increasingly competitive market-place.
Four decades ago, just after the Second World War, the larger banks
relied on punched-card equipment and accounting machines for infor-
mation handling. Three decades ago they introduced computers to
slowly replace punched cards. Not until the mid-1960s did banking
products and information systems start to merge.
The catalyst to this merger have been the networks. By the mid to late
1960s, forward-looking banks had established real-time operations.
Crude by today's standards, these polling-selecting systems, with their
point-to-point or multidrop lines and their non-intelligent terminals,
heralded a new epoch in banking.
1
2 Implementing Networks in Financial Services
policies, which can be expressed in two ways: the one technical, the other
market-oriented. In the technical sense, the then classical approach to
data processing has been changed. This made possible the marketing
angle. Online operations made it feasible for the bank's managers and
professionals to start thinking in terms of new products and services.
Figure l.l demonstrates the technical evolution. Batch processing
gave way to a private online system built to serve the interests of one
bank (I GOLS, I GPS). But the lack of interbanking features saw to it
that a great deal of batch work still remained. Even today an estimated
85 per cent of banking transactions in the USA are dealt with in the
traditional manner, that is, drafts, cheques, LCs and so on. Only 15 per
cent are handled through electronics.
Electronic Funds Transfer (EFT) is crucial to the automation of
banking operations. But EFT requires cooperative online systems for
interbanking exchanges. This came with 2GOLS and provided the basis
for 2 GPS. The change has been significant. We have just said that even
today in the USA 85 per cent of banking transactions are dealt with in
the traditional manner - but the other 15 per cent of transactions
account for 85 per cent of the total dollars moved, which is in excess of
200 trillion dollars annually.
Thanks to cooperative online systems, every day 300,000 funds
transfers are executed on the various banking networks electronically.
The money is transferred from the sender to the receiver in a matter of
minutes. Typically each of these transactions involves over a million
dollars. The electronic funds are transferred over the various banking
networks, the most popular of which is CHIPS (Clearing House
Interbank Payment System). The other popular networks are Fedwire,
Bankwire, Swift, Cashier and Chess.
While these have been significant breakthroughs for the banking
industry, neither technology nor product strategy remained stagnant.
The 1970s, particularly the end of the decade, experienced several
mergers:
The future belongs to those who prepare for it. Preparation means
business opportunity. There are critical questions to which we should
reply in a factual and documented manner. First of all: What's our
strategy? Then, what's the policy of the opponents? Can our strategy
overtake them?
A strategic plan is primarily market-oriented. The next questions are:
What's the market? How fast does the market grow? Are there
significant market shifts? The evaluation of market perspectives is not
only a significant part of planning for survival - it is the heart of it.
A key issue confronting the top management of a financial institution
at all times is: What's our product line? The associated questions to
answer are: What can technology do for our product line? Is our current
status satisfactory? Are we moving ahead, or are we falling behind?
Banking management should always be keen to ask itself and its
systems specialists: /s our use of technology making our products more
appealing? Sharply cutting our costs? Giving us a competitive edge in
distribution? Increasing our products' reliability and availability? In all
these questions the strategic aspects have to be answered first.
When we give to the strategic aspects the importance they deserve, we
find that 3 GOLS and 3 GPS are no longer good enough for our bank,
though they might have been quite adequate only two years ago.
Technology is moving fast. The market is changing. Here is how one of
the foremost money centre banks looks at technology to gain the upper
hand over the competition: 'The banking industry deeply depends on
computers and communications for the development, production and
delivery of its products. But it also depends on added value.' Let's always
remember that the solutions which are given closely connect to the
products and services which are offered to their market.
If we fall behind, we are lost. It is practically the same in the
manufacturing industry. Increasingly we find that the microprocessor
has become an integral component of man-made products, from sewing
machines to turbo-generators. This is an accepted fact, but not the final
6 Implementing Networks in Financial Services
INTEGRATED
SYSTEMS
PRIVATE INTEGRATED COMPUTER NETWORK
SYSTEMS
_..
SYSTEMS
ONLINE ONLINE
INTEGRATED SYSTEM SYSTEMS
.....,. CONNECTING WITH
THE ENVIRONMENT
REGULATED ENVIRONMENT
PROFITABILITY
PROFITABILITY
+ 2 GPS
..
.......
.. · ..
LOSSES
Number (1) has been the classical approach. The market was defined by
the product brought forward by the banking industry. This is still valid
where the pace of technological change, and therefore of market
dynamics, is slow, as in the past. Number (2) is the rule in a highly
competitive environment. For financial institutions, this is a relatively
new rule. Banks able to adopt it as a strategy are going to be the
survivors.
The market defines the product means customer partnership. The bank
does not operate alone. It collaborates with its clients. This is true not
only in product design but also in other areas:
(1) Switching That's the role of the PBX as well as of the city and
regional centres of the phone company.
(2) Transmission The switches are interconnected through links. The
latter may be cables, microwaves or other media.
12 Implementing Networks in Financial Services
(3) Terminal equipment They range from the simple telephone set to
a microcomputer combining data, text, voice and image.
The network which we design has a goal to meet. The goal is an able,
cost-effective and reliable answer to marketing requirements. That is the
role of an enabling technology.
Marketing requirements are strategic in nature. Responding to them
positions our bank against its competition. Marketing has to define:
e what new function or performance is expected.
Then the bank's system engineering must detail:
e what technologies can we capitalise on.
The bank's technologists look at the tool market; its salesmen focus on
co-ordinated products. The two together must define and implement
application packages.
They must also care about competitiveness which means:
18
The Role of Money: From Coins to Electronics 19
is the new form money took in the 1970s: a form based on electronics
rather than paper; hence the notion of electronic money.
TECHNOLOGY ASSIMILATION
(Figure 2.1 ). Such phases are inherent in all major changes. None comes
overnight.
Gestation is the period during which the product is defined, refined,
tested on the market, and reactions are recorded. Though a basic
ingredient is technology, gestation involves a great deal of market
research, user education, and product refinement. Market awareness
grows. Capabilities for reducing, selling, distributing and supporting the
product are developed. An organisation is created to provide this
support, and the technical part itself is fine-tuned.
Today we are at the end of the gestation period with electronics funds
transfer. The same is true of financial networks in general. The Japanese
first generation online system and second generation online system are
gestation-era products. With the third generation online system starts
the rapid growth phase. It will find its fulfilment with the fourth
generation online system.
Rapid growth is the second stage, during which volume grows
significantly. Customer awareness of the product becomes widespread.
Yet growth is often constrained by limits on production and distribution
capacity. Support may be deficient in the early portion of rapid growth.
By contrast, the mature growth stage has adequate production,
distribution and support capabilities. Competition is stiff and prices
decline over the course of this stage, providing further incentives for
accelerated volume growth. While under rapid growth the early starters
gain the upper ground, with mature growth the financial institutions
which are better organised win. When technology changes, both the
organisation and the culture of its people must also change. This is
necessary to match the new possibilities and answer the developing
needs.
The management of financial institutions must pay attention to the
fact that technology is a 'peculiar critter'. The key question which it asks
is whether we are able to:
e develop our concepts appropriately;
e implement the new advances made available; and
e live with our time, in a manner which is both competitive and
ethical.
Reaction to challenge must be fast and efficient. The fifty years covered
in Figure 2.1 dramatise the connectivity which exists between the phases
of gestation, rapid growth, and mature growth. If we fail in our
leadership we will pay for such failure by losing our market.
A study done by Kodak in the 1970s documented that for a major
23
o:r:
f-
(L3=
<!0
o:r:
f-
a: f-
a:
o:r:
(.!)
(L3=
<!0
(L3=
<!0
a: a:
(.!)
o:r:
o:r:
f-
(L3=f- o:r:
(L3=
<!0
f-
a:<!0
a: (L3=
a: (.!)a:
(.!) <!0
o:r:
f-
(L3=
<!0
o:r:
<!0f-
(L3=
<!0
o:r:
f-
o:r:
f-
(L3= (L3=
<!0 <!0
a: a:
(.!)
o:r: o:r:
o:r: f- <!0 f-
(L3=
f-
(L3=
o:r:
o:r:
(L3=
<!0
f- <!0 <!0
f-
a: a:
<!0
(L3= (L3=
a: a:
<!0
(.!)
(.!) <!0
a: a:
(.!)
24 Implementing Networks in Financial Services
company it takes about six years to lose its market position when
management fails in its plans. Translated to the context of a financial
industry, such failure means living in the past: that is, in the saturation
part of the graph. Saturation occurs when virtually all potential users
have adopted the formerly new product. Sales represent replacement,
upgrading to new models, and growth in the population. But these are
slow-moving items. The dynamics favour innovation, and innovation
does not exist in the saturation phase.
At the same time, the fact of supporting innovation and electronic
funds transfer is no guarantee of success - though the opposite is a
prescription for failure. A financial network must have goals. The first
critical question we should ask ourselves is: 'What do we want to
achieve?' Are we sure we wish to be in the financial networking business?
Are we investing in this line to cover only our own needs as a financial
institution, or are we planning to sell time and services?
If our answer tends towards the latter case, a torrent of other
questions should come up, among them: What's the market? What's the
projected growth? Can it sustain well its current players? Can it afford
new entrants? What is the projected return on investment? In short, can
we see a business opportunity? Can we document it?
Only when these questions have been answered in a positive sense,
should the second round of analysis be started: Do we have the
technology to launch a financial network? Do we have the brains to set it
up? Are the computer-aided design tools available to us? the expert
system for the design? Gone is the time when the setting up of a network
based on multidrop lines called for pirating some modem specialists
from the local telephone company. Complex networks today require the
highest skill.
A modern, competitive, sophisticated financial network needs the
highest available skill to be technically successful. It also calls for first-
class management and maintenance. This is the third round. A
computer-based network control centre (NCC) must be set up. It should
operate in real-time with first-class diagnostics. The network must
measure its traffic. Not only must it be able to bill the user (whether
internal or external) but it must also provide the needed detail so that
these users can subsequently bill the service to their customers.
Competition is tough. The players in the development and operation
of financial networks are:
e telephone companies (Telcos)
e banks
The Role of Money: From Coins to Electronics 25
The point has been made that modern banking is information in motion.
This new way of thinking is characterised by the shift from paper money
to electronics. The latter is as important as the change from barter to
money which took place twenty-five to thirty centuries ago. The change
from paper-based financial transactions generally, and from paper
money in particular, to electronics is profound. It would have long-
lasting effects in the banking industry, as well as a noticeable cultural
impact. The problem is that:
e our thinking
e our attitudes
e our skills and - consequently
e our decisions
have not yet caught up with the new reality. Yet this is a professional
obligation.
A study made by a large American institution demonstrated that the
26 Implementing Networks in Financial Services
1962, IBM in the USA was dealing with more money from EAM than
from computers. Batch and Stand alone have had a long life-cycle, but
since about 1970 change has set in and the transition accelerated- as we
have seen in Chapter I.
Technology in banking sees to it that many of the difficulties
experienced by financial institutions relate to the practices and policies
of management in terms of unwillingness to invest in the company's
infrastructure. Precisely for this reason several banks have restructured
their organisation and through well-chosen investments in computers
and communications have seen substantial increases in earnings.
The views and experience of several different types of contributors are
normally essential to develop a balanced approach to the benefits to be
sought, as well as the practicalities of their achievement. There is also a
big profit in getting the fresh look and external experience that suitably
qualified outsiders can bring.
In moving from paper money to electronics, cultural change means that
the quality and level of thinking is vitally important when formulating a
new strategy. We must take a strategic view of major long-term business
opportunities and we need people able to do so.
Only when the cultural problem has been successfully approached,
can technical issues find meaningful solutions. Invariably, such technical
issues will involve networks, databases, telecommunications, central
computers, distributed resources, personal workstations- and a golden
horde of software support.
The reason why so much interest is placed on databases and networks
should be found in the fact that the market-place is catching up with the
changing landscape of supports, systems and checks necessary to remain
competitive. This challenges bank management. It also obliges them to
plan now for new services that can be developed under the current
regulatory structure, while remaining as the prevailing regulations are
dropped. The question is not whether banks have the capability to offer
their customers innovative services in a technical sense, but rather how
they can make such offering pay dividends. Banks have been innovating
for the last three decades: computers, private branch exchanges, MICR
(magnetic ink character recognition) and OCR (optical character
recognitioin), automated tellers, automated clearing houses, interbank
payment systems, cash and treasury management are some of the
examples.
Each of these developments has a specific reason (and applications
perspective) in the background. The first aim of electronic funds transfer
(EFT) has been to facilitate payments between businesses. This
N
00
z STANDSTAND
0
1- STAND
STANDSTAND
<(
~ 50% STAND
UJ
~
UJ
__J INDIVIDUAL
a.. STAND
~
STAND
25% STAND
STAND
STAND
STAND
1950 1960 1960 1965 1970 1975 19 80 1985 1990 1995 2000
Figure 2.2
The Role of Money: From Coins to Electronics 29
tion has aggressively ventured into the new field of interstate banking,
largely through the tactic of acquiring weak or failed savings and loans
companies which offer it the regulatory rights to operate out of state. To
open a branch on the merchandising floor, K mart simply makes room
among its pots and pans, sporting goods and small appliances for First
Nationwide to set up a tiny branch office- some 12 square metres (136
square feet), about 1/30 to 1/40 the floor of a standard, independent
merchandising outlet.
Other EFT-oriented efforts start at point of sale (POS) equipment.
EFT/POS allows customers to make purchases using the same card as
with ATM. The result is a payment alternative more convenient than
cheques or cash. The purchase amount is debited from the customer's
account and credited to the trader's account electronically. EFT/POS is
a communications system between customers, traders, and their finan-
cial institutions. The bank authorises the transaction, transfers the
funds, and sends a completion message back through the switch to the
store - typically, in seconds.
EFT/POS has been tried since the early to mid-1970s and for a good ten
years was in gestation. Today the system has grown both in terms of
terminal locations and technological capabilities, with an emphasis on
reliability. Both the range of supported services and their generalisation
can make EFT/POS appealing. To serve the latter aim, financial
institutions co-sponsor an EFT/POS network. This is a different way of
looking at the restructuring of their branch offices.
operative venture substitutes plastic cards for cheques and cash. The
switch, which is a computer facility, is owned by Interlink.
Preparation is the necessary prerequisite for making profits with
innovation. In the years to come, technological opportunities will be
increasing at a rate faster than our ability to absorb them. All of us, and
particularly those who have been involved in major high-technology
ventures, are victims of:
e slipping time-scales;
e scarcity in obtaining knowhow;
e overrunning budgets;
e teething problems.
There always seems to be a mismatch between the claims of suppliers
and the practicalities of implementation and use. Bankers are users of
technology. As users they tend to suggest that this is overselling- but
they would also do well to ponder whether they themselves have given
adequate consideration to the environments into which they are
introducing technology. We should ask whether our staff (and our
customer base) are able to absorb the new concepts and new thought-
processes. Have we done our homework in preparing them for this
mission? Have we considered in due form the changing work patterns?
Changing banking habits are part of the new emerging lifestyles,
encouraged by more flexible social and work activity, as well as
increasing familiarity with the use of new technology. These two are
forces influencing the switch to electronic banking- and the demand for
innovation at financial institutions. Bankers will be well advised to
realise that the currently ongoing innovation reflects only the first steps,
a timid beginning. There are going to be many more steps and a much
faster pace underlining the importance of a well-planned, sophisticated
financial network.
Since we are talking of innovation in banking it is correct to underline
that the concept was not born overnight. It has existed since the mid-
nineteenth century, though the focal point of innovation was different.
Let's take an example.
The American Express was established in 1850, when three indepen-
dent express companies merged. In 1882 the new company issued its
successful money order. In 1891 the traveller's cheque was born. In the
late nineteenth century M. C. Berry designed both instruments: the
money order and the traveller's cheque. His designs remained virtually
unaltered till today. Many banks pride themselves on being giro (money
order, direct debit) oriented. Besides influencing the habits of the
34 Implementing Networks in Financial Services
banking public, the financial instrument itself is nearly one century old.
Diners Club was incorporated in 1950. It immediately established the
principles of the worldwide credit-card industry. At American Express
the plastic cards were introduced in 1958. Visa was also launched in
1958. It evolved from BankAmericard.
e In 1966 Bank of America began to license other banks.
e In 1967 the Interbank Card Association (Ibanco) was incorporated
with seven founding members.
e In 1969 Interbank acquired the Master Card trademark.
e In 1974 Ibanco was extended to control the worldwide operation of
all licensed cards.
e In 1977 the Visa debit card was brought on to the market.
e In 1980 the name was replaced by Master Card.
e The premium Gold Master Card was introduced in 1981.
In 1968, Eurocheque was established to provide standard procedure
for cheque encashment. Eurocheque was enhanced in 1974 when banks
from six countries agreed to replace their local guarantee system with
uniform procedures. Eurocheque now constitutes a standard procedure
in about twenty countries, involving 8,000 banks. This, too, is a network
for financial service. It is charging for the facility which it provides. The
fee for uniform Eurocheque transaction in foreign countries is 1.25 per
cent of cheque value. When we charge for our services, the primary
criterion is not the absolute level of pricing but the quality of the service
which we offer. This sense of service quality has not yet entered the
banking culture. Yet its impact will greatly increase as time goes on and
competition stiffens.
In their innovation programme, banks have to reach specific targets.
The first challenge is image. Banks have to convince their customers that
their institution is reliable enough to carry all their relationships. The
second is performance. Banks have to deliver improved products and
new services if they want to keep and develop the client relationship. The
third challenge is low cost. Banks have to become not only innovators but
also low-cost producers and deliveres of services. The fourth is incentive.
What is in it for their clients? That covers everything from pricing to
packaging- but also the investment image and a dynamic sales effort.
The fifth challenge is able investment advice. The right advice on the
client's financial and investment issue makes up the background for
relationship banking. That is a key concept for the future.
These challenges represent a considerable departure from the practice
of the past. For money centre banks, three more issues must be brought
into focus:
The Role of Money: From Coins to Electronics 35
e international management
e internationally oriented research
e international sales
Financial institutions can achieve these objectives by establishing new
policies regarding managers, analysts, account executives- and covering
major financial centres.
A global strategy is a critical component in the expansion of
consumer, institutional, and international markets. Internationalisation
is more than simple geographical expansion. A bank must move
aggressively to increase its information coverage of markets which are
diverse and, sometimes, contradictory in their drives. This too is a
mission to be covered by the network.
3 Generations of Online
Systems
There exists a rather significant difference between the perspectives of
the late 1980s, such as the preceding two chapters have been discussing,
and those of two decades earlier when the online effort started. To
understand better where we are and where we are going, as well as the
opportunities and constraints which we are facing, it is always helpful to
turn to the past and look at how we started and what has been achieved
through steady effort.
Today we say that a major financial institution must provide its clients
with windows to international capital markets, monitoring opportun-
ities in:
e corporate finance
e asset management
e venture capital
e mergers
e acquisitions.
Bank management should look at these activities as opportunities to
promote two-way flows of capital, information and technology. This is
the spirit which allows the ground work for market leadership to be laid.
A dual commitment to internationalisation and client services
provides the bank with distinctive capabilities best suited to meet the
market demands of the future, which means with the needed competitive
edge. A properly organised computers and communications programme
reflects the goals to be achieved; is strong on project organizations and
management; has established the financial justification of ongoing and
coming projects; and places emphasis on timetables. The swift manner in
which the projects it involves have been moving ahead is a valid
reflection of the programme as a whole.
Once top management has decided to go ahead with the next
generation of information systems, the men entrusted with the job
should be conducting their mission in a concrete, unambiguous, and
well-organised manner. But management must be co-involved in order
to give its unqualified support to the project. That's the only way to
achieve results. At least that's what we say, and in some cases do, today.
However, these principles of action have not been present from the start.
36
Generations of Online Systems 37
- HIERARCHICAL
- 2 DEGREES REMOTE FROM USER
-DATA ORIENTATION
-OPERATING SYSTEM
- FRONT-END PROCESSOR
-POLLING/SELECTING
-COMMUNICATIONS SOFTWARE
AT DATA LINK
-NETWORK CONTROL CENTRE ( NCCl
level. That is, nearer to the end-user than could be ever achieved through
mainframes.
Figure 3.2 outlines the technical characteristics of the second
generation online system (2 GOLS). It is distributed, only one degree
remote from the end user, but the data orientation prevails. The range of
applications has been enlarged, but there are also other technical
developments.
-DISTRIBUTED
- 1 DEGREE REMOTE FROM USER
-DATA ORIENTATION
-OPERATING SYSTEM
- DATABASE MANAGEMENT SYSTEM
- FRONT -END PROCESSOR
-BEGINNING NETWORKS
-COMMUNICATIONS SOFTWARE AT X.25
- BEGINNING LOCAL AREA NETWORKS
-BEGINNING NETWORK CONTROL CENTR
The period over which the second generation online system developed
has seen the beginning of four major issues:
-PERSONAL COMPUTING
- FULL 'ENDUSER VISIBILITY
- DATABASE MANAGEMENT SYSTEM
- SYSTEM ARCHITECTURE
- NETWORK ARCHITECTURE
- COMMUNICATING DATABASES
- WIDE AREA NETWORKS-LOCAL AREA NETWORKS
-COMMUNICATIONS SOFTWARE,
e -
ALL 7 LAYERS ISO/OSI
- NEED ·FOR 8TH LAYER AND INTERCONNECT
FULLY SUPPORTED NCC
0:::=:;_-----f-----:J..J - RELIABILITY - BIT ERROR RATE
The project to be undertaken must properly reflect the size of the bank,
its network of branch offices, the clientele to which it appeals, the new
approaches to be chosen, the applications to be implemented, and the
services to be provided. For these reasons it is helpful when the
organisational analysis starts with the macrostructure and the aim to
streamline the structural issues incompatible with or contradicting the
implementation of a computers and communications network. Top
management should definitely be co-involved in this project, and
convinced of what needs to be done. This can be achieved through a top
management committee which supervises the systems development,
whether strategic, decision-making, organisational, or at the informa-
tion-handling level.
This approach helps ensure that the Information Systems (IS) projects
consider many facets, not only information-level studies, and that policy
making is not centred on hardware but on strategic approaches of a wide
breadth which affect:
e client services
e market orientation
e employment practices
e cost control
e customer number systems
e applications programming.
Such projects will influence the whole structure of the bank's accounting
procedures. Their impact will be just as great on management. Planning
is a major issue: through computers it can be handled at three levels:
strategic, medium-range, and yearly (budget) - with the objective of
automating the planning process.
A distributed information system should be designed to provide
management with the capability to improve control over costs. Con-
sequently, the programs must be concerned for total compatibility and
maximum usage of a common, though segmeted, database.
Generations of Online Systems 45
Data
-.¥
Processing algorithms
-.¥
Information
-.¥
Formatted management report (preferably graphics)
-.¥
Presented interactively to management
e is cheaper;
e means the user pays per bit of transport, not for lots of lines and
equipment.
52 Implementing Networks in Financial Services
e is adaptive;
e is applications-independent;
e has international standards to observe;
The results of this study were convincing. As a senior Vice-President
ofthe bank was to remark: 'We decided on a network which has a future,
because it is flexible. The system will stress on office automation and this
needs open-ended solutions.'
The bank's management firmly believes that the chosen packet-
switching discipline can be used for computer-based and office automa-
tion applications; that it can serve both clients and management in an
able manner. Management expressed the opinion that while 'Many
banks use data communications networks,' these in the general case are
obsolete because they are host-centred and dependent. Packet switching
is host-independent, and this constitutes a major advantage.
The investment called for by a private network was one of the crucial
factors in establishing the technical specifications. Both technical and
financial reasons made it clear that the network contemplated should be
able to handle any type of transaction, ranging from inquiry through
conversational operations to data entry. It should also be able to
connect with a minimum of complications to terminal systems, micros,
minicomputers and mainframes; and allow fairly easy interfacing with
other networks (Swift, telex network, etc.).
To permit broadcasting and narrowcasting capabilities, the network
has been endowed with the following software support:
54
Rethinking the Telecommunications Network 55
capabilities made available through the VAN. The user can also
effectively attach to other users, whether nearby or remote, using the
network as the bridge.
Internetworking is an increasingly necessary capability, supported
either by means of gateways or, much better, by means of network
compatibility. For this we need standards- even semi-standards; hence
the emphasis on the reference model defined by the open network
interconnection of the International Standards Organization (ISO/
OSI).
We must polish our concept, collect our statistics, develop our
specifications, select our supplies, design our network. In-house domes-
tic and international operations should be included. (See Chapter 5 on
Ubinet.) We must apply our criteria of cost effectiveness, require the
vendors to comply with them, and make sure that they serve our bank to
the utmost in terms of benefit. We must also address problems before
they become acute. We must carry this approach to networking and
beyond. This spirit of anticipating a problem before it becomes a crisis
situation has consistently showed its worth. It can avoid further
problems, and it has always proved to be sound financial thinking as
well.
(1) The physical layer is the lowest of all and describes the electrical,
mechanical, and functional interface to the carrier. Examples are
modems (modulators/demodulators) and cabling. Communica-
tions with distributed-access control depend on this level. The
carrier (transport medium) and the media access unit are the
sublayers.
(2) The data-link layer looks after data-flow initialisation, control, and
error recovery. The data-link layer is higher up than the physical
but is, at the same time, the lowest of the logical layers in a
communication. Data link handles channel addressing, error
detection, and transmission control. Its protocols are start/stop (S/
S) asynchronous and bisynchronous (BSC).
SYSTEM ARCHITECTURE
FACILITIES
FACILITIES FACILITIES
FACILITIES
>-
!:: FACILITIES
..J
<X
z Ul
~
~ Ul
~
NETWORK 0
u u
z STRUCTURE
=>
u.
0:
UJ
Ul
>
0
::E
UJ ..J
~ SOFTWARE 0
Ul 0:
>- SUPPORTS ~
(/)
z
..J 0
<X u
~
0
~ APPLICATIONS
PERSPECTIVES
\ I
\ I
USER
v
FUNCTIONS
Figure 4.1
SNAANDDNA
SNA and DNA are neither hardware nor simple software packages.
They are network architectures designed as total communications
systems. They are projected to grow in order to cover future communi-
cations requirements. Both network architectures converge design
practices, integrate facilities, promote resource sharing, and separate
logically independent functions, that is, data-link controls and end-to-
end data format protocols. They:
62 Implementing Networks in Financial Services
PRESENTATION LAYER
SUB NETWORKING
NUCLEUS
<PHYSICAL>
DATA LINK
X.25
GRAPHIC SETS:
NAPLPS, CEPT
Figure 4.2
SNA helps control native devices, manage local resources, and looks
after operator interfaces. It supports application programs both in a
networking and in a stand-alone capability. The architecture defines the:
e functional responsibilities of components within the communica-
tions system;
Rethinking the Telecommunications Network 63
e The first is the integration of voice, data, text and image over the
same network.
e The second is interactivity.
If sender and receiver are taken as the basic frame of reference, not all
messages are of an interactive nature. This is true even of voice: a study
by AT & T has documented that about half the voice communications in
a business environment are basically one-way messages: informing
somebody or giving an answer. From this simple finding derives the
concept of voice mail.
Yet we all know that the frame of reference has changed. Interactive
communications should no longer be seen as between two parties
(whether men or machines) but, rather, between the user of information
and the information stored in a text and database (TDB). Even
controlled data collection calls for an interactivity with the TDB. The
interfaces must be user-friendly, so that executives can learn to use
interactive systems in only minutes, and have the information represent-
ed to them in a graphical or textual form, at their choice. The system
should help monitor business operations, run simulation models, help in
day-to-day decision making. It should offer assistance to the man with
the problem.
Using a flexible database management, transparent to the non-
specialist, the system must allow managers and professionals to consult
directories or pick up references simply by touching the appropriate keys
on the keypad. As they have available an editing terminal, the function
generator should display data as figures or graphs (at the user's choice);
store graphs in memory; move on to other application programs, and
obtain a flexible user-directed output.
The distributive aspect of the interactive network minimises risk if
single outage occurs; reduces restart time after the problem has been
corrected; brings into perspective the wisdom of standardisation of
software to limit development cost; and assures a greater flexibility in
adding other applications, as the requirements develop.
Any network can be both physically and conceptually decomposed
into four basic components:
66 Implementing Networks in Financial Services
(2) Text and data processing (TDP) is concerned with the use of
computers for processing information. The semantic content, or
meaning, of input data (and text) is in a way transformed through the use
of stored programs (or firmware) which act on the information: add,
delete, sum up, abstract, or perform arithmetic and logical operations.
Storage and retrieval (initiated by TDP) takes place for other than S & F
purposes, and the output constitutes a programmed response to the
input.
A machine's capacity for data processing is measured in million
instructions per second (MIPS). This is not an absolute measure and
other factors such as system architecture, vertical and horizontal
microcode, array design and pipelining can influence machine perfor-
mance. But it is a useful standard both for evaluation and as a frame of
reference. If we keep the price of computing as a constant, the effect of
technology will result in significantly higher instruction-processing
rates. Improved price/performance ratios will extend the capability of
computer systems to new applications and it is in this sense that we are
talking of a significant evolution in text and data processing including
the handling of noncoded information: interactive graphics; voice input,
image character recognition, electronic mail and voice mail.
(3) The text and database (TBD) An impressive growth in storage
capabilities can be put to work in handling the global text and database.
It is the organised, orderly connection of information elements designed
in an application-independent manner to serve man - information
communications purposes. The elements (bytes, fields, records, whole
sections of the database) are the building blocks of the TDB.
A message is a file in the text and database. Files and messages must be
Rethinking the Telecommunications Network 67
Between the challenge of the user-friendly solution and the fairly well-
known issues connected with data processing lies the communication
network, as well as the properly projected database capability able to
accommodate text, data, image, voice, and the needed vocabularies.
This system must provide complete information security.
The joint working meetings stressed the technical issues involved, after
the managerial aspects and the banking perspectives had been dealt
with. These issues were: to settle the details of the network architecture;
to define the systems architecture; to establish the applications perspec-
tives and their integration; to define the database and its distribution; to
work out the approach to retail banking at the branch level; and to
establish the principles of wholesale clients' handling at the central level.
In terms of work assignment, whatever depended on operational
procedures, configuration control and troubleshooting was developed
by the bank. The basic software was made by the manufacturer,
including detailed specifications, add-on software, and integration
testing.
5 UBINET, the Worldwide
Network of the Union
Bank of Switzerland
The first four chapters outlined the reasons why high technology affects
banking, while- at the same time- the sophistication of banking services
calls for further advances beyond the frontiers of current knowledge.
Within this highly competitive environment which is in steady evolution,
a financial institution finds it necessary to invest in communications and
in computers in order to preserve its biggest assest. The biggest assets of
a bank are not in its balance sheet. They are its customers, its people and
its technology.
Sophisticated customers steadily communicate with the bank's
professionals. That is why financial institutions build networks. They
help to increase effectiveness and lower service-handling costs. They also
make feasible online connection between the bank and its customers;
allow value-added services; and permit the bank to show value differen-
tiation over its competitors. That is the way the Union Bank of
Switzerland (UBS) looks at financial networking.
But cost effectiveness is not forgotton. The more sophisticated the
data-processing applications (Abacus, MOSS) the more they develop a
large amount of communications requirements. Among financial
institutions, Abacus has been one of the first integrated implementations
in data processing. 1 The Central Information File (CIF) has been its
pivot point. CIF not only serves the client database but is also the
infrastructure for client account handling. Among other Abacus
subsystems are online transaction processing, general accounting,
securities administration, stock exchange, foreign currency and
payments traffic. They are all handled interactively.
The concept of a Management and Office Support System (MOSS)
was developed at UBS in the mid-1980s. High technology saw to it that
personal computing could be done at an affordable price. UBS was
among the first banks to take advantage of that fact. In a nutshell, Phase
1 of the MOSS effort centred on supporting the UBS international
The system architecture we are adopting today and the value differentia-
tion which we do must make sure that our computers and communica-
tions will store, transport, retrieve and present in a user-friendly manner
vast amounts of text, data, graphics, image and voice messages.
e These will refer to our clients, our markets, our products and
services, our competition, our suppliers.
UBINET, Switzerland 73
HIGHER EFFICIENCY,
LOWER COSTS
IMPROVED
RELIABILITY
FACILITIES
FACILITIES
FACILITIES
GUARANTEED
SECURITY
Figure 5.1 Higher efficiency and lower costs require the proper infrastructure
74 Implementing Networks in Financial Services
SENIOR MANAGEMENT
MIDDLE MANAGEMENT
AND PROFESSIONALS
TRANSACTIONAL
OPERATIONS
UBINET
H UBINET-SNA
I
UBI NET-DCA
- U BINET-INTERNATIONAL
f--- UBINET-VOICE
y UBI NET-INHOUSE
ever more complex public networks. This trend is caused by the desire of
organisations to increase productivity, especially at the white-collar
level.
UBS management is aware of the fact that in the 1990s, telecommun-
ications will be to business, industry and finance what distributed data
processing was in the 1970s and personal computers in the 1980s. Top
management also appreciates that the demand for value-added services
can be expected to soar since high technology in telecommunications
will be used:
e as a cost savings mechanism;
e for strategic, competitive purposes.
When coupled with deregulation, the development of advanced net-
works will increase the incentive to invest in additional features,
including sophisticated, non-commodity equipment and software. The
overriding need is to use large-scale computers and communications
systems for excellence in customer service.
(I) UBS clients The decision has been to offer services to the client
base in the most effective manner, both in absolute terms and in
regard to competition, in all areas of operations.
(2) UBS employees Sophisticated clients depend on communications
- and so do the employees and the bank as a whole. High
technology should be at the service of both clients and employees.
That is the sense of personal computing.
(3) Communications, computers and artificial intelligence A leading-
edge organisation must move far beyond DP and WP (word
processing) into environments enriched with expert systems. The
emphasis is on immediate implementation of artificial intelligence
technology in a practical, useful sense. The application of informa-
tion technology in general, and of AI in particular, should help in:
(4) Swamping costs Technology should be used to produce
individualised services at low costs. This should definitely be a
fundamental goal.
As old man Rothschild advised his sons before dying: 'In life it is
better to be rich, happy and healthy, than poor, miserable and ill.' The
message is applicable both in a personal and in an institutional sense.
The four strategic issues we have just outlined are the key to its successful
application.
STEERING
COMMITTEE
CONCEPT
TEAMS
I I I I
CONCEPTS FOR DOMESTIC MANAGEMENT INTERNATIONAL TELE-
BANKING OPERATIONS AND OFFICE COMMUNI CAJ IONS
OPERATIONS
AUTOMATION <TRANSACT I ONAU SUPPORT SYSTEM STRATEGY
'- -
-DOMESTIC APPLICATIONS
- MANAGERIAL SUPPORT
-INTERNATIONAL
APPLICATIONS
- TELEBANKING
00
Figure 5.4 Design organisation for computers and communications at UBS
82 Implementing Networks in Financial Services
having to change the software and reinvent the wheel. This is the true
sense of an open environment, and the fact remains that it is not properly
supported through current offers. Manufacturers of computers and
communications are simply not tooled to provide wares fitting an open
environment.
There were other interesting findings in the course of the UBS
networking study. The associated analysis and design have themselves
been executed in two rounds: the first was: request for information; the
second, request for proposals.
The first round was quite helpful on three counts: first, it established
what exists in the market that could satisfy the communications
requirements as defined by the systems specialists ofUBS. By so doing, it
helped focus the request for proposals on solutions which could be
immediately available for implementation.
Second, the request for information phase permitted the limitation of
the range of alternative suppliers, As a result a more detailed analysis
could be done on those proposals retained for further investigation
during the second round.
Third, the market responses from the first round put in motion an
important process of tuning the interfacing and interaction between the
communications study and MOSS. This fine-tuning concerns data
processing, databasing, and networking. It has been further perfected
during the second round (request for proposals) as some of the vendors
bid both on the projected UBS network and on MOSS. In this manner,
in parallel to the elaboration of networking solutions, the definitions
necessary for the MOSS architecture were prepared.
Four different solutions came up for the final decision. These were:
e Sperry (Sperry proprietary solution, including Sperrylink);
e IBM-hosts plus Nixdorf branch computers and workstations;
e IBM-hosts plus Wang branch computers and workstations;
e IBM-hosts plus IBM workstations.
------ ------
------
------
------------
PERSONAL
PERSONALPERSONAL
PERSONAL
PERSONAL
PERSONAL
PERSONAL
PERSONAL
PERSONAL PERSONAL
PERSONAL
PERSONAL
DEPARTMENTAL
CENTRAL
CWSJ
-------
SW/HW PERSONAL
PERSONAL
,A"
( )( )~I B~
I I
PRE 1987 ESTABLISHED PLANTI 1987 1990 1993-95
PHASE 1 PHASE 2 PHASE 3
Figure 5.7 UBINET in-house migration path 1.0
92 Implementing Networks in Financial Services
supporting through software five ofthe seven ISO/OSI layers (up to and
including session control). This runs on coaxial cable.
Table 5.2 dramatises transmission capacity growth which took place
in the first nine months of 1987 in connection to the domestic network.
This is also a good example of the optimisation of tariffs- provided there
is demand for communications services to meet the higher capacity goals
of the data pipe. A 64 KBPS circuit offers 667 per cent greater
bandwidth than the now classical9.6 KBPS, but costs 250 per cent more
money. Thus a greater datapipe can be obtained on isocost basis at a
ratio of 2.67: I, on the premise that the network is managed in a way to
anticipate growth. Typically such growth is driven by departmental and
personal computing demands.
Circuit optimisation can be carried also to the level of the 2 MBPS
datapipes which, as stated, support 30 channels of 64 KBPS each.
Prevailing tariffs stand at I 0 times the 64 KBPS cost. Hence, even by
using only one-third the 2 MBPS bandwidth, there can be an economic
solution. Such an approach does however require a thorough technical
and economic study.
UBS has currently under development a metropolitan area network
UBINET, Switzerland 93
Installed as per
Line speed 1.1.87 1.1.88
no surprise that the X.25 road was chosen as the primary avenue ofWS
connectivity, as we have already seen in Figure 5.7.
Not only connectivity criteria but also other considerations have to be
taken into account in making strategic choices. For instance, the
building distribution system must be independent of the equipment it
serves and still be capable of interconnecting different communications
devices. For example: analog and digital switches, text and data
terminals, host computers, and so on. It must also be flexible with regard
to handling and moving workstations as operational requirements
impose. Given that the building distribution system should support
voice, text, data and graphics applications, the telecommunications
specialists of UBS recommend use of a star topology which can be
grouped into five subsystems:
e backbone or riser;
e horizontal wiring;
e backbone closet;
e workstation wiring;
e equipment wiring, including the main telecommunications equip-
ment room.
The backbone subsystem provides the main cable routes in the building
and consists of a combination of standard twisted pair, optical fibre and
coaxial cabling; also associated support hardware: broadband or
baseband local area networks (LAN), or, for dedicated links, solutions
like IBM host-to-cluster controller.
Particular attention has been paid to the gateways and therefore to the
PBX. With voice orientation in mind, the product choice has been in
principle: SL/1 and Meridian by Northern Telecom; MD 110 by
Ericsson; and ECS 10000 by Siemens - following the request for
proposal to which reference was made in the opening sections of this
chapter. The criteria used for choice have been:
e technical
e vendor-oriented
e financial.
In terms of the PBX evaluation technical criteria included: cabling (2
wires, 4 wires for digital telephony); voice/data integration; 2 MBPS
possibility (PBX to PTT central office); reliability (MTBF, MTTR);
restart/recovery (particularly in connection with software); multitenant
service. Under the last heading were considered tenant groups by
number oflines, as well as functionality, for instance, one operator for
96 Implementing Networks in Financial Services
NCC COMMUNICATIONS
TRANSPORT
-NETWORK ARCHITECTURE
Figure 5.7
-GATEWAYS
-PUBLIC AND PRIVATE LINES
- LONG HAUL NETWORK
-LOCAL AREA NETWORK
-PBX
-MODEMS
98 Implementing Networks in Financial Services
99
100 Implementing Networks in Financial Services
tions and computers aggregate which finds its analogy in the telephone
network: each individual device can contact and establish links with any
other device connected to the same network. Unlike elsewhere, the
software is in place. That's what makes the difference.
Figure 6.1
of the results did not show till the third generation online system. Once
the wheels were put in motion, the new financial landscape followed.
These references are important in as much as they provide the
background for the automation of payment systems which, quite
evidently, comes in stages. At the consumer level, Japanese banks
invested in automated teller machines not only to rationalise the
banking business and reduce costs, but also to cope with the cash-
oriented behaviour of the Japanese consumers. Today, Japan has more
ATMs than most other countries in the world, both in absolute numbers
and per capita. Financial institutions have installed A TMs in all of their
branch offices. Joint utilisation of ATMs is also widespread.
The popularisation of A TM has played a major role in the spread of
direct deposit of payroll.
e Wide use of direct credit.
e pre-authorised direct debit and
e debit/credit cards
reduced the everyday carrying of cash by Japanese consumers. The
Japanese credit public acceptance of direct debit had two aftermaths:
first, a greater efficiency than collecting cheques; second, the utilisation
102 Implementing Networks in Financial Services
of bills whose settlement dates are fixed. This minimised the problem of
cheque float, and made it easy to switch from the use of bills and cheques
to credit transfers through the banking system.
Such are the background factors which propelled telecommunications
in banking for financial payments in Japan. Technology has, of course,
had its impact.
MANAGEMENT
MANAGEMENT
MANAGEMENT
MANAGEMENT EXTENDING
MANAGEMENT
MANAGEMENT MANAGEMENT
OF
MANAGEMENT
MANAGEMENT
MANAGEMENT
MANAGEMENT
MANAGEMENT
MANAGEMENT
MANAGEMENT
MANAGEMENT MORE
MANAGEMENT EFFICIENT
MANAGEMENT
MANAGEMENT MANAGEMENT
Figure 6.3
Four Generations of Payment Systems in Japan 107
zwzw Ul
a!::!
a!::! w <!)
-u.
-u.
1-U.Ul
1-U.Ul w ..J z
<Xotn <X <!)
<Xotn 1-<!>
<XZ Ul wz a.
N N W
a:- a.
-::J:Z
-::J:Z ~- 0
..Ju-
zw..Ju- o:.:: lL 0:.:: ::J:
<XzUl<XzUl a.z 0 ::J:z
a!::! <X Ul
Z<t:::l
-u.
oa:co
1-U.Ul
a: <X
ceo .... CD w
u z ...J
....
-CD<Xotn
N
<XU. 0 ....
UJ
a:o
-::J:Z a.
..Ju-
<XzUl
Figure 6.4
The direct debit system was first adopted in Japan in 1955, when NTT
introduced it as part of its rationalisation of telephone bill collection.
Since 1963 it has been applied to the payment of public utilities bills,
including water, electric power and city gas, as well as television fees.
By late 1986 more than 80 per cent of telephone bills, 78 per cent of
electricity bills, 74 per cent of gas, 65 per cent of the water service and 64
per cent of TV fees were paid through the direct debit services offered by
the Japanese banks. This simplified not only payments but also
collection. As it is practised in Europe, enterprises such as NTT and
power companies, instead of sending bills directly to users, present the
bills to banks in which users have accounts. Acting upon requests from
users (depositors), given appropriate authorisation, the bank debits the
amount equivalent to the bill from the depositors' accounts
automatically.lt credits them to the deposit accounts of the enterprises.
The direct debit system is also widely in use for monthly repayment of:
e housing loans;
e credit card bills;
e insurance premiums;
e payroll credits, automatic transfers of various types of dividends;
e payment of pensions, and so on.
The spread of direct credit of payroll has produced a big impact on the
settlement system as a whole.
In Japan the real success story in customer transaction systems is
110 Implementing Networks in Financial Services
TRANSACTION T
TRANSACTION
R
- FOREIGN
A
EXCHANGE
N -SECURITIES
TRANSACTION TRANSACTION
s -LOANS
A - PORT FOLIO
TRANSACTION
MANAGEMENT
TRANSACTION DECISIONS c - OTHER
T
TRANSACTION
0
TRANSACTION N
TRANSACTION
Figure 6.5
ACCOUNT
ACCOUNT
J
YOUR
ACCOUNT
ACCOUNT
ACCOUNT
I
I c
............
KEYPAD
ACCOUNT
ACCOUNT
CARD
READER
I
SETTLEMENT OF PAYMENT RECEIPT
At the same time, the area where traders benefit the most is not the
payment side itself, as Japan is a cash society and there is very little
cheque fraud. The major benefit from an advanced-type application of
computers comes from zero inventories and the implementation of an
integrated system from receipt to check-out, as well as from the online
connection to suppliers and the automation of buyers' lists.
EFT/POS is not the only technology still behindhand. Also difficult to
materialise in Japan (as everywhere else) is home banking. 'Financial
products for end customers are not as diverse as they should be,' a senior
banker told me. 'Furthermore, consumers prefer savings accounts and
need simple, easy ways of dealing with the bank.'
electrical request) made full use of audio response and speech recogni-
tion technologies through telephony. In so doing, it helped automate
such services as advice to customers and enquiries from customers,
which formerly were performed by bank staff. Today, conventional
audio advice and enquiries regarding bank transactions are provided for
many types of client guidance. Such information primarily involves
moments of funds (debits, remittance, transfers) and balances.
ANSER has grown to a nationwide network, realising improved
customer service and helping the banks rationalise their business. At the
bottom line are labour savings and better client service.
The following are milestones in the development of the ANSER
system:
e August 1981: Service in the Tokyo area. The terminals are touch-
tone telephones and data telephones.
e December 1981: Voice recognition service. The terminals are dial
telephones.
e March 1983: The voice recognition service is offered in ten cities
in Japan.
e March 1984: This service is extended to cover thirty-five cities
throughout Japan.
e Apri/1984: A value-added feature supports facsimile terminals.
e December 1984: An experimental INS model system is set up for
home banking, using Captain (character and pattern telephone
access information network system) terminals. Pay-by-phone is
added.
e March 1985: This service is extended to cover seventy-four cities
throughout Japan.
e January 1986: Personal computer terminal service began m
Tokyo and Osaka.
Technologically speaking, ANSER is basically composed of
individual menus for advice from banks to customers, as well as queries
from customers to banks. There are forty-six types available, so that
each bank has a free choice to suit its particular needs and those of its
clients.
ANSER services (Figure 6. 7) cover a diverse spectrum including
terminals that customers can use: dial, touch-tone, data telephones and
facsimile. Table 6.3 sums up the facilities which are being supported. The
system connects online computers of the financial industry and NTT's
ANSER centre by circuitry. Service is provided to seventy-five cities
throughout the country. Bank management selects the cities it wishes to
use the service.
STRUCTURE OF ANSER NETWORK
0 '\
-
SERVICE THROUGH ANALOG TERMINAL
DIAL
[ TELEPHONE TOKYO
AUDIO
TOUCH-TONE TOKYO
TOKYO
jDATA ANSER CENTER
PRINT
LTELEPHONE
MERCHANT
MERCHANT
FACSIMILE TOKYO
IMAGE [ PC
CENTER
MERCHANT
CAPTAIN VTX
MERCHANT
CENTER TOKYO
TOKYO
CENTER
SERVICE THROUGH CENTER CENTER
DIGITAL
CENTER CENTER
TELEPHONE
CENTER
DIGITAL
IMAGE
FACSIMILE CENTER
CENTER
MERCHANT
MERCHANT
CAPTAIN VTX CENTER
CENTER
CENTER
CENTER CENTER
CENTER
MERCHANT
MERCHANT
MERCHANT
Figure 6. 7 Structure of ANSER network
Four Generations of Payment Systems in Japan 117
A Terminals
e Dial telephone
e Touch-tone
e Data telephone
e Facsimile (Gil, GIII, mindfax)
e Captain terminal (videotex)
e Personal computer terminal
P Services
I. Transaction advice
1.1 Remittance advice
1.2 Collection advice
1.3 Automatic withdrawal advice
1.4 Transaction processing
1.5 Details on credit and debit
1.6 Details on credit only
1.7 Details on debit only
2. Information and guidance advice
3. Transaction queries (remittances, collections, automatic withdrawals,
credit and debit particulars)
4. Repeated transaction enquiries
5. Queries on account balance (same day, previous day, the last day of the
previous month, etc.)
6. Remittances and transfers (to another account, same bank, or different
bank)
, - - - - - - - -ANSER
---------l
I AUDIO RESPONSE I
I AUD 10 RESPONSE CONTROL I BANK
1 EQUIPMENT TDIII\IC:IIrTII"11\I EQUIPMENT 1 COMPUTER
I C\MI"''""'""'"'IIVI"t QUERY
r
I QUERY I DATA
I RESPONSE '\
I QUERY
le -
<I TO QUERY I REPLY
I REPORT OF ICOMPLETION
~ COMPLETION I CONFIRMED '
I '\
I
I I l!t
I I '~
L _ _ _ _ - - - - - - - - - - - - - - _J
I
' ,_, ,.
'-
DATABASE
li'inuro F.,. ~ Prni'P~~;na nf tPIPnhnnP lliiPriPs '- ~
- - \0
-
120 Implementing Networks in Financial Services
Bank
computer ANSER Customer and audio input/output
centre
Call centre
This is the xxx Telephone Service Center. Please say
your code.
Input service code.
~-- You are enquiring about a transfer. Please state your
branch number.
Input branch number.
~-- Please state the type of account and account number.
Input type and number of account.
Please state your secret code.
Input secret code.
~-- Please state the number you want.
-----+- Input desired number.
121
122 Implementing Networks in Financial Services
SUMITOMO BANK
CLIENT CHOICE
w
cr
::::>
1- BRA INS
u
w
1- MULTI MEDIA
:J: SUPPORT
u
cr
<!
INFRASTRUCTURE BY
SUM ITOMO BANK
PRODUCTION RANGE
Figure 7.1
Media
Personal Data
Services computers Facsimile Telex Telephon
Transaction iriformation
Transfer, credit entry 2 2 2 2
Credit/Debit entry 1 2 2 1
Balance (chequeing and savings 1 1 1 1
account)
Details of time deposit 1
Details of foreign transactions 2 1
(import/export bills, etc)
Advice on export 2
Data transmission (payroll, local 2 1 1
tax, etc)
Securities information
Market price info/bonds 1 1
Short-term financial information 1 1
Surnitomo's advice/bonds 2 2
Economic and financial data 1
analysis chart 1
Investment analysis info. (yield, 1 1
spread)
International financial
Market, major currencies FX 1 1
Interest rates 1 1
Sumitomo's FX quotations 2 2 2
Today's Tokyo FX market 1 1 2
International FX money market 1 1 1
Impact loan rate 1 1
Foreign currencies deposit rate 1 1
associated services they will call for. The corporate market would
benefit. Since the PC is jud~ed too expensive for home banking and
clients will not pay for the service, Sumitomo does not offer it to the
public. But it works on a very low cost, terminal to market, at less than
10,000 yen (about $60), and ensures not only queries on debits/credits,
but also integrates the IC card ofCassio. The Sumitomo is thinking that
the low-cost solution is the better approach for consumers. The current
device is aimed at mid-range clients: low device cost, low service fee, is
the guideline. Parallel with this effort, there is intensive marketing: 'In
developing new media we first must assure good market size,' a
Sumitomo executive said.
At the branch office level, Sumitomo is working to make AI available
for advice to clients. Among the applications are:
(1) Simulation and optimisation of individual's fund.
(2) Judgement required for loans the bank makes to clients.
(3) Other branch level implementation, for instance, operations
control.
MITSUBISHI BANK
The Mitsubishi Bank has 250 branch offices in Japan and 8 million
accounts. It handles 1.5 million transactions per day and masters 1,400
ATMs online. Its active database stands at the 375 gigabytes online.
Optical disks are being used for personnel filing and for the management
of the documentation centre. The current programming library involves
20 million lines of code; 600 analysts and programmers expand and
maintain it. Among the upcoming problems is the development of an
intelligent database structure through the use of expert systems.
Costing is another area of leadership, leading toward the restructur-
ing of the front-ending operations to the client base. Figure 7.2 gives an
example at the branch office level. A bank-wide reference is the
aggressive selling of electronic banking.
A top priority today is the completion of the third generation online
system. As we underlined, the integration of the different lines of
banking business (current accounts, loans, portfolio, foreign operations,
overseas and so on) has already been covered by 2 GOLS. The third
generation has brought as services:
(1) The conversion of all account processing into online. Here the
ambitious goal is to practically replace 65 per cent or more of batch
activities.
(2) Connection to external (client) network to promote electronic
banking. Current supports offer and receive information to/from
client, provide security indexes retrieved from anywhere in Japan
public database information and so on. This means about 100 large
public databases and many of smaller size.
I TREASURY I TREASURY
TREASURY
BRANCH
MANAGER
I SALES GENERAL
- VARIETY OF TRANSACTIONS AFFAIRS
~ OA FOR INFORMATION
PROCESSING ~--____._-___,
-50% TO 80% OF MANAGER
VERIFICATION ARE POSSIBLE
AT TERMINAL PROCESSING
~MEANS GOAL EXPERT SYSTEMS
Figure 7.2
-..c> IMPLEMENTATION
N
-.1
-
128 Implementing Networks in Financial Services
e expanding capacity;
e improving worldwide security;
e providing back-up routing
Already the current dealing room implementation sets out to satisfy the
varied needs of customers. Apart from greater efficiency, the goal of the
global dealing room is to enable the Mitsubishi Bank to enhance its
international status.
Circuit capacity exceeds 600 lines, providing a basis for further
expansion. But the more significant increase in capability will be the
incorporation of artificial intelligence, to which reference has been
made. The inference construct under development runs on a Cray
computer, one of the largest presently available in terms of computer
power.
Finally, since 1985 the Mitsubishi Bank has been doing two
experiments in Tokyo with the IC card. Some 3,000 cards have been
issued with 200 read/write units. The 1987 evaluation was not in favour
of the IC card. Reaction has not been positive, one of the major
questions being standardisation.
(1) It was the first bank to hit one trillion bytes of disk memory
online. As of September 1987, Dai-Ichi had 400 drives of 2.5 Gbytes
each. This enormous database was running under four database
management systems (DBMS): AIN (Fujitsu); ADN; (Hitachi) and IMS
and DB 2 (IBM). Dai-Ichi was also actively using optical disks, still on a
test basis, stand-alone. The first online application started at the
branches in 1987. Management considered the trillion-byte disk
memory as the necessary transition to effective use of an online
environment with corresponding elimination of magnetic tapes. In 1983
Top Performers of Japanese Banking Industry 129
the number of magnetic tapes handled per day was at the 3,000 to 4,000
level. In 1987 it was half that number.
NETWORK
NETWORK
VTX
NETWORK
NETWORK
NETWORK NETWORK
NETWORK NETWORK NETWORK
*DIGITAL DATA EXCHANGE
Figure 7.3
Top Performers of Japanese Banking Industry 131
At the Fuji Bank, the term electronic banking has been used for about six
years. During that time it has conditioned management thinking. It has
also helped to explain the third generation online system and its
functions.
w
N
-
Table 7.3 Electronic banking for business and households
Communications media
Mainframe Personal Facsimile Telephone Videotex
computer computer terminal
Electronic funds transfer + + + +
Financial information services
Interest rates information + + +
Foreign exchange information + + +
General finance & monetary information + + +
Business & investment information - +
Transaction data reporting
Credit advice + + + + +
Account transaction detail + + + +
Foreign exchange transaction detail + +
Account balance inquiry + + + +
Batch data receiving service
Direct crediting of wages and salaries + +
Payment and transfer + +
+ indicates supported services
- indicates non-supported services
Top Performers ofJapanese Banking Industry 133
Even the expert systems which are chosen for first implementation -
loans, investment advisers- are there to give a high level sophistication
to customer services.
Something similar can be written on the automation of software
development. 'Everything today is highly mechanized, but software
development is largely manual. AI will be used very much for software
development,' stated the Fuji Bank executive.
Top Performers of Japanese Banking Industry 135
SANYO SECURITIES
At Sanyo Securities, the focal point has been the use of artificial
intelligence in promoting its competitiveness in the market. Develop-
ment work is done by a wholy owned subsidiary, Sanyo Extended Data
Systems, which also has the responsibility for all data-processing
activities. 'We have many offers from IBM and other companies to
install expert systems for us,' said an executive, 'but we chose to take our
own road. If we define as an Enduser Expert System one the broker can
work with, then we have SIRNIS.'
SIRNIS stands for Sanyo Investment Research New Information
System. It is a front-desk system, not for the back office, though the
back-office itself is highly automated.
e At Sanyo one marketing executive has only 0.6 back-office persons
for support.
e At Merrill Lynch, for every front-desk salesman, there are about
2.0 back-office operators.
The difference between 0.6 and 2.0 is made up by advanced information
systems design and expert system support.
Sanyo Securities' top management is highly oriented to online
interactive implementation. The Chairman has a WS on his desk, and he
established the policy that every executive must have and use an
intelligent WS. 'It is a matter of corporate culture,' he emphasised in
talking to one of the authors.
The President of Sanyo Securities is in his early forties, a graduate of
Keo University and computer expert. He was instrumental in establish-
ing the expert systems culture. Sanyo is the only security house whose
president is a computer expert. 'At our company, we try to increase the
number of marketing and front-desk people,' a senior executive
suggested, 'to help the client and sell security. The number of customers
who visit our offices is growing very fast. With SIRNIS, even less-
experienced operators can give consultation advice.'
To sign on SIRNIS, the user must employ both his identification and
his password. Then he accesses a menu featuring fourteen services which
divide into two main groups:
R: Stock issues
B: Bonds
G: Sokoneken (a system provider of the same group)
S: Investment selection system (SISCO)
F: Futures
P: Portfolio
T: Telequote (given by Tokyo Stock Exchange)
K: SOR (SIRNIS one key request for abbreviation)
(2) In-house communications system
L: Electronic mail
C: Spais (Customer information system)
D: TDOS (Sanyo directory)
variation is analysed. The stock diffusion index varies between 0 per cent
and I 00 per cent. Three bands are defined:
e 80% to 100%
e 20% to 80%
e 0% to 20%.
If the individual stock fluctuation is kept in the 80 per cent to 100 per
cent band no action is taken. But if it drops just below 80 per cent then
this is a sell signal. If it keeps between 0 per cent and 20 per cent it stands
low. But if it breaks over 20 per cent then this is a buy signal.
This expert system runs on an IBM 3090 with VF (vector facility);
hence it is a large-scale system. Top traders from Sanyo Securities and
the Sanyo Investment Institute activity collaborated in the knowledge
engineering work.
The Sanyo Investment Institute has also been active in the develop-
ment of other expert modules regarding indexes integrating into
SIRNIS. For instance, COMRES for investment analysis. It forecasts
stock prices four months from now. Within a given range and
established confidence intervals, this four-month forecast has proved to
give 70 per cent accuracy. Its expertise focuses on the Tokyo Stock
Exchange and addresses 18,000 stock issues.
Also impressive is the Radar Chart (Figure 7.4) for individual
company performance. It evaluates any chosen corporation against the
industry to which it belongs, taken as a whole, and against itself over a
given period. The criteria (axes of reference) are:
RADAR CHART
OVERALL
PERFORMANCE
I
I
I 19B7
I
I
I
I
I
I
I
STA BILl T Y
this analysis, through Sanyo's database. This analytical service, like the
AI constructs which were described, is available only to Sanyo
executives. But some of its graphs can be provided to customers through
the marketing people of Sanyo.
A simple but effective analytical online service is ranking of stocks.
This system focuses on the 100 top companies who incur increasing
profits. They are listed automatically and the list is kept up to date.
Another expert system, Passport, was developed for individual
investors. It runs on PCs and started operating in April 1986. It gives
advice and also accepts orders for stock as input. Passport is capable of
Top Performers of Japanese Banking Industry 139
•• portfolio
data
•• news
stock
•• funds
mail
• splits .
Finally, Sanyo Securities has an expert system in operation designed
for profit and loss calculation in stock selling. Examples of its expertise
are:
e buyjsell stock recommendations
e project trend
e commissions and tax.
It also calculates minimum price to avoid incurring loss. Prices, tax and
commission rates are steadily updated.
While these references are all applicable in Tokyo today, a similar
implementation to SIRNIS and Passport will be operated by Sanyo for
the New York Stock Exchange. In Tokyo the system operates twenty-
four hours per day, 365 days per year.
Just as important is Sanyo's push in global networking. Today its
customers work online to its database through PCs. The information is
free of charge, provided the client keeps a reasonable account. The
minimum basis is 3 million yen (less than $20,000). Automatic bank
transfer is included, through an agreement with the Mitsui Bank.
~-----------HORIZONTAL VAN------------.,
I
I
INFORMATION I
I
I CENTRE
I I
I
COMMUNICATIONS COMMUNICATIONS I
CENTRE CENTRE I
I
I
I
r --------------------------------1--,
~~!!
L _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ - - - - - - - - - - __ _j I
I
I
• RETAIL SALES I
e MANUFACTURING • TRANSPORT I
e DISTRIBUTION • WAREHOUSE
I
• SERVICE • WHOLESALE
• COOPERATIVE
I
L _______ -- ---VERTICAL VAN- ___________ _j
All account executives are attached to the Nomura network, each with
his workstation. The system is being expanded so that every employee
will have his WS. The dual goal of the new design is to:
(I) Develop the best system for account executives, managers, profes-
sionals.
(2) Integrate all information sources into one intelligent terminal -
both in-house information and outside information (financial,
market data).
142 Implementing Networks in Financial Services
The new implementation will feature several types of WS: for traders,
analysts, managers. These will be enriched with expert systems.
NCC already has expert systems in production. At least two were
identified:
'Since we believe this is very important for the future we work with great
interest in this field,' underlined a senior NCC executive. 'We also train
our people in expert systems, both in Japanese and in American
U ni versi ties.'
In network design, the goal is to achieve one logical AI-enriched
solution. A number of physical solutions will integrate into it. The top
logical layer would be very practical, applied to the problem but flexible,
as requirements change very fast.
In the past, NCC seems to have experienced stability problems with
very large monolithic networks - as any other firm. Hence the decision
to focus on flexibility requirements and reconfiguration capability,
integrated into one logical any-to-any construct. Artificial intelligence
will play a key role in this solution.
8 National Payment
Systems, Research on
Artificial Intelligence and
Progress in Integration
There are three subjects in the realm of financial networks modern
technology has made indivisible: first, the national payment systems in all
its phases- from the level of the automatic clearing house to that serving
corporations and end-users.
Second are the interconnect facilities provided by the public auth-
orities, in other words, the telephone company (telco). Given the
capillarity of the telephone network, this is a key factor in the success of
online systems in general and financial networks in particular. Tele-
phony is an enabling mechanism, provided that the proper investments
are made and vision used in its expansion.
Third, value-added services are very important to keep and augment
the financial network's attractiveness. The concept of value added
changes with time. What is today an add-on feature becomes standard,
and new facilities pop up to provide competitive advantages. This is
discussed in the section on the Mitsubishi Research Institute (MIRI) in
this chapter.
There is great emphasis today on the use of artificial intelligence (AI)
in banking and networking (see Chapter 9). The range of AI applications
is wide, going from end-user level implementation to application plans
of new information media, measures to improve system reliability,
global outline servicing of new product services, as well as a number of
research themes.
The use of AI in Japanese banking is significant today, but can be
expected to intensify in the years ahead. Both the refinements now in
process in connection with the oncoming fourth generation online
system (4 GOLS), and the advances made by the fifth generation
computer (5GC) projects, call for it.
Financed by the government, the fifth generation computer project in
Japan has already produced significant results. One of them is the
personal sequential inference (PSI) engine. It has been developed by the
143
144 Implementing Networks in Financial Services
COMPANY
CENTRE
MANUFACTURING
MANUFACTURING CONSUMERS
MANUFACTURING
I
INSURANCE MANUFACTURING
PUBLIC
COMPANY MANUFACTURING
MANUFACTURING AUTHORITIES
CENTRE
Figure 8.1
Vl
-
""""
HOUSEHOLDS HOUSEHOLDS HOUSEHOLDS
-
~
HOUSEHOLDS
HOUSEHOLDS
HOUSEHOLDS
HOUSEHOLDS HOUSEHOLDS
HOUSEHOLDS
HOUSEHOLDS
HOUSEHOLDS
HOUSEHOLDS
HOUSEHOLDS
HOUSEHOLDS
HOUSEHOLDS
HOUSEHOLDS HOUSEHOLDS
Percentage digitised
1986 1989 (est.)
% %
1. Switching equipment
1.1 Su bscri her terminals 3 11
1.2 Relays
*Telephone offices 85 100
*Terminals 11 17
2. Transmission equipment
2.1 Circuits 17 28
148 Implementing Networks in Financial Services
(1) Digitallines;
(2) Satellite transmission;
(3) Optical fibres;
(4) Optical subscriber lines (business use);
(5) Integrated digital Centrex;
(6) Digital telephone set;
(7) Advanced multibeam satellite systems;
(8) Ultra-large capacity optical fibres;
(9) Optical subscriber lines (residential use);
(10) Fully integrated workstation;
(11) Completion of information network system (INS).
Items (1) to (8) are available today to be followed by (9) and (1 0). INS, in
Integrated network system (Figure 8.3) is scheduled for 1995 as a full-
blown operation.
The higher-up layers address facsimile, electronic mail, data commun-
ications and teleconferencing services. They are intense in software
support and involve:
-- )
CD- ATM-ET
FRONTEND FRONTEND
) FRONTEND
FRONTEND FRONTEND
FRONTEND
POS <SINGLE, THEN INTEGRATED FUNCTION) FRONTEND
FRONTEND
FRONTEND
.-------) FRONTEND
CM-HB FRONTEND
<VOICE, FAX, PC)
.--------)
FRONTENDAUTOMATED
FRONTEND FRONTEND
FRONTEND
......
Vl
Figure 8.3
FRONTEND
152 Implementing Networks in Financial Services
Average inter-computer
Computers located in distance
EXISTING NETWORK
TELEPHONE TELEPHONE
TELEPHONE NETWORK
FACSIMILE FACSIMILE
FACSIMILE NETWORK
INTEGRATED
INTEGRATED
I NS
9i:MMUN 'CAnO'S
ATELLITE
TELEPHONE TELEPHONE
FACSIMILE ~ FACSIMILE
DIGITAL VI OED
VIDEO
TERMINAL NETWORK TERMINAL
DATA DATA
TERMINAL TERMINAL
MOBILE COMMUNICATIONS
Figure 8.4
By way of example, Figure 8.5 identifies the Zengin system. Some 700
financial institutions with 20,000 branches are connected to it. The
Zengin system provides for interbanking integration. It operates online,
handles the flow of funds, and acts as catalyst in funds settlements.
Typically, the payer makes an application for transfer at the branch
office of a bank. The transaction may concern:
e cash;
e ordinary deposit;
e payment of bills;
e transfer order - domestic or abroad.
In a paper-based environment, this would have involved transfer slips,
mail, clearing: in short, costly exchange of documentation.
This approach, prominent in the pre-computer era, has been
preserved with batch computers and, ironically, with the first and second
generation online solutions. The latter, let's recall, called themselves
'integrated'. To do away with it, it has been necessary to establish the
online clearance system like Zengin, CHIPS and CHAPS are other
examples providing a necessary inter-banking integrated infrastructure.
It has also been necessary to support and apply standardisation. In
Japan this is promoted through the adoption of standardised data
communications protocols by the Federation of Bankers association. It
is also given a boost through the utilisation of ANSER for electronic
banking services. CAFIS has led to the standardisation of the EFT/POS
system.
ZENGIN SYSTEM
NIPPON BANK
~
700 FINANCIAL INSTITUTION S <APPROX. 20,000 BRANCHES>
~
Ul
-..l
Figure 8.5 Zengin system
-
158 Implementing Networks in Financial Services
This last reference leads us to the next level of the integrated system's
definition- 1987/88 standard. We have already described ANSER.
Today, the clients of seventy-one Japanese banks are connected to it, as
well as stockbrokers and other terminal equipment. At the same time the
nationwide cash dispensing system interconnects and integrates
BANCS (the ATM network of 13 city banks), ACS (of 63 regional
banks), SCS (of69 Sogo banks), Sinkin (of 419 credit associations), and
SOCS (of 7 credit banks).
While BANCS points to the right direction as far as consumer
integrated services are concerned, there is still in Japan a debit card
problem to be solved. Today each bank issues its own. While the debit
card from city banks can work through BANCS, this is the ATM
network for city banks only. Other banks are now expected to tie in,
eventually grouping together in competition with the Post Office.
On the other side, there is an integrated direct debit/credit data
exchange system (Figure 8.6). By using the Zengin standard protocol,
city, regional, Sogo banks, the NOKYO system, and other contributors
attach to it.
FINANCIAL INSTITUTIONS
DIRECT DIRECT
1----------- -----
DIRECT DIRECT
<EXTEND TO FINE)
TRANSACTIONS
AND BALANCE VOICE• TRANSACTIONS
TRANSACTIONS
~ 4
TRANSACTIONS
VOICE•
r;;;} TRANSACTIONS
LEDGER
TRANSACTIONS.
uFILE
BALANCE. NOTICES
TRANSACTIONS
J<EYPAtr' TRANSACTIONS
PICTURE
GJ PICTURE
u FINANCIAL
u
FILE INFORMATION
FILE
Figure 8.7
National Payment Systems, AI and Integration 163
In the one as in the other case, MIRI and its clients explore ways to
normalise and integrate diverse vendor proposals. Once a solution is
found, it is expected to be used in Japan and also internationally. The
any-to-any solution aims to integrate diverse networks operating at
different levels of the ISO/OSI protocol and incompatible among
themselves:
e DIA/DCA
e X.400
e TCP/IP
e X.25
e BSC, S/S, etc.
Current evidence suggests that von Neumann-type computer tech-
nology and its software cannot support this solution. The problem is of a
logical nature and- according to the MIRI reference- it can be handled
nicely through PSI and other fifth generation computers. The target date
is 1990-91. So far, however, there is proof that some functions of PSI
are most convenient in terms of cost and performance. This work is
evidently enhanced by the leadership Mitsubishi Electric exhibits in the
development of intelligent exchanges, one of the implementation areas
of PSI-X.
MIRI is also very active on AI constructs. It has developed ZEUS- an
expert systems shell now being sold on VMG (VAX line) and Unix
environments. ZEUS is also implemented under MVS. The develop-
ment of ZEUS has been part of a multiclient study project which started
in 1984 and was completed in 1985. Today there are many applications.
This is a telling example of how early the Japanese started with expert
systems.
Today, ZEUS has sixty clients among the leading Japanese City
Banks and Trust Banks. There are at least three examples of projects
using ZEUS-I and ZEUS-2.
166
Networking Solutions by American Banks 167
Figure
Figure Figure
Figure
9.1
Figure
FigureFigure
Figure
Figure
Figure
Figure
Figure 9.1
advance once acquired will not be there for ever. Because of strides by
competitors its life cycle is increasingly short. This is an important
message.
In the late 1950s the Bank of America was at the forefront of computer-
aided accounting methods: ERMA was the tool. The application was
data-processing oriented. At that time, there was a limited necessity for
1. This and the following section are based on a contribution by John T.
Critchfield, then Vice-President Network Engineering, Bank of America, to
the 3rd International Symposium on Electronic Banking, held in West Berlin
at the International Congress Center, June 1986.
168 Implementing Networks in Financial Services
The building cabling system selected was the IBM Type-2 twisted
pairs, some shielded for data use which terminate on IBM patch panels
on each floor.
e Connectivity to a terminal is through the use of coaxial cable
connection.
e Connectivity between buildings is by multimode fibre optic cable
and multiplex (optic) distributed to each building and to each floor
and others for telephone use.
Every possible work location has been incorporated in this wiring
system, so that more than 4,500 personnel can have their individual
terminals as well as a telephone, which can be either digital or analog.
The entire campus enjoys the design benefits of a structured, flexible and
expandable wiring system that will support various local area network
topologies.
While the Concord Technology Center is an important part of
technology policy at Bank of America, the Strategic Information
Resource Committee (which oversees expenditures on technology) also
focused on other innovative solutions to the competitive environment
the Bank is addressing. Projects which are interlinked but distinctive
include:
e An international banking service which links around 100 countries
with common communications vehicles and databases. This service
is composed of a number of products.
e Cash-management products, designed to give the big corporation
money managers access to many of the Bank's wholesale services
through automated delivery systems. These systems interface with
the well-known money market networks.
e Automated teller machines, some on national networks which have
allowed a reduction of bank personnel and have lowered transac-
tion costs.
These services are targeted at 80 per cent of the Bank's retail
customer base and will gradually incorporate newer features such
as electronic mail and information about investments available to
customers.
e Up-scale financial products designed for the person who needs to
invest and use allowable 'tax shelters'. The services are available
through home computer services media.
e Private banking services, a marketing strategy and service which
provides financial counselling to selected retail clients with substan-
tial assets invested with the bank.
170 Implementing Networks in Financial Services
An architecture was selected for this utility network that had several
components: centralised network facility (CNF), distributed network
facility (DNF), centralised applications facility (CAF), and distributed
applications facility (DAF). These provide application interface and
control.
The system architecture ensures resource sharing, logical separation
of business and network functions, standardisation and user-viewed
functional attachment. It also provides for management by a network
operator of application sessions, network sessions as well as man-
agement of the physical network links.
The objective of the digital utility network is to improve the quality,
reliability and availability of network services for the Bank's teller
terminals (10,000 plus), automated teller machines (1,200 plus), IBM
3270-type terminals (30,000 plus) and other devices within Bank of
America units. This is achieved through the use of digital transmission
facilities and related equipment.
The network management and control system will ultimately be able
to detail network cost on a usage-sensitive basis. It will give the
operators the ability to quickly diagnose and rapidly respond to service
interruptions throughout the network, from the application level to the
terminal and the telephone instrument level.
The network integrates voice and data on the major routes which
operate at T-1 speeds (1.544 MBPS) or greater through dynamic
allocation of bandwidth. Bank of America refers to this high-speed
portion of the network as the backbone. Its contingency operation is
accommodated at a significantly reduced operating cost, as opposed to
adding necessary switching and circuits to the physical existing net-
works.
Implementation of the utility transport network is accomplished
using IBM as a vendor project manager. IBM has the responsibility for
172 Implementing Networks in Financial Services
(1) International
(2) Corporate banking;
(3) Retail banking;
174 Implementing Networks in Financial Services
D v s 0 N S
I II
DATA PROCESSING /MANAGEMENT INFORMATION SYSTEM
IEJ
I II I
Each division has been allocated part of what used to be central services
in terms of computer resources. Nevertheless some vital departments
remained centralised, directly responsible to corporate headquarters.
Examples are Human Resources and Controllership, as well as the
corporate computer services, including electronic mail which is run
throughout the world as a corporate utility.
The essence of this divisionalisation is that each of the five new entities
Networking Solutions by American Banks 175
Figure 9.3 reflects the outline structure and provides some more detail. It
also underlines the wisdom of instituting one more department:
(5) Technology Planning Its objectives should range from the close
follow-up of new tools, particularly programming tools and
packages, to technology transfer. It should also gather market-
place intelligence to help steadily monitor the status of compet-
ition, its effects on the banking industry in general and for this bank
in particular.
It also brought into perspective the need to expand the standards toward
a broader environment. Today about 3 per cent of electronic mail users
are non-MHTC people: bank customers, consultants, vendors. Users
are given mailboxes as communications vehicles, instead of employing
the classical telephone network. Quite evidently, this compounds the
challenge of uniform standards. The reference is valid inside the banks.
The equipment outside parties are using is their own responsibility.
An MHTC study however documented that no financial transactions
should be done through electronic mail, or more precisely, nothing that
can put the bank or the customer in jeopardy, for instance, a money
order where $5,000 become $50,000. 'Everyone has become security-
conscious,' the responsible executive commented. Precisely for security
reasons, a front-end processor has now been installed, able to provide 99
per cent of the security definitions, as well as to guarantee compliance
with requirements.
System restructuring also permitted integration with timesharing (TS)
services into an interactive services complex. It includes a single entry
point to Dow Jones, instead of some twenty different entry points which
existed in the past. A similar solution is in negotiation with Telerate and
Reuters. After an agreement is reached, and the details worked out, the
178 Implementing Networks in Financial Services
The choice was soul-searching. Said the Chairman:' You can do No.3 if
you master your own business, know well the technology and have
wisdom. Otherwise, forget it.'
Hence the idea of top-management training. After the infrastructure
for appreciating technology was provided, the Board itself saw the point
that the winners will be those companies using technology to solve their
related problems:
e Provide distinct and broad range of products, designed with
understanding of the buyer.
e Assure enough brain power to provide steady innovation.
e Be able to become and keep on being a low-cost producer.
This carried all the way into strategic planning. National Life studies
established the wisdom of client handling through one interface: an officer
equipped with all electronic gear enabling him to investigate financial,
personal and other information. Added the Chairman: 'Originally, the
main reason our company decided to go into PC was to assure our
people become computer literate. Today we see that there is a lot more
that can be done through Intelligent Workstations than we originally
thought.'
This led to the development of a new network concept and the
deployment of intelligent workstations at the agent level. National Life
makes sure its representatives have the technology to fight successfully
against the best of competition.
182 Implementing Networks in Financial Services
(1) The Brass Project orients itself to the senior executive's WS.
(2) Broker's Edge is being designed around the requirements of the
account executive WS.
l. Bank of America and other financial institutions say precisely the same thing.
Networking Solutions by American Banks 183
185
186 Implementing Networks in Financial Services
(1) Language
(2) Domain
(3) Inference
(4) Learning
(5) Goals
(6) Problem-Solving
(7) Strategic.
Artificial Intelligence and Expert Network Systems 187
Table 10.1
Strategic level
Area to which system addresses itself,
type of users, intent
Problem solution level
Structuring goals,
definition of tasks to reach goals
Goals level
Plans, missions, tasks
generating of hypothesis
definition of actions
Learning level
Metarules, metadata
knowledge acquisition, retrospect
prototyping tasks
Inference level
Rules, frames
induction, deduction
test of hypotheses, diagnoses
Domain level
Facts, states, values
concepts, relations
access to global database
Language level
Analysis, programming tools
organisations of knowledge sources
Hardware level
Inference engine
global database machine
(sequential or parallel)
Strategic is the highest layer. It defines the area to which the intelligence
system addresses itself, as well as the intent, the type of users and, by
consequence, the problem solution and the goals being reached. That is
why these are expressed through layers lower than the strategic.
The goals layer elaborates on how goals can be structured for problem
188 Implementing Networks in Financial Services
solution. Hence problem solution as such is higher than the goals layer.
But at the same time the goals level utilises metarules and metadata. In
other words, rules about rules and data about data. It also employs
prototyping procedures. Metarules, metadata and prototyping form a
learning layer immediately below the goals level.
The inference layer is the key to knowledge management. Knowledge
management should ensure a complete development and implementa-
tion environment designed for use in a specific function: financial,
managerial, networking, requiring expert systems support.
The most striking aspect of developments in artificial intelligence does
not lie in any breathtaking announcement but rather in a meth-
odological appraoch. For the first time there is a consensus that AI is a
technology applicable in solving real problems. The object of the layered
solution is methodology. Unlike idealised situations, real problems
require a complete, comprehensive approach. This is valid whether we
talk of isolated instances or of a broader range of applications. Real
business problems also call for powerful approaches. Trivia have no
place in inference rules.
Inference is made in relation to objects according to their roles in
problem-solving. Inference involves testing of hypothesis and diagnosis.
Data is a metaclass.
The domain level features concepts and relations, as well as facts,
states, values. It also accesses the global database through linguistic
interfaces to the hardware level.
With presently available artificial intelligence constructs, the layers of
domain and inference are closely interlinked. In expert system
implementations, we typically combine knowledge sources into an
inference structure, specifying:
e the inferences which can be made;
e the constraints of the possible inferences.
In such work, powerful solutions are a trademark of well-constructed
expert systems. In a banking environment based on human expertise, the
word expert typically indicates a person with extended knowledge in a
well-defined (hence limited) applications domain. The expert system can
do no less.
Next to completeness and power comes simplicity. Simplicity compr-
ises ease oflearning and ease of use. It is heavily affected by integration.
Integration means ease of moving between the various functions of a
product offering, making different components to appear similar to the
user. Such components typically use similar protocols, identical
subroutines and common files. This is a prerequisite for the global
Artificial Intelligence and Expert Network Systems 189
I<.!)
w
o-t-<
(f) <I
- ::>
_)<.!)
<.!>z
z <I
w...J
X
m
Q..
[] X
I
(f)
Q..
ww
(f)<.!> ww
W<l (f)<.!>
z::> W<l
<l<.!) z::>
Q.. z <l<.!)
<I <I z
>...J <I
>...J
ww
(f)<.!> X
X
W<l I
m
z::>
Q..
<l<.!) (f)
z Q..
<I
>...J
ww
(f)<.!>
W<l
z::>
<l<.!)
Q.. z
<I <I
>...J
194 Implementing Networks in Financial Services
(1) Technological
(2) User-oriented
(3) Service-intense
(4) Administrative-type
(5) Cost-oriented.
Let's assume that the network being designed is packet switching. This
choice having been made, a number of other technological alternatives
must be examined prior to a network design. An X.25 network admits of
a large number of choices, particularly in the types of equipment to be
used, which must be specified. This list includes specific items for th·.!
packet switches, PAD (packet assembly/disassembly devices), modems
and multiplexers. In addition, a wide number of alternatives are
available for transmission media:
e point-to-point leased lines might be obtained;
e channels for the packet-switching network might be derived from
an underlying network based upon 1.544 or 2.048 MBPS circuits:
e a very small aperture terminal (VSAT) technology might be chosen
to obtain circuits.
While in most European countries these choices are largely deter-
mined by the public telephone authority and vary from country to
country, other countries -like the United States- have a broader range
of alternatives. It is no less true that an international network may
require different technical choices in its multinational topology.
Then come the requirements. Any network configuration must have
sufficient capacity to accommodate all of its users. The user needs must
be accurately stated. If the amount of traffic which is generated by users
is underestimated, the network will not have sufficient capacity.
Performance will be unsatisfactory. If the user requirements are
overestimated, the network will be too expensive. It will not be
competitive.
A statement of user requirements has different components. First,
each user (terminal, computer, or human) must be identified. This
information should include location, expressed in some set of geogra-
phical co-ordinates, and the protocol(s) that the device supports. Then
the traffic which flows between each pair of devices in the network at
Artificial Intelligence and Expert Network Systems 197
peak hours (and peak minutes) must be expressed through metrics. This
is best stated in transactions per second, with the length and priority of
each transaction specified. A statement of traffic should include the
effects of any protocols above level 3 in ISO/OSI. These will contribute
traffic to the network but will appear to the packet-switching network as
under data.
Further, a statement of user requirements must take into account the
extent to which traffic and number of devices will grow over the lifetime
of the network. This means that the lifespan of the network must be
projected, then accounted for.
Service requirements primarily concern performance. There are many
different measures of network performance; which is most important
depends very much on the application.
e In some networks, delay is the most important performance metric.
e In other networks, throughput might be most critical.
e In all networks, reliability and availability play a significant role.
Network design must include a global, deterministic measure,
expressing the number of component outages which are required to
seriously disrupt network service. Reliability is a probability, not an
ability. A typical question pertaining to the reliability of a network is,
'How many lines must fail before the network is divided into two
segments?' Availability is a local, probabilistic concept; for example,
how likely is it that a given terminal will not be able to access its
application?
Not only may different criteria exist in network design, but they might
also be important to different applications, perhaps running at different
times during the day. For example, consider a credit authorisation
network in which credit queries and responses are sent during the day
and settlement traffic during the night. During the day, response time is
most important. Long response times can cause unacceptably long
queues at cash registers and unhappy customers. During the evening
hours, throughput is at a premium. The amount of time a particular
record takes to cross the network is not as important as the amount of
time it takes to complete the transfer of all records.
The fourth class of requirements on the network design are adminis-
trative constraints. These tend to be quite specific to particular
networks, and are worth citing.
A common type of constraint governs where equipment may and may
not be placed. In most networks, any site which houses computers is an
acceptable candidate for a switch location. In some networks, this may
198 Implementing Networks in Financial Services
not be the case. For instance, there may be a case where the network
offers pure transport services to users who are customers of the provider
of the network, but not organisationally affiliated with the latter. Hence,
if the computer locations belong to the customer, they may not be
acceptable for switching equipment.
The fifth class of requirements centres on costs. There are a number of
different types of costs which must be understood before embarking on a
network design.
First, the cost of all communications equipment must be known.
These costs include not only the purchase price of the equipment, but
also the costs associated with installing and maintaining it.
In addition, the tariffs used for leased circuits must be determined.
Sometimes these tariffs will be rates published by telecommunications
companies. If the lines are obtained from, say, an underlying corporate
T1 network, then the line prices may be derived from an internal tariff.
With all these factors taken into account, typically network design
consists of trading off the recurring costs of lines with the fixed costs
associated with switching equipment. Supported facilities must be
accounted for and the resulting functionality properly determined. Since
costs and efficiency are determining factors, an important input to the
design process is a decision on how to compare one-time costs with
recurring costs. This comparison is critical in subsequently determining
the ultimate network topology and the services which will be supported.
The number of factors involved in a network design makes advisable
computer usage. A first level can be reached through computer-aided
design (CAD), but CAD also evolves as experience accumulates; in fact
the most sophisticated CAD systems today incorporate artificial
intelligence constructs.
(1) Specifier
(2) Configurer
(3) DESIGNet.
Much of the effort in the development ofDESIGNet has gone into the
presentation of information to the designer, and many innovative
techniques have been developed. Indeed, a major problem in designing
large networks is caused by the complexity of the design. It is often very
difficult to see the design because of the density of lines and nodes.
DESIGNet allows the creation of a very large number of maps.
e New maps can be made in which the network is untangled by
moving objects around on the screen.
e Other maps are invoked magnifying regions of the network.
These maps are not purely passive displays. By employing the correct
commands, the designer can edit any of them and thereby modify the
Artificial Intelligence and Expert Network Systems 201
design. Maps can also be buried, so that they are no longer in view and
can be made visible when needed.
Network objects are represented by simple icons. When a network
object is pointed to, its name appears on the colour display. Thus the
names of objects do not obscure the designer's view of the network. If
more information is needed about the network object than its name, this
too can be obtained by pointing at the object and invoking the
appropriate menu item, for example, the names of all objects which are
homed to a packet switch.
The system employs a feature called 'presentation'. An object can be
asked to present itself, in which case a detailed English language
description of the network object is displayed.
In general, a network object can be manipulated - moved, deleted,
described- by pointing to it on the map or by pointing to its name in any
report. Suppose the designer is presented with information about a
packet switch by pointing to its icon. This information may include the
names of attached PAD. Information about a given PAD can then be
obtained by pointing to its name in the list of the devices attached to the
packet switch. This new information will include the identities of the
terminals that are attached to the PAD. By pointing to the name of a
terminal in this list, information can be obtained about that terminal.
Through the command pane, the designer is able to invoke many
heuristics to solve each phase of the topological design problem. For
instance, a number of clustering heuristics are available for PAD (packet
assembly/disassembly) placement.
The commands DESIGNet makes available for backbone design are
those heuristics which have been demonstrated to be useful to network
engineers. Examples are commands to:
e Create minimum-cost singly and doubly connected networks.
e Link pairs of sites which send large amounts of traffic to each other;
e Connect switches which are very close to each other.
Since, ultimately, the best heuristics are inadequate and must be
supplemented by the judgement of the designer, DESIGNet allows
manual editing of the network topology in all phases. Components are
easily added and deleted by the designer and this is a demonstration of
the flexibility afforded by expert systems, and of an effective man-
machine communication.
11 Using Computers for
Online Auditing
The existence of networking facilities and the online access to databases
offers bank management control abilities over and above the classical
operational aspects. One of the most important is internal audit. Not
only do computers and communications help make the internal auditing
function interactive, but they also enlarge the applications horizon.
Internal auditing can be greatly assisted through the use of artificial
intelligence constructs in a manner quite similar to that described in
Chapter 10.
The assistance computers and expert systems can offer to the internal
auditor should be most welcome because, at the same time, with online
systems the risk has increased. Electronic banking permits, indeed
promotes, direct access to the bank's text and data available through
thousands of terminals and people. Hence, online information systems
increase the possibilities offraud- unless we take the proper measures to
avoid this eventuality. Widely publicised irregularities involving the
manipulation of computer data have induced major information
systems users to implement computer audit techniques specifically
related to databases. Banks have led other industries in recruiting
trained computer auditors and intensified testing to ensure that there are
no loopholes in their existing control procedures.
A computer masterfile audit is necessary, as input and output controls
in themselves cannot guarantee complete protection against errors or
against deliberate data manipulation. Therefore direct verification of
the information on the computer's data files is essential to make sure no
material errors have occurred.
Banks are particularly vulnerable to computer fraud because their
inventory is money. Unlike the inventories of industrial companies,
'money inventories' are homogeneous and immediately negotiable. A
primary objective of the top-management assessment should, therefore,
be the evaluation of the current audit and control practice and the range
of data-processing skills within the internal audit staff. This is in contrast
to past practices where inadequate attention has been given to the
importance of internal controls in developing computer-based informa-
tion systems and in establishing computer operations.
With a growing dependence on internal auditors to evaluate and
202
Using Computers for Online Auditing 203
and from what mode of entry; determine and enforce the source of entry;
and ensure different levels of data protection. Examples are access
control for whoever has the authority to access specific data; and
function control for what the requestor may do with the data once the
access is granted.
While the last two paragraphs have been stressing the mechanics of
computer system operations, and many financial institutions can state
that they fully observe them, other issues relate to background factors
and organisational dependencies. The latter constitute the foundations
of accountability, as we will see to a certain degree.
Experience from successful practices indicates that the following
factors relate to independence of the auditing function and are therefore
important to a successful and effective internal audit: first, a written
policy statement specifying the internal audit mandate that includes the
objectives and prerogatives of the internal audit functions- such a policy
need not be either lengthy or detailed; second, the authority to plan and
pursue audit work within the scope of the written mandate; third,
supporting issues are necessary to complement the mandate. They range
from access to and support from top management for internal audit
plans and programmes to a collaboration with consultants from outside
the organisation specialising in the different issues modern internal
auditing should confront. Unquestionably a vital element is access to all
phases of the bank's operations, including data processsing, databasing
and data communications.
The merits of the classical audit function are magnified through
computers and communications. Through online services the auditor
can properly identify critical areas; establish weak points in systems,
procedures and practices; reflect on vulnerability and countermeasures.
He can evaluate the needed control and then, through the usual in situ
inspection, see the control action through and assure conformity (Figure
11.1). Testing and maintenance can be done partly online and partly
through the more classical approaches.
It is evident from the responsibilities placed upon the internal auditor
that his function can't be successful unless middle and junior man-
agement know that senior management supports him. Therefore top
management must examine and establish the place, scope, and extent of
the internal auditing function in a way that leaves no ambiguity to the
subordinates. Internal audit should have a charter which will describe its
role, so that management, too, will have something against which to
measure results. What should such a charter say?
We said that it is very important to have a line of communication to
Using Computers for Online Auditing 205
IDENTIFY CRITICAL
FUNCTIONAL AREAS
ESTABLISH THE
WEAK POINTS
FEASIBLE TO
EXECUTE ONLINE
REFLECT ON VULNERABILITY
AND COUNTERMEASURES
EVALUATE THE
NEEDED CONTROL
IMPLEMENT THE
CONTROL ACTION
THROUGH IN-PLACE
INSPECTION
ASSURE CONFORMITY
BOTH ONLINE
TEST AND MAINTAIN
AND IN-PLACE
Figure 11.1
(1) Online auditing of the bank's books and transactions In a way, this
is greatly facilitated by the fact that books and transactions are anyway
computer-handled. But this, while necessary, is not enough. The internal
auditor also needs specific authorisation, a complete methodology, and
the corresponding computer programs.
The advice I give to the banks I am working with is that the internal
auditor must check the procedures set to implement the powers of an
officer in the jurisdiction he supposedly controls, by controlling his
approval of transactions. Such considerations go beyond the classical,
but by now obsolete, view that the auditor must only control to make
sure that valuable property of the bank is not misused, lost or stolen,
though it is only natural that means of control should be established:
e to minimise such risks;
e to inspect records as a deterrent to those who might otherwise take
advantage of the situation;
208 Implementing Networks in Financial Services
The references made in the foregoing section document that the internal
auditing function concerning DP/DB/DC should be kept in the hands of
persons separate from those who perform the various data-processing
and datacommunications activities. The system of internal auditing
must serve as an independent reporting agency, checking upon all the
DP/DB/DC work performed at the bank in such a way as to bring to the
attention of operating executives the kinds of action which should
demand their attention.
Continuous review and reporting of conditions by the internal auditor
is an effective means of making sure that the data-processing and office-
automation executives do not overlook their responsibilities in one
direction because of their preoccupation with some other aspects of their
work. The auditing system should thus serve as an overall check upon
the entire organisation, not in the sense of giving orders or attending to
details of supervision, but in bringing various parts of the picture of the
bank's DP progress and achievement to the attention of proper officers,
so that the persons most interested in correcting undesirable conditions
may take steps to improve results.
It follows that the auditing reports must be comprehensive and
action-oriented. Well-defined standards are necessary to establish the
professional identify of the mission, and it is important to clarify and put
in writing the underlying principles that control and guide the auditing
210 Implementing Networks in Financial Services
Organisational Standards
(1) The bank shall have a DP/DB/DC audit function responsible for
evaluating the adequacy, effectiveness and practicality of its
systems: computers, communications and office automation.
(2) This internal auditing function should be given the responsibility of
control and of quality measurement of ongoing operations.
(3) Management shall maintain an environment within which the
audit function has freedom to act and reach, online or otherwise, all
corners of the DP/DB/DC network.
(4) Management shall allocate sufficient resources to the subject audit
function to enable'it to conform to the principles and standards of
internal auditing.
(5) The bank's systems of control shall include measurement of audit
effectiveness and efficiency.
Personal Standards
Performance Standards
(1) The internal auditor for data processing, databasing, data com-
munications and office automation, shall have a formal audit plan
which will cover all significant organisational activities over an
appropriate cycle of time.
(2) Audit coverages shall include evaluation of controls within new
systems and significant modifications to existing systems before
such systems become operational.
(3) Audit control should emphasise software from program develop-
ment to operation and maintenance - a particular requirement
being that of preventing computer fraud.
(4) Audit procedures shall provide sufficient competent, well-
documented evidence to support conclusions as to the adequacy,
effectiveness, and practicality of the systems of control and the
quality of operations.
(5) The organisation of the audit function and related administrative
practice shall provide for proper supervision of persons performing
the audit and for proper review of work performed.
Reporting Standards
It will be appreciated that the first rule is the proper choice of an audit
package. Audit packages are generalised computer programs designed
to assist auditors in independently selecting information for evaluation.
If properly selected, they can change the nature of auditing. Audit
programs enable auditors to extend the scope of their reviews beyond
confirmations without reliance on data-processing personnel. They
facilitate audit review of computerised data and provide management
with more meaningful and effective audit performance.
The auditors decide what information is to be extracted and what
reports are to be printed. But the package should be efficient as to audit
preparation time; and the documentation supplied should measure up to
the bank's standards. With the appropriate programs available, the
computer can be utilised to perform the following functions:
e Extraction: i.e., the selection of records which meet certain
predetermined criteria. An effective extraction routine can select
records on the basis of whether or not data fall within a range of
values.
e Sampling of records based on certain criteria.
e Review of personnel calculations on clients' and bank accounts. The
auditor should use the computer to review the calculations done
during normal computer-processing activities.
e Comparisons: taking item and amount totals of all records meeting
certain criteria, such as determining the number and monetary
amounts of all records falling within a certain financial range.
e Comparison of similar files. If there are any differences, they would
be printed out. This would be a very efficient use of the computer.
e Comparison of dates in records to a given date. This allows
reviewing instalment-loan application and selecting the loans
which are overdue.
e Confirmations: ability to review computer files, select accounts and
print out the accounts selected, as has been done with traditional
audit.
216 Implementing Networks in Financial Services
Given the proper software and his own expertise on how to conduct
an investigation and conclude an audit, the computer auditor will need
to perform the following three work phases:
The load phase: inserting his privately kept audit programs for
execution.
SEC's ability to expose and prosecute securities frauds has been greatly
enhanced by electronic market-surveillance systems and transaction-
audit trails that permit the quick identification of the sources of
suspicious trading activities.
Electronic surveillance is that much more important as a new
generation of crooks knows how to manipulate computers to their own
advantage. Indeed, a disturbing subject is the recent rash of insider-
trading cases against young men in their twenties and early thirties who
are graduates of leading business and law schools: that is, the cream of
the crop. Ten graduates of Harvard, Stanford, Columbia, Wharton and
other leading business and law schools have been convicted felons. Most
serve prison terms. They may be the tip of the iceberg, symptomatic of
more serious problems in business.
Not only has this problem become pervasive, but also the profile of
the crook has changed. The recent crop of convicted felons included men
who were successful, earning six-figure incomes, with promising careers
at distinguished securities and law firms. Cold figures tend to indicate
that being unethical is a kind of sport. While their salaries were hundreds
of thousands of dollars, their insider-trading profits have typically
ranged from $20,000 to $50,000. Yet they misappropriated material,
non-public information from those who trusted them, or knowingly
traded on such information.
Have the temptations become too great? Is it the challenge or the
excitement of seeing if they could get away with it? If they could beat the
system? Were they driven by rivalries to win a 'game' in which the score
has a money sign in front of it? Or has there been a radical change in
moral attitudes? The answer probably lies in a combination of factors.
The question now is: 'What can be done about it?'
Online auditing will not replace ethics, but it can help police them.
That's the contribution to be made by AI and computers.
e The system must be built around the concept that only ethics pays.
e The risk of uncovering dishonest behaviour should be so high that
the potential felon would have to count the odds of destroying his
career and his life.
Though they survived twenty centuries of practice and malpractice, the
rules of ethical behaviour written in the Bible do need some tech-
nological support. It is not just a matter of making surveillance more
steady to discourage the crook. Rather, the issue is one of policing and
law enforcement in a more intelligent manner.
12 Security in Financial
Networks
Chapter 11 underlined the importance of the audit function in financial
computer systems. The object of the present chapter is to emphasise the
key reasons for firm security rules in financial networks, and the
solutions which are necessary. The bank's assets are held in computers
and communications nodes. No laxity is permitted in network security.
Security must be network-wide. We have defined network processing
as the functions necessary for moving information from source location
to destination. During the transfer, logical actions are executed by
software modules for the purpose of controlling the:
219
220 Implementing Networks in Financial Services
(1) The Tax Reform Act requires financial institutions to notify their
customers when the Internal Revenue Service (IRS) issues a
summons for their records.
222 Implementing Networks in Financial Services
the financial community. But even these are fraught with their own legal
trappings.
Financial institutions that exchange or disseminate financial informa-
tion should avoid acts that can have anticompetitive consequences. That
is what antitrust law says. But the interpretation can be so broad as to
inhibit EFT banking at the corporate level. Massive movements of
money might in some cases be interpreted as dissemination of informa-
tion regarding an important financial transaction.
Tax laws raise questions about whether system programs are goods or
services. Branching laws have long limited the ability of US banks to
establish A TM, POS systems and other EFT systems.
In another frame of reference, patents, trade secrets and copyrights
have questionable application as regards software. Here the law is weak
and imprecise in providing necessary safeguards. Interestingly enough,
computer software and banking services have this in common: there is no
effective copyright to speak of
Potential enforcement action by legal authorities also raises the
question of system-related compliance regarding electronic funds
transfer. In the United States, of primary concern to the financial
community are the enforcement powers of:
European bankers feel bad enough with the national (reserve) bank
doing the controlling activity. What about having six governmental
organisations breathing down your neck?
Though the word security has not been mentioned by most of the
references to regulatory bodies, the breach of security is sanctioned by
them. The challenge to bank management is that new media magnify
some of the security risks even in cases where good faith predominates.
Satellite transmission is an example. Banks use them, but they don't
own them. Protection must be provided by organisational and
procedural means, always with greater security in mind. The Bank of
America prefers to use terrestrial circuits for data communications;
satellites for voice. Bankers Trust uses both satellite and terrestrial links
for data and voice. In management opinion, encryption is the answer.
Sometimes, when public carriers are involved, the lack of standardisa-
tion makes security controls so much more complex. In the United
States, for instance, within ten kilometres from Charlotte there are three
different CATV companies with three different standards. Yet we know
that the delivery system has first to be streamlined before offering secure
banking and shopping financial services. As the media which we are
using multiply and increase in terms of sophistication, controls must do
the same. They should address themselves to human errors, systems
failure, malfunctions, fire, flood and computer fraud. Many reasons
might lead to, say, wrongful deductions from the customer's account
which may not be detected until some time after the event - if at all.
Some years ago, an international study conducted for the American
Institute of Internal Auditors concluded that the following, in order of
frequency, were the potential losses arising from the use of computer
systems:
e errors and omissions;
e improper controls;
e inadequate system design;
e fraud and defalcation;
e failure to comply with standards or procedures.
For every one of them there should be security controls which, when
Security in Financial Networks 225
probability a given system (or part) will operate over specified period of
time, under given environmental conditions, without failure. Intruders
can capitalise on a system's unreliability just as they can exploit its
errors. Security measures have their own goals, as this chapter
exemplifies. They are not supposed to make up for hardware and
software failures in an availability sense.
Error-detection modules used for data transmission must be such as
to reduce the probability of an undetected error to about one bit in I 00
billion (10- 11 ) or better. This, together with redundant routing informa-
tion, can almost eliminate the possibility ofmisrouting messages due to
an error introduced into the address portion of messages during
transmission.
Data being handled by the network can be made less vulnerable by
minimising the time a message is present in the network. Consequently
exposure can be minimised by restricting journalling and clearing
buffers immediately after use.
Recovery and restart procedures should include checks on routing
tables and, if there is a possibility that memory contents have been
modified, a complete reload of all programs associated with security
should be performed. Unattended remote programmable devices such
as network processors should be loaded downline only from a secure
host processor.
Remote diagnostics should be an integral part of a financial network.
Expert systems may be used in an able manner to promote diagnosis of
both software and hardware failure. They should also be employed to
foretell impending problems so that the network is better controlled and
repaired on time. Without a diagnostic capability, it is not possible to
manage a device in a distributed sense. The user must be able to do
diagnostics and effective maintenance on his equipment. According to
IBM, through online diagnostics global-cost figures can be brought
down by 30 per cent, eliminating the need for immediate vendor
intervention.
A communications manager must know number oflines, device types,
and other system characteristics. A software communications man-
agement layer can be put at every attached device, or even better,
enriched with expert systems functionality. Mock alarms must also be
performed at the network administrator's choice. For the specialists
manning the financial network, proper training includes drills developed
by the executive responsible for security together with the vendor. They
should be conducted at least twice a year but preferably quarterly.
As the financial institution depends more and more for its operations
228 Implementing Networks in Financial Services
(3) Users of the facilities They range from the bank's own personnel
(at all levels) to client-base references.
The best way to defend against computer crime, specialists say, is for
managers to know their employees well enough that unusual behaviour
or serious personal problems stand out. Risk analysis can be applied to
the human component as to all other factors involved in the system.
The global approach is advisable for another reason. An EFT security
concept includes organisational, physical, and logical measures. The
physical we can acquire; the logical we can build. But the most difficult
to develop are the organisational.
The security system should help the bank's security administrators
keep on top of changes in personnel, hardware, and operating policies. It
should demonstrate comprehensiveness in protecting all the bank's
computer resources- from workstations to central databases- without
inhibiting flexible file access. The emphasis on the global perspective is
important. By being a service business, the bank depends greatly on
office work. But the office is a network of people and workstations
working together for a common goal. It is not scattered resources
working independently from one another. Hence both the network we
develop and its security measures should serve the interconnect
requirements of different jobs. They should maintain:
It is not the object of this text to treat data encryption in any detailed
sense. But neither should this subject escape attention. Cryptographic
techniques range from a very elementary letter-substitution cipher to
highly mathematical public-key encryption systems. Security levels
which these different approaches provide also vary very dramatically.
The existence oftrade-offs between security level, simplicity, and ease of
Security in Financial Networks 231
233
234 Glossary
237
238 Index
Contd. (GOLS), 2
Electronic mail, 78 Geonet, 166
Electronic media, 49 Global database, 189
Electronic money, 19 Global network policies, 90
Electronic office, 97 Grossberg, Kenneth A., 31
Electronic surveillance, 218
Encryption, 231, 232 Hitachi, 139
End-user interface, 57 Housekeeping procedure, 112
Ericsson, 94 Huschke, Hubert, Dr, 71, 88
Error-detection modules, 227 Hyperchannel software, 90
Ethernet, 89
Eureka, 78 Identification, 219
Executive committee, 47, 48 Image handling, 42
Expert systems, 185,189,191,207, Inference engine, 188-90
227 Information, request for, 83
Information management, 14
Facsimile interconnection, 42 Information providers, 25
Federal Deposit Insurance Corp., 223 Information systems projects, 44
Federal Home Loan Bank Board, 223 Inhouse Communications System
Federal Reserve Bank of New York, (ICS), 89
225 Inhouse solution, mission of, 94
Federal Reserve System, 223 Institute for New Generation
Fedwire, 3 Computer Technology (I COT),
Fifth-generation computers, 59 144, 165
Fifth-generation computer (5GC) Integrated digital network (IDN), 88
projects, 143, 191 INS, 100, 150, 153, 154
Financial information documents, 18 Intelligent business system, 16
Financial networks, 19, 143 Interbank Card Association (Ibanco ),
First-generation online systems 34
(IGOLS), 2, 3, 38, 54, 102 Intercomputer communications, 148
First-generation product strategy Interfaces, user-friendly, 67
(IGPS), 2, 3 Interlink Network, 32
First-Interstate Bank of California, 32 Internal audit functions, 204
First National Bank of Boston, 31 Internal auditing, 203, 204, 209
First Nationwide Bank, 31, 32 Internal auditor, 203, 205, 206, 207,
Flurhof, 90 213, 217
Flurpark, 90 Internal Revenue Service, 221
Flur Sued, 90 International Business Ministries
Ford Motor Company, 31 (IBM), 27, 61, 82, 83, 88, 171, 183
4GOLS, 6, 107, 109, 134, 155 International Marketnet (Imnet), 183,
4GPS, 6, 8 184
Fourth-generation programming International Standards Organization
tools, 84 (ISO/OSI), 55, 74, 82, 163, 186
Front-end processor (FEP), 38 Internetworking, 55
Fuji Bank, 121, 131, 133, 134 Intruders, 220
Istituto Bancario Italiano, 155
Gateways, 16,94
General Electric, 38 JAIS (Japan Information System),
Generations of online systems 123, 124
240 Index