3 resultados para Behavioral corporate finance

em DRUM (Digital Repository at the University of Maryland)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Prior research has been divided regarding how firms respond to bankruptcy risk, largely revolving around two competing forces. On the one hand, asset substitution encourages firms to increase the riskiness of assets to extract value from creditors. On the other, firms want to minimize bankruptcy risk, either by reducing cash flow risk or through increasing the size of the firm. I test these two theories using a natural experiment of chemicals used in production processes being newly identified as carcinogenic to explore how firms may respond to potential negative cash flow resulting from litigation risk. I use plantlevel chemical data to study firm exposure to risk. I examine how responses between firms of differing levels of chemical exposure may vary within the industry, how firm financial distress affects firm response and whether public and private firms respond differently. In general, my research provides support for the asset substitution theory. My first paper studies how investment response varies based on level of carcinogenic exposure. I find that firms with moderate levels of exposure make efforts to mitigate their cash flow risk and reduce their exposure. At the same time, firms with high levels of exposure increase their exposure and riskiness of future cash flows. These findings are consistent with asset substitution theory. My second paper analyzes the interaction of financial distress and risk exposure. I find that firms in a stronger financial position are more likely to limit their exposure by reducing the number of exposed facilities. On the other hand, not only do firms in weaker financial position not decrease their exposure, I find that, in some instances, they increase their exposure to carcinogens. This work again supports the theory of asset substitution. Finally, in my third paper, I explore if public firms respond differently to a potential negative cash flow shock than do private firms. I test whether existing public firms are more likely to attempt to minimize their cash flow risk and thus reduce their carcinogen exposure than are private firms. I do not find evidence that public firms respond differently to this shock than do private firms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Behavioral Parent Training (BPT) is a well-established therapy that reduces child externalized behaviors and parent stress. Although BPT was originally developed for parents of children with defiant behaviors, the program’s key concepts are relevant to parenting all children. Since parents might not fully utilize BPT due to cost and program location, we created an online game as a low-cost, easily accessible alternative or complement to BPT. We tested the game with nineteen undergraduate students at the University of Maryland. The experimental group completed pretest survey on core BPT knowledge, played the game, and completed a BPT posttest, while the control group completed a pretest and posttest survey over a three week period. Participants in the experimental group also completed a survey to indicate their satisfaction with the overall program. The experimental group demonstrated significantly higher levels of BPT knowledge than the control group and high levels of satisfaction. This suggests that an interactive, online BPT platform is an engaging and accessible way for parents to learn key concepts.