7 resultados para Security Markets Act

em Aston University Research Archive


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Case law report - online

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the profitability that the widely published momentum strategy achieves following bull and bear markets. Investors can gain stronger momentum profits by adopting the continuation strategy after poor lagged market returns. The longer the duration used to describe the bear state, the stronger the momentum returns that are realised. The results contradict the theoretical findings of the investors' overconfidence model of Daniel et al. (`Investor Psychology and Security Market Under- and Over-Reactions', Journal of Finance, 53, 1839-85, 1998) and the follow-the-trend model of Kim (`Long-term Momentum Hypothesis: Contrarian and Momentum Strategies', Working Paper, 2002), but concur with the theoretical results of the traders' hesitation model of Du (`Heterogeneity in Investor Confidence and Asset Market Under- and Overreaction', Working Paper, 2002).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent research has suggested that the A and B share markets of China may be informationally segmented. In this paper volatility patterns in the A and B share market are studied to establish whether volatility changes to the A and B share markets are synchronous. A consequence of new information, when investors act upon it is that volatility rises. This means that if the A and B markets are perfectly integrated volatility changes to each market would be expected to occur at the same time. However, if they are segmented there is no reason for volatility changes to occur on the same day. Using the iterative cumulative sum of squares across the different markets. Evidence is found of integration between the two A share markets but not between the A and B markets. © 2005 Taylor & Francis Group Ltd.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Following the end of the Cold War and the ensuing changes to the international landscape, thinking about security has tended to become more discursive and interpretative in nature. What counts as security has increasingly derived from security discourses (that is, 'securitisation') and uncertainty about the multi-faceted future facing various countries and regions. Within this post-Cold War discourse, the Western Mediterranean has emerged as a region fraught with latent and manifest threats in the economic, political, societal and military sectors. Improved access to EU markets for Maghrebi exports; the security of energy supplies to the EU from Algeria and Libya; lack of democracy and the advance of political Islam; the flow of northward migration and worries about law and order in France, Italy and Spain; the growth in military expenditure and weapons proliferation in the Maghreb; all have been central to the securitisation agenda. However, this agenda has often lacked credibility especially when inter-linkages have purportedly been established between economic underdevelopment and political instability, between the advance of political Islam and the threat to energy supplies, or between immigration and the threat to national identity. Such inter-sectoral linkages distract from the credibility of those 'securitisation instances' which correspond to reality; the former linkages have often been exploited by extremist politicians in south-west European countries as well as by regimes in the Maghreb to advance their respective interests. Thus, securitisation may defeat its main purpose; it may generate responses out of keeping with the aims proclaimed at the outset, aims centred on the countering of real threats and the ensuring of greater stability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this article we study the relationship between security returns cross-listed on the A share market of China and the H share market at the Stock Exchange of Hong Kong (SEHK). Most of these securities are also cross-listed on other markets. An important feature of this article is that we focus on the multilateral relationships between all cross-listed markets rather than concentrating only on the bi-lateral relationship between A and Hong Kong H shares. Using the impulse response functions and the variance decompositions from a Vector Autoregressive (VAR) process we show that the returns to the A share market are almost exclusively determined by domestic factors. In contrast, we find that the H share market is influenced by both the A share market within China and foreign stock markets elsewhere in the world. Impulse response functions suggest that innovations to the A share market and the Hong Kong H share market are partly transmitted to each other and to stock markets outside China. We show that liquidity has an important role to play in determining the impact that the home market has on cross-listed variance decompositions. © 2012 Copyright Taylor and Francis Group, LLC.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we re-examine the relationship between non-trading frequency and portfolio return autocorrelation. We show that in portfolios where security specific effects have not been completely diversified, portfolio autocorrelation will not increase monotonically with increasing non-trading, as indicated in Lo and MacKinlay (1990). We show that at high levels of non-trading, portfolio autocorrelation will become a decreasing function of non-trading probability and may take negative values. We find that heterogeneity among the means, variances and betas of the component securities in a portfolio can act to increase the induced autocorrelation, particularly in portfolios containing fewer stocks. Security specific effects remain even when the number of securities in the portfolio is far in excess of that considered necessary to diversify security risk. © 2014 Elsevier B.V.