988 resultados para Security Markets Act


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This fulfills the statutory requirement in Section 19-130, Commission Study and Report, of Article 19 (220 ILCS 5/19) of the Illinois Public Utilities Act ("Act"). Section 19-130 requires the Illinois Commerce Commission ("Commission") to prepare an annual report analyzing the status and development of the retail natural gas market in the State of Illinois, including data on volumes of natural gas sold to retail customers and the number of customers served by alternative gas suppliers and gas utilities. The required data is included in tables and attached as an appendix.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cover title.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"September 29, 2005."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"H.R. 6675, an act to provide a hospital insurance program for the aged under the Social security act, with a supplementary health benefits program and an expanded program on medical assistance, to increase benefits under the old-age, survivors, and disability insurance system, to improve the Federal-State public assistance programs, and for other purposes."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article explores the different moral and legal arguments used by protagonists in the debate about whether or not to conduct a humanitarian intervention in Darfur. The first section briefly outlines four moral and legal positions on whether there is (and should be) a right and/or duty of humanitarian intervention: communitarianism, restrictionist and counter-restrictionist legal positivism and liberal cosmopolitanism. The second section then provides an overview of the Security Council's debate about responding to Darfur's crisis, showing how its policy was influenced by both normative concerns and hard-nosed political calculations. The article concludes by asking what Darfur's case reveals about the legitimacy and likelihood of humanitarian intervention in such catastrophes and the role of the UN Security Council as the primary authorising body for the use of international force. The authors argue that this case demonstrates that for the cosmopolitan/counter-restrictionist case to prevail pivotal states need to put humanitarian emergencies on the global agenda and express a willingness to act without Council authorisation, though the question of how to proceed in cases where the Council is deadlocked remains vexed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the profitability that the widely published momentum strategy achieves following bull and bear markets. Investors can gain stronger momentum profits by adopting the continuation strategy after poor lagged market returns. The longer the duration used to describe the bear state, the stronger the momentum returns that are realised. The results contradict the theoretical findings of the investors' overconfidence model of Daniel et al. (`Investor Psychology and Security Market Under- and Over-Reactions', Journal of Finance, 53, 1839-85, 1998) and the follow-the-trend model of Kim (`Long-term Momentum Hypothesis: Contrarian and Momentum Strategies', Working Paper, 2002), but concur with the theoretical results of the traders' hesitation model of Du (`Heterogeneity in Investor Confidence and Asset Market Under- and Overreaction', Working Paper, 2002).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent research has suggested that the A and B share markets of China may be informationally segmented. In this paper volatility patterns in the A and B share market are studied to establish whether volatility changes to the A and B share markets are synchronous. A consequence of new information, when investors act upon it is that volatility rises. This means that if the A and B markets are perfectly integrated volatility changes to each market would be expected to occur at the same time. However, if they are segmented there is no reason for volatility changes to occur on the same day. Using the iterative cumulative sum of squares across the different markets. Evidence is found of integration between the two A share markets but not between the A and B markets. © 2005 Taylor & Francis Group Ltd.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Following the end of the Cold War and the ensuing changes to the international landscape, thinking about security has tended to become more discursive and interpretative in nature. What counts as security has increasingly derived from security discourses (that is, 'securitisation') and uncertainty about the multi-faceted future facing various countries and regions. Within this post-Cold War discourse, the Western Mediterranean has emerged as a region fraught with latent and manifest threats in the economic, political, societal and military sectors. Improved access to EU markets for Maghrebi exports; the security of energy supplies to the EU from Algeria and Libya; lack of democracy and the advance of political Islam; the flow of northward migration and worries about law and order in France, Italy and Spain; the growth in military expenditure and weapons proliferation in the Maghreb; all have been central to the securitisation agenda. However, this agenda has often lacked credibility especially when inter-linkages have purportedly been established between economic underdevelopment and political instability, between the advance of political Islam and the threat to energy supplies, or between immigration and the threat to national identity. Such inter-sectoral linkages distract from the credibility of those 'securitisation instances' which correspond to reality; the former linkages have often been exploited by extremist politicians in south-west European countries as well as by regimes in the Maghreb to advance their respective interests. Thus, securitisation may defeat its main purpose; it may generate responses out of keeping with the aims proclaimed at the outset, aims centred on the countering of real threats and the ensuring of greater stability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this article we study the relationship between security returns cross-listed on the A share market of China and the H share market at the Stock Exchange of Hong Kong (SEHK). Most of these securities are also cross-listed on other markets. An important feature of this article is that we focus on the multilateral relationships between all cross-listed markets rather than concentrating only on the bi-lateral relationship between A and Hong Kong H shares. Using the impulse response functions and the variance decompositions from a Vector Autoregressive (VAR) process we show that the returns to the A share market are almost exclusively determined by domestic factors. In contrast, we find that the H share market is influenced by both the A share market within China and foreign stock markets elsewhere in the world. Impulse response functions suggest that innovations to the A share market and the Hong Kong H share market are partly transmitted to each other and to stock markets outside China. We show that liquidity has an important role to play in determining the impact that the home market has on cross-listed variance decompositions. © 2012 Copyright Taylor and Francis Group, LLC.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we re-examine the relationship between non-trading frequency and portfolio return autocorrelation. We show that in portfolios where security specific effects have not been completely diversified, portfolio autocorrelation will not increase monotonically with increasing non-trading, as indicated in Lo and MacKinlay (1990). We show that at high levels of non-trading, portfolio autocorrelation will become a decreasing function of non-trading probability and may take negative values. We find that heterogeneity among the means, variances and betas of the component securities in a portfolio can act to increase the induced autocorrelation, particularly in portfolios containing fewer stocks. Security specific effects remain even when the number of securities in the portfolio is far in excess of that considered necessary to diversify security risk. © 2014 Elsevier B.V.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Different types of ontologies and knowledge or metaknowledge connected to them are considered and analyzed aiming at realization in contemporary information security systems (ISS) and especially the case of intrusion detection systems (IDS) or intrusion prevention systems (IPS). Human-centered methods INCONSISTENCY, FUNNEL, CALEIDOSCOPE and CROSSWORD are algorithmic or data-driven methods based on ontologies. All of them interact on a competitive principle ‘survival of the fittest’. They are controlled by a Synthetic MetaMethod SMM. It is shown that the data analysis frequently needs an act of creation especially if it is applied to knowledge-poor environments. It is shown that human-centered methods are very suitable for resolutions in case, and often they are based on the usage of dynamic ontologies