978 resultados para financial security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of social media has spread into many different areas including marketing, customer service, and corporate disclosure. However, our understanding of the timely effect of financial reporting information on Twitter is still limited. In this paper, we propose to examine the timely effect of financial reporting information on Twitter in Australian context, as reflect in the stock market trading. We aim to find out whether the level of information asymmetry within the stock market will be reduced, after the introduction of Twitter and the use of Twitter for financial reporting purpose

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the extent and nature of use of use of twitter for financial reporting by ASX listed companies. We consider 199 financial information related tweets from 14 ASX listed companies’ Twitter accounts. A thematic analysis of these tweets shows ‘Earnings’ and ‘Operational Performance’ are the most discussed financial reporting themes. Further, a comparison across industry sectors reveals that listed companies from varies industries show different usage patterns of financial reporting on Twitter. The examination of tweet sentiments also indicates a reporting bias within these tweets, as listed companies are more willing to disclose positive financial reporting tweets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of social media has spread into many different areas including marketing, customer service, and corporate disclosure. However, our understanding of the timely effect of financial reporting information on Twitter is still limited. In this paper, we examine the timely effect of financial reporting information on Twitter in the Australian context, as reflected in the follow-up stock market reaction. With the use of event methodology and comparative setting, we find that financial reporting disclosure on Twitter reduces the information asymmetry level. This is evidenced by reduction of bid-ask spread and increase of share trading volume. The results of this study imply that financial reporting disclosure on social media assists the dissemination of information and the stock market response to this information

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital image

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper I conduct a Foucauldian discourse analysis of a political speech given by Brendon Nelson in 2006 when the Australian Minister for Defence in the Howard Coalition Government. The speech connects conceptualisations of terror, globalization, education and literacy as part of a whole of government security strategy. The analysis examines this speech as an example of a liberal way of governing the conduct of diverse and unpredictable populations. My analysis suggests that the apparatus of government has been strategically used in order to biopolitically contain the rise of complex social forces and protect a set of homogenous cultural values. The purposes of education and uses of literacy are seen as instruments for the inscription of a coded set of values understood to be synonymous with civil society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding the important concepts necessary to undertake the preparation of consolidated financial statements has proven challenging for many accounting undergraduate students. As a result, the development of multimedia modelling concepts such as acquisition analysis, business combination valuation entries, reacquisition entries and intragroup transactions were embedded within an e-learning environment. The principle of modelling, derived from social cognitive theory, was applied to the design of the multimedia. A study was conducted to gauge the effectiveness of the approach and consider student perceptions with regard to learning through this approach. Quantitative data were collected from accounting undergraduate students (n= 464) enrolled across three different cohorts including international campuses (n=386), an Australian campus (n=49) and a distance education cohort (n=29). Analyses were undertaken to show significant differences between these cohorts. This research paper presents findings that indicate a positive and significant association between the number of times the videos were accessed, and the assignment score (p<0.05) was evident, suggesting that students that referred to the videos relatively frequently were able to utilise the knowledge gained from the videos to assist them in completing the assignment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main objective of the study is to evaluate the Finnish central government s foreign borrowing between the years 1862 and 1938. Most of this period was characterised by deep capital market integration that bears resemblance to the liberal world financial order at the turn of the millennium. The main aim is to analyse the credit risk associated with the state and its determination by evaluating the world financial market centres perception of Finland. By doing this, the study is also expected to provide an additional dimension to Finland s political and economic history by incorporating into the research the assessments of international capital markets regarding Finland during a period that witnessed profound political and economic changes in Finnish society. The evaluation of the credit risk mainly relies on exchange-rate risk free time series of the state s foreign bonds. They have been collected from quotations in the stock exchanges in Helsinki, Hamburg, Paris and London. In addition, it investigates Finland s exposure to short-term debt and Moody s credit ratings assigned to Finland. The study emphasises the importance of the political risk. It suggests that the hey-day of the state s reliance on foreign capital markets took place during last few decades of the 19th century when Finland enjoyed a wide autonomy in the Russian Empire and prudently managed its economy, highlighted in Finland s adherence to the international gold standard. Political confrontations in Finland and, in particular, in Russia and the turbulence of the world financial system prevented the return of this beneficial position again. Through its issuance of foreign bonds the state was able to import substantial amounts of foreign capital, which was sorely needed to foster economic development in Finland. Moreover, the study argues that the state s presence in the western capital markets not only had economic benefits, but it also increased the international awareness of Finland s distinct and separate status in the Russian Empire and later underlined its position as an independent republic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we discuss results of a field study focused on understanding the ways money and financial issues are handled within family settings. Families develop ‘systems’ or methods through which they coordinate and manage their everyday financial activities. Through an analysis of our fieldwork data collected from fifteen families, we provide several examples of such systems, highlighting their qualities and illustrating how such systems come to support the handling of financial activities in the home. Our results show that these systems are developed with a careful consideration of familial values, relationships and routines; and incorporate the use of physical and digital tools. Consequently, we suggest that design should consider the use and non-use of technology when supporting household financial management, taking into account the richness of families’ existing organically formed practices surrounding financial systems. Finally, our findings point to the fact that financial management in the domestic setting is socially organized and is closely connected to supporting everyday household activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main objective of on-line dynamic security assessment is to take preventive action if required or decide remedial action if a contingency actually occurs. Stability limits are obtained for different contingencies. The mode of instability is one of the outputs of dynamic security analysis. When a power system becomes unstable, it splits initially into two groups of generators, and there is a unique cutset in the transmission network known as critical cutset across which the angles become unbounded. The knowledge of critical cutset is additional information obtained from dynamic security assessment, which can be used for initiating preventive control actions, deciding emergency control actions, and adaptive out-of-step relaying. In this article, an analytical technique for the fast prediction of the critical cutset by system simulation for a short duration is presented. Case studies on the New England ten-generator system are presented. The article also suggests the applications of the identification of critical cutsets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We examine the impact of financial reforms on efficient reallocation of capital within and between sectors in South Africa using firm-level panel data for the period 1991–2008. The measure of efficient allocation of capital is based on the Tobin’s Q. We find that financial reforms are associated with improvements in within-sector, but not between-sector allocation of capital. These results imply that for South Africa to unleash the potential for take-off that is often associated with reallocation of resources from the primitive to modern sectors, reforms that focus beyond the financial sector are necessary. While more research is necessary to determine what would fully constitute such additional reforms, our analysis shows that reforms that improve the quality of economic institutions may be a step in the right the direction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At present, many countries have either embraced ISO9001 or used it as the basis of their national quality certification systems. However, few studies have been conducted to examine the benefits companies’ gain from achieving and implementing ISO9001 standards (Chikuku et al. 2012; Psomas et al. 2013; Sampaio et al. 2011a,b). Analysis has brought much more confused and uneven results across the countries. Turning to the experience of Malaysia, this country has witnessed a spectacular growth at an average rate of 9.89% per annum of ISO certificates issued to companies operating within its borders (ISO Survey 2012). While many companies rush to be ISO 9001 certified whether this brings about better benefits (both the financial and the non-financial) is still an open question. In this study, the research problems were first formulated from the literature and then a questionnaire survey was conducted to test the hypotheses. A survey was administered to chief executives officers and managers across manufacturing and service organizations in Malaysia. Multivariate analysis and SPSS macro developed by Preacher and Hayes were used as statistical techniques to the financial and non-financial benefits of ISO9001 certification. The survey instrument was a two-page questionnaire comprising three sections. The first section of the questionnaire covered the company’s profile. The second section consisted of 25 items on internal benefits and third section consisted of 7 items on external benefits measured on 1–5 Likert scale to assess the benefits of ISO9001 certification. Total 201 valid responses were received. Results of the study indicate that there was no significant direct relationship between ISO9001 certification and organizational financial performance, while strong statistical evidence was found to support the direct relationship between ISO9001 certification and non-financial performance. The findings of the study discovered that financial performance is actually directly related to two non-financial measures, namely quality performance and local and international business performance, which are directly and significantly influenced by ISO9001 certification. Therefore non-financial performance measures are involved in the mediational process. The findings will assist practitioners in taking right courses of action that make the implementation of this standard more effective. For example, the study findings study suggests that companies should put emphasize on nonfinancial factors to improve their financial performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.