Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
LanguageLanguage
-
SubjectSubject
-
Item TypeItem Type
-
DisciplineDiscipline
-
YearFrom:-To:
-
More FiltersMore FiltersIs Peer Reviewed
Done
Filters
Reset
443
result(s) for
"Securities industry -- Law and legislation -- United States"
Sort by:
Regulation of securities, markets, and transactions
2011
The ultimate guide to the current rules and regulations that govern the securities industry?including amendments in 2010 Providing readers with expert coverage of domestic securities regulation, this book fills the need for coverage of securities regulations, defining, describing, and explaining everything professionals need to know about domestic securities regulation. - Examines the current securities rules - Provides an overview of the latest regulations for this industry - Includes a description of the various government regulations of securities markets, and securities transactions Since the corporate scandals of 2002, this industry has seen intense scrutiny of how it is regulated. Regulation of Securities, Markets, and Transactions demystifies the new laws and regulations with straightforward, to-the-point coverage professionals need.
When the levees break
by
Martin, Jena
,
Kunz, Karen
in
Financial crises - United States - Prevention
,
Finanzmarktregulierung
,
POLITICAL SCIENCE
2016,2017,2019
The stock markets. Whether you invest or not, the workings of the stock market almost certainly touch your life. Either through your retirement fund, your mutual fund or just because you work for a place that invests (or is invested in)—the reach of the securities markets is expanding, like an ever growing tidal wave.
This book discusses what happens when that wave hits the shore. Specifically, this book argues that, given the mounting deluge from misplaced regulation, fast-paced technology, and dominant financial players, the current US regulatory structure is woefully inadequate to hold back the tide.
Using vivid imagery and plain language, Karen Kunz and Jena Martin take the problems involved in regulating the complex world of securities head on. Examining everything from the rise of technology and the role of hedge funds to our bloated agency system, Kunz and Martin argue that the current structure is doomed to fail and, when it does, the consequences will be disastrous.
Sending out a call to action, the authors also offer a bold vision for how to fix the mess we've made—not by tinkering around the edges—but instead by building a whole new structure, one that can withstand the next storm that is sure to come.
Investor and Industry Perspectives on Investment Advisers and Broker-Dealers
2008
In theory, financial professionals are relatively distinct: A broker-dealer conducts transactions in securities on behalf of itself and others; and an investment adviser provides advice to others regarding securities. Different laws regulate each type of professional, but boundaries have blurred. This report examines current business practices and investor understanding of each type.
Good Jobs, Bad Jobs
2011
Good Jobs, Bad Jobs provides an insightful analysis of how and why precarious employment is gaining ground in the labor market and the role these developments have played in the decline of the middle class. Kalleberg shows that by the 1970s, government deregulation, global competition, and the rise of the service sector gained traction, while institutional protections for workers—such as unions and minimum-wage legislation—weakened. Together, these forces marked the end of postwar security for American workers. The composition of the labor force also changed significantly; the number of dual-earner families increased, as did the share of the workforce comprised of women, non-white, and immigrant workers. Of these groups, blacks, Latinos, and immigrants remain concentrated in the most precarious and low-quality jobs, with educational attainment being the leading indicator of who will earn the highest wages and experience the most job security and highest levels of autonomy and control over their jobs and schedules. Kalleberg demonstrates, however, that building a better safety net—increasing government responsibility for worker health care and retirement, as well as strengthening unions—can go a long way toward redressing the effects of today’s volatile labor market. There is every reason to expect that the growth of precarious jobs—which already make up a significant share of the American job market—will continue. Good Jobs, Bad Jobs deftly shows that the decline in U.S. job quality is not the result of fluctuations in the business cycle, but rather the result of economic restructuring and the disappearance of institutional protections for workers. Only government, employers and labor working together on long-term strategies—including an expanded safety net, strengthened legal protections, and better training opportunities—can help reverse this trend.
Healthcare Cybersecurity
by
Gantt, W. Andrew H
in
Computer security-Law and legislation-United States
,
Data protection-Law and legislation-United States
,
Health services administration-Information technology-Law and legislation-United States
2021
Maintaining cybersecurity in today's technologically driven world is vital to the health of any business. Media outlets continue to report on large-scale data breaches affecting millions of consumers' information and costing companies millions, and sometimes even billions, of dollars to rectify. Organizations, particularly those within or touching the healthcare industry, remain the most attractive of targets for cyber attackers given the higher and lasting value of personal health information.The goal of this book is to help bolster stakeholders' knowledge of cybersecurity in the healthcare industry, with the aim of pinpointing current and impending threats to the industry's data security. The topics to be addressed include types of cybersecurity threats; ransomware in healthcare; how to prepare for and respond to cybersecurity attacks; the cost of inadequate security measures; and managing privacy and cybersecurity risks.
Patient Health Record Protection Beyond the Health Insurance Portability and Accountability Act: Mixed Methods Study
by
Xu, Yilin
,
Subramanian, Hemang
,
Sengupta, Arijit
in
Access control
,
Analysis
,
Computer Security - legislation & jurisprudence
2024
The security and privacy of health care information are crucial for maintaining the societal value of health care as a public good. However, governance over electronic health care data has proven inefficient, despite robust enforcement efforts. Both federal (HIPAA [Health Insurance Portability and Accountability Act]) and state regulations, along with the ombudsman rule, have not effectively reduced the frequency or impact of data breaches in the US health care system. While legal frameworks have bolstered data security, recent years have seen a concerning increase in breach incidents. This paper investigates common breach types and proposes best practices derived from the data as potential solutions.
The primary aim of this study is to analyze health care and hospital breach data, comparing it against HIPAA compliance levels across states (spatial analysis) and the impact of the Omnibus Rule over time (temporal analysis). The goal is to establish guidelines for best practices in handling sensitive information within hospitals and clinical environments.
The study used data from the Department of Health and Human Services on reported breaches, assessing the severity and impact of each breach type. We then analyzed secondary data to examine whether HIPAA's storage and retention rule amendments have influenced security and privacy incidents across all 50 states. Finally, we conducted a qualitative analysis of textual data from vulnerability and breach reports to identify actionable best practices for health care settings.
Our findings indicate that hacking or IT incidents have the most significant impact on the number of individuals affected, highlighting this as a primary breach category. The overall difference-in-differences trend reveals no significant reduction in breach rates (P=.50), despite state-level regulations exceeding HIPAA requirements and the introduction of the ombudsman rule. This persistence in breach trends implies that even strengthened protections and additional guidelines have not effectively curbed the rising number of affected individuals. Through qualitative analysis, we identified 15 unique values and associated best practices from industry standards.
Combining quantitative and qualitative insights, we propose the \"SecureSphere framework\" to enhance data security in health care institutions. This framework presents key security values structured in concentric circles: core values at the center and peripheral values around them. The core values include employee management, policy, procedures, and IT management. Peripheral values encompass the remaining security attributes that support these core elements. This structured approach provides a comprehensive security strategy for protecting patient health information and is designed to help health care organizations develop sustainable practices for data security.
Journal Article
A Century of Repression
by
Engelman, Ralph
,
Shenkman, Carey
in
Communication Studies
,
Freedom of the press
,
Freedom of the press-United States-Criminal provisions
2022
A Century of Repression offers an unprecedented and
panoramic history of the use of the Espionage Act of 1917 as the
most important yet least understood law threatening freedom of the
press in modern American history. It details government use of the
Act to control information about U.S. military and foreign policy
during the two World Wars, the Cold War, and the War on Terror. The
Act has provided cover for the settling of political scores,
illegal break-ins, and prosecutorial misconduct.
Security Law and Methods
Security Law and Methods examines suggested security methods designed to diminish or negate the consequence of crime and misconduct, and is an attempt to understand both the legal exposures related to crime and the security methods designed to prevent crime. The clear and concise writing of this groundbreaking work, as well as its insightful analysis of specific cases, explains crime prevention methods in light of legal and security principles. Divided into five parts, Security Law and Methods discusses the topics of premises liability and negligence, intentional torts and claims, agency and contract based claims, legal authority and liability, and the subject of terrorism. It also offers an evocative look at security issues that may arise in the future. The book serves as a comprehensive and insightful treatment of security, and is an invaluable addition to the current literature on security and the law. * Contains clear explanations of complicated legal concepts* Includes case excerpts, summaries, and discussion questions* Suggests additional research and relevant cases for further study
The price of rights
2013
Many low-income countries and development organizations are calling for greater liberalization of labor immigration policies in high-income countries. At the same time, human rights organizations and migrant rights advocates demand more equal rights for migrant workers. The Price of Rights shows why you cannot always have both.
Examining labor immigration policies in over forty countries, as well as policy drivers in major migrant-receiving and migrant-sending states, Martin Ruhs finds that there are trade-offs in the policies of high-income countries between openness to admitting migrant workers and some of the rights granted to migrants after admission. Insisting on greater equality of rights for migrant workers can come at the price of more restrictive admission policies, especially for lower-skilled workers. Ruhs advocates the liberalization of international labor migration through temporary migration programs that protect a universal set of core rights and account for the interests of nation-states by restricting a few specific rights that create net costs for receiving countries.
The Price of Rights analyzes how high-income countries restrict the rights of migrant workers as part of their labor immigration policies and discusses the implications for global debates about regulating labor migration and protecting migrants. It comprehensively looks at the tensions between human rights and citizenship rights, the agency and interests of migrants and states, and the determinants and ethics of labor immigration policy.
Surveillance, privacy, and transatlantic relations
by
Fabbrini, Federico
,
Schulhofer, Stephen J.
,
Cole, David
in
Electronic surveillance -- Law and legislation -- European Union countries
,
Electronic surveillance -- Law and legislation -- United States
,
Privacy, Right of -- European Union countries
2017