Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
140,807
result(s) for
"Securities issues"
Sort by:
Cloud-connected flying edge computing for smart agriculture
by
Ammad, Uddin M
,
Aggoune el-Hadi M
,
Ayaz Muhammad
in
Agriculture
,
Applications programs
,
Cloud computing
2021
Due to recent advancements and the success of versatile mobile applications, more and more services around the globe are being moved to the cloud. As a result, its limitations have become more evident. The major issues that cloud-based applications face include large latency, bottlenecks because of central processing, compromised security, and lack of offline processing. The drawbacks of cloud computing are reduced by fog and edge computing, where data are processed near the places where it is generated—at network edges or fog nodes—most importantly in a distributed way. Smart agriculture is an approach based on the Internet of Things (IoT) where cloud computing is not an option as the internet is usually not available at remote sites. In addition, pure edge computing also is not practical, as most sensor nodes are very small and they do not have enough computing power. Intermediate fog computing also is not a good choice, as fixed fog nodes (getaway nodes) do not work well with high node fluctuation caused by bad weather or harsh conditions. Considering these issues and limitations, we have proposed the idea of flying edge computing where an unmanned aerial vehicle (UAV) acts as an edge-computing machine. This can be an ideal solution for smart agriculture, given the size and remoteness of many agricultural areas. This technique can be called “wind or breeze computing” because the data are “blown” or moved by the current of computing. The Flying-Edge offers fast deployment of edge facilities in challenging locations and it can be a major step to accomplish the goal of IoT-based smart agriculture.
Journal Article
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
by
Benbasat, Izak
,
Cavusoglu, Hasan
,
Bulgurcu, Burcu
in
Attitudes
,
Betriebliches Informationssystem
,
Compliance
2010
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the information security rules and regulations of the organization are the key to strengthening information security, understanding compliance behavior is crucial for organizations that want to leverage their human capital. This research identifies the antecedents of employee compliance with the information security policy (ISP) of an organization. Specifically, we investigate the rationality-based factors that drive an employee to comply with requirements of the ISP with regard to protecting the organization's information and technology resources. Drawing on the theory of planned behavior, we posit that, along with normative belief and self-efficacy, an employee's attitude toward compliance determines intention to comply with the ISP. As a key contribution, we posit that an employee's attitude is influenced by benefit of compliance, cost of compliance, and cost of noncompliance, which are beliefs about the overall assessment of consequences of compliance or noncompliance. We then postulate that these beliefs are shaped by the employee's outcome beliefs concerning the events that follow compliance or noncompliance: benefit of compliance is shaped by intrinsic benefit, safety of resources, and rewards, while cost of compliance is shaped by work impediment; and cost of noncompliance is shaped by intrinsic cost, vulnerability of resources, and sanctions. We also investigate the impact of information security awareness (ISA) on outcome beliefs and an employee's attitude toward compliance with the ISP. Our results show that an employee's intention to comply with the ISP is significantly influenced by attitude, normative beliefs, and self-efficacy to comply. Outcome beliefs significantly affect beliefs about overall assessment of consequences, and they, in turn, significantly affect an employee's attitude. Furthermore, ISA positively affects both attitude and outcome beliefs. As the importance of employees' following their organizations' information security rules and regulations increases, our study sheds light on the role of ISA and compliance-related beliefs in an organization's efforts to encourage compliance.
Journal Article
Sizing Up Repo
by
KRISHNAMURTHY, ARVIND
,
NAGEL, STEFAN
,
ORLOV, DMITRY
in
Asset backed securities
,
Assets
,
Bank collateral
2014
To understand which short-term debt markets experienced \"runs\" during the financial crisis, we analyze a novel data set of repurchase agreements (repo), that is, loans between nonbank cash lenders and dealer banks collateralized with securities. Consistent with a run, repo volume backed by private asset-backed securities falls to near zero in the crisis. However, the reduction is only $182 billion, which is small relative to the stock of private asset-backed securities as well as the contraction in asset-backed commercial paper. While the repo contraction is small in aggregate, it disproportionately affected a few dealer banks.
Journal Article
The Credit Crisis as a Problem in the Sociology of Knowledge
2011
This article analyzes the role in the credit crisis of the processes by which market participants produce knowledge about financial instruments. Employing documentary sources and 87 predominantly oral history interviews, the article presents a historical sociology of the clusters of evaluation practices surrounding ABSs (asset-backed securities, most importantly mortgage-backed securities) and CDOs (collateralized debt obligations). Despite the close structural similarity between ABSs and CDOs, these practices came to differ substantially and became the province (e.g., in the rating agencies) of organizationally separate groups. In consequence, when ABS CDOs (CDOs in which the underlying assets are ABSs) emerged, they were evaluated in two separate stages. This created a fatally attractive arbitrage opportunity, large-scale exploitation of which sidelined previously important gatekeepers (risk-sensitive investors in the lower tranches of mortgage-backed securities) and eventually magnified and concentrated the banking system's calamitous mortgage-related losses. Adapted from the source document.
Journal Article
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
2011
End users are said to be \"the weakest link\" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, have examined end user motivation to engage in such behavior. To fill this research gap, in the present study we propose and test empirically a nonmalicious security violation (NMSV) model with data from a survey of end users at work. The results suggest that utilitarian outcomes (relative advantage for job performance, perceived security risk), normative outcomes (workgroup norms), and self-identity outcomes (perceived identity match) are key determinants of end user intentions to engage in NMSVs. In contrast, the influences of attitudes toward security policy and perceived sanctions are not significant. This study makes several significant contributions to research on security-related behavior by (1) highlighting the importance of job performance goals and security risk perceptions on shaping user attitudes, (2) demonstrating the effect of workgroup norms on both user attitudes and behavioral intentions, (3) introducing and testing the effect of perceived identity match on user attitudes and behavioral intentions, and (4) identifying nonlinear relationships between constructs. This study also informs security management practices on the importance of linking security and business objectives, obtaining user buy-in of security measures, and cultivating a culture of secure behavior at local workgroup levels in organizations.
Journal Article
The Role of Institutional Investors in Voting: Evidence from the Securities Lending Market
by
STURGESS, JASON
,
AGGARWAL, REENA
,
SAFFI, PEDRO A. C.
in
Corporate governance
,
Financial performance
,
Governance
2015
This paper investigates voting preferences of institutional investors using the unique setting of the securities lending market. Investors restrict lendable supply and/or recall loaned shares prior to the proxy record date to exercise voting rights. Recall is higher for investors with greater incentives to monitor, for firms with poor performance or weak governance, and for proposals where returns to governance are likely higher. At the subsequent vote, recall is associated with less support for management and more support for shareholder proposals. Our results indicate that institutions value their vote and use the proxy process to affect corporate governance.
Journal Article
Voluntary Disclosure and Information Asymmetry: Evidence from the 2005 Securities Offering Reform
by
WHITE, HAL D.
,
SHROFF, NEMIT
,
ZHANG, WEINING
in
2005
,
Asymmetric information
,
Asymmetrische Information
2013
In 2005, the Securities and Exchange Commission enacted the Securities Offering Reform (Reform), which relaxes \"gun-jumping\" restrictions, thereby allowing firms to more freely disclose information before equity offerings. We examine the effect of the Reform on voluntary disclosure behavior before equity offerings and the associated economic consequences. We find that firms provide significantly more preoffering disclosures after the Reform. Further, we find that these preoffering disclosures are associated with a decrease in information asymmetry and a reduction in the cost of raising equity capital. Our findings not only inform the debate on the market effect of the Reform, but also speak to the literature on the relation between voluntary disclosure and information asymmetry by examining the effect of quasi-exogenous changes in voluntary disclosure on information asymmetry, and thus a firm's cost of capital.
Journal Article
Estimating Oil Risk Factors Using Information from Equity and Derivatives Markets
by
CHIANG, I-HSUAN ETHAN
,
SAGI, JACOB S.
,
HUGHEN, W. KEENER
in
1983-2012
,
Capital returns
,
Crude oil prices
2015
We introduce a novel approach to estimating latent oil risk factors and establish their significance in pricing nonoil securities. Our model, which features four factors with simple economic interpretations, is estimated using both derivative prices and oil-related equity returns. The fit is excellent in and out of sample. The extracted oil factors carry significant risk premia, and are significantly related to macroeconomic variables as well as portfolio returns sorted on characteristics and industry. The average nonoil portfolio exhibits a sensitivity to the oil factors amounting to a sixth (in magnitude) of that of the oil industry itself.
Journal Article
International Differences in the Cost of Equity Capital: Do Legal Institutions and Securities Regulation Matter?
2006
This paper examines international differences in firms' cost of equity capital across 40 countries. We analyze whether the effectiveness of a country's legal institutions and securities regulation is systematically related to cross-country differences in the cost of equity capital. We employ several models to estimate firms' implied or ex ante cost of capital. Our results support the conclusion that firms from countries with more extensive disclosure requirements, stronger securities regulation, and stricter enforcement mechanisms have a significantly lower cost of capital. We perform extensive sensitivity analyses to assess the potentially confounding influence of countries' long-run growth differences on our results. We also show that, consistent with theory, the cost of capital effects of strong legal institutions become substantially smaller and, in many cases, statistically insignificant as capital markets become globally more integrated.
Journal Article
A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
by
Gharehchopogh, Farhad Soleimanian
,
Naghib, Arezou
,
Zamanifar, Azadeh
in
Artificial Intelligence
,
Classification
,
Computer Science
2025
The increasing number of medical devices in the Internet of Medical Things (IoMT) environment has raised significant cybersecurity concerns. These devices often have weak security features, poor design, and insufficient authentication protocols, making them vulnerable to cyberattacks and intrusions. To mitigate these threats, robust security measures are essential. This includes implementing strong security protocols, ensuring continuous security monitoring, enforcing regular updates, and maintaining a constant response plan. Additionally, designing an effective Intrusion Detection System (IDS) is crucial to safeguard patient data and devices. This paper systematically studies the current state of the literature and the essential methods for intrusion detection in the IoMT. Employing a selection process, the paper identifies 28 critical studies published between 2018 and April 2024. The intrusion detection mechanisms in the IoMT are divided into five categories: IDS based on artificial intelligence models, datasets used in IoMT for IDS, fundamental security requirements, intrusion detection processes, and evaluation metrics. This paper dissects the various mechanisms within each category in a meticulous and comprehensive analysis. Finally, the paper examines the challenges and open issues in developing IDSs in IoMT. By offering a roadmap for researchers to enhance IDSs in the IoMT, this paper has the potential to significantly impact the fields of computer engineering, cybersecurity, and healthcare, thereby contributing to the advancement of these crucial fields.
Journal Article