Search results

1 – 9 of 9
Article
Publication date: 18 September 2007

Brian A. Ochs

The purpose of this article is to analyze the SEC enforcement staff's recent scrutiny of the roles and responsibilities of securities firms for the protection of confidential…

1326

Abstract

Purpose

The purpose of this article is to analyze the SEC enforcement staff's recent scrutiny of the roles and responsibilities of securities firms for the protection of confidential information.

Design/methodology/approach

The article reviews the SEC's implementation and enforcement of section 15(f) of the Exchange Act and section 204A of the Advisers Act. Part I discusses the legislative history of these provisions and reviews SEC and staff pronouncements relating to procedures for the protection of material nonpublic information. Part II discusses the potential consequences, from an enforcement perspective, of a firm's failure to satisfy the requirements of section 15(f) or section 204A. Part III describes the SEC's enforcement program in this area and distills guidance for securities firms from the SEC's actions.

Findings

Sections 15(f) and 204A require brokers, dealers, and investment advisers to “establish, maintain, and enforce written policies and procedures reasonably designed, taking into consideration the nature of such (broker, dealer, or investment adviser's) business, to prevent the misuse” of material nonpublic information. Thus, the statutory terms frame the issues in any SEC investigation. Does the firm maintain written procedures? Are the written procedures reasonably designed to safeguard material nonpublic information? In particular, are the procedures designed with a view toward the specific structure and business activities of the firm? Has the firm taken reasonable steps to enforce its written procedures?

Practical implications

Given the SEC's current enforcement emphasis in this area, it is essential that brokers, dealers, and investment advisers look critically at whether they are taking adequate steps to protect the confidential information they may handle on a daily basis.

Originality/value

The paper presents a practical guide by an experienced enforcement attorney.

Details

Journal of Investment Compliance, vol. 8 no. 3
Type: Research Article
ISSN: 1528-5812

Keywords

Book part
Publication date: 17 August 2022

Marek Jeziński

The death of John F. Kennedy (JFK) was one of the most remarkable facts of the second half of the twentieth century. Not surprisingly, it was reflected numerous times in popular…

Abstract

The death of John F. Kennedy (JFK) was one of the most remarkable facts of the second half of the twentieth century. Not surprisingly, it was reflected numerous times in popular culture, including in popular music. In this chapter, I discuss songs published in the 1963–1968 period in which the image of JFK was represented as an idea, a cultural motif or a political myth created, transformed and maintained by artistic means. In song lyrics, a real person (who was a genuinely influential politician) was portrayed as a person who acquired a certain mythical status, stemming from JFK's charismatic features and augmented by his tragic death. Thus, separate from the real political career as the president, JFK serves as a kind of mythological structure used by several artists to generate meanings and mirror cultural iconography present in American culture.

Article
Publication date: 23 May 2019

Carl O. DiNardo and Mary J. Snyder Broussard

This paper aims to demonstrate how commercially available tabletop games can be effective tools to teach information literacy and present a list of best practices to improve…

1027

Abstract

Purpose

This paper aims to demonstrate how commercially available tabletop games can be effective tools to teach information literacy and present a list of best practices to improve instructor’s chances of success with this pedagogical method.

Design/methodology/approach

Librarians from two separate institutions with complementary experiences analyze the theory of game-based learning with tabletop games, present an example of game-based information literacy instruction in practice and suggest four best practices for this method of instruction.

Findings

This paper demonstrates that educators by combining sound pedagogical practices to connect the educational content to what rules of games ask of students can effectively find a balance between enthusiastic engagement and higher-order information literacy learning outcomes.

Practical implications

This paper can be used to guide librarians looking for creative and sound methods to engage students using tabletop games to teach information literacy.

Originality/value

The authors have unique theoretical and practical knowledge with joining pedagogy and tabletop games in the information literacy classroom. While there is a lot of literature on games in academic libraries, there is only one other paper on using a commercially available tabletop game to teach information literacy.

Details

Reference Services Review, vol. 47 no. 2
Type: Research Article
ISSN: 0090-7324

Keywords

Book part
Publication date: 4 October 2013

Abstract

Details

The Development of Higher Education in Africa: Prospects and Challenges
Type: Book
ISBN: 978-1-78190-699-6

Article
Publication date: 1 November 2021

Astrid Heidemann Lassen and Brian Vejrum Waehrens

The purpose of this paper is to determine how companies develop and acquire competences to capture the benefits of Industry 4.0 (I4.0) technologies. The authors argue that this is…

Abstract

Purpose

The purpose of this paper is to determine how companies develop and acquire competences to capture the benefits of Industry 4.0 (I4.0) technologies. The authors argue that this is a fundamental and often overlooked prerequisite for industrial transformation.

Design/methodology/approach

The authors conduct a process study of 33 small- and medium-sized companies engaged in the transformation of a manufacturing industry from the different perspectives of manufacturers or manufacturing solution providers.

Findings

Key findings indicate a strong link between the specific competence development approach, the specific intricacies of the application domain and the process outcomes. On this basis, a competence development framework is proposed.

Research limitations/implications

The conclusions are drawn from a Danish population of companies in the manufacturing industry and are based on particular contingencies, such as low volume/high mix, high skill, low tech and high cost. However, the findings are believed to be applicable across different sets of contingencies where the need to combine legacy and emerging technologies is present, and where the human factor is central to leveraging technology beyond predefined supplier specifications.

Practical implications

In a time of extraordinary investments in the manufacturing of technologies in support of digital transformation, the development of strategic and operational competences to support these investments is lagging behind. This paper develops a conceptual outset for closing this gap.

Originality/value

The research is based on the fundamental argument that to efficiently apply new technology, a strategic approach to the acquisition of new knowledge and skills is required. The empirical research demonstrates that new skills and knowledge are often assumed to follow automatically from the use of new technologies. However, we demonstrate that this perspective in fact limits the ability to capture the potential benefits ascribed to I4.0 technologies. The authors propose that the competence strategy needs to be expansive and cover not only the technological competences but also the organizational- and individual-level competences. These results add to our understanding of how the digital transformation of manufacturing companies unfolds.

Details

Journal of Global Operations and Strategic Sourcing, vol. 14 no. 4
Type: Research Article
ISSN: 2398-5364

Keywords

Content available
Article
Publication date: 18 September 2007

Henry A. Davis

300

Abstract

Details

Journal of Investment Compliance, vol. 8 no. 3
Type: Research Article
ISSN: 1528-5812

Article
Publication date: 1 April 1992

Hannelore B. Rader

The following is an annotated list of materials dealing with information literacy including instruction in the use of information resources, research, and computer skills related…

Abstract

The following is an annotated list of materials dealing with information literacy including instruction in the use of information resources, research, and computer skills related to retrieving, using, and evaluating information. This review, the eighteenth to be published in Reference Services Review, includes items in English published in 1991. A few are not annotated because the compiler could not obtain copies of them for this review.

Details

Reference Services Review, vol. 20 no. 4
Type: Research Article
ISSN: 0090-7324

Book part
Publication date: 9 October 2019

Linda Chisholm

Abstract

Details

Teacher Preparation in South Africa
Type: Book
ISBN: 978-1-78743-694-7

Open Access
Article
Publication date: 29 December 2023

Priya C. Kumar

This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing…

Abstract

Purpose

This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing institutional, rather than community, goals.

Design/methodology/approach

This article analyzes theory and prior work on datafication, privacy, data literacy, privacy literacy and critical literacy to provide a vision for future privacy literacy research and praxis.

Findings

This article (1) explains why privacy is a valuable rallying point around which people can resist datafication, (2) locates privacy literacy within data literacy, (3) identifies three ways that current research and praxis have conceptualized privacy literacy (i.e. as knowledge, as a process of critical thinking and as a practice of enacting information flows) and offers a shared purpose to animate privacy literacy research and praxis toward social change and (4) explains how critical literacy can help privacy literacy scholars and practitioners orient their research and praxis toward changing the conditions that create privacy concerns.

Originality/value

This article uniquely synthesizes existing scholarship on data literacy, privacy literacy and critical literacy to provide a vision for how privacy literacy research and praxis can go beyond improving individual understanding and toward enacting social change.

Details

Information and Learning Sciences, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5348

Keywords

1 – 9 of 9