Search results
1 – 10 of 83Martin J. Luby and Robert S. Kravchuk
Debt-related financial derivative usage by state and local governments became a very salient topic over the last few years in light of the Great Recession and its impacts on the…
Abstract
Debt-related financial derivative usage by state and local governments became a very salient topic over the last few years in light of the Great Recession and its impacts on the efficacy of these financial instruments. However, there has been a dearth of systematic research on the types and kinds of derivatives state and local governments have actually employed in recent years. While anecdotes of financial derivative usage has grabbed the headlines (such as the case of Jefferson County, Alabama), there has been little research examining the derivative portfolios among states or local governments pre- and post-Great Recession. Using descriptive research, this paper attempts to rectify this gap in the literature for state governments as a means of better understanding how the recent financial crisis has impacted the critical debt management decision to use financial derivatives.
The esoteric area of financial derivatives has become quite salient in light of the financial crisis of the last few years. In the public sector, state and local governments have…
Abstract
The esoteric area of financial derivatives has become quite salient in light of the financial crisis of the last few years. In the public sector, state and local governments have increasingly employed derivatives in their bond financings. This paper analyzes state and local governments’ use of a specific type of municipal derivative instrument (a floating-to-fixed interest rate swap) in a specific type of transaction (bond refinancing). The paper provides a case study of an executed bond refinancing transaction that employed a floating-to-fixed interest rate swap quantifying the substantial long-term costs financial derivatives can impart on state and local governments. The paper concludes with some specific lessons learned about debt-related derivative usage for public financial managers and offers some suggestions for further empirical and theoretical research in this area of public financial management.
The Chief Financial Officers Act and subsequent legislation require federal agencies to produce corporate-style financial statements. Arguments for financial statements drew on…
Abstract
The Chief Financial Officers Act and subsequent legislation require federal agencies to produce corporate-style financial statements. Arguments for financial statements drew on private sector analogies and suggested policy makers and managers would use the information to make better public policy and management decisions and improve accountability for financial management and program performance. Nearly all major government agencies have unqualified audit opinions and improvements in financial management are claimed. But benefits for policy making and management are not yet well understood. This paper examines the question by comparison with the private sector and by examining what agencies say about the uses and users of financial statement information. The emerging challenge in the evolution of federal financial reporting is to develop better government-specific analytical tools and other financial information for policy makers and managers.
Arnaud Denis, Tatjana Volkova, Simon Grima, Graţiela Georgiana Noja and Mirela Cristea
Current research aims to investigate whether it would be possible to identify all information security policy (ISP) writing styles and how these would influence ISP compliance…
Abstract
Current research aims to investigate whether it would be possible to identify all information security policy (ISP) writing styles and how these would influence ISP compliance. Almost all businesses use ISPs to establish boundaries and require secure behaviour from their employees. Unfortunately, professional surveys and academic research demonstrate a high level of non-compliance with the ISP. While the justification for the employee’s behaviour has been discussed, very few research papers have investigated whether the ISP writing style impacted the intent to comply with ISP. The research methodology incorporates content analysis and a quantitative descriptive review of published papers on ISP and non-IS policy compliance. The theoretical research allowed the identification of five major ISP writing styles: belonging, deterrence, goal, motivation, and specialist, as well as writing style influencers such as timeliness and readability. To achieve a higher level of compliance with the ISP, it was suggested that the writing styles of belonging, goal, and motivation be used primarily. Deterrence is generally discouraged. The study enabled us to determine when ISP writing styles were mentioned and the type of influence on the intent to comply with ISP. It also allowed for comparison and possible differences in ISPs versus standard workplace policies. There are proposals on which writing styles to put forward, along with recommendations on creating an ISP.
Details
Keywords
Brenda Jones Harden, Brandee Feola, Colleen Morrison, Shelby Brown, Laura Jimenez Parra and Andrea Buhler Wassman
Children experience toxic stress if there is pronounced activation of their stress-response systems, in situations in which they do not have stable caregiving. Due to their…
Abstract
Children experience toxic stress if there is pronounced activation of their stress-response systems, in situations in which they do not have stable caregiving. Due to their exposure to multiple poverty-related risks, African American children may be more susceptible to exposure to toxic stress. Toxic stress affects young children’s brain and neurophysiologic functioning, which leads to a wide range of deleterious health, developmental, and mental health outcomes. Given the benefits of early care and education (ECE) for African American young children, ECE may represent a compensating experience for this group of children, and promote their positive development.
Details
Keywords
Eric Amankwa, Marianne Loock and Elmarie Kritzinger
This paper aims to examine the individual and combined effects of organisational and behavioural factors on employees’ attitudes and intentions to establish an information…
Abstract
Purpose
This paper aims to examine the individual and combined effects of organisational and behavioural factors on employees’ attitudes and intentions to establish an information security policy compliance culture (ISPCC) in organisations.
Design/methodology/approach
Based on factors derived from the organisational culture theory, social bond theory and accountability theory, a testable research model was developed and evaluated in an online survey that involves the use of a questionnaire to collect quantitative data from 313 employees, from ten different organisations in Ghana. The data collected were analysed using the partial least squares-structural equation modelling approach, involving the measurement and structural model tests.
Findings
The study reveals that the individual measures of accountability – identifiability (2.4%), expectations of evaluation (38.8%), awareness of monitoring (55.7%) and social presence (−41.2%) – had weak to moderate effects on employees’ attitudes towards information security policy compliance. However, the combined effect showed a significant influence. In addition, organisational factors – supportive organisational culture (15%), security compliance leadership (2%) and user involvement (63%) – showed positive effects on employees’ attitudes. Further, employees’ attitudes had a substantial influence (65%), while behavioural intentions demonstrated a weak effect (24%) on the establishment of an ISPCC in the organisation. The combined effect also had a substantial statistical influence on the establishment of an ISPCC in the organisation.
Practical implications
Given the findings of the study, information security practitioners should implement organisational and behavioural factors that will have an impact on compliance, in tandem, with the organisational effort to build a culture of compliance for information security policies.
Originality/value
The study provides new insights on how to address the problem of non-compliance with regard to the information security policy in organisations through the combined application of organisational and behavioural factors to establish an information security policy compliance culture, which has not been considered in any past research.
Details
Keywords
How do transnational social movements organize? Specifically, this paper asks how an organized community can lead a nationalist movement from outside the nation. Applying the…
Abstract
How do transnational social movements organize? Specifically, this paper asks how an organized community can lead a nationalist movement from outside the nation. Applying the analytic perspective of Strategic Action Fields, this study identifies multiple attributes of transnational organizing through which expatriate communities may go beyond extra-national supporting roles to actually create and direct a national campaign. Reexamining the rise and fall of the Fenian Brotherhood in the mid-nineteenth century, which attempted to organize a transnational revolutionary movement for Ireland’s independence from Great Britain, reveals the strengths and limitations of nationalist organizing through the construction of a Transnational Strategic Action Field (TSAF). Deterritorialized organizing allows challenger organizations to propagate an activist agenda and to dominate the nationalist discourse among co-nationals while raising new challenges concerning coordination, control, and relative position among multiple centers of action across national borders. Within the challenger field, “incumbent challengers” vie for dominance in agenda setting with other “challenger” challengers.
Details