Search results

1 – 10 of over 30000
Article
Publication date: 1 January 2003

Guy P. Lander

The private placement is the principal alternative method of financing to an SEC registered offering. The private placement avoids registration under the Securities Act of 1933…

Abstract

The private placement is the principal alternative method of financing to an SEC registered offering. The private placement avoids registration under the Securities Act of 1933 (the “Securities Act”) with its concomitant costs and delays. It also avoids periodic reporting under the Securities Exchange Act of 1934 (the “Exchange Act”) for foreign private issuers. Issuers frequently resell their private placement securities abroad or to other qualified institutional investors. The combination of statutory exemptions, Rule 144A, Regulation S, and other SEC initiatives enable issuers to take advantage of these benefits

Details

Journal of Investment Compliance, vol. 4 no. 1
Type: Research Article
ISSN: 1528-5812

Keywords

Article
Publication date: 1 March 1997

Dana L. Platt and Mark J. McKeefry

The United States Securities and Exchange Commission adopted Regulation S in 1990 to clarify that offshore offers and sales of securities need not comply with the onerous…

Abstract

The United States Securities and Exchange Commission adopted Regulation S in 1990 to clarify that offshore offers and sales of securities need not comply with the onerous registration requirements of US securities laws. In the short time since Regulation S was adopted, a number of issuers have abused the regulation. Amendments designed to curb these abuses have been recently proposed. This paper addresses the impact of the amendments and identifies significant issues to consider when undertaking a Regulation S transaction.

Details

Journal of Financial Regulation and Compliance, vol. 5 no. 3
Type: Research Article
ISSN: 1358-1988

Article
Publication date: 13 June 2008

Valerie Ford Jacob, Daniel J. Bursky, Stuart H. Gelfond, Michael A. Levitt, Paul D. Tropp and Vasiliki B. Tsaganos

The purpose of this paper is to describe recent amendments to Rule 144 of the Securities Act of 1933 concerning holding periods and resale of privately placed securities.

Abstract

Purpose

The purpose of this paper is to describe recent amendments to Rule 144 of the Securities Act of 1933 concerning holding periods and resale of privately placed securities.

Design/methodology/approach

The paper describes key changes with respect to shortened holding periods, elimination of most requirements for non‐affiliates, and relaxation of requirements for sale of debt securities.

Findings

The paper finds that the SEC has adopted significant amendments to Rule 144 that will increase the liquidity of privately placed securities and ease the burden on issuers caused by having to grant burdensome registration rights. The amendments shorten the holding periods before affiliates and non‐affiliates may sell restricted securities and otherwise loosen restrictions on the public resale of equity and debt securities acquired in private placements.

Originality/value

The paper is a useful guide to rule changes written by experienced securities lawyers.

Details

Journal of Investment Compliance, vol. 9 no. 2
Type: Research Article
ISSN: 1528-5812

Keywords

Article
Publication date: 1 February 2004

Ahmad A. Abu‐Musa

Computerized accounting information systems (CAIS) are becoming more readily available to all types and sizes of business. The increased growth in real‐time and online data…

1985

Abstract

Computerized accounting information systems (CAIS) are becoming more readily available to all types and sizes of business. The increased growth in real‐time and online data processing in CAIS has made access to these systems more available and easier for many users. Therefore, implementing adequate security controls over organisations, CAIS and their related facilities has become a necessity. The main objective of this article is to investigate the adequacy security controls implemented in the Egyptian banking industry (EBI) to preserve the confidentiality, integrity and availability of the banks' data and their CAIS through a proposed security controls check‐list. The security controls check‐list of CAIS was developed based on the available literature and the empirical results of previous studies. It includes many security counter‐measures that are empirically tested here for the first time. The entire population of the EBI has been surveyed in this research. The significant differences between the two respondent groups had been investigated. The statistical results revealed that the vast majority of Egyptian banks had adequate CAIS security controls in place. The results also revealed that the heads of computer departments (HoCD) paid relatively more attention to technical problems of CAIS security controls. This study has provided invaluable empirical results regarding inadequacies of implemented CAIS security controls in the EBI. Accordingly some recommendations were suggested to strengthen the security controls in the Egyptian banking sector.

Details

Managerial Auditing Journal, vol. 19 no. 2
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 1 May 2007

Ahmad A. Abu‐Musa

This paper aims to examine the existence and adequacy of implemented computerized accounting information system (CAIS) security controls to prevent, detect and correct security

1122

Abstract

Purpose

This paper aims to examine the existence and adequacy of implemented computerized accounting information system (CAIS) security controls to prevent, detect and correct security breaches in Saudi organization.

Design/methodology/approach

The first part of the paper introduces and discusses the literature review concerned with the CAIS security controls. The current paper introduces and discusses the main results of the empirical investigation. An empirical survey using self‐administered questionnaire, was carried out to achieve this purpose. A total of 500 questionnaires were distributed on a random sample of Saudi organizations. Of them, 275 valid, usable questionnaires were collected and analyzed.

Findings

The results of the study highlight a number of inadequately implemented CAIS security controls, and some suggestions and recommendations are introduced to strengthen the weak points and to close the loopholes in the present CAIS security controls in Saudi organizations.

Practical implications

From a practical standpoint, mangers, auditors, IT users and practitioners alike stand to gain from the findings of this study.

Originality/value

The results presented in the paper help enable managers, auditors, IT users and practitioners to better understand and secure their CAIS and to champion IT development for the success of their businesses.

Details

Information Management & Computer Security, vol. 15 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 5 August 2015

Tony Kazda and Bob Caves

Abstract

Details

Airport Design and Operation
Type: Book
ISBN: 978-1-78441-869-4

Article
Publication date: 1 January 2001

CHIP VONEIFF and TONY EVANGELISTA

The daily valuation of portfolio securities can be one of the most onerous aspects of managing a registered investment company or mutual fund. The developing complexity of…

Abstract

The daily valuation of portfolio securities can be one of the most onerous aspects of managing a registered investment company or mutual fund. The developing complexity of securities combined with the increasing influence of foreign markets and nonexchange‐traded holdings have made the accurate pricing of securities difficult at best. Mutual funds typically rely on a myriad of sources to price their portfolio holdings, including domestic pricing services, broker‐dealers, foreign custodians or pricing agents, matrix pricing, fair value committees, or any combination thereof (see Exhibit). While the pricing function is typically delegated, fund management and the board of directors or trustees have the ultimate responsibility to ensure that appropriate pricing procedures and supervisory activities are in place.

Details

Journal of Investment Compliance, vol. 1 no. 4
Type: Research Article
ISSN: 1528-5812

Article
Publication date: 14 October 2019

Hiep Cong Pham, Linda Brennan, Lukas Parker, Nhat Tram Phan-Le, Irfan Ulhaq, Mathews Zanda Nkhoma and Minh Nhat Nguyen

Understanding the behavioral change process of system users to adopt safe security practices is important to the success of an organization’s cybersecurity program. This study…

1475

Abstract

Purpose

Understanding the behavioral change process of system users to adopt safe security practices is important to the success of an organization’s cybersecurity program. This study aims to explore how the 7Ps (product, price, promotion, place, physical evidence, process and people) marketing mix, as part of an internal social marketing approach, can be used to gain an understanding of employees’ interactions within an organization’s cybersecurity environment. This understanding could inform the design of servicescapes and behavioral infrastructure to promote and maintain cybersecurity compliance.

Design/methodology/approach

This study adopted an inductive qualitative approach using in-depth interviews with employees in several Vietnamese organizations. Discussions were centered on employee experiences and their perceptions of cybersecurity initiatives, as well as the impact of initiatives on compliance behavior. Responses were then categorized under the 7Ps marketing mix framework.

Findings

The study shows that assessing a cybersecurity program using the 7P mix enables the systematic capture of users’ security compliance and acceptance of IT systems. Additionally, understanding the interactions between system elements permits the design of behavioral infrastructure to enhance security efforts. Results also show that user engagement is essential in developing secure systems. User engagement requires developing shared objectives, localized communications, co-designing of efficient processes and understanding the “pain points” of security compliance. The knowledge developed from this research provides a framework for those managing cybersecurity systems and enables the design human-centered systems conducive to compliance.

Originality/value

The study is one of the first to use a cross-disciplinary social marketing approach to examine how employees experience and comply with security initiatives. Previous studies have mostly focused on determinants of compliance behavior without providing a clear platform for management action. Internal social marketing using 7Ps provides a simple but innovative approach to reexamine existing compliance approaches. Findings from the study could leverage proven successful marketing techniques to promote security compliance.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 February 1978

Stephen F. Witt

The potential gains available from diversifying security holdings internationally (as opposed to merely nationally) are examined. A theoretical framework is developed illustrating

Abstract

The potential gains available from diversifying security holdings internationally (as opposed to merely nationally) are examined. A theoretical framework is developed illustrating the conditions necessary for international diversification to result in benefit to the investor, and the likelihood of these conditions being met is considered. Previous research which contains empirical results quantifying the potential benefits is reported.

Details

Managerial Finance, vol. 4 no. 2
Type: Research Article
ISSN: 0307-4358

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7113

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

1 – 10 of over 30000