Search results
1 – 10 of over 2000Reza Alavi, Shareeful Islam and Haralambos Mouratidis
The purpose of this paper is to introduce a risk-driven investment process model for analysing human factors that allows information security managers to capture possible risk…
Abstract
Purpose
The purpose of this paper is to introduce a risk-driven investment process model for analysing human factors that allows information security managers to capture possible risk–investment relationships and to reason about them. The overall success of an information security system depends on analysis of the risks and threats so that appropriate protection mechanism can be in place to protect them. However, lack of appropriate analysis of risks may potentially results in failure of information security systems. Existing literature does not provide adequate guidelines for a systematic process or an appropriate modelling language to support such analysis. This work aims to fill this gap by introducing the process and reason about the risks considering human factors.
Design/methodology/approach
To develop risk-driven investment model along with the activities that support the process. These objectives were achieved through the collection of quantitative and qualitative data utilising requirements engineering and secure tropos methods.
Findings
The proposed process and model lead to define a clear relationship between risks, incidents and investment and allows organisations to calculate them based on their own figures.
Research limitations/implications
One of the major limitations of this model is that it only supports incident-based investment. This creates some sort of difficulties to be presented to the executive board. Secondly, because of the nature of human factors, quantification does not exactly reflect the monetary value of the factors.
Practical implications
Applying the information security risk-driven investment model in a real case study shows that this can help organisations apply and use it in other incidents, and more importantly, to the incidents which critical human factors are a grave concern of organisations. The importance of providing a financial justification is clearly highlighted and provided for seeking investment in information security.
Social implications
It has a big social impact that technically could lead for cost justifications and decision-making process. This would impact the whole society by helping individuals to keep their data safe.
Originality/value
The novel contribution of this work is to analyse specific critical human factors which have subjective natures in an objective and dynamic domain of risk, security and investment.
Details
Keywords
If complaints about an agent’s sale of “ABC” mutual fund are handled by the state securities commissioner… Why should complaints about the same agent’s sale of a variable annuity…
Abstract
If complaints about an agent’s sale of “ABC” mutual fund are handled by the state securities commissioner… Why should complaints about the same agent’s sale of a variable annuity invested in “ABC” mutual fund be handled exclusively by the state insurance commissioner? Are state laws enacted 35 years ago still relevant today when most agents who sell variable annuities are also licensed to sell mutual funds?
Details
Keywords
Sung-Hwan Kim, Nam-Uk Kim and Tai-Myoung Chung
The purpose of this paper is to provide a model for quantitatively analyzing the security profile of an organization’s IT environment. The model considers the security risks…
Abstract
Purpose
The purpose of this paper is to provide a model for quantitatively analyzing the security profile of an organization’s IT environment. The model considers the security risks associated with stored data, as well as services and devices that can act as channels for data leakages. The authors propose a sensitive information (SI) leakage vulnerability model.
Design/methodology/approach
Factors identified as having an impact on the security profile are identified, and scores are assigned based on detailed criteria. These scores are utilized by mathematical models that produce a vulnerability index, which indicates the overall security vulnerability of the organization. In this chapter, the authors verify the model result extracted from SI leakage vulnerability weak index by applying the proposed model to an actual incident that occurred in South Korea in January 2014.
Findings
The paper provides vulnerability result and vulnerability index. They are depends on SI state in information systems.
Originality/value
The authors identify and define four core variables related to SI leakage: SI, security policy, and leakage channel and value of SI. The authors simplify the SI leakage problem. The authors propose a SI leakage vulnerability model.
Details
Keywords
Briefly reviews previous literature by the author before presenting an original 12 step system integration protocol designed to ensure the success of companies or countries in…
Abstract
Briefly reviews previous literature by the author before presenting an original 12 step system integration protocol designed to ensure the success of companies or countries in their efforts to develop and market new products. Looks at the issues from different strategic levels such as corporate, international, military and economic. Presents 31 case studies, including the success of Japan in microchips to the failure of Xerox to sell its invention of the Alto personal computer 3 years before Apple: from the success in DNA and Superconductor research to the success of Sunbeam in inventing and marketing food processors: and from the daring invention and production of atomic energy for survival to the successes of sewing machine inventor Howe in co‐operating on patents to compete in markets. Includes 306 questions and answers in order to qualify concepts introduced.
Details
Keywords
Russel Poskitt and Peihong Yang
This study investigates the impact of the enhanced continuous disclosure regime introduced in December 2002 on several measures of information risk in NZX‐listed stocks. We employ…
Abstract
This study investigates the impact of the enhanced continuous disclosure regime introduced in December 2002 on several measures of information risk in NZX‐listed stocks. We employ two microstructure models and an intraday data set to measure information risk in a sample of 71 stocks. Our empirical results show that the reforms enacted in December 2002 had no significant effect on either the level of information‐based trading or the adverse selection component of market spreads in our sample of NZX‐listed stocks.
Details
Keywords
Falko Paetzold, Timo Busch and Marc Chesney
Investment advisors play a significant role in financial markets, yet the determinants of their behavior have not been explored in detail. The purpose of this paper is to explore…
Abstract
Purpose
Investment advisors play a significant role in financial markets, yet the determinants of their behavior have not been explored in detail. The purpose of this paper is to explore the determinants of how actively advisors communicate about sustainable investing with their clients, and differences in the preferences of advisors compared to investors.
Design/methodology/approach
Based on a survey with 296 retail and private banking investment advisors, this study employs an ordinary least squares regression model to explore the determinants of advisors activity in communicating about sustainable investing (SI) with their clients, differences in the aspects that matter to advisors and investors, and the role of the complexity of sustainability.
Findings
Advisors activity in communicating about SI relates to their expectation of SI regarding financial return, real-world impact, and the fuzziness and trustworthiness of SI. Advisors appear not to be influenced by expected risk and their personal values, which runs against prior research findings and the interest of investors.
Research limitations/implications
Future research should assess cultural differences and explore asymmetries between advisors and investors in regard to the role of volatility, values, impact measurement, and complexity.
Practical implications
Investment advisors underweighting aspects related to risk and self-transcendent values relative to their clients might limit the suitability of clients ' portfolios, skew capital allocation, and depress the role of SI in financial markets. Generalized to salespeople this behavior might depress the market success of products related to sustainability at large.
Social implications
The findings and their generalization indicate that salespeople might systematically deviate from their clients’ interests in regard to social responsibility. Advisors and salespeople in their mediating role might be an important barrier to sustainable development.
Originality/value
This is the first quantitative study that explores the decision-making by investment advisors in the context of SI, and as such answers to specific calls in literature to explore the micro-foundations of decision making in regard to SI and social responsibility, and on the relationship between private investors and investment advisors. This study is based on unique and original empirical data on advisors that work with retail and wealthy private investors.
Details
Keywords
This study aims to investigate whether social investment (SI) policies improve employment among single mothers.
Abstract
Purpose
This study aims to investigate whether social investment (SI) policies improve employment among single mothers.
Design/methodology/approach
This paper analyzes the potential effects of SI policies on vulnerable individuals and workers at the macro level by using the employment position of single mothers as a dependent variable. Time-series cross-national data from 18 OECD countries between 1998 and 2017 are analyzed. Multilevel model analysis is also used for robustness check.
Findings
I find that public spending on education and family support is positively associated with the employment rates of single mothers. In contrast, active labor market policy (ALMP) spending is negatively associated. ALMP’s negative effects stand out particularly with public spending on job training. Of all family support policies, family allowances are positively associated with single mothers’ employment, which runs counter to the conventional argument that family allowances are a disincentive for women’s or mothers’ employment. Paid leave (length and generosity) is also associated with higher employment for single mothers. There is also some tentative evidence that public spending on maternity leave benefits (spending level) may raise the odds of single mothers being employed, when individual-level factors are controlled for in multilevel analysis we implement for robustness check.
Research limitations/implications
This paper does not analyze the effects of the qualitative properties of SI policies. Future research is necessary in this respect.
Originality/value
The effects of SI policies on employment among single mothers have not yet been examined in the literature. This paper seeks to be a first cut at measuring the effects.
Details
Keywords
The Equal Pay Act 1970 (which came into operation on 29 December 1975) provides for an “equality clause” to be written into all contracts of employment. S.1(2) (a) of the 1970 Act…
Abstract
The Equal Pay Act 1970 (which came into operation on 29 December 1975) provides for an “equality clause” to be written into all contracts of employment. S.1(2) (a) of the 1970 Act (which has been amended by the Sex Discrimination Act 1975) provides:
The “welfare reform” narrative of successive Conservative-led UK Government emphasises public spending reductions, individual responsibility and strengthening of benefit…
Abstract
Purpose
The “welfare reform” narrative of successive Conservative-led UK Government emphasises public spending reductions, individual responsibility and strengthening of benefit conditionality. The purpose of this paper is to cast light on how this narrative is challenged and disrupted by the Scottish Government through their articulation of a social democratic welfare state imaginary.
Design/methodology/approach
The study draws together a decentred governance perspective that emphasises ideational tradition for understanding (re)construction of governance (Bevir, 2013, p. 27) with critical discourse analysis to examine how welfare interpretations/representations are carried into the policy and public arena. The Scottish Government documents are deconstructed to interrogate the ideas and form of their emergent discourse and its relation to the independence referendum and welfare governance reform.
Findings
Responding to changing socio-economic contexts and welfare governance, the Scottish Government has developed a discourse of modernisation rooted in British and Scandinavian social democratic traditions. Fusing (civic) nationalism with social wage and social investment concepts, they conjure up imaginaries of a prosperous, solidaristic, egalitarian welfare state as a feasible future reality, recuperating “welfare” as a collective endeavour and positioning a maldistribution of power/resources between groups and constituent countries of the UK as the “problem”.
Originality/value
The paper is of value to those interested in how changes to centralised-hierarchical welfare governance can open new spaces for actors at different levels of government to articulate counter-hegemonic discourses and practices. Its originality lies in the analysis of how the Scottish Government has reworked social democratic traditions to weave together a welfare imaginary that directly contests the problem-solution narrative of successive Conservative-led UK Governments.
Details
Keywords
Edward R. Bruning, Harry J. Turtle and Kevin Buhr
We examine the entry mode choice for Canadian firms entering the United States (U.S.). Entry options are categorized into three competing modes: mergers and acquisitions; joint…
Abstract
We examine the entry mode choice for Canadian firms entering the United States (U.S.). Entry options are categorized into three competing modes: mergers and acquisitions; joint ventures; and subsidiaries. The unit of analysis is the foreign direct investment (FDI) transaction between a Canadian firm and an American counterpart during the period from January 1980 through December 1989. Using canonical discriminant analysis, we develop a set of variables that characterize the entry mode choice. We find transaction specific information available to senior management provides important information regarding the entry mode choice. The importance of mergers and acquisitions is particularly apparent over this sample period. Empirical evidence strongly supports our measures of resource commitment, dissemination risk, and liquidity position as important measures determining mode of entry. Joint ventures display meaningful differences related to these measures in contrast to both mergers and acquisitions, and subsidiary investments.