To see the other types of publications on this topic, follow the link: Electronic evidence.

Dissertations / Theses on the topic 'Electronic evidence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Electronic evidence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Stanfield, Allison R. "The authentication of electronic evidence." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93021/1/Allison_Stanfield_Thesis.pdf.

Full text
Abstract:
This thesis examines whether the rules for of evidence, which were developed around paper over centuries, are adequate for the authentication of electronic evidence. The history of documentary evidence is examined, and the nature of electronic evidence is explored, particularly recent types of electronic evidence such as social media and 'the Cloud'. The old rules are then critically applied to the varied types of electronic evidence to determine whether or not these old rules are indeed adequate.
APA, Harvard, Vancouver, ISO, and other styles
2

Alghamdi, Abdulhadi M. S. "Electronic commerce with particular reference to electronic contracts." Thesis, University of Aberdeen, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.275068.

Full text
Abstract:
This thesis analyses legal issues related to evidence and contract laws in the context of electronic commerce. Electronic commerce raises a number of legal problems such as the need for authentication, liabilities, whether electronic records are admissible as evidence and whether electronic transmissions are considered writing where writing is required. Many legal systems have faced or will face some questions, such as whether electronic evidence is inadmissible only in the ground of being created or stored electronically? Should the law of evidence be reformed in order to meet the new technologies? It is questionable whether electronic communications and records can or should meet the legal requirements of "writing" and "signature". Do electronic and digital signatures satisfy the legal requirements? It has been argued that it is not logical and reasonable to apply legal requirements that have been constituted in the ground of paper-based communication on electronic communication. Electronic contracts raise some legal issues, including whether the contract must be in a particular form or authenticated; when the message is sent and received; whether it is received in the same form as it is sent; validity, time and place of communication; cross-offers and battle of forms issues. All these issues are considered from UK common law point of view and according to CISG, UNIDROIT Principles, PECL, UNCITRAL Model Laws and the Uniform Commercial Code. Electronic contracts involve consideration whether a computer can properly be used to enter into a contractual relationship, to which existing rules on contract negotiation may need to be developed to suit formation of contracts by means of computer and telecommunications and whether old rules are appropriate today. This study examines other legal problems relating to contracts formed on the Internet, including the use of electronic agents, enforceability of mass-market licences, electronic payments and choice of law and jurisdiction issues.
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Nerisha. "Electronic evidence in criminal proceedings." Doctoral thesis, Faculty of Law, 2020. http://hdl.handle.net/11427/32978.

Full text
Abstract:
The research question central to the thesis is stated as follows: what are the implications of new technological phenomena in South African law to the existing legal frameworks in relation to (i) investigatory powers of law enforcement and security and intelligence agencies to obtain electronic evidence, and (ii) its subsequent admissibility in criminal proceedings? Written with an emphasis on South African law, but also taking into account aspects of foreign and international law, the thesis seeks to investigate how our existing legal frameworks which regulate the use of and access to electronic evidence in criminal proceedings, including its admissibility, integrate and adapt to challenges raised by new and rapidly changing technological developments. The thesis provides a critical analysis of the existing legal framework regulating certain key investigative powers of law enforcement and security and intelligence agencies in the current modern environment of the information age in which they operate. Key among them is the Regulation of Interception of Communications and Provision of Communication-Related Information Act 70 of 2002. New technology has not only increased opportunities for criminal activity, it has also created opportunities for law enforcement and security and intelligence agencies to have access to more sophisticated and new capabilities. The range of intrusive capabilities now available to law enforcement and security and intelligence agencies triggers a range of issues and challenges for individual rights, including how those capabilities are used in investigation activities, the scale of their use, the extent to which such capabilities intrude on privacy rights, legislative authority for their use and safeguards that constrain and regulate such new technological capabilities. The challenges of regulating investigative powers in an era of new and fastpaced technological developments is explored in relation to (i) interception of communications (ii) acquisition and retention of communications data, and (iii) access to encrypted information. The introduction of electronic evidence in criminal legal proceedings raises unique challenges in the South African law on evidence. The most interesting perhaps is the extent to which the nature of the evidence presented, in this instance electronic evidence, impacts on admissibility in criminal proceedings. Potential anomalies arise as the relevant legislation, the Electronic Communications and Transactions Act 25 of 2002, is based on an electronic commerce model law concerned with commercial activities. In this regard, two separate issues are the focus of research interest. The thesis offers a rethinking of (a) admissibility of electronic evidence and (b) its weight. The meaning and application of certain statutory provisions, insofar as it applies to electronic evidence as hearsay or real evidence, or both, are key and controversial issues. Another relates to the business records exceptions, which directly translated for electronic records appears to have created a problematic presumption. On matters of evidential weight, there is no ‘one-size-fits-all' approach that will work. While a robust consideration of authentication is required in the court's assessment of evidential weight of electronic evidence, it should not be subject to inflexible tests that make it difficult for authentic electronic evidence to be admitted into evidence. A central premise of the thesis is that evolving technological phenomena can and do present challenges to existing legal concepts on evidence and the investigatory powers of law enforcement and the security and intelligence agencies to obtain electronic evidence and for its admissibility in criminal proceedings. This is done in the context of understanding whether South African law has developed appropriately in response to advancements in technology. In the final analysis, the thesis considers appropriate and meaningful reform towards a modern and transparent legal framework in South African law.
APA, Harvard, Vancouver, ISO, and other styles
4

Hong, Ki Young. "Why are electronic payments preferred? : evidence from international data /." free to MU campus, to others for purchase, 2002. http://wwwlib.umi.com/cr/mo/fullcit?p3060105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Harris, Rodger C. "Propensity evident [i.e. evidence] fusion alchemy : rules of evidence 414 and the legal metamorphosis of similar similar offenses evidence in child molestation cases in the military /." abstract and full text PDF (free order & download UNR users only), 2006. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1436204.

Full text
Abstract:
Thesis (M.J.S.)--University of Nevada, Reno, 2006.
"May 2006." Includes bibliographical references (leaves 170-174). Online version available on the World Wide Web. Library also has microfilm. Ann Arbor, Mich. : ProQuest Information and Learning Company, [2006]. 1 microfilm reel ; 35 mm.
APA, Harvard, Vancouver, ISO, and other styles
6

Janse, van Rensburg Wilmari. "The impact of electronic evidence in forensic accounting investigations / Wilmari Janse van Rensburg." Thesis, North-West University, 2014. http://hdl.handle.net/10394/11355.

Full text
Abstract:
This study revolves around the admissibility of electronic evidence obtained during forensic accounting investigations. Electronic evidence is problematic for the forensic accountant, in that the courts have difficulties with the admissibility of electronic evidence. The research method used in this dissertation is a literature study or literature review. Firstly, the study aims to define a forensic accountant. The need for the forensic accountant is determined, as well as the definition and the roles and responsibilities of the forensic accountant. The study further aims to establish how the forensic accountant is regulated in South Africa. Secondly, this study aims to provide a historical overview of South African legislation that addresses electronic evidence. Applicable legislation is the Electronic Communications and Transactions Act 25 of 2002, the Criminal Procedure Act 51 of 1977, the Law of Evidence Amendment Act 45 of 1988, the Civil Proceedings Evidence Act 25 of 1965 and the repealed Computer Evidence Act 57 of 1983. To determine the challenges that arise from electronic evidence, it is critical to understand how electronic evidence is classified in terms of the traditional forms of evidence. Documentary evidence, real evidence and evidence as the product of an apparatus, with specific reference to electronic evidence, is discussed for the purpose of this study. Hearsay evidence, the originality of electronic evidence, as well as the authenticity and reliability of electronic evidence hamper the admissibility of electronic evidence. The impact of legislation on the aforementioned difficulties is considered in this study. The problematic nature of electronic evidence already creates challenges during legal proceedings. The forensic accountant can follow certain steps and procedures to better the chances of the admissibility of electronic evidence. This study establishes how electronic evidence should be gathered, stored and analysed by the forensic accountant in order to be admissible legal proceedings. Lastly, this study aims to determine how the UNCITRAL model, on which the Electronic Communications and Transactions Act 25 of 2002 has been based, compares to the act (25 of 2002) itself. The legislation addressing electronic evidence in Canada and Australia is also considered.
MCom (Forensic Accountancy), North-West University, Potchefstroom Campus, 2014.
APA, Harvard, Vancouver, ISO, and other styles
7

Wood, Michelle H. "Organisation for innovation : evidence from the UK electronic components industry." Thesis, University of Newcastle Upon Tyne, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.388153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nieman, Annamart. "Search and seizure, production and preservation of electronic evidence / Annamart Nieman." Thesis, North-West University, 2006. http://hdl.handle.net/10394/1367.

Full text
Abstract:
Criminals are becoming increasingly involved in computing activity and connectivity, but practitioners in the criminal justice field do not seem to be keeping pace with crime in a computing context. Being comfortable with the technology that underpins the Information Age is a non-negotiable skill for those who have to unravel and bring twenty-first century crimes to book. Chapter two of this study therefore sought to serve two purposes. The first aim was to acquaint the reader with the exceedingly complex technologies involved in computers and networks. The second aim was to clarify the technical context and terminology typical of the collection of electronic evidence. South Africa signed the Cybercrime Convention in November 2001. At present, the Cybercrime Convention is the only existing internationally accepted benchmark, inter alia, for the procedural powers aimed at the collection of electronic evidence. The main objective of this study was to consider whether the South African search and seizure, production and preservation devices need to be augmented and/or aligned so as to be on par with the devices proposed in the Cybercrime Convention. This objective was served in two ways. Firstly, an exposition of the requirements, scope, conditions and safeguards of the domestic and transborder search and seizure, production and preservation mechanisms proposed by the Cybercrime Convention was provided in chapter three of this study. Secondly, an exposition of the domestic and transborder international search and seizure, production and preservation devices available in the current South African legislative framework was given in chapter four of this study. A comparative analysis was done between the South African catalogue of criminal procedural search and seizure, production and preservation devices compared to those set out in the Cybercrime Convention. Where any alignment or augmentation of the South African devices was found to be necessary, this study identified these intervention areas. The findings and recommendations based on this comparative analysis were set out in chapter seven of this study. In considering any alignments and/or augmentations required in respect of the South African domestic search and seizure, production and preservation mechanisms, the application of the equivalent mechanisms directed at electronic evidence used in the United States of America and England were investigated in chapters five and six respectively. The lessons learned were also referred to in chapter seven of this study.
Thesis (LL.D. (Law of Evidence))--North-West University, Potchefstroom Campus, 2007
APA, Harvard, Vancouver, ISO, and other styles
9

Zollo, Fabiana. "Emotional contagion and group polarization: experimental evidence on Facebook." Thesis, IMT Alti Studi Lucca, 2016. http://e-theses.imtlucca.it/200/1/Zollo_phdthesis.pdf.

Full text
Abstract:
Information, rumors, debates shape and reinforce the perception of reality and heavily impact public opinion. Indeed, the way in which individuals influence each other is one of the foundational challenges in several disciplines such as sociology, social psychology, and economics. One of the most fascinating and powerful mechanisms of social contagion is that of group polarization. The phenomenon manifests when like-minded people discuss and reinforce their shared views thus ending up in a more extreme position. The core of the research work presented in this thesis explores the phenomenon of group polarization on online social media. We focus on the Italian and US pages providing scientific and conspiracy information and we analyze a) users’ emotional dynamics and b) their response to dissenting information. We offer tight quantitative evidence about the existence of echo chambers on online social media. Users tend to promote their beliefs and to form highly polarized groups. Furthermore, dealing with untrusted opponents in online discussion results for users in a major commitment with respect to their own echo chamber.
APA, Harvard, Vancouver, ISO, and other styles
10

Jordaan, Jason. "An examination of validation practices in relation to the forensic acquisition of digital evidence in South Africa." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1016361.

Full text
Abstract:
The acquisition of digital evidence is the most crucial part of the entire digital forensics process. During this process, digital evidence is acquired in a forensically sound manner to ensure the legal admissibility and reliability of that evidence in court. In the acquisition process various hardware or software tools are used to acquire the digital evidence. All of the digital forensic standards relating to the acquisition of digital evidence require that the hardware and software tools used in the acquisition process are validated as functioning correctly and reliably, as this lends credibility to the evidence in court. In fact the Electronic Communications and Transactions Act 25 of 2002 in South Africa specifically requires courts to consider issues such as reliability and the manner in which the integrity of digital evidence is ensured when assessing the evidential weight of digital evidence. Previous research into quality assurance in the practice of digital forensics in South Africa identified that in general, tool validation was not performed, and as such a hypothesis was proposed that digital forensic practitioners in South Africa make use of hardware and/or software tools for the forensic acquisition of digital evidence, whose validity and/or reliability cannot be objectively proven. As such the reliability of any digital evidence preserved using those tools is potentially unreliable. This hypothesis was tested in the research through the use of a survey of digital forensic practitioners in South Africa. The research established that the majority of digital forensic practitioners do not use tools in the forensic acquisition of digital evidence that can be proven to be validated and/or reliable. While just under a fifth of digital forensic practitioners can provide some proof of validation and/or reliability, the proof of validation does not meet formal international standards. In essence this means that digital evidence, which is preserved through the use of specific hardware and/or software tools for subsequent presentation and reliance upon as evidence in a court of law, is preserved by tools where the objective and scientific validity thereof has not been determined. Since South African courts must consider reliability in terms of Section 15(3) of the Electronic Communications and Transactions Act 25 of 2002 in assessing the weight of digital evidence, this is undermined through the current state of practice in South Africa by digital forensic practitioners.
APA, Harvard, Vancouver, ISO, and other styles
11

Schatz, Bradley Lawrence. "Digital evidence : representation and assurance." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16507/1/Bradley_Schatz_Thesis.pdf.

Full text
Abstract:
The field of digital forensics is concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. The complexity of such digital evidence is constantly increasing, as is the volume of data which might contain evidence. Current approaches to interpreting and assuring digital evidence rely implicitly on the use of tools and representations made by experts in addressing the concerns of juries and courts. Current forensics tools are best characterised as not easily verifiable, lacking in ease of interoperability, and burdensome on human process. The tool-centric focus of current digital forensics practise impedes access to and transparency of the information represented within digital evidence as much as it assists, by nature of the tight binding between a particular tool and the information that it conveys. We hypothesise that a general and formal representational approach will benefit digital forensics by enabling higher degrees of machine interpretation, facilitating improvements in tool interoperability and validation. Additionally, such an approach will increase human readability. This dissertation summarises research which examines at a fundamental level the nature of digital evidence and digital investigation, in order that improved techniques which address investigation efficiency and assurance of evidence might be identified. The work follows three themes related to this: representation, analysis techniques, and information assurance. The first set of results describes the application of a general purpose representational formalism towards representing diverse information implicit in event based evidence, as well as domain knowledge, and investigator hypotheses. This representational approach is used as the foundation of a novel analysis technique which uses a knowledge based approach to correlate related events into higher level events, which correspond to situations of forensic interest. The second set of results explores how digital forensic acquisition tools scale and interoperate, while assuring evidence quality. An improved architecture is proposed for storing digital evidence, analysis results and investigation documentation in a manner that supports arbitrary composition into a larger corpus of evidence. The final set of results focus on assuring the reliability of evidence. In particular, these results focus on assuring that timestamps, which are pervasive in digital evidence, can be reliably interpreted to a real world time. Empirical results are presented which demonstrate how simple assumptions cannot be made about computer clock behaviour. A novel analysis technique for inferring the temporal behaviour of a computer clock is proposed and evaluated.
APA, Harvard, Vancouver, ISO, and other styles
12

Schatz, Bradley Lawrence. "Digital evidence : representation and assurance." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16507/.

Full text
Abstract:
The field of digital forensics is concerned with finding and presenting evidence sourced from digital devices, such as computers and mobile phones. The complexity of such digital evidence is constantly increasing, as is the volume of data which might contain evidence. Current approaches to interpreting and assuring digital evidence rely implicitly on the use of tools and representations made by experts in addressing the concerns of juries and courts. Current forensics tools are best characterised as not easily verifiable, lacking in ease of interoperability, and burdensome on human process. The tool-centric focus of current digital forensics practise impedes access to and transparency of the information represented within digital evidence as much as it assists, by nature of the tight binding between a particular tool and the information that it conveys. We hypothesise that a general and formal representational approach will benefit digital forensics by enabling higher degrees of machine interpretation, facilitating improvements in tool interoperability and validation. Additionally, such an approach will increase human readability. This dissertation summarises research which examines at a fundamental level the nature of digital evidence and digital investigation, in order that improved techniques which address investigation efficiency and assurance of evidence might be identified. The work follows three themes related to this: representation, analysis techniques, and information assurance. The first set of results describes the application of a general purpose representational formalism towards representing diverse information implicit in event based evidence, as well as domain knowledge, and investigator hypotheses. This representational approach is used as the foundation of a novel analysis technique which uses a knowledge based approach to correlate related events into higher level events, which correspond to situations of forensic interest. The second set of results explores how digital forensic acquisition tools scale and interoperate, while assuring evidence quality. An improved architecture is proposed for storing digital evidence, analysis results and investigation documentation in a manner that supports arbitrary composition into a larger corpus of evidence. The final set of results focus on assuring the reliability of evidence. In particular, these results focus on assuring that timestamps, which are pervasive in digital evidence, can be reliably interpreted to a real world time. Empirical results are presented which demonstrate how simple assumptions cannot be made about computer clock behaviour. A novel analysis technique for inferring the temporal behaviour of a computer clock is proposed and evaluated.
APA, Harvard, Vancouver, ISO, and other styles
13

Nguyen, Long Duy. "An Investigation of Critical Factors Affecting Customers' Trust in Electronic Banking: Empirical Evidence from Vietnam." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367718.

Full text
Abstract:
Electronic banking services have gained increased popularity around the world; however in Vietnam these services have put just their first footsteps in the beginning of 2005. Electronic banking is an alternative means of offering customers expedited and self-controlled transactions using the Internet as the medium for the transaction. Nowadays, banks use electronic banking services as a powerful “value added” channel to attract and retain new customers. This research examines the critical factors affecting customers’ trust in electronic banking in Vietnam. The analysis is carried out by answering three research questions: Does customers’ trust in electronic banking affect their intention to use electronic banking in Vietnam? What are the key factors affecting customers’ trust in using electronic banking and subsequently, their intention to use electronic banking in Vietnam? How can banks use these factors to foster customers’ trust in electronic banking? These questions often confront researchers as well as bank managers and policy makers.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
Griffith Business School
Griffith Business School
Full Text
APA, Harvard, Vancouver, ISO, and other styles
14

Grant, Michael George. "Extraction of arbitrarily moving arbitrary shapes by evidence gathering." Thesis, University of Southampton, 2002. https://eprints.soton.ac.uk/209761/.

Full text
Abstract:
There are currently available many approaches aimed at tracking objects moving in sequences of images. These approaches can suffer in occlusion and noise, and often require initialisation. These factors can be handled by techniques that extract objects from image sequences, especially when phrased in terms of evidence gathering. As yet, the newer approaches to arbitrary shape extraction avoid discretisation affects but do not include motion. The moving-object evidence gathering approach has yet to include arbitrary shapes and can require high order description for complex motions. Since the template approach is proven for arbitrary shapes, we re-deploy it for moving arbitrary shapes, but in a way aimed to avoid discretisation problems. As the template approach has already been seen to reduce computational demand in the extraction of arbitrary shapes, we further deploy it to describe the motion of moving arbitrary shapes. As with the shape templates, we use Fourier descriptors for the motion templates, yielding an integrated framework for the representation of shape and motion. This prior specification of motion avoids the need to use an expensive parametric model to capture data that is already known. Furthermore, as the complexity of motion increases, a parametric model would require increasingly more parameters, leading to a rapid and catastrophic increase in computational requirements, whilst the cost and complexity of the motion template model is unchanged. The new approach combining moving arbitrary shape description with motion templates permits us to achieve the objective of low dimensionality extraction of arbitrarily moving arbitrary shapes with performance advantage as reflected by the results this new technique can achieve.
APA, Harvard, Vancouver, ISO, and other styles
15

Kuttainen, Christer. "The role of trust in B2B electronic commerce : evidence from two e-marketplaces." Doctoral thesis, Luleå, 2005. http://epubl.luth.se/1402-1544/2005/25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Davies, H. R. "Drug use and opioid substitution treatment in pregnancy : evidence from electronic health records." Thesis, University College London (University of London), 2017. http://discovery.ucl.ac.uk/1544123/.

Full text
Abstract:
BACKGROUND: Misuse of drugs is a public health problem which can lead to poor health outcomes. Drug use during pregnancy could potentially harm the unborn baby. Pregnancy usually triggers women to visit their general practitioner (GP) which may provide an opportunity for drug use to be raised and recorded. To date, there are no UK studies with large sample sizes to estimate the burden of drug use during pregnancy. Therefore, my aim was to describe and understand drug use and opioid substitution treatment in and around pregnancy using electronic health records. METHODS: Using a mixed methods design, I firstly, utilized The Health Improvement Network (THIN) to estimate GP recording rates of individuals who use drugs and/or are prescribed opioid substitution treatment in the general population, of women in and around pregnancy and infants with neonatal abstinence syndrome (NAS). Next, I compared rates with national surveys and hospital birth data. Finally, I conducted qualitative interviews to gain GPs’ perspectives regarding their decisions about recording drug-use. RESULTS: GP recording trends for the general population were in keeping with national surveys, but with lower rates. Recording was relatively low in and around pregnancy. GP recording of NAS was similar to hospital data, however rates were lower. Finally, qualitative interview analysis identified that influences on recording drug use were complex and related to pressures at the individual as well as organisational (general practices, Clinical Commissioning Groups) and governmental levels in the shape of government policies. CONCLUSIONS: In conclusion, evidence from the thesis supports the use of THIN as a suitable tool for monitoring trends but not rates of problem drug use in the general population. Electronic primary health records could potentially be used to monitor the impact of problematic drug use in and around pregnancy. The thesis also supports utilising THIN for researching drug use and opioid substitution treatment in the general population.
APA, Harvard, Vancouver, ISO, and other styles
17

Morscheck, Justin David. "Overreaction in trading : evidence from the intraday trading of SPDRs /." abstract and full text PDF (UNR users only), 2008. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1461538.

Full text
Abstract:
Thesis (M.S.)--University of Nevada, Reno, 2008.
"December, 2008." Includes bibliographical references (leaves 23-24). Library also has microfilm. Ann Arbor, Mich. : ProQuest Information and Learning Company, [2009]. 1 microfilm reel ; 35 mm. Online version available on the World Wide Web.
APA, Harvard, Vancouver, ISO, and other styles
18

Rule, Samantha Elizabeth. "A Framework for using Open Source intelligence as a Digital Forensic Investigative tool." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017937.

Full text
Abstract:
The proliferation of the Internet has amplified the use of social networking sites by creating a platform that encourages individuals to share information. As a result there is a wealth of information that is publically and easily accessible. This research explores whether open source intelligence (OSINT), which is freely available, could be used as a digital forensic investigative tool. A survey was created and sent to digital forensic investigators to establish whether they currently use OSINT when performing investigations. The survey results confirm that OSINT is being used by digital forensic investigators when performing investigations but there are currently no guidelines or frameworks available to support the use thereof. Additionally, the survey results showed a belief amongst those surveyed that evidence gleaned from OSINT sources is considered supplementary rather than evidentiary. The findings of this research led to the development of a framework that identifies and recommends key processes to follow when conducting OSINT investigations. The framework can assist digital forensic investigators to follow a structured and rigorous process, which may lead to the unanimous acceptance of information obtained via OSINT sources as evidentiary rather than supplementary in the near future.
APA, Harvard, Vancouver, ISO, and other styles
19

Osop, Hamzah Bin. "A practice-based evidence approach for clinical decision support." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/123320/2/Hamzah%20Bin%20Osop%20Thesis.pdf.

Full text
Abstract:
This thesis studies the conceptualisation and evaluation of a Practice-Based Evidence approach to decision making in healthcare. It examines the existing ICT architecture of a public hospital in Singapore to design a decision support system that leverages practical clinical evidence meaningfully captured in electronic health records. In doing so, healthcare professionals are supported in decision making through findings from past similar patients that can be generalised to the current patient population.
APA, Harvard, Vancouver, ISO, and other styles
20

MacDermott, A. M. "Collaborative intrusion detection in federated cloud environments using Dempster-Shafer theory of evidence." Thesis, Liverpool John Moores University, 2017. http://researchonline.ljmu.ac.uk/7609/.

Full text
Abstract:
Moving services to the Cloud environment is a trend that has been increasing in recent years, with a constant increase in sophistication and complexity of such services. Today, even critical infrastructure operators are considering moving their services and data to the Cloud. As Cloud computing grows in popularity, new models are deployed to further the associated benefits. Federated Clouds are one such concept, which are an alternative for companies reluctant to move their data out of house to a Cloud Service Providers (CSP) due to security and confidentiality concerns. Lack of collaboration among different components within a Cloud federation, or among CSPs, for detection or prevention of attacks is an issue. For protecting these services and data, as Cloud environments and Cloud federations are large scale, it is essential that any potential solution should scale alongside the environment adapt to the underlying infrastructure without any issues or performance implications. This thesis presents a novel architecture for collaborative intrusion detection specifically for CSPs within a Cloud federation. Our approach offers a proactive model for Cloud intrusion detection based on the distribution of responsibilities, whereby the responsibility for managing the elements of the Cloud is distributed among several monitoring nodes and brokering, utilising our Service-based collaborative intrusion detection – “Security as a Service” methodology. For collaborative intrusion detection, the Dempster-Shafer (D-S) theory of evidence is applied, executing as a fusion node with the role of collecting and fusing the information provided by the monitoring entities, taking the final decision regarding a possible attack. This type of detection and prevention helps increase resilience to attacks in the Cloud. The main novel contribution of this project is that it provides the means by which DDoS attacks are detected within a Cloud federation, so as to enable an early propagated response to block the attack. This inter-domain cooperation will offer holistic security, and add to the defence in depth. However, while the utilisation of D-S seems promising, there is an issue regarding conflicting evidences which is addressed with an extended two stage D-S fusion process. The evidence from the research strongly suggests that fusion algorithms can play a key role in autonomous decision making schemes, however our experimentation highlights areas upon which improvements are needed before fully applying to federated environments.
APA, Harvard, Vancouver, ISO, and other styles
21

Swales, Lee. "An analysis of the regulatory environment governing electronic evidence in South Africa: suggestions for reform." Doctoral thesis, Faculty of Law, 2019. http://hdl.handle.net/11427/30335.

Full text
Abstract:
Technology has developed rapidly over the last three decades. Information is regularly transmitted and stored electronically – and only electronically. The use of mobile phones, email, social media, and various electronic messaging services are ubiquitous. However, there are several areas of confusion and inconsistent application in the regulation of electronic evidence in South Africa. As a result, the South African Law Reform Commission (‘SALRC’) has suggested three different methods for law reform, and recommends the most aggressive of these options in the form of a Law of Evidence Bill. In this thesis, I agree with many of the findings made by the SALRC, but I disagree with the option selected for law reform. As suggested by several other stakeholders, rather than a drastic overhaul of the current legal framework, a more cautious amendment of existing legislation would be the more preferable approach. Electronic evidence is primarily regulated by the Electronic Communications and Transactions Act 25 of 2002 (‘ECT Act’), and although it is ageing, it still achieves one of its primary functions, namely facilitating the admissibility and evidential weight of electronic evidence. However, there is room for improvement. This research addresses six primary questions relating to electronic evidence: Namely, whether the definition of data message requires amendment; whether the ECT Act liberates data messages from the exclusionary hearsay rules; whether a presumption of regularity exists in South Africa; whether section 15 of the ECT Act requires amendment; whether it is appropriate to apply different evidentiary considerations to electronic evidence in civil and criminal proceedings; and finally, this research considers the SALRC’s selected option for law reform. This thesis, which adopts a descriptive form of desktop research, concludes that the ECT Act is sufficient to regulate the admissibility of electronic evidence, but that it requires amendment in certain areas, together with the amendment of related legislation in relation to 1) the definition of data message; 2) the hearsay exceptions; 3) terminology and consistency in relation to electronic evidence in South African legislation; and 4) the discovery of electronic evidence.
APA, Harvard, Vancouver, ISO, and other styles
22

Lalla, Himal. "E-mail forensic authorship attribution." Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/360.

Full text
Abstract:
E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
APA, Harvard, Vancouver, ISO, and other styles
23

Ramoo, Dinesh Kumar. "Syllable structure in the mental lexicon : neuropsychological and computational evidence." Thesis, University of Birmingham, 2014. http://etheses.bham.ac.uk//id/eprint/4846/.

Full text
Abstract:
This thesis investigated the fundamental representations within the mental-lexicon and whether such representations are fixed or differ according to the characteristics of various languages. It looked at whether syllable structure is represented at distinct levels of linguistic representation at phonological and phonetic levels, with phonology governed by the demands of a combinatorial system (the need to create many distinct words from a small number of symbols) and phonetics governed by articulatory complexity (the need to keep motor programming as simple as possible). Empirical evidence as well as computational work was used to investigate whether syllable structure may be present as an abstract unit within the lexicon and not just computed online at the phonetic level. Three languages were explored in this work: English, Hindi and Italian. This project found evidence from English and Hindi patients with acquired language disorders to support the data previously collected from Italian patients. The empirical data was supported by computational work that considered the rates of resyllabification and storage costs based on the assumptions of different speech production models. Both the empirical and computational data support the hypothesis that syllable structure may be stored within the mental lexicon.
APA, Harvard, Vancouver, ISO, and other styles
24

KIssane, Kelly C. "Geographic variation and cryptic species evidence from natural populations of the fishing spider Dolomedes triton /." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3275834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Van, Tonder Gert Petrus. "The admissibility and evidential weight of electronic evidence in South African legal proceedings: a comparative perspective." University of the Western Cape, 2013. http://hdl.handle.net/11394/4833.

Full text
Abstract:
Magister Legum - LLM
This research will analyse legislation, case law, law commission papers and reports, as well as academic commentary on electronic evidence in South Africa, Canada and England. A comparative analysis will be conducted in order to determine whether South Africa is adequately regulating electronic evidence in light of international and foreign law.
APA, Harvard, Vancouver, ISO, and other styles
26

Setthapirom, Wandee. "The Collection of Electronic Evidence in the Prevention of Cybercrimes : A Dichotomy Between Security and Privacy." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-94623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Al, Jneibi Khaled Ali. "The regulation of electronic evidence in the United Arab Emirates : current limitations and proposals for reform." Thesis, Bangor University, 2014. https://research.bangor.ac.uk/portal/en/theses/the-regulation-of-electronic-evidence-in-the-united-arab-emirates--current-limitations-and-proposals-for-reform(bf6b3736-65d4-48ce-96fc-8d4f2ec7024e).html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ngomane, Amanda Refiloe. "The use of electronic evidence in forensic investigation." Diss., 2010. http://hdl.handle.net/10500/4200.

Full text
Abstract:
For millions of people worldwide the use of computers has become a central part of life. Criminals are exploiting these technological advances for illegal activities. This growth of technology has therefore produced a completely new source of evidence referred to as ‘electronic evidence’. In light of this the researcher focused on the collection of electronic evidence and its admissibility at trial. The study intends to assist and give guidance to investigators to collect electronic evidence properly and legally and ensure that it is admitted as evidence in court. Electronic evidence is fragile and volatile by nature and therefore requires the investigator always to exercise reasonable care during its collection, preservation and analysis to protect its identity and integrity. The legal requirements that the collected electronic evidence must satisfy for it to be admissible in court are relevance, reliability, and authenticity. When presenting the evidence in court the investigator should always keep in mind that the judges are not specialists in the computing environment and that therefore the investigator must be able to explain how the chain of custody was maintained during the collection, preservation and analysis of electronic evidence. The complex technology behind electronic evidence must be clearly explained so that the court is able to understand the evidence in a way that an ordinary person or those who have never used a computer before can. This is because the court always relies on the expertise of the investigator to understand electronic evidence and make a ruling on matters related to it.
Police Practice
M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
29

Turnbull, Benjamin. "Wi-Fi as electronic evidence : policy, process and tools." 2007. http://arrow.unisa.edu.au:8081/1959.8/80697.

Full text
Abstract:
802.11-based wireless networking has invaded cities, offices, homes and coffee shops over the last five years, and has become a widely used and accepted technology. It has revolutionised computer networking and automation and added a social aspect to personal computing. Accompanying this widespread usage is the presence of crime; the more popular technology, the more opportunity exists for its misuse.
This dissertation studied 802.11-based wireless networking environment from a forensic computing perspective. It sought to understand the current state of wireless misuse: present misuses; potential forms of misuse involving 802.11-based wireless networks; and current tools and techniques used in its identification, containment and analysis. The research highlights the lack of current tools and procedures for forensic computing investigations that are able to effectively handle the presence of wireless devices and networks, and that there are forms of misuse that may escape detection by forensic investigation teams. This work was then developed into a taxonomy of wireless misuse.
Once the current state was known, this research sought to readdress the current state of forensic computing teams, through analysing the need for software tools and procedural changes to counter the misuses that this technology allows. Once software outcomes were developed, the legal and technical feasibility of their use was ascertained. Based on the outcomes of this work, a final set of software requirements was developed and the proposed methodology for their development was discussed.
A new series of procedures was also developed for forensic investigators to identify, contain and analyse sources of electronic evidence with 802.11-networking. Much of this work was based upon but extending current procedural guides for law enforcement.
The final outcome of this research was the development of a series of recommendations for forensic teams and research that incorporates short, medium and long term development for forensic teams as well as research and development. This work intended to provide mechanisms for future research that are jurisdictionally independent able to be adapted for each individual forensic team. The short term recommendations were primarily changes to procedure, whereas the medium and long terms changes sought to address the larger issues raised by wireless networking devices being the target of or involved in crime or misuse.
Much of this dissertation is exploratory in nature and much of its length is devoted to determining the current state of the misuse and current mechanisms employed to counter it. In such a rapidly developing field of study, this work will need constant revision as new technologies emerge and new forms of misuse take advantage of them.
Thesis (PhDInformationTechnology)--University of South Australia, 2007
APA, Harvard, Vancouver, ISO, and other styles
30

Ping, Yen Ya, and 顏雅萍. "Factors of technology transfer price - evidence of electronic industry." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/36270806529287379620.

Full text
Abstract:
碩士
東吳大學
會計學系
88
Abstract Technology is the key intellectual property of high-tech industry. Technology development is the primary economic growth source and the index of developed country. Limited resource enterprises can maximize their profit by technology transfer. Many countries encourage R&D of technology. Technology transfer is a kind of complex and subjective trade-off. The most difficult part of technology transfer is that the technology price is not determined by supply and demand. The price is almost determined by bargaining process. Technology transferor and transferee should find out a reasonable price range before bargain. In the past, technology price lacks entire consideration, there is deviation in technology pricing. Because of the importance of technology in high-tech industry, technology transfer is another way to get technology besides research and develop by themselves. In order to build a proper price model, this paper integrates as a whole and evidences from public electronic industry in Taiwan. We try to find out the influential factors of technology price. The result indicates that the profitability of the technology does not positively relate to the technology price. The cost of R&D positively relates to the technology price. The transfer cost passively relates to the technology price. The bargaining power passively relates to the technology price.
APA, Harvard, Vancouver, ISO, and other styles
31

Chu, Shuai-Chun, and 朱帥俊. "The Application of Criminal Evidentiary Rules to Electronic Evidence." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/28157180447736895400.

Full text
Abstract:
碩士
國立交通大學
管理學院碩士在職專班科技法律組
95
The revised Code of Criminal Procedure went into effect in Taiwan in 2003, with many changes in the evidentiary rules. The introduction of the concept of evidentiary rules under the Common Law System brought many issues for further discussion in the new Code of Criminal Evidence System. On the other hand, digital data in various forms such as electronic documents, digital photos, digital pictures, digital images, digital voice recording, etc. have been increasingly admitted as court evidence in recent years. However, the applicability and scope of electronic evidence in the Code of Criminal Evidence has been an uncharted territory for many. Therefore, the paper aims at analyzing the nature of electronic evidence in order to fully understand how the evidentiary rules apply. In addition, the new evidentiary rules have incorporated many concepts from the Common Law System. It is worthwhile analyzing whether or not these concepts are compatible with our existing evidentiary system or practical views and if they require adjustments or exclusion when applied to electronic evidence. As electronic evidence is international and common in the nature, we need to take reference from international cases to determine the future directions of such application and adjustments. This constitutes the second objective of this paper. This paper begins with an analysis of computer operations and electromagnetic records. From the evolution of information development and its interaction with human beings, the paper then discusses how electronic evidence has challenged the conventional evidentiary rules. It goes further to analyze how the evidentiary rules of international organizations and foreign countries (mainly the United States) responded to these challenges. After delineating the legislative trends of various countries, the balance point and necessary adjustments between electronic evidence and conventional evidentiary rules are explored based on how electronic evidence was treated in US cases. Finally, the paper analyzes the strengths and weaknesses of the existing evidentiary rules and practical cases in Taiwan based on the physical characteristics of electronic evidence as well as the legislative trends of foreign countries and international cases. The paper attempts to formulate principles for the application and adjustments of electronic evidence to the evidentiary rules of various criminal codes for the reference of how Taiwan’s criminal justice system treats electronic evidence in practice and future legislation.
APA, Harvard, Vancouver, ISO, and other styles
32

Jia-WeiLin and 林嘉瑋. "The Performance of Analyst Recommendation -Evidence from Taiwan Electronic Industry." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/3kuu2w.

Full text
Abstract:
碩士
國立成功大學
財務金融研究所碩士在職專班
104
This study examined the value of analyst recommendations issued by brokerage house for Taiwan electronic companies in the Taiwan market from the period of 2015/1/1-2015/12/18. The 1,173 analyst recommendations were selected. This study used event study to discusses when brokerage house released the recommendations, the market how to response this report. The empirical results of this study indicated the cumulative average abnormal return (CAR) of buying recommendation was smaller than selling recommendation. In all samples, the number of selling recommendations was 25 copies and did not conform to the central limit theorem. In statistical, the result of selling recommendations could be bias. Therefore the statistics result of selling recommendations did not have statistical significance in this study. In holding recommendations, all event windows had statistical significance and negative CAR. This result indicated the Taiwan securities traders released holding recommendation and these recommendations implied that “selling” comment. Finally, the statistical result of Taiwan securities traders released recommendation fixed frequency did not have statistical significance, even if event windows had positive CAR.
APA, Harvard, Vancouver, ISO, and other styles
33

Wei-JenChen and 陳瑋仁. "CSR and Firm's borrowing Rate: Evidence from Taiwan Electronic Industry." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/64531199133201011145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

"Liforac - A Model For Life Forensic Acquisition." Thesis, 2010. http://hdl.handle.net/10210/3438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kabeš, Viktor. "Elektronická evidence tržeb." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-368623.

Full text
Abstract:
The subject of this thesis is the electronic registration of sales and its efects on reducing the grey economy in the Czech republic. The electronic registration of sales is a system designed to ensure that entrepreneurs selling goods or services in return for cash report every instance of such transaction directly to the tax authority so opportunities for tax evasion are significantly reduced. FIK, a code unique to every transaction that serves as a proof that the report has been done is subsequently sent back and receipt for transaction with FIK included is issued to the customer who can check, using special internet aplication, whether transaction has been in deed reported. The work is divided into five chapters. The first one describes accounting and similar systems that record information needed to administration of taxes. The next chapter describes occasions when issuing invoices not related to electronic evidence of sales is required. The third chapter analyses the Registration of Sales Act which introduces the electronic evidence of sales into Czech law. This chapter is further divided into seventeen subchapters focused on the most important provisions of the act, for example those setting out exactly what transactions are required to be reported, what are the details of the receipt and the rules of...
APA, Harvard, Vancouver, ISO, and other styles
36

Lo, Amy Hsueh-Mei. "Excluding evidence obtained through illegal electronic surveillance : a comparision between the U.S. and Canada /." 2005. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=370311&T=F.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wang, Kunyi. "Electronic trading, liquidity and information efficiency : evidence from the Montreal exchange." Thesis, 2007. http://spectrum.library.concordia.ca/975311/1/MR28986.pdf.

Full text
Abstract:
This paper studies the deviation spread of the Equity Index S&P/TSX 60 Futures Contract SXF's daily price from the Cost of Carry Model before and after the contract is launched on the electronic trading platform in the Montreal Exchange. The relative stability of the deviation spread after the introduction of electronic trading shows strong market efficiency improvement. Besides this, after examining the relationship of the deviation spread with the trading volume and some other information sources generated on the trading venue before and after the introduction of the electronic trading, it is found that electronic trading greatly mitigates these information sources' adverse impacts on the spread's stability. This empirical evidence suggests that the information efficiency facilitated by the electronic trading may not conflict with the liquidity enhancement in the public exchange organization.
APA, Harvard, Vancouver, ISO, and other styles
38

Chang, Che-Chen, and 張哲誠. "Intellectual Capital, Corporate Governance, and Corporate Performance: Evidence from Electronic Industry." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/40610836479102688753.

Full text
Abstract:
碩士
國防管理學院
國防財務資源研究所
96
Under the environment that Intellectual Capital and Corporate Governance are being more important than before, we want to investigate that whether Intellectual Capital has a significant effect on Corporate Governance and whether Corporate Governance has a significant effect on Corporate Performance. So, the relationship among Intellectual Capital, Corporate Governance and Corporate Performance is one of this study’s main purposes. This research collects statistic data from “Taiwan Economics Journal” and takes evidence on electronic industry. The study time was from 2002 to 2006. According to relevant references about Intellectual Capital, Corporate Governance and Corporate Performance, we select variable elements and construct the performance models between Intellectual Capital and Corporate Governance to interpret the association between Intellectual Capital, Corporate Governance and Corporate performance. The method we use to measure the Intellectual Capital is VAIC proposed by Pulic (2000). The empirical results can define the association among Intellectual Capital, Corporate Governance and Corporate performance distinctly. Intellectual Capital and Corporate Governance both have impact on Corporate Performance. The Capital Employed Efficiency and Human Capital Efficiency have positive impact on interior performance; the Structural Capital Efficiency has negative impact on interior performance. The interior performance is negatively influenced by president who also serves as a CEO; the interior performance is positively influenced by the percentage of ownership hold by managers; the interior performance is positively influenced by the percentage of directors. The empirical results show that the association among Intellectual Capital, Corporate Governance and Corporate performance has mediating effect and interference effect as well.
APA, Harvard, Vancouver, ISO, and other styles
39

Chang, Chihh-Hsiang, and 張智翔. "The Performance of Foreign Analyst Recommendation -Evidence from Taiwan Electronic Industry." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/vnt558.

Full text
Abstract:
碩士
東海大學
財務金融學系
101
This study examines the value of analyst recommendations issued by foreign brokerage house for Taiwan technological companies in the Taiwan market from the period of 2012/2-2012/9. This study further investigates whether these foreign brokerage houses follow their recommendations to buy or sell their shares taking into account foreign brokerage houses from Asia, European and American. With the analysis of 657 samples, the results show that buying recommendations issued by Asian and American brokerage houses are informative. Then, the empirical evidence reveals that selling recommendations issued by European brokerage houses have superior performance relative to those from Asian and American. Brokerage houses issued buying recommendations have superior performance in the high trading volume period. However, brokerage houses issued selling recommendations in the period of low trading volume have lower CAR than those in the period of high trading volume. This paper also examines the credibility of brokerage houses. On the buying recommendations, the empirical evidence shows that Asian brokerage houses have self-interest behavior. However, on the selling recommendations, European and American brokerage houses have self-interest behavior.
APA, Harvard, Vancouver, ISO, and other styles
40

Hong-HueiChen and 陳弘輝. "Strategic Stock Selection-Evidence from Electronic Sector in Taiwan Stock Market." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/ks8h54.

Full text
Abstract:
碩士
國立成功大學
財務金融研究所
104
This thesis examines whether a stock selection strategy which considers the external environment, the internal capabilities, and the fundamental analysis of a firm can help improve the return performance. The empirical results show that our strategy, which is called high S-Score strategy, can beat the market by an average of 7.08% higher raw returns per year. Moreover, the performance of high S-Score portfolio is better than the electronic sub-index. It also outperforms the high F_SCORE portfolios, indicating that the strategy is more useful than traditional fundamental analysis. Finally, we find the simple strategy outperforms a more complex strategy combined with the high S-Score and high F_SCORE strategy. As a result, the high S-Score strategy can help improve investor’s profitability.
APA, Harvard, Vancouver, ISO, and other styles
41

Yang, Shuhua, and 楊曙華. "Internationalization and Foreign Shareholding: Evidence from Listed Electronic Firms in Taiwan." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/35631448864843881973.

Full text
Abstract:
碩士
東海大學
財務金融學系
99
With the international and liberalization of Taiwan security market and removal the forbid condition of foreign investors gradually since 1983, foreign investors became an influential power in Taiwan security market. Because Taiwan is an export-oriented nation, the specialization of Taiwan economy is easily affected by the international environment. On the other hand, about sixty per cent Taiwan electronic industry is OEM & export-oriented. For this reason, this study is based on 2004 to 2008 Taiwan electronic industry data to analyze the effect between internationalization and foreign shareholding, and explore the difference between high export-oriented group and low export-oriented group. The result of this study indicate that the higher export-oriented were lead to the lower foreign shareholding, the main reason is foreign investors may held a defensive attitude in the Taiwan security market, causing the foreign investors trend to buy the stocks with low export-oriented firms rather than high export-oriented firms stocks.
APA, Harvard, Vancouver, ISO, and other styles
42

Tsai, Yu-lin, and 蔡育霖. "Voluntary Disclosure And Corporate Governance- Evidence From Taiwan Listed Electronic Companies." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/22818856661111763336.

Full text
Abstract:
碩士
國立臺灣科技大學
財務金融研究所
96
This study uses the multiple regression model to explore and compare the different types of voluntary disclosure of information under indicators and the existence of the agents of corporate governance issues and to test the hypothesis of the present study. In addition, we would like to further explore the different types of voluntary disclosure of information indicators, the characteristics of the company and its relevance. The empirical results show that the voluntary Eng and Mak of the information to expose is the best performance indicators. The indicators can highlight four issues of corporate governance in the presence of agents. It also shows that the relationship between the internal shareholding ratio of directors and the ratio of seats and the voluntary act to expose is significant, while major shareholders and shareholding ratio of voluntary disclosure is of a significant negative correlation. Only research on the internal reasoning of shareholding ratio is not in line with expectations, while other inferences are in line with expectations. In addition, card-based Council and the voluntary exposure nature on Company's Web site and the voluntary disclosure of time are the worst performance indicators. It only highlighted the agent of a corporate governance issue, which is that the Government shareholding ratio and the level of voluntary disclosure are related positively, while the latter both did not highlight the issue of corporate governance proxy completely. In terms of the relevant characteristics of the company, the integrity of the voluntary disclosure is positively related to the level and scale of the company. The choice of top four accounting firms and profitability also showed a significant correlation, and this is in line with expectations. The voluntary card-based Council of the information to reveal and the extent and size of the company alone is significant positive correlation. The Eng and Mak of voluntary disclosure also reveals the significant correlation between the extent of information, the choice of top four accounting firms and profitability. There is a significant positive correlation between the voluntary natures of the Company's Web site information to expose the extent, the growth opportunities, company size and profitability, and this is in line with expectations. There is a significant positive correlation between the voluntary disclosure and growth opportunities.
APA, Harvard, Vancouver, ISO, and other styles
43

Lu, Penny, and 呂佩玲. "Executive Stock Option and Abnormal Stock Returns- Evidence from Electronic Industry." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/05676455414976658559.

Full text
Abstract:
碩士
中原大學
會計研究所
95
This study attempts to examine whether the top management of the publicly listed electronic companies in Taiwan are beneficial or not for implementing the Employee Stock Option Plans (ESOP) on the granting day or executing day to manage the earnings and manipulate the stock prices of the company. First, this study examines the relationship between ESOP and the abnormality of stock returns on the granting day, this investigation utilizes 284 samples of electronic firms in Taiwan which implements ESOP from January 2001 to December 2006 to examine whether there is an abnormality of stock return on the day of granting stock options. This study then collects 353 top managements of electronic firms who exercising ESOP from May 2004 to December 2006 for exploring the relationship between the abnormality of stock return and Chairman, President as well as CEO’s earnings management on the day of exercising stock option. This work uses calendar-time approach and the modified Jone’s Model to measure whether the top management manipulates the management earnings and stock prices of the company. The empirical results are summarized as follows: (1) there is a negatively abnormal return before the day on which the company granted ESOP and it has a positively abnormal return after that day. (2) there are positively abnormal stock returns during the post-exercising period. (3) the top management of the electronic companies inclined to postpone announcing the good news to public and to advance declaring the bad news to investors thru the Market Observation Post System. This investigation does not find top managements significantly utilize the accruals to manage earnings of the company during the exercising period. However, the finding indicates that the top managements inclined to utilize the accruals to manage the earnings of the company during the post-exercising period.
APA, Harvard, Vancouver, ISO, and other styles
44

涂良育. "The impact of electronic commerce announcements evidence in Taiwan stock market." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/24400625264285308414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chung, Ho-Hung, and 鍾和宏. "The Association between Private Placement and the Improvement of Operating Performance: Evidence of Electronic and Non-Electronic Industries." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/6et2cf.

Full text
Abstract:
碩士
國立雲林科技大學
會計系
103
Taiwan started to allow private placement from February 6, 2002 on. The company gradually changed financing preference. FSC also as the reaction of Taiwan private placement, continued trimming and Regulations, in September 2010 substantially revised legislation again. We find that after issuance, Whether private placement company short and long term operating performance of both the degree of improvement than the non-private placement company. On different Industries, large private placement level, the decreased of the operating performance improvement for the electronics Industries. But on the contrary non-electronic Industries that the increased of the ROE from large private placement level. In additional test, Electronic Industries immediately Private placement after the previous year profit. Lead to the decline of improved operating performance, but unlike non-electronic Industries. Large private placement discount level, the slightly increased of the ROA improvement for electronics Industries
APA, Harvard, Vancouver, ISO, and other styles
46

莊牧頤. "Agglomeration and productivity: Firm-level evidence from China's Electronic Information Manufacturing Industry." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/xzsnvw.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Wu, Yueh-Lin, and 吳岳霖. "Intellectual Capital and Financial Distress Model – Evidence from Electronic Industries in Taiwan." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/j436xs.

Full text
Abstract:
碩士
朝陽科技大學
財務金融系
103
In this study, the sample is from publicly traded companies of Taiwan's electronics industry. We use financial ratios and intellectual capital to construct a financial distress model by Logit model and back-propagation network. The data is full-cash delivery stock during 1999-2014 from total 79 companies which is in crisis. According to the empirical results, the forecast will more accurate, when the sample period is more close to the crisis point. No matter we use Logit model or back-propagation network, the result will keep in similar. After we adding the variable of intellectual capital to both model, the former four average forecast accuracy ratio raised 3.15% in Logit model model, and in the back-propagation network it raised 3.51%. So we suggest that, adding the intellectual capital may improve the prediction accurate.
APA, Harvard, Vancouver, ISO, and other styles
48

Hsin, Lin-Shih, and 林信志. "The Impact of Business Type on Cost Stickiness-Evidence from Electronic Industry." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7mkvhv.

Full text
Abstract:
碩士
東海大學
會計學系
103
The purpose of this paper is to investigate whether the difference of business type would cause the cost stickiness. The result are as follows: (1) the OBM’s stickiness of SG&A costs is greater than the OEM’s stickiness of SG&A costs (2) we divided the sample of OBM and OEM into large enterprises and small enterprises, and we find that the large enterprises’ stickiness of SG&A costs are greater than the cost stickiness of small enterprises. (3) we also find OEM's stickiness of labor costs more than OBM.
APA, Harvard, Vancouver, ISO, and other styles
49

Tien, Shiao-Huei, and 田小慧. "The Effect of Employee Bonus on Firm Value: Evidence from Electronic Industry." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/66742774688147859810.

Full text
Abstract:
碩士
朝陽科技大學
會計所
101
Taiwan Stock Exchange (TSE)-listed electronics firms often through the employee bonus system to attract employees, retain employees, improve the company''s overall operating efficiency method, and motivate employees to maximize firm value. Using a panel of Taiwanese listed electronics firms during a 7-year period (2005-2011), this study tests whether there are optimal level of employee cash bonus, and employee stock bonus which maximizes corporate value. This work finds that employee cash bonus less than 0.0348% is an optimal level of employee cash bonus to maximize firm value and which indicates that firm value increases by 22.9991 with an increase of 1% in employee cash bonus. The research also finds that employee stock bonus less than 24.1239% is an optimal level of employee stock bonus to maximize firm value and which indicates that firm value increases by 0.0361 with an increase of 1% in employee stock bonus. This study find that the optimal level of employee cash bonus, and employee stock bonus, not only can motivate employees, but also provide management decision making, to avoid the company paid too much profit sharing, unable to enhance firm value.
APA, Harvard, Vancouver, ISO, and other styles
50

Shen, Yu-Fu, and 沈昱甫. "Trading Density and Trading Bloc: An Empirical Evidence from Electronic Manufacturing Industry." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/56299927007465053826.

Full text
Abstract:
碩士
國立臺灣海洋大學
應用經濟研究所
94
The paper is research on the relationship with marketing scope and trading bloc to display the appearance or evolution of trading density which proved it by the data of the electronic manufacturing industry from 1970 to 2000. To begin with clustering analyzed the related industry of bilateral trading that to comprehend the situation of trading bloc by the result of the tree diagrams and to understand the development process of the related industry’s trading bloc. The secondary step is attempt to apply the gravity model to identify the evolution of trading bloc and used the result of clustering analyzed to set the variable appropriately, that can further prove the correctness of the appearance or evolution of trading bloc. The major findings are as follows: (1) Under the clustering analyzed, the electronic manufacturing industry to appear dual bloc with Pacific Ocean bloc and Europe bloc. (2) The Pacific Ocean bloc has extremely significance result of gross domestic product standard. (3) On the whole, the electronic manufacturing industry in Pacific Ocean bloc take on increase gradually and the Europe bloc appear decrease little by little. (4) After 1985, the China into the Pacific Ocean bloc progressively. Extremely, it almost become a core position after 1990 and separate Pacific Ocean bloc to two blocs, become an fortress in East Asia bloc. (5) Taiwan to be promoted the core member in the East Asia bloc and parallel connection with Japan . It could come into view that Taiwan has the momentous position in this domain.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography