Academic literature on the topic 'Insider'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Insider"
Firth, Michael, T. Y. Leung, and Oliver M. Rui. "Insider Trading in Hong Kong: Tests of Stock Returns and Trading Frequency." Review of Pacific Basin Financial Markets and Policies 14, no. 03 (2011): 505–33. http://dx.doi.org/10.1142/s0219091511002317.
Full textSanders, George Lawrence, Shambhu Upadhyaya, and Xunyi Wang. "Inside the Insider." IEEE Engineering Management Review 47, no. 2 (2019): 84–91. http://dx.doi.org/10.1109/emr.2019.2917656.
Full textNita. "Legal Aspects of Insider Dealing." Dagon University Research Journal Vol.3, no. 2011 (2019): Pg.41–54. https://doi.org/10.5281/zenodo.3542332.
Full textKi, Do Hoon, and Seung Jun Kim. "An Empirical Study on Relation between Accounting Earnings-Stock Return Bias and Insider Stock Trade." Academic Society of Global Business Administration 19, no. 5 (2022): 157–86. http://dx.doi.org/10.38115/asgba.2022.19.5.157.
Full textMutiari, Yunial Laily, Irsan Simangunsongsyahri@gmail.com, and Muhammad Syahri Ramadhan. "INSIDER TRADING DALAM PERSPEKTIF HUKUM PASAR MODAL DI INDONESIA." Jurnal Yuridis 5, no. 2 (2019): 228. http://dx.doi.org/10.35586/.v5i2.769.
Full textGupta, Dhruba, Ananda Lal, and Philip Lutgendorf. "Inside-Outsider, Outside-Insider." TDR (1988-) 37, no. 4 (1993): 12. http://dx.doi.org/10.2307/1146288.
Full textNguyen, Minh-Duong, Ngoc-Tu Chau, Seungwook Jung, and Souhwan Jung. "A Demonstration of Malicious Insider Attacks inside Cloud IaaS Vendor." International Journal of Information and Education Technology 4, no. 6 (2014): 483–86. http://dx.doi.org/10.7763/ijiet.2014.v4.455.
Full textBhuana, Nararia Aji, Celia Rahma Putri Eritika, and Brawijaya B. Kusuma. "Information Inequality With Insider Trading Practices in The Indonesian Capital Market." Syiah Kuala Law Journal 5, no. 2 (2021): 212–21. http://dx.doi.org/10.24815/sklj.v5i2.21705.
Full textDymke, Björn M., and Andreas Walter. "Insider Trading in Germany — Do Corporate Insiders Exploit Inside Information?" Business Research 1, no. 2 (2008): 188–205. http://dx.doi.org/10.1007/bf03343533.
Full textM., SABILUL ALIF. "LAW ENFORCEMENT INSIDER TRADING IN THE INDONESIAN CAPITAL MARKET." Seybold Report Journal 18, no. 07 (2023): 2573–82. https://doi.org/10.5281/zenodo.8241021.
Full textDissertations / Theses on the topic "Insider"
Sjödin, Ulrika. "Insiders’ outside/Outsiders’ inside : Rethinking the insider regulation." Doctoral thesis, Stockholm University, School of Business, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-944.
Full textSjödin, Ulrika. "Insiders' outside/outsiders' inside : rethinking the insider regulation /." Stockholm : School of Business, Stockholm University, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-944.
Full textAstorino, Eduardo Sanchez. "Insider trading networks in Brazil." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/12/12138/tde-01092017-174408/.
Full textKallunki, J. (Jenni). "Corporate insiders’ personal characteristics and insider trading." Doctoral thesis, Oulun yliopisto, 2019. http://urn.fi/urn:isbn:9789526222776.
Full textSauerbrey, Roland, and Peter Joehnk. "INSIDER." Helmholtz-Zentrum Dresden-Rossendorf, 2011. https://hzdr.qucosa.de/id/qucosa%3A22200.
Full textRosén, Stefan, and Christian Peters. "Kan oinformerade investerare imitera insiders?" Thesis, Uppsala University, Department of Business Studies, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-8822.
Full textJones, Jameson Harris. "Teaching Inside Out in Appalachia: Identity Development of Insider/Outsider Teachers." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/100063.
Full textWilliamu, Ghati. "Critical analysis of the insider trading framework of Tanzania." Thesis, University of the Western Cape, 2015. http://hdl.handle.net/11394/5173.
Full textBiehl, Kristof. "Insider im Insolvenzverfahren /." Herne : Verlag für die Rechts- und Anwaltspraxis, 2000. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009061424&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textHuerta, Lopez Ana Karen. "An Insider Account Of Insider Witness Practices: Discovering My Chicana Identity." Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28067.
Full textBooks on the topic "Insider"
Cerroni-Long, E. L., ed. Insider Anthropology. Blackwell Publishing Ltd., 1995. http://dx.doi.org/10.1002/9781444306811.
Full textArduin, Pierre-Emmanuel. Insider Threats. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119419785.
Full text1946-, Cerroni-Long E. L., ed. Insider anthropology. National Association for the Practice of Anthropology, 1995.
Find full textCopyright Paperback Collection (Library of Congress), ed. The insider. Silhouette Books, 2003.
Find full textBook chapters on the topic "Insider"
Frick, Jörg. "Insider." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.fm.
Full textFrick, Jörg. "Dankesworte." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.028.
Full textFrick, Jörg. "Rote Beete und Branntwein." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.002.
Full textFrick, Jörg. "Von Angola bis Amigo." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.024.
Full textFrick, Jörg. "Das französische Schloss." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.017.
Full textFrick, Jörg. "Ion Tiriac | Boris Becker." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.009.
Full textFrick, Jörg. "Der Flughafen in Macau." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.010.
Full textFrick, Jörg. "Das ägyptische Mandat." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.006.
Full textFrick, Jörg. "Das italienische Mandat." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.008.
Full textFrick, Jörg. "Zwei Verteidigungen mit Rolf Bossi." In Insider. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446475243.003.
Full textConference papers on the topic "Insider"
Manoharan, Phavithra, Jiao Yin, Hua Wang, Yanchun Zhang, and Wenjie Ye. "Insider Threat Detection: A Review." In 2024 International Conference on Networking and Network Applications (NaNA). IEEE, 2024. http://dx.doi.org/10.1109/nana63151.2024.00031.
Full textNarikiyo, Ryunosuke, and Youichiro Miyake. "Artificial Intelligence for the “INSIDER”." In 2024 Joint 13th International Conference on Soft Computing and Intelligent Systems and 25th International Symposium on Advanced Intelligent Systems (SCIS&ISIS). IEEE, 2024. https://doi.org/10.1109/scisisis61014.2024.10760083.
Full textTamersoy, Acar, Bo Xie, Stephen L. Lenkey, Bryan R. Routledge, Duen Horng Chau, and Shamkant B. Navathe. "Inside insider trading." In ASONAM '13: Advances in Social Networks Analysis and Mining 2013. ACM, 2013. http://dx.doi.org/10.1145/2492517.2500288.
Full textBishop, Matt, Kara Nance, and Jason Clark. "Introduction to Inside the Insider Threat Minitrack." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2017. http://dx.doi.org/10.24251/hicss.2017.318.
Full textWilliams, Adam, Colton Heffington, Shannon Abbott, et al. "Operationalizing Insider Threat Potential and Risk-Significant Insiders to Enhance Insider Threat Detection and Mitigation." In Annual Meeting - Vienna, , Austria - May - 2023. US DOE, 2023. http://dx.doi.org/10.2172/2431208.
Full textBishop, Matt, Kara Nance, and William Claycomb. "Introduction to the Inside the Insider Threat Minitrack." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.342.
Full textMcGough, Andrew Stephen, David Wall, John Brennan, et al. "Insider Threats." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. ACM, 2015. http://dx.doi.org/10.1145/2808783.2808785.
Full textGreitzer, Frank L. "Insider Threats." In NCS '19: Northwest Cybersecurity Symposium. ACM, 2019. http://dx.doi.org/10.1145/3332448.3332458.
Full textHo, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg, and Muye Liu. "Insider Threat." In SIGMIS-CPR '15: 2015 Computers and People Research Conference. ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.
Full textValenzuela, Bert. "The insider." In the 31st annual ACM SIGUCCS conference. ACM Press, 2003. http://dx.doi.org/10.1145/947469.947497.
Full textReports on the topic "Insider"
Hallahan, Jason. Countering Insider Threats - Handling Insider Threats Using Dynamic, Run-Time Forensics. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada473440.
Full textLevine, Ross, Chen Lin, and Lai Wei. Insider Trading and Innovation. National Bureau of Economic Research, 2015. http://dx.doi.org/10.3386/w21634.
Full textCALIFORNIA UNIV LOS ANGELES. DoD Insider Threat Mitigation. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385423.
Full textBebchuk, Lucian Arye, and Chaim Fershtman. The Effects of Insider Trading on Insiders' Choice Among Risky Investment Projects. National Bureau of Economic Research, 1991. http://dx.doi.org/10.3386/t0096.
Full textHanley, Michael, and Joji Montelibano. Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada610463.
Full textReiher, Peter. File Profiling for Insider Threats. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada405498.
Full textMontelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada609926.
Full textWong, F. Insider Threat Symposium Curated Questions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1548366.
Full textShaw, Eric D., Lynn F. Fischer, and Andree E. Rose. Insider Risk Evaluation and Audit. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada563910.
Full textBlanchflower, David, Andrew Oswald, and Mario Garrett. Insider Power in Wage Determination. National Bureau of Economic Research, 1989. http://dx.doi.org/10.3386/w3179.
Full text