Academic literature on the topic 'Insider information'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider information.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Insider information"

1

Hnyluch Sobański, Konrad. "Inside information and insider trading." Studenckie Prace Prawnicze, Administratywistyczne i Ekonomiczne 29 (September 30, 2019): 119–34. http://dx.doi.org/10.19195/1733-5779.29.8.

Full text
Abstract:
EU law acts often have a built-in element of the so-called self-control, consisting in verification of the effectiveness of regulation after a specified period of time from the entry into force of a legal act. In the year 2019, the Market Abuse Regulation MAR, which in 2016 introduced new regulations concerning confidential information and trade related to internal information, causing a revolution in the capital market, will be reviewed. Numerous new duties were imposed on market participants, among others in the field of transaction reporting, access to confidential information, the circle o
APA, Harvard, Vancouver, ISO, and other styles
2

Dymke, Björn M., and Andreas Walter. "Insider Trading in Germany — Do Corporate Insiders Exploit Inside Information?" Business Research 1, no. 2 (2008): 188–205. http://dx.doi.org/10.1007/bf03343533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Danovi, Safia Ali. "Insider information." Nature Reviews Cancer 9, no. 1 (2008): 8–9. http://dx.doi.org/10.1038/nrc2567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Richardson, John. "Government information insider." Government Information Quarterly 8, no. 4 (1991): 407–8. http://dx.doi.org/10.1016/0740-624x(91)90013-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ferley, Margaret. "Government Information Insider." Serials Review 18, no. 3 (1992): 71. http://dx.doi.org/10.1080/00987913.1992.10764077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fredette, Kevin. "Government information insider." Government Publications Review 18, no. 6 (1991): 726–28. http://dx.doi.org/10.1016/0277-9390(91)90180-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferley, Margaret. "Government Information Insider." Serials Review 18, no. 3 (1992): 71. http://dx.doi.org/10.1016/0098-7913(92)90089-f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Draouil, Olfa, and Bernt Øksendal. "Stochastic differential games with inside information." Infinite Dimensional Analysis, Quantum Probability and Related Topics 19, no. 03 (2016): 1650016. http://dx.doi.org/10.1142/s0219025716500168.

Full text
Abstract:
We study stochastic differential games of jump diffusions, where the players have access to inside information. Our approach is based on anticipative stochastic calculus, white noise, Hida–Malliavin calculus, forward integrals and the Donsker delta functional. We obtain a characterization of Nash equilibria of such games in terms of the corresponding Hamiltonians. This is used to study applications to insider games in finance, specifically optimal insider consumption and optimal insider portfolio under model uncertainty.
APA, Harvard, Vancouver, ISO, and other styles
9

Firth, Michael, T. Y. Leung, and Oliver M. Rui. "Insider Trading in Hong Kong: Tests of Stock Returns and Trading Frequency." Review of Pacific Basin Financial Markets and Policies 14, no. 03 (2011): 505–33. http://dx.doi.org/10.1142/s0219091511002317.

Full text
Abstract:
The main purpose of this paper is to examine the legal insider trading activities by directors of companies listed on the Hong Kong Exchange over the period 1993 to 1999. One characteristic of insider trading in Hong Kong is the high frequency of transactions and the large amounts of money involved. Inside purchases appear to signal and correct undervaluation and inside sales appear to signal and correct overvaluation. In contrast to research from Britain and the United States, insider sales are more informative than purchases. On average, insiders earn HK$91,297 per trade, while outsiders who
APA, Harvard, Vancouver, ISO, and other styles
10

Hong, Claire Yurong, and Frank Weikai Li. "The Information Content of Sudden Insider Silence." Journal of Financial and Quantitative Analysis 54, no. 4 (2018): 1499–538. http://dx.doi.org/10.1017/s0022109018001059.

Full text
Abstract:
We present evidence of investors underreacting to the absence of events in financial markets. Routine-based insiders strategically choose to be silent when they possess private information not yet reflected in stock prices. Consistent with our hypothesis, insider silence following a routine sell (buy) predicts positive (negative) future returns, as well as fundamentals. The return predictability of insider silence is stronger among firms with a poor information environment and facing higher arbitrage costs, and a large fraction of abnormal returns concentrates on future earnings announcements.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Insider information"

1

Sjödin, Ulrika. "Insiders’ outside/Outsiders’ inside : Rethinking the insider regulation." Doctoral thesis, Stockholm University, School of Business, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-944.

Full text
Abstract:
<p>Financial speculation has increased dramatically over the last 30 years. This means that a practice that used to be viewed as immoral <i>gambling</i> has become legitimate financial <i>trade</i>. This book explores the<i> genealogy</i> of the coexisting<i> insider trading laws</i>. The insider regulation prohibits trade based on privileged information in order to create equal trading conditions, and in this way uphold confidence in the financial markets among the general public. However, this study shows that the existing view of the insider regulation is <i>misleading</i> and that the regu
APA, Harvard, Vancouver, ISO, and other styles
2

Astorino, Eduardo Sanchez. "Insider trading networks in Brazil." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/12/12138/tde-01092017-174408/.

Full text
Abstract:
The presence of insider trading in a financial market is detrimental to its functioning. Traders with public information are always at a disadvantage when negotiating with agents in possession of inside information. Thus insider trading should increase risk and should lower participation in financial markets. In this study we investigate a channel through which inside information may be transferred to market participants: social connections based on common education. We hand-collect a novel data set of the educational background of members of the board of directors of Brazilian firms and portf
APA, Harvard, Vancouver, ISO, and other styles
3

Williamu, Ghati. "Critical analysis of the insider trading framework of Tanzania." Thesis, University of the Western Cape, 2015. http://hdl.handle.net/11394/5173.

Full text
Abstract:
Magister Legum - LLM<br>This study is on the insider trading framework of Tanzania. The researcher has made enquiries whether the Tanzania legal framework governing insider trading provides strong enough enforcement mechanisms, including remedies and measures against malpractices found on the securities market to attract investor confidence. Critical analysis is done of the Capital Markets and Securities Act, 79 of 1994 (RE 2002) in conjunction with an investigation into the Capital Markets and Securities Authority (CMSA) a body corporate charged with the duties among others, of protecting the
APA, Harvard, Vancouver, ISO, and other styles
4

Hartline, Cecil L. Jr. "Examination of Insider Threats| A Growing Concern." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10687276.

Full text
Abstract:
<p> The National Infrastructure Advisory Council (NAIC) reports that "...preventing all insider threats is neither possible nor economically feasible..." because the threat is already behind perimeter defenses and often know exactly where vulnerabilities exist within organizations (Cline, 2016). The purpose of this research was to determine the prevalence of malicious and unintentional insider threats. Statistically, the numbers support the idea that insider threats are increasing and occurring more frequently. The true numbers, which only account for the incidents that were reported, may be h
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Jun. "Profitability and information content of insider trading in HK /." Hong Kong : University of Hong Kong, 2002. http://sunzi.lib.hku.hk/hkuto/record.jsp?B24520986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Jun, and 朱君. "Profitability and information content of insider trading in HK." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Callahan, Christopher J. "Security information and event management tools and insider threat detection." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37596.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provid
APA, Harvard, Vancouver, ISO, and other styles
8

Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.

Full text
Abstract:
<p> Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of
APA, Harvard, Vancouver, ISO, and other styles
9

Tell, Markus. "Insiderhot : En systematisk litteraturöversikt av insiderhot som utvärderar administrativa säkerhetsåtgärder." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19764.

Full text
Abstract:
Inom en organisation finns det insiders med direkt tillgång till konfidentiell och känslig information. Insiderhot kan antingen vara avsiktliga eller oavsiktliga och båda typerna kan utgöra förödande konsekvenser. Frågan är egentligen hur organisationer ska säkerställa informationssäkerhet när anställda har en daglig tillgång till information. Det som organisationer behöver implementera är särskilda säkerhetsåtgärder. Förebyggande säkerhetsåtgärder kan delas upp som tekniska och administrativa. Denna uppsats har genomfört en systematisk litteraturöversikt med en tematisk analys för att undersö
APA, Harvard, Vancouver, ISO, and other styles
10

Crha, Jiří. "Insider dealing and market manipulation." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16946.

Full text
Abstract:
The issue of capital market protection, especially from manipulation with financial instruments' prices and abuse of inside information, forms the content of this diploma thesis. After the legal introduction of market manipulation in EU directives and regulations, which gives manipulation relevant context, there follows the analysis of particular forms of manipulation, which can be used to influence prices of investment instruments. Then, analysis of impact of investment recommendation to selected stock prices (i.e. NWR, ERSTE and Telefónica O2), which are traded on Czech stock market RM-Syste
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Insider information"

1

Wetfeet. Careers In Information Technology,: Wetfeet Insider Guide. Wetfeet, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goelzer, Daniel L. Inside information: Prevention of abuse. Bureau of National Affairs, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Canter, David. The Swedish insider legislation. FöretagsJuridik, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rundfelt, Rolf. Insiders affärer: Om bruk och missbruk av information om börsbolag. SNS förlag, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Graziani, Rolando Campos. Insider trading o uso indebido de información privilegiada. Ediciones Metropolitana, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alexander, Richard David. Insider information trading analysis of Defense companies prior to major contract awards. Naval Postgraduate School, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Welch, Jane. Comparative implementation of EU directives (I): Insider dealing and market abuse. Published by the Corporation of London for the British Institute of International and Comparative Law, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

James, Hamilton. Fair disclosure and insider trading reforms: Regulation FD, rule 10b5-1 and rule 10b5-2. CCH Inc., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mayer, Dale. The home mortgage book: Insider information your banker & broker don't want you to know. Atlantic Pub. Group, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

James, Hamilton. A guide to short-swing trading and exemptions. CCH Inc., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Insider information"

1

Fisher, Thomas. "Insider information." In The Architecture of Ethics. Routledge, 2018. http://dx.doi.org/10.4324/9781351065740-24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Weihan, Brajendra Panda, and Qussai Yaseen. "Mitigating Insider Threat on Database Integrity." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Coles-Kemp, Lizzie, and Marianthi Theoharidou. "Insider Threat and Information Security Management." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jensen, Michael C. "Arbitrage, Information Theft and Insider Trading." In The New Palgrave Dictionary of Economics. Palgrave Macmillan UK, 2018. http://dx.doi.org/10.1057/978-1-349-95189-5_2945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rannenberg, Kai. "Information und Beratung der Nicht-Insider." In Zertifizierung mehrseitiger IT-Sicherheit. Vieweg+Teubner Verlag, 1998. http://dx.doi.org/10.1007/978-3-322-90281-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jensen, Michael C. "Arbitrage, Information Theft and Insider Trading." In The New Palgrave Dictionary of Economics. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/978-1-349-95121-5_2945-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dent, Alexander W. "Hybrid Signcryption Schemes with Insider Security." In Information Security and Privacy. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506157_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Weihan, Brajendra Panda, and Qussai Yaseen. "Malicious Users’ Transactions: Tackling Insider Threat." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yuan, Fangfang, Yanmin Shang, Yanbing Liu, Yanan Cao, and Jianlong Tan. "Attention-Based LSTM for Insider Threat Detection." In Applications and Techniques in Information Security. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0871-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stumpf, Frederic, Patrick Röder, and Claudia Eckert. "An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks." In Information Security Applications. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Insider information"

1

Abbadi, Imad M., and Muntaha Alawneh. "Preventing Insider Information Leakage for Enterprises." In 2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE). IEEE, 2008. http://dx.doi.org/10.1109/securware.2008.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Das, Sanmay. "Learning to trade with insider information." In the ninth international conference. ACM Press, 2007. http://dx.doi.org/10.1145/1282100.1282135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Viet, Khanh, Brajendra Panda, and Yi Hu. "Detecting collaborative insider attacks in information systems." In 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2012. http://dx.doi.org/10.1109/icsmc.2012.6377774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Modelling of Enterprise Insider Threats." In 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005327901320136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chi, Hongmei, and David Angulo Rubio. "Design insider threat hands-on labs." In the 2014 Information Security Curriculum Development Conference. ACM Press, 2014. http://dx.doi.org/10.1145/2670739.2670756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Eldardiry, Hoda, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, and Oliver Brdiczka. "Multi-Domain Information Fusion for Insider Threat Detection." In 2013 IEEE CS Security and Privacy Workshops (SPW2013). IEEE, 2013. http://dx.doi.org/10.1109/spw.2013.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Elmrabit, Nebrase, Shuang-Hua Yang, and Lili Yang. "Insider threats in information security categories and approaches." In 2015 21st International Conference on Automation and Computing (ICAC). IEEE, 2015. http://dx.doi.org/10.1109/iconac.2015.7313979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan, Shuhan, Panpan Zheng, Xintao Wu, and Hanghang Tong. "Few-shot Insider Threat Detection." In CIKM '20: The 29th ACM International Conference on Information and Knowledge Management. ACM, 2020. http://dx.doi.org/10.1145/3340531.3412161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nkosi, Lucky, Paul Tarwireyi, and Matthew O. Adigun. "Insider threat detection model for the cloud." In 2013 Information Security for South Africa. IEEE, 2013. http://dx.doi.org/10.1109/issa.2013.6641040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sanzgiri, Ameya, and Dipankar Dasgupta. "Classification of Insider Threat Detection Techniques." In CISRC '16: 11th Annual Cyber and Information Security Research. ACM, 2016. http://dx.doi.org/10.1145/2897795.2897799.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Insider information"

1

Thompson, Herbert H., and James A. Whittaker. Information Centric Security: Innovative Protections to Mitigate the Insider Threat. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada421489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cohen, Lauren, Christopher Malloy, and Lukasz Pomorski. Decoding Inside Information. National Bureau of Economic Research, 2010. http://dx.doi.org/10.3386/w16454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lakonishok, Josef, and Inmoo Lee. Are Insiders' Trades Informative? National Bureau of Economic Research, 1998. http://dx.doi.org/10.3386/w6656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ghosh, Arijeet, Madhurima Dhanuka, Sai Bourothu, Fernando Lannes Fernandes, Niyati Singh, and Chenthil Kumar. Lost Identity: Transgender Persons Inside Indian Prisons. Commonwealth Human Rights Initiative, 2020. http://dx.doi.org/10.20933/100001185.

Full text
Abstract:
This report sheds light on challenges faced by Transgender persons in Indian prisons. The report analyses the international and legal frameworks in the country which provide the foundation for policy formulations with regard to confinement of LGBT+ persons, with particular reference to the Transgender community. This report also documents the responses received to right to information requests filed to prison headquarters across the country, which in addition to providing the number of Transgender prisoners in Indian prisons between 1st May 2018 to 30th April 2019, also provides relevant infor
APA, Harvard, Vancouver, ISO, and other styles
5

Shaw, Eric D., and Lynn F. Fischer. Ten Tales of Betrayal: The Threat to Corporate Infrastructure by Information Technology Insiders Analysis and Observations. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada441293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.

Full text
Abstract:
This literature review finds that the main malicious threats to civilian aviation since 1975 are attacks by terrorist groups, deliberate or accidental damage arising from conflicts, and incidents caused by people who work for airlines or airports. While the sector has responded to hijackings and bombings with increasing security since the 1970s, actors seeking to attack aircraft have modified their tactics, and new threats such as liquid explosives and cyber attacks have emerged. Civilian aviation has seen relatively fewer accidents and deaths over the years, but threats remain. The review foc
APA, Harvard, Vancouver, ISO, and other styles
7

Facts about adolescents from the Demographic and Health Survey—Statistical tables for program planning: Jordan 1997. Population Council, 2001. http://dx.doi.org/10.31899/pgy21.1018.

Full text
Abstract:
The Population Council initiated its work on adolescents in the mid-1990s. At that time, those advocating greater attention to adolescent issues were concerned about adolescent fertility—particularly outside of marriage—and adolescent “risk-taking” behavior. As an international scientific organization with its mandate centered around the needs of developing countries, the Council sought a more nuanced and context-specific understanding of the problems confronting adolescents in the developing world. In working with colleagues inside and outside the Council, it became clear that information on
APA, Harvard, Vancouver, ISO, and other styles
8

Facts about adolescents from the Demographic and Health Survey—Statistical tables for program planning: Indonesia 1997. Population Council, 2001. http://dx.doi.org/10.31899/pgy21.1017.

Full text
Abstract:
The Population Council initiated its work on adolescents in the mid-1990s. At that time, those advocating greater attention to adolescent issues were concerned about adolescent fertility—particularly outside of marriage—and adolescent “risk-taking” behavior. As an international scientific organization with its mandate centered around the needs of developing countries, the Council sought a more nuanced and context-specific understanding of the problems confronting adolescents in the developing world. In working with colleagues inside and outside the Council, it became clear that information on
APA, Harvard, Vancouver, ISO, and other styles
9

Facts about adolescents from the Demographic and Health Survey—Statistical tables for program planning: Ghana 1998. Population Council, 2001. http://dx.doi.org/10.31899/pgy21.1013.

Full text
Abstract:
The Population Council initiated its work on adolescents in the mid-1990s. At that time, those advocating greater attention to adolescent issues were concerned about adolescent fertility—particularly outside of marriage—and adolescent “risk-taking” behavior. As an international scientific organization with its mandate centered around the needs of developing countries, the Council sought a more nuanced and context-specific understanding of the problems confronting adolescents in the developing world. In working with colleagues inside and outside the Council, it became clear that information on
APA, Harvard, Vancouver, ISO, and other styles
10

Facts about adolescents from the Demographic and Health Survey—Statistical tables for program planning: Guatemala 1995. Population Council, 2001. http://dx.doi.org/10.31899/pgy21.1014.

Full text
Abstract:
The Population Council initiated its work on adolescents in the mid-1990s. At that time, those advocating greater attention to adolescent issues were concerned about adolescent fertility—particularly outside of marriage—and adolescent “risk-taking” behavior. As an international scientific organization with its mandate centered around the needs of developing countries, the Council sought a more nuanced and context-specific understanding of the problems confronting adolescents in the developing world. In working with colleagues inside and outside the Council, it became clear that information on
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!