Academic literature on the topic 'Insider information'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider information.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Insider information"
Hnyluch Sobański, Konrad. "Inside information and insider trading." Studenckie Prace Prawnicze, Administratywistyczne i Ekonomiczne 29 (September 30, 2019): 119–34. http://dx.doi.org/10.19195/1733-5779.29.8.
Full textDymke, Björn M., and Andreas Walter. "Insider Trading in Germany — Do Corporate Insiders Exploit Inside Information?" Business Research 1, no. 2 (2008): 188–205. http://dx.doi.org/10.1007/bf03343533.
Full textDanovi, Safia Ali. "Insider information." Nature Reviews Cancer 9, no. 1 (2008): 8–9. http://dx.doi.org/10.1038/nrc2567.
Full textRichardson, John. "Government information insider." Government Information Quarterly 8, no. 4 (1991): 407–8. http://dx.doi.org/10.1016/0740-624x(91)90013-x.
Full textFerley, Margaret. "Government Information Insider." Serials Review 18, no. 3 (1992): 71. http://dx.doi.org/10.1080/00987913.1992.10764077.
Full textFredette, Kevin. "Government information insider." Government Publications Review 18, no. 6 (1991): 726–28. http://dx.doi.org/10.1016/0277-9390(91)90180-6.
Full textFerley, Margaret. "Government Information Insider." Serials Review 18, no. 3 (1992): 71. http://dx.doi.org/10.1016/0098-7913(92)90089-f.
Full textDraouil, Olfa, and Bernt Øksendal. "Stochastic differential games with inside information." Infinite Dimensional Analysis, Quantum Probability and Related Topics 19, no. 03 (2016): 1650016. http://dx.doi.org/10.1142/s0219025716500168.
Full textFirth, Michael, T. Y. Leung, and Oliver M. Rui. "Insider Trading in Hong Kong: Tests of Stock Returns and Trading Frequency." Review of Pacific Basin Financial Markets and Policies 14, no. 03 (2011): 505–33. http://dx.doi.org/10.1142/s0219091511002317.
Full textHong, Claire Yurong, and Frank Weikai Li. "The Information Content of Sudden Insider Silence." Journal of Financial and Quantitative Analysis 54, no. 4 (2018): 1499–538. http://dx.doi.org/10.1017/s0022109018001059.
Full textDissertations / Theses on the topic "Insider information"
Sjödin, Ulrika. "Insiders’ outside/Outsiders’ inside : Rethinking the insider regulation." Doctoral thesis, Stockholm University, School of Business, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-944.
Full textAstorino, Eduardo Sanchez. "Insider trading networks in Brazil." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/12/12138/tde-01092017-174408/.
Full textWilliamu, Ghati. "Critical analysis of the insider trading framework of Tanzania." Thesis, University of the Western Cape, 2015. http://hdl.handle.net/11394/5173.
Full textHartline, Cecil L. Jr. "Examination of Insider Threats| A Growing Concern." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10687276.
Full textZhu, Jun. "Profitability and information content of insider trading in HK /." Hong Kong : University of Hong Kong, 2002. http://sunzi.lib.hku.hk/hkuto/record.jsp?B24520986.
Full textZhu, Jun, and 朱君. "Profitability and information content of insider trading in HK." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227090.
Full textCallahan, Christopher J. "Security information and event management tools and insider threat detection." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37596.
Full textSchluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Full textTell, Markus. "Insiderhot : En systematisk litteraturöversikt av insiderhot som utvärderar administrativa säkerhetsåtgärder." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19764.
Full textCrha, Jiří. "Insider dealing and market manipulation." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16946.
Full textBooks on the topic "Insider information"
Goelzer, Daniel L. Inside information: Prevention of abuse. Bureau of National Affairs, 2004.
Find full textRundfelt, Rolf. Insiders affärer: Om bruk och missbruk av information om börsbolag. SNS förlag, 1989.
Find full textGraziani, Rolando Campos. Insider trading o uso indebido de información privilegiada. Ediciones Metropolitana, 2006.
Find full textAlexander, Richard David. Insider information trading analysis of Defense companies prior to major contract awards. Naval Postgraduate School, 1993.
Find full textWelch, Jane. Comparative implementation of EU directives (I): Insider dealing and market abuse. Published by the Corporation of London for the British Institute of International and Comparative Law, 2005.
Find full textJames, Hamilton. Fair disclosure and insider trading reforms: Regulation FD, rule 10b5-1 and rule 10b5-2. CCH Inc., 2000.
Find full textMayer, Dale. The home mortgage book: Insider information your banker & broker don't want you to know. Atlantic Pub. Group, 2007.
Find full textBook chapters on the topic "Insider information"
Fisher, Thomas. "Insider information." In The Architecture of Ethics. Routledge, 2018. http://dx.doi.org/10.4324/9781351065740-24.
Full textLi, Weihan, Brajendra Panda, and Qussai Yaseen. "Mitigating Insider Threat on Database Integrity." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_16.
Full textColes-Kemp, Lizzie, and Marianthi Theoharidou. "Insider Threat and Information Security Management." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_3.
Full textJensen, Michael C. "Arbitrage, Information Theft and Insider Trading." In The New Palgrave Dictionary of Economics. Palgrave Macmillan UK, 2018. http://dx.doi.org/10.1057/978-1-349-95189-5_2945.
Full textRannenberg, Kai. "Information und Beratung der Nicht-Insider." In Zertifizierung mehrseitiger IT-Sicherheit. Vieweg+Teubner Verlag, 1998. http://dx.doi.org/10.1007/978-3-322-90281-8_16.
Full textJensen, Michael C. "Arbitrage, Information Theft and Insider Trading." In The New Palgrave Dictionary of Economics. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/978-1-349-95121-5_2945-1.
Full textDent, Alexander W. "Hybrid Signcryption Schemes with Insider Security." In Information Security and Privacy. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506157_22.
Full textLi, Weihan, Brajendra Panda, and Qussai Yaseen. "Malicious Users’ Transactions: Tackling Insider Threat." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_18.
Full textYuan, Fangfang, Yanmin Shang, Yanbing Liu, Yanan Cao, and Jianlong Tan. "Attention-Based LSTM for Insider Threat Detection." In Applications and Techniques in Information Security. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0871-4_15.
Full textStumpf, Frederic, Patrick Röder, and Claudia Eckert. "An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks." In Information Security Applications. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_11.
Full textConference papers on the topic "Insider information"
Abbadi, Imad M., and Muntaha Alawneh. "Preventing Insider Information Leakage for Enterprises." In 2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE). IEEE, 2008. http://dx.doi.org/10.1109/securware.2008.14.
Full textDas, Sanmay. "Learning to trade with insider information." In the ninth international conference. ACM Press, 2007. http://dx.doi.org/10.1145/1282100.1282135.
Full textViet, Khanh, Brajendra Panda, and Yi Hu. "Detecting collaborative insider attacks in information systems." In 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2012. http://dx.doi.org/10.1109/icsmc.2012.6377774.
Full text"Modelling of Enterprise Insider Threats." In 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005327901320136.
Full textChi, Hongmei, and David Angulo Rubio. "Design insider threat hands-on labs." In the 2014 Information Security Curriculum Development Conference. ACM Press, 2014. http://dx.doi.org/10.1145/2670739.2670756.
Full textEldardiry, Hoda, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, and Oliver Brdiczka. "Multi-Domain Information Fusion for Insider Threat Detection." In 2013 IEEE CS Security and Privacy Workshops (SPW2013). IEEE, 2013. http://dx.doi.org/10.1109/spw.2013.14.
Full textElmrabit, Nebrase, Shuang-Hua Yang, and Lili Yang. "Insider threats in information security categories and approaches." In 2015 21st International Conference on Automation and Computing (ICAC). IEEE, 2015. http://dx.doi.org/10.1109/iconac.2015.7313979.
Full textYuan, Shuhan, Panpan Zheng, Xintao Wu, and Hanghang Tong. "Few-shot Insider Threat Detection." In CIKM '20: The 29th ACM International Conference on Information and Knowledge Management. ACM, 2020. http://dx.doi.org/10.1145/3340531.3412161.
Full textNkosi, Lucky, Paul Tarwireyi, and Matthew O. Adigun. "Insider threat detection model for the cloud." In 2013 Information Security for South Africa. IEEE, 2013. http://dx.doi.org/10.1109/issa.2013.6641040.
Full textSanzgiri, Ameya, and Dipankar Dasgupta. "Classification of Insider Threat Detection Techniques." In CISRC '16: 11th Annual Cyber and Information Security Research. ACM, 2016. http://dx.doi.org/10.1145/2897795.2897799.
Full textReports on the topic "Insider information"
Thompson, Herbert H., and James A. Whittaker. Information Centric Security: Innovative Protections to Mitigate the Insider Threat. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada421489.
Full textCohen, Lauren, Christopher Malloy, and Lukasz Pomorski. Decoding Inside Information. National Bureau of Economic Research, 2010. http://dx.doi.org/10.3386/w16454.
Full textLakonishok, Josef, and Inmoo Lee. Are Insiders' Trades Informative? National Bureau of Economic Research, 1998. http://dx.doi.org/10.3386/w6656.
Full textGhosh, Arijeet, Madhurima Dhanuka, Sai Bourothu, Fernando Lannes Fernandes, Niyati Singh, and Chenthil Kumar. Lost Identity: Transgender Persons Inside Indian Prisons. Commonwealth Human Rights Initiative, 2020. http://dx.doi.org/10.20933/100001185.
Full textShaw, Eric D., and Lynn F. Fischer. Ten Tales of Betrayal: The Threat to Corporate Infrastructure by Information Technology Insiders Analysis and Observations. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada441293.
Full textKelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full textFacts about adolescents from the Demographic and Health Survey—Statistical tables for program planning: Jordan 1997. Population Council, 2001. http://dx.doi.org/10.31899/pgy21.1018.
Full textFacts about adolescents from the Demographic and Health Survey—Statistical tables for program planning: Indonesia 1997. Population Council, 2001. http://dx.doi.org/10.31899/pgy21.1017.
Full textFacts about adolescents from the Demographic and Health Survey—Statistical tables for program planning: Ghana 1998. Population Council, 2001. http://dx.doi.org/10.31899/pgy21.1013.
Full textFacts about adolescents from the Demographic and Health Survey—Statistical tables for program planning: Guatemala 1995. Population Council, 2001. http://dx.doi.org/10.31899/pgy21.1014.
Full text