Academic literature on the topic 'Insider Transaction'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider Transaction.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Insider Transaction"

1

Stotz, Olaf. "Germany’s New Insider Law: The Empirical Evidence after the First Year." German Economic Review 7, no. 4 (2006): 449–62. http://dx.doi.org/10.1111/j.1468-0475.2006.00129.x.

Full text
Abstract:
Abstract This paper investigates insider trading activities in German stocks during the first year following implementation of the new Insider Law on 1 July 2002. It can be observed that insiders act as contrarian investors. They buy stocks after prices have fallen and sell stocks after prices have risen. In general, insider trades are very profitable. A typical stock purchased by an insider yields an abnormal return of almost 3 per cent during the 25 days following the transaction. In contrast, a typical stock that has been sold by insiders achieves an abnormal return of nearly -3 per cent ov
APA, Harvard, Vancouver, ISO, and other styles
2

Stotz, Olaf. "Do Retail Investors Follow Insider Trades?" German Economic Review 13, no. 3 (2012): 257–74. http://dx.doi.org/10.1111/j.1468-0475.2011.00556.x.

Full text
Abstract:
Abstract On the basis of transaction records of retail investors provided by a large financial institution, this article analyzes whether, in the aggregate, retail investors do copy insider trades. The results suggest that insider trades are indeed an important piece of information for the transactions of retail investors, whose buy-sell imbalances (BSIs) increase in stocks which insiders buy, and whose BSIs decrease following insider sales. These results are robust when considering stock characteristics and general attention effects. With regard to trading insider stocks, retail investors’ pr
APA, Harvard, Vancouver, ISO, and other styles
3

BARGER, WESTON, and RYAN DONNELLY. "INSIDER TRADING WITH TEMPORARY PRICE IMPACT." International Journal of Theoretical and Applied Finance 24, no. 02 (2021): 2150006. http://dx.doi.org/10.1142/s0219024921500060.

Full text
Abstract:
We model an informed agent with information about the future value of an asset trying to maximize profits when the agent’s trades are subjected to a transaction cost as well as a market maker tasked with setting fair transaction prices. In a single auction model, equilibrium is characterized by the unique root of a particular polynomial. Analysis of this polynomial with small levels of risk-aversion and transaction costs reveal a dimensionless parameter which captures several orders of asymptotic accuracy of the equilibrium behavior. In a continuous time analogue of the single auction model, i
APA, Harvard, Vancouver, ISO, and other styles
4

Ben Sedrine Goucha, Nadia, and Nadia Loukil. "Blockholders, board structure and liquidity: evidence from Tunis stock exchange." Corporate Ownership and Control 5, no. 3 (2008): 428–33. http://dx.doi.org/10.22495/cocv5i3c4p2.

Full text
Abstract:
This paper investigates the effect of blockholders and board structure into stock liquidity in Tunisian market. We use five measures of liquidity in order to detect the multidimensionality of liquidity: immediacy cost, price impact, trading frequency, trading speed and total transaction cost. Results show that blockholders, insiders or outsiders, reduce trading speed, while ownership concentration and board characteristic effect on liquidity depend on liquidity dimension considered. Insider ownership concentration enhances price impact. Outsider ownership concentration induces a high trading a
APA, Harvard, Vancouver, ISO, and other styles
5

Sidgman, Juergen. "Form 4 Electronic Submissions and the Thomson Reuters Insider Filing Data Feed: Discrepancies and Their Impact on Research." Journal of Information Systems 29, no. 3 (2014): 1–33. http://dx.doi.org/10.2308/isys-50981.

Full text
Abstract:
ABSTRACT This paper examines discrepancies between the electronic Form 4 and Thomson Reuters' Insider Filing Data Feed. The analysis shows differences in a small number of trades. The transaction code is the item frequently found to differ. Results also show that Thomson Reuters fails to follow its data codification policies. Users of Form 4 should expect discrepancies in trade and firm characteristics. Inferences about the market reaction to insider filings and trades, the association between aggregate insider trading and market returns, and cross-sectional variation in profitability of insid
APA, Harvard, Vancouver, ISO, and other styles
6

Neill, Bradley J., Mehdi Sadeghi, and Edward Watts. "Are insider trades profitable? Evidence from directors’ trade on the Australian stock exchange." Corporate Ownership and Control 5, no. 3 (2008): 176–87. http://dx.doi.org/10.22495/cocv5i3c1p2.

Full text
Abstract:
This paper argues that directors earning statistically significantly abnormal returns from trades within their own companies. Evidence is provided through the analysis of 8,053 transactions by directors on the Australian Stock Exchange during the period of January 2002 to April 2006. Specifically this paper finds directors’ sales to be more profitable than purchases, contrary to much of the existing US and UK research. Director sales exhibit a price reversal effect, in that positive abnormal returns are earned prior to the sale and negative returns after it. There is also evidence to support a
APA, Harvard, Vancouver, ISO, and other styles
7

Hnyluch Sobański, Konrad. "Inside information and insider trading." Studenckie Prace Prawnicze, Administratywistyczne i Ekonomiczne 29 (September 30, 2019): 119–34. http://dx.doi.org/10.19195/1733-5779.29.8.

Full text
Abstract:
EU law acts often have a built-in element of the so-called self-control, consisting in verification of the effectiveness of regulation after a specified period of time from the entry into force of a legal act. In the year 2019, the Market Abuse Regulation MAR, which in 2016 introduced new regulations concerning confidential information and trade related to internal information, causing a revolution in the capital market, will be reviewed. Numerous new duties were imposed on market participants, among others in the field of transaction reporting, access to confidential information, the circle o
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Frederick, Behzad Taghipour, and Thomas J. Walker. "Insider trading surrounding securities class action litigation and settlement announcements." Managerial Finance 43, no. 1 (2017): 124–40. http://dx.doi.org/10.1108/mf-05-2016-0129.

Full text
Abstract:
Purpose The purpose of this paper is to investigate the trading patterns of corporate insiders, both managing and non-managing, around the announcement dates of securities class action lawsuits and related legal settlements. Design/methodology/approach The authors use market model event study methodology to examine the impact of class action litigation and settlement announcements on the stock prices of sued firms. The authors then determine the extent of abnormal insider trading surrounding such announcements by comparing insider trading activity (volume and transaction counts) to prior insid
APA, Harvard, Vancouver, ISO, and other styles
9

Hu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (2020): 5297. http://dx.doi.org/10.3390/s20185297.

Full text
Abstract:
The insider threats have always been one of the most severe challenges to cybersecurity. It can lead to the destruction of the organisation’s internal network system and information leakage, which seriously threaten the confidentiality, integrity and availability of data. To make matters worse, since the attacker has authorized access to the internal network, they can launch the attack from the inside and erase their attack trace, which makes it challenging to track and forensics. A blockchain traceability system for insider threats is proposed in this paper to mitigate the issue. First, this
APA, Harvard, Vancouver, ISO, and other styles
10

Faradiza, Sekar Akrom, and Ratna Listiana Dewanti. "Ethical Orientation and Personal Benefit in Insider Trading." Winners 13, no. 1 (2012): 9. http://dx.doi.org/10.21512/tw.v13i1.663.

Full text
Abstract:
Most of people think insider trading is an unfair activity because the parties that involved have unequal information. In a certain condition, unequal information used in a transaction is a fraud. The BAPEPAM’s act have regulated that insider trading is illegal. Nevertheless it is not easy to bring perpetrators to the court due to some difficulties to prove. Insider trading is motivated by self attentiveness or personal advantage. However, ethical orientation can mitigate insider trading because it can mediate personal benefit. Through a survey administrated to the students, this study would l
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Insider Transaction"

1

Maconi, Stephen, and Alexander Singer. "Insider timing on the Stockholm Stock Exchange : A study of short-term cumulative returns prior to mid-cap CEOs’ transactions in their own firm." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-379436.

Full text
Abstract:
This paper investigates how CEOs in public Swedish mid-cap corporations time their transactions in their own company’s stock in a short-term perspective. To investigate this, an event study methodology is employed on cumulative returns surrounding these insiders’ transactions, both absolute and relative to the market. We find that these insiders, on average, purchase stock subsequent to a period of decline in both total and abnormal cumulative returns and sell stock following a period of positive total and abnormal returns. This is in line with our hypotheses. We also find that total and abnor
APA, Harvard, Vancouver, ISO, and other styles
2

Sjöberg, Agaton. "Extracting Transaction Information from Financial Press Releases." Thesis, Linköpings universitet, Artificiell intelligens och integrerade datorsystem, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177688.

Full text
Abstract:
The use cases of Information Extraction (IE) are more or less endless, often consisting of a combination of Named Entity Recognition (NER) and Relation Extraction (RE). One use case of IE is the extraction of transaction information from Norwegian insider transaction Press Releases (PRs), where a transaction consists of at most four entities: the name of the owner performing the transaction, the number of shares transferred, the transaction date, and the price of the shares bought or sold. The relationships between the entities define which entity belongs to which transaction, and whether shar
APA, Harvard, Vancouver, ISO, and other styles
3

Atallah, Zackarias, and Amrani Nassim El. "Follow the Insider : An event study on the impact of Insider transactions." Thesis, Stockholm University, School of Business, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-5965.

Full text
Abstract:
<p>Although there are as many trading strategies as there are people in this world, the traditional opinion is that investments should be based on sound fundamental analysis which in turn is partly based on information that by law should be given to the financial market without delay. The Efficient Market Hypothesis (EMH) states that prices quickly adjust to new information and that current prices are accurately reflected by all the information about the asset in question (Fama, 1970). Thus, no investor should have an advantage in forecasting future stock prices since no one is supposed to hav
APA, Harvard, Vancouver, ISO, and other styles
4

Tahaoglu, Cagdas. "Return Performance Of Insider Transactions: Evidence From The Istanbul Stock Exchange." Thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12611367/index.pdf.

Full text
Abstract:
The aim of this master&rsquo<br>s thesis is to estimate the return performance of insiders (persons or firms liable for announcing their transactions to the public in accordance with the Capital Markets Board decrees) from their transactions and assess whether outsiders can earn abnormal returns by following reported insider transactions. In the study, Rolling Portfolio Approach has been implemented. As a result of the analysis made, when the purchases and sales of insiders are considered together, it has been observed that they, generally, cannot earn abnormal positive returns from their tr
APA, Harvard, Vancouver, ISO, and other styles
5

Fazio, Dimas Mateus. "Short selling and inside information." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/12/12138/tde-28082014-163356/.

Full text
Abstract:
Using data on all lending deals in the Brazilian stock market from 2009 to 2011, we provide answers to the following questions: i) are short-sellers informed in Brazil?, ii) which short sellers are informed?, and iii) how are they informed? The answer to the first question is positive, the average Brazilian short-seller is informed. Among these short-sellers, individual investors appear to be as informed as investment funds. To provide an answer to the third question, the approach is to observe how short-selling behaves around days when relevant corporate news is disclosed. This paper shows th
APA, Harvard, Vancouver, ISO, and other styles
6

Yingling, Scott T. "Congressional Insider Trading: An Analysis of the Personal Common Stock Transactions of U.S. Senators." Scholarship @ Claremont, 2011. http://scholarship.claremont.edu/cmc_theses/193.

Full text
Abstract:
I have examined the common stock investments made by members of the U.S. Senate between 2006 and 2009. I find that the average stock portfolio in the Senate exhibits one and two year cumulative abnormal returns (CARs) of -0.15 % and 0.43%, respectively. This suggests that members of the Senate are not trading on insider knowledge as indicated by one previous researcher who calculated a one year CAR of 25%. However, my findings are in line with another previous researcher who found a one year CAR of about -2% and concluded that Congressmen are not trading on inside information. I also examine e
APA, Harvard, Vancouver, ISO, and other styles
7

Shahnon, Suhaimi. "Insider transactions and the implications for pricing efficiency and behaviour of the Malaysian stock market." Thesis, University of Hull, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.301492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dunn, Malcolm. "Inside the capitalist firm : an evolutionary theory of the principal agent-relation." Universität Potsdam, 2013. http://opus.kobv.de/ubp/volltexte/2013/6515/.

Full text
Abstract:
This book deals with the inner life of the capitalist firm. There we find numerous conflicts, the most important of which concerns the individual employment relationship which is understood as a principal-agent problem between the manager, the principal, who issues orders that are to be followed by the employee, the agent. Whereas economic theory traditionally analyses this relationship from a (normative) perspective of the firm in order to support the manager in finding ways to influence the behavior of the employees, such that the latter – ideally – act on behalf of their superior, this book
APA, Harvard, Vancouver, ISO, and other styles
9

Dalley, Jeffrey Brian. "The Seesaw of Organisational Social Capital Flows: Inside the "Black Box" of Social Exchange." Thesis, University of Canterbury. Management, 2011. http://hdl.handle.net/10092/6001.

Full text
Abstract:
The purpose of this study is to develop deeper understanding of the informal contributions of employees to organisational success; more specifically, the exchange ‘mechanism’ by which resources accrue to organisations through the social relationships of their members. The second purpose is to explore the influence of organisational contextual factors on this exchange mechanism; more specifically, the influence – if any – of contingent employment practices. Through the use of a qualitative research design, I have gained an in-depth understanding of the cognitive mechanism employed by organisat
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Jr-Feng, and 李志烽. "Insider Ownership, Related Party Transaction and Company Value:Empirical Study." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/29437095782912160764.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>會計系研究所<br>95<br>The paper explores the relation among insider ownership, related party transaction, and company value, focusing on whether insider ownership affects company value by its effect on related party transaction. Simultaneous regression results show that insider ownership affects non-operating income-related party which, in turn, affects company value. The empirical evidence indicates that related party transaction affects company value and company value also affects related party transaction.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Insider Transaction"

1

Brown, Gary M. PLI's guide to the SEC's executive compensation and related party transaction disclosure rules. 2nd ed. Practicing Law Institute, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

A, Buck Edwin, ed. Investing in--and profiting from--legal insider transactions. New York Institute of Finance, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Canada, Canada Industry. Canada Business Corporations Act: Discussion paper : going-private transactions. Industry Canada, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Institute), Seminar on People and Poverty: the Dilemma of Rural Developmental Transactions (1985 Gandhigram Rural. Rural development: An inside look at problems and prospects : papers presented at a Seminar on People and Poverty: the Dilemma of Rural Developmental Transactions held at Gandhigram Rural Institute, 2-4 September 1985. Yatan Publications, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pli's Guide to the Sec's Executive Compensation and Related Party Transaction Disclosure Rules. 2nd ed. Practising Law Institute, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sebastian, Mock. Part A Annotated Guide, 3 The Concept of Market Manipulation. Oxford University Press, 2017. http://dx.doi.org/10.1093/law/9780198811756.003.0003.

Full text
Abstract:
This chapter discusses the concept of market manipulation. In contrast to the prohibition of insider dealing, market manipulation is not a single act or set of different behaviours but more of a multi-layer phenomenon covering all kinds of behaviours generally not accepted in any market. In capital markets law, four different forms of market manipulation developed, which can also be found in the Market Abuse Regulation (and other European regulations). These are information-based manipulation, transaction-based manipulation, short selling, and other forms of manipulation. However, the Market A
APA, Harvard, Vancouver, ISO, and other styles
7

Simon, Morris. 13 Financial Crime. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780199688753.003.0013.

Full text
Abstract:
This chapter concerns financial crime. While the Financial Conduct Authority (FCA) can prosecute offences such as insider dealing and money laundering, its principal role in relation to financial crime is to require authorised firms to take adequate steps to protect against the risk of being used in connection with such offences. The elements (offences, defences, and penalties) of market abuse under the UK regime—which implements the EU Market Abuse Directive (MAD)—are explained. The main types of behaviour which can constitute market abuse—dealing on inside information, disclosing inside info
APA, Harvard, Vancouver, ISO, and other styles
8

Ethics for insider transactions in financial institutions. Carlston Press, Inc, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Services, Insight Educational, ed. OSC policy 9.1: New regulations for related party transactions. Insight, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gabor, Garai, Massachusetts Continuing Legal Education, Inc. (1982- ), and New England Corporate Counsel Association., eds. Working together: The roles of inside and outside counsel in corporate transaction. Massachusetts Continuing Legal Education, Inc., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Insider Transaction"

1

Simpson, William R., and Kevin E. Foltz. "Insider Threat Veracity Issues." In Transactions on Engineering Technologies. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2191-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Weihan, Brajendra Panda, and Qussai Yaseen. "Malicious Users’ Transactions: Tackling Insider Threat." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ménard, Claude. "Inside the Black Box: The Variety of Hierarchical Forms." In Transaction Cost Economics and Beyond. Springer Netherlands, 1996. http://dx.doi.org/10.1007/978-94-009-1800-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ohba, Ryuji. "Nonvolatile Memories Using Single Electron Tunneling Effects in Si Quantum Dots Inside Tunnel Silicon Oxide." In Ceramic Transactions Series. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118771402.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yung-Sheng, and Yu-Ching Hsu. "Approach to the Segmentation of Buttons from an Elevator Inside Door Image." In Transactions on Engineering Technologies. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-32-9808-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ernst, Gidon, Jörg Pfähler, Gerhard Schellhorn, and Wolfgang Reif. "Inside a Verified Flash File System: Transactions and Garbage Collection." In Lecture Notes in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29613-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Putz, Benedikt, and Günther Pernul. "Trust Factors and Insider Threats in Permissioned Distributed Ledgers." In Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII. Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-60531-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kushwaha, Alok Kumar Singh, and Rajeev Srivastava. "A Framework of Moving Object Segmentation in Maritime Surveillance Inside a Dynamic Background." In Transactions on Computational Science XXV. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47074-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Radhouani, Amira, Akram Idani, Yves Ledru, and Narjes Ben Rajeb. "Symbolic Search of Insider Attack Scenarios from a Formal Information System Modeling." In Transactions on Petri Nets and Other Models of Concurrency X. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48650-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Go, Gwang-Myong, Seok-Jun Bu, and Sung-Bae Cho. "Detecting Intrusion via Insider Attack in Database Transactions by Learning Disentangled Representation with Deep Metric Neural Network." In 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57805-3_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Insider Transaction"

1

Ulrich, Patrick, and Dennis Anselmann. "Insider trading on the German capital market — Can insiders achieve excess returns through their information advantage?" In Corporate governance: A search for emerging trends in the pandemic times. Virtus Interpress, 2021. http://dx.doi.org/10.22495/cgsetpt17.

Full text
Abstract:
This study investigates whether corporate insiders can generate excess returns on the German capital market due to their information advantage. This is done with the help of an event study based on a market model that estimates the expected returns. Furthermore, the effect size of individual aspects is examined in a multiple regression. It is shown that insiders can achieve short-term excess returns of up to 2.1% after purchases and of up to -2.95% after sales. Moreover, these are strikingly high for, relative to market capitalization, transactions of smaller firms and transactions of other ex
APA, Harvard, Vancouver, ISO, and other styles
2

Lomet, D., R. Barga, M. F. Mokbel, and G. Shegalov. "Transaction Time Support Inside a Database Engine." In 22nd International Conference on Data Engineering (ICDE'06). IEEE, 2006. http://dx.doi.org/10.1109/icde.2006.162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gottlieb, Max, and Boris Stavrovski. "Common Approaches to Patenting New E-commerce Business Models (a Case Study)." In InSITE 2005: Informing Science + IT Education Conference. Informing Science Institute, 2005. http://dx.doi.org/10.28945/2853.

Full text
Abstract:
Three very typical examples of recently patented new E-commerce business models (commercial real estate transaction system, inventory database management system and Internet marketing resource allocating system) are analyzed. Common approaches to patenting new E-commerce business models are proposed and potential usefulness of patents as informing, marketing and protective instruments is discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Eberle, William, and Lawrence Holder. "Mining for insider threats in business transactions and processes." In 2009 IEEE Symposium on Computational Intelligence and Data Mining (CIDM). IEEE, 2009. http://dx.doi.org/10.1109/cidm.2009.4938645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kritzinger, Elmarie, and Sebastiaan Von Solms. "E-learning: Incorporating Information Security Governance." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2953.

Full text
Abstract:
The global society is living in the electronic age where electronic transactions such as e-mail, e-banking, e-commerce and e-learning are becoming more and more prominent. This paper primarily focuses on e-learning and how important it is to ensure that proper Information Security measures are put in place to ensure that all information within the e-learning environment is properly protected. This paper highlights four Information Security pillars that could be used to achieve this.
APA, Harvard, Vancouver, ISO, and other styles
6

Strauch, Tobias. "Dynamic Inside-Out Verification Using Inverse Transactions in TLM." In 2018 Forum on specification & Design Languages (FDL). IEEE, 2018. http://dx.doi.org/10.1109/fdl.2018.8524048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Review of Blockchain Literature – Its Application and Acceptance." In InSITE 2019: Informing Science + IT Education Conferences: Jerusalem. Informing Science Institute, 2019. http://dx.doi.org/10.28945/4347.

Full text
Abstract:
Aim/Purpose: To understand the current state of the body of literature in blockchain technology and propose dimensions for acceptance. Background: Blockchain technology has large promise to replace centralized and even distributed database systems. Its premise focuses on issues such as transparency, immutability, and privacy of transactions. Created for bitcoin, researchers and practitioners have begun to see its potential in different areas and industries. Its acceptance is still debatable as there are a number of issues still to be resolved. Methodology: We conducted a literature review to a
APA, Harvard, Vancouver, ISO, and other styles
8

Christozov, Dimitar, Stefanka Chukova, and Plamen Mateev. "Warranty and the Risk of Misinforming: Evaluation of the Degree of Acceptance." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3278.

Full text
Abstract:
Nowadays the product warranty plays increasingly important role in any business transaction. It is a valuable attribute of the product and it is used extensively in marketing and advertising. It is a tool to enforce the competing power of the producer on the market place. There is a vast literature on the product warranty related to the product malfunctioning. In this study we address another type of warranty - the warranty of misinforming, which of great importance in the light of indirect business communication, as in e-commerce. Here, we extend previous studies, aiming to provide a more rea
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Qiyang, James Yao, and Rubin Xing. "Middleware Components for E-commerce Infrastructure: An Analytical Review." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/2951.

Full text
Abstract:
Embracing inapt infrastructure technology is a major threat in developing extensive and efficient Web-based systems. The architectural strength of all business models demands an effective integration of various technological components. And middleware, the center of all applications, becomes the driver—everything works if middleware does. In the recent times, the client/server environment has experienced sweeping transformation and led to the notion of the “Object Web”. Web browser is viewed as a universal client that is capable of shifting flawlessly and effortlessly between various applicati
APA, Harvard, Vancouver, ISO, and other styles
10

Neu, Charles V., Avelino F. Zorzo, Alex M. S. Orozco, and Regio A. Michelin. "An approach for detecting encrypted insider attacks on OpenFlow SDN Networks." In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2016. http://dx.doi.org/10.1109/icitst.2016.7856698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!