To see the other types of publications on this topic, follow the link: Insidia.

Journal articles on the topic 'Insidia'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Insidia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Perini, Giordano, Enrico Rosa, Ginevra Friggeri, Lorena Di Pietro, Marta Barba, Ornella Parolini, Gabriele Ciasca, et al. "INSIDIA 2.0 High-Throughput Analysis of 3D Cancer Models: Multiparametric Quantification of Graphene Quantum Dots Photothermal Therapy for Glioblastoma and Pancreatic Cancer." International Journal of Molecular Sciences 23, no. 6 (March 16, 2022): 3217. http://dx.doi.org/10.3390/ijms23063217.

Full text
Abstract:
Cancer spheroids are in vitro 3D models that became crucial in nanomaterials science thanks to the possibility of performing high throughput screening of nanoparticles and combined nanoparticle-drug therapies on in vitro models. However, most of the current spheroid analysis methods involve manual steps. This is a time-consuming process and is extremely liable to the variability of individual operators. For this reason, rapid, user-friendly, ready-to-use, high-throughput image analysis software is necessary. In this work, we report the INSIDIA 2.0 macro, which offers researchers high-throughput and high content quantitative analysis of in vitro 3D cancer cell spheroids and allows advanced parametrization of the expanding and invading cancer cellular mass. INSIDIA has been implemented to provide in-depth morphologic analysis and has been used for the analysis of the effect of graphene quantum dots photothermal therapy on glioblastoma (U87) and pancreatic cancer (PANC-1) spheroids. Thanks to INSIDIA 2.0 analysis, two types of effects have been observed: In U87 spheroids, death is accompanied by a decrease in area of the entire spheroid, with a decrease in entropy due to the generation of a high uniform density spheroid core. On the other hand, PANC-1 spheroids’ death caused by nanoparticle photothermal disruption is accompanied with an overall increase in area and entropy due to the progressive loss of integrity and increase in variability of spheroid texture. We have summarized these effects in a quantitative parameter of spheroid disruption demonstrating that INSIDIA 2.0 multiparametric analysis can be used to quantify cell death in a non-invasive, fast, and high-throughput fashion.
APA, Harvard, Vancouver, ISO, and other styles
2

Chueca, Luis. "Poesía joven y fin del siglo XX: contrapuntos entre Perú y Chile a partir de Pista de baile de Martín Rodríguez-Gaona y La insidia del sol sobre las cosas de Germán Carrasco." Taller de Letras, no. 68 (2021): 46–77. http://dx.doi.org/10.7764/tl6846-77.

Full text
Abstract:
El artículo revisa los poemarios Pista de baile del peruano Martín Rodríguez-Gaona y La insidia del sol sobre las cosas del chileno Germán Carrasco a fin de establecer un diálogo entre los rasgos de la poesía joven a fines del siglo XX, en ambos países, con los aspectos comunes de sus contextos de producción, a fin de indagar en cómo estos intervinieron en las subjetividades juveniles y cómo se expresaron desde la poesía.
APA, Harvard, Vancouver, ISO, and other styles
3

Lanceros, Patxi. "La pregunta por el poder." Estudios de Deusto 43, no. 1 (January 28, 2015): 113. http://dx.doi.org/10.18543/ed-43(1)-1995pp113-131.

Full text
Abstract:
Para una lectura apresurada y ciertamente superficial, el poder sería el concepto central de la filosofía foucaultiana, el objeto —finalmente hallado— gracias al cual se recuperan unos primeros pasos titubeantes y alguna que otra reflexión despistada. Los primeros serían los pasos dados en pos de una tematización de la locura y la enfermedad, problemas ambos «políticamente sin importancia y epistemológicamente sin nobleza ». Las segundas aludirían al esfuerzo invertido en la polémica narración de una «historia de las ciencias» (Las palabras y las cosas) que, a la vista del trabajo posterior, no sería sino un paréntesis, una especie de capricho incrustado en la «verdadera» trayectoria foucaultiana; la que desde el principio acosa al poder, hostiga sus múltiples formas de aparición, desvela sus secretos, muestra sus maniobras y su injustificable insidia.
APA, Harvard, Vancouver, ISO, and other styles
4

Moriconi, Chiara, Valentina Palmieri, Riccardo Di Santo, Giusy Tornillo, Massimiliano Papi, Geoff Pilkington, Marco De Spirito, and Mark Gumbleton. "INSIDIA: A FIJI Macro Delivering High‐Throughput and High‐Content Spheroid Invasion Analysis." Biotechnology Journal 12, no. 10 (September 6, 2017): 1700140. http://dx.doi.org/10.1002/biot.201700140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Preterossi, Germinello. "LA EXCEPCIÓN COTIDIANA. HACIA EL FINAL DE LA EDAD DE LOS DERECHOS." Revista de la Facultad de Derecho de México 56, no. 246 (August 18, 2017): 109. http://dx.doi.org/10.22201/fder.24488933e.2006.246.61526.

Full text
Abstract:
<p>La respuesta institucional y cultural de las democracias al "terrorismo global" ha caminado, sobre todo en los Estado Unidos, pero no solamente, en la ruta de la simplificación amigo-enemigo, de la dramatización de la unicidad del evento (como si la historia hubiera comenzado el 11 de Septiembre), del uso políticamente instrumental del miedo y del luto (evitando cuidadosamente el trabajo de autoreflexión que la fragilidad y las aporías del mundo globalizado implicarían).</p><p>Miedo no como conciencia "hobbesiana" de la insidia a la cual está expuesto constantemente todo orden político, como el no excluir del horizonte al conflicto, que es lo que determina en última instancia el carácter político del orden. Pero ello no como fuente de consenso fácil, mediático-plebiscitario, vinculado a la acentuación de pasiones elementales y regresivas, y no a su "gobierno".</p><p>Miedo, nuevamente, como legitimación de una nueva, por lo menos en ciernes, forma "posmoderna" de absolutismo, es decir, de un poder no regulado, puramente militar y tecnológico-financiero. Un plano inclinado que anunica la delegación posdemocrática, la simplificación del discurso público, la familiarización con tasas de violencia pública y privada elevadísimas, la identificación obsesiva-paranoica que remite a la figura del jefe y la patria "occidental".</p>
APA, Harvard, Vancouver, ISO, and other styles
6

Nguyen, Minh-Duong, Ngoc-Tu Chau, Seungwook Jung, and Souhwan Jung. "A Demonstration of Malicious Insider Attacks inside Cloud IaaS Vendor." International Journal of Information and Education Technology 4, no. 6 (2014): 483–86. http://dx.doi.org/10.7763/ijiet.2014.v4.455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

De Castro, Maurício Paroni. "THIERRY SALMON, DEMIURGO E PEDAGOGO." Revista Rascunhos - Caminhos da Pesquisa em Artes Cênicas 6, no. 1 (March 28, 2019): 20–34. http://dx.doi.org/10.14393/rr-v6n1-2019-02.

Full text
Abstract:
Título: THIERRY SALMON, DEMIURGO E PEDAGOGO – uma introdução para um público brasileiro Resumo: Através da narração de sua experiência pessoal com o encenador e pedagogo do teatro Thierry Salmon, o diretor, dramaturgista e roteirista Mauricio Paroni de Castro traz o percurso de um aprendizado teatral que transformou e formou radicalmente sua estética, até seus primeiros espetáculos italianos. Tal percurso serve para apresentar técnicas do diretor enquanto meio expressivo e não como o esteticismo virtuosístico que se insidia-se incipientemente na realização de alguns workshops sobre atuação – por exemplo, o círculo neutro. Paroni utiliza seu percurso pessoal para compor uma visão, entre apaixonada e racional, do modo de trabalhar de Thierry enquanto apresentação ao público brasileiro. Palavras-chave: Círculo neutro; Pedagogia teatral; Dramaturgia de cena; Personagem; Narração. Titolo: THIERRY SALMON, DEMIURGO E PEDAGOGO – una introduzione per un pubblico brasiliano. Riassunto: Attraverso il racconto della sua esperienza personale con il regista e pedagogo teatrale Thierry Salmon, il regista, drammaturgo e sceneggiatore Maurício Paroni de Castro traccia il percorso di un apprendimento teatrale che ha trasformato e plasmato radicalmente la sua estetica, fino dai suoi primi spettacoli italiani. Tale percorso serve a presentare le tecniche del regista come mezzo espressivo e non come l’estetismo virtuosistico che è insidiosamente proposto nell'esecuzione di alcuni workshop sulla recitazione - per esempio, il cerchio neutro. Paroni usa il suo personale percorso per comporre una visione, tra appassionata e razionale, del modo di lavorare di Thierry e allo stesso tempo lo presenta al pubblico brasiliano. Parole chiave: Cerchio neutro; Pedagogia teatrale; Drammaturgia scenica; Personaggio; Narrazione. Title: THIERRY SALMON, DEMIURGE AND EDUCATOR – an introduction for a Brazilian audience Abstract: Through the narration of his personal experience with the director and pedagogue of Thierry Salmon Theater, the director, dramaturgist and screenwriter Mauricio Paroni de Castro brings the course of a theatrical learning that transformed and radically shaped his aesthetic, until his first Italian spectacles. This course serves to present techniques of the director as an expressive medium and not as a virtuosic aestheticism that is insidiously incipient in the performance of some workshops on acting - for example, the neutral circle. Paroni uses his personal path to compose a vision, between passionate and rational, of the way of working of Thierry while presenting to the Brazilian public. Keywords: Neutral circle; Theatrical pedagogy; Scene dramaturgy; Character; Narration.
APA, Harvard, Vancouver, ISO, and other styles
8

Sanders, George Lawrence, Shambhu Upadhyaya, and Xunyi Wang. "Inside the Insider." IEEE Engineering Management Review 47, no. 2 (June 1, 2019): 84–91. http://dx.doi.org/10.1109/emr.2019.2917656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Dhruba, Ananda Lal, and Philip Lutgendorf. "Inside-Outsider, Outside-Insider." TDR (1988-) 37, no. 4 (1993): 12. http://dx.doi.org/10.2307/1146288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

HIXSON, WALTER L. "Inside a Cold War Insider." Diplomatic History 17, no. 3 (July 1993): 477–82. http://dx.doi.org/10.1111/j.1467-7709.1993.tb00592.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hnyluch Sobański, Konrad. "Inside information and insider trading." Studenckie Prace Prawnicze, Administratywistyczne i Ekonomiczne 29 (September 30, 2019): 119–34. http://dx.doi.org/10.19195/1733-5779.29.8.

Full text
Abstract:
EU law acts often have a built-in element of the so-called self-control, consisting in verification of the effectiveness of regulation after a specified period of time from the entry into force of a legal act. In the year 2019, the Market Abuse Regulation MAR, which in 2016 introduced new regulations concerning confidential information and trade related to internal information, causing a revolution in the capital market, will be reviewed. Numerous new duties were imposed on market participants, among others in the field of transaction reporting, access to confidential information, the circle of persons having access to confidential information. Due to the above, the article discusses the regulations of confidential information and related obligations imposed on market participants, based on the current achievements of the doctrine and judicatory. These considerations have been confronted with the undesirable element of having confidential information, i.e. insider trading. Often, an entity that has access to specific confidential information uses it in an unlawful manner to achieve its own profit. This causes inequalities in access to market information and leads to distortions in the transparency of financial markets. The article also included a polemic on the morality of insider dealing. Informacja poufna w obrocie papierami wartościowymiAkty prawa unijnego często mają wbudowany element tak zwanej samokontroli self controlling, polegający na weryfikacji skuteczności regulacji po upływie określonego czasu od wejścia w życie aktu prawnego. Na rok 2019 przypada rewizja rozporządzenia MAR Market Abuse Regulation, które wprowadzając w 2016 roku nowe regulacje dotyczące informacji poufnej i obrotu związanego z informacją wewnętrzną, spowodowało rewolucję na rynku kapitałowym. Na uczestników rynku zostały nałożone nowe liczne obowiązki, między innymi w zakresie raportowania transakcji, dostępu do informacji poufnej czy też kręgu osób mających dostęp do informacji poufnej. Z uwagi na to w artykule omówione zostały regulacje informacji poufnej oraz związanych z nią obowiązków nałożonych na uczestników rynku, opierając się na aktualnym dorobku doktryny i dostępnym orzecznictwie. Rozważania zostały zestawione z niepożądanym elementem posiadania informacji poufnej, to jest insider trading. Często podmiot mający dostęp do określonych informacji poufnych wykorzystuje je w sposób bezprawny dla osiągnięcia własnego zysku. Powoduje to nierówności w dostępie do informacji rynkowych i prowadzi do zaburzenia transparentności rynków finansowych. W artykule podjęto również polemikę co do moralności wykorzystywania informacji poufnych.
APA, Harvard, Vancouver, ISO, and other styles
12

Hewitt-Taylor, Jaquelina. "Inside knowledge: issues in insider research." Nursing Standard 16, no. 46 (July 31, 2002): 33–35. http://dx.doi.org/10.7748/ns.16.46.33.s5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Pritchard, A. "Insider Trading Law and the Ambiguous Quest for Edge." Michigan Law Review, no. 116.6 (2018): 945. http://dx.doi.org/10.36644/mlr.116.6.insider.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Figueroa, Dante. "Insider Trading and Other Securities Frauds in the United States: Lessons for Chile." Michigan Business & Entrepreneurial Law Review, no. 3.2 (2014): 165. http://dx.doi.org/10.36639/mbelr.3.2.insider.

Full text
Abstract:
This Article is a comparative analysis of insider trading law in the United States and Chile. The study summarily reviews the historical, political, and legal foundations of insider trading regulation in both jurisdictions, identifying areas of convergence, as well as areas in which the Chilean securities market could benefit vis- ` a-vis the more advanced experience of the considerably larger American securities market. The Article also highlights the axiological closeness between both jurisdictions concerning the protection of inside corporate information and the fiduciary role of those who intervene in securities markets in their various capacities (as investors, shareholders, corporate officers, consultants, advisors, or as other intermediary roles). The Article concludes by identifying a series of reforms that might potentially benefit the Chilean legal system as it works towards its stated purpose of protecting and promoting transparency in its national securities market.
APA, Harvard, Vancouver, ISO, and other styles
15

Ki, Do Hoon, and Seung Jun Kim. "An Empirical Study on Relation between Accounting Earnings-Stock Return Bias and Insider Stock Trade." Academic Society of Global Business Administration 19, no. 5 (October 31, 2022): 157–86. http://dx.doi.org/10.38115/asgba.2022.19.5.157.

Full text
Abstract:
This study analyzes the pre-transaction period accounting earnings-stock price relation among companies with and without insider trade(insider sell and buy) to find out whether information asymmetry increase potential insider’s profit, thereby, motivate insider to trade their own stocks. In order to figure out correct relationship between insider trading and information asymmetry, this study recognize succesive insider trading, and use only first trade observation of succetive insider sell and buy, respectively. Therefore the total number of stocks and the first trade of each successive insider tradings are respectively presumed as an insider trading volume and as an observation of the the succesive insider trading. Also, all ownership information of directors and major shareholder is cellected from DART using Python, and quarterly financial information is used for our analysis to alleviate the possible problem coming from assumption of period of insider trading. The analysis period is from 2012 to 2018, and non-financial companies among listed companies on the Korea Stock Exchange and KOSDAQ are targeted. Empirical analysis shows as follow. First, it was found that the greater the over-estimate of earnings-return relation incurs greater probability of occurrence of insider stock sales and greater insider sales stock volume. These relationships are larger and more significant than those between insider trading and future earnings level, future earnings growth, and future stock return, which represent insiders' information advantage on future prospects of the firm. Second, the effect of estimation bias of earnings-return relation on the probability of insider sales was stronger and more immediate than those of insider purchases. The positive relationship between future prospects and insider trading, reported in previous studies, was stronger in insiders purchases than in insider sales. This study directly analyzed whether information asymmetry between insiders and external stakeholders plays a major role of insider trading, comparing pre-period earning-return relation estimates of insider trading firms with those of control firms. It is also meaningful in that it shows that the information asymmetry difference between insiders and external stakeholders can have different effects on insider trading for different properties of insider sales and purchase.
APA, Harvard, Vancouver, ISO, and other styles
16

Ghina Mariyah Fairuz and M. Yusuf Bambang Setiadji. "Pembuatan Bahan Cyber Exercise sebagai Sarana Latihan Penanganan Insiden Malware (Studi Kasus: Instansi XYZ)." Info Kripto 15, no. 3 (November 17, 2021): 123–31. http://dx.doi.org/10.56706/ik.v15i3.31.

Full text
Abstract:
Serangan malware semakin berkembang di dunia, termasuk di Indonesia. Salah satu sektor yang menjadi target serangan malware adalah sektor pendidikan. Contoh nyata insiden malware pada sektor pendidikan adalah insiden malware di Instansi pendidikan XYZ. Insiden tersebut mengakibatkan terganggunya layanan e-mail Instansi XYZ, data-data pribadi mahasiswa hilang atau terenkripsi, serta terganggunya kinerja perangkat elektronik yang terinfeksi. Berkaca dari insiden yang pernah terjadi, Instansi XYZ sebaiknya memiliki kemampuan penanganan insiden. Kemampuan penanganan insiden dapat dilatih melalui kegiatan Cyber Exercise. Penelitian ini bertujuan untuk menghasilkan bahan berupa dokumen Participants Handout dan lingkungan simulasi yang dapat digunakan untuk Cyber Exercise insiden malware oleh pengelola TI Instansi XYZ. Pembuatan bahan dilakukan berdasarkan siklus Cyber Exercise dengan skenario insiden malware jenis ransomware. Skenario penanganan insiden yang dilakukan mengacu pada NIST SP 800-83r1. Berdasarkan penelitian yang dilakukan, diperoleh hasil keluaran berupa mesin virtual sebagai lingkungan simulasi insiden, berkas hasil tangkapan jaringan, dan dokumen Participants Handout yang berisi enam studi kasus skenario insiden.
APA, Harvard, Vancouver, ISO, and other styles
17

Azizah, Nadya, Yupie Kusumawati, and Ramadhan Rakhmat Sani. "Perancangan Manajemen Insiden pada Layanan Teknologi Informasi Inventory Menggunakan Framework ITIL Versi3 (Studi Kasus : PT. Genta Semar Mandiri Semarang)." JOINS (Journal of Information System) 5, no. 1 (May 31, 2020): 136–46. http://dx.doi.org/10.33633/joins.v5i1.3610.

Full text
Abstract:
Teknologi informasi digunakan oleh PT. Genta Semar Mandiri untuk mempermudah proses bisnis inventory. Namun pada kenyataanya masih sering terjadi insiden yang menghambat proses bisnis inventory. Insiden yang sering terjadi adalah aplikasi sering error, part number tidak terintegrasi dengan sistem, dan basis data overload. Selama ini insiden tersebut tidak dikelola dengan baik, hal ini disebabkan karena tidak adanya divisi yang khusus menangani insiden TI, serta belum dibuatnya SOP yang digunakan sebagai acuan menangani insiden TI. Penelitian ini bertujuan untuk mendapatkan hasil kesenjangan antara kondisi eksisting dengan kondisi ideal proses manajemen insiden pada PT. Genta Semar Mandiri serta mendapatkan SOP yang di perlukan dalam manajemen insiden. Penelitian ini menggunakan Framework ITIL versi 3 dalam merancang kerangka kerja dalam manajemen layanan insiden. Penelitian menunjukkan adanya beberapa perbedaan antara kondisi eksisting dengan kondisi ideal yaitu tidak adanya divisi khusus yang menangani manajamen layanan insiden, serta tidak adanya service desk yang bertugas sebagai pintu gerbang layanan insiden. Sehingga dihasilkan beberapa perubahan yaitu penambahan struktur organisasi pada perusahaan, SOP, serta form yang diperlukan pada penanganan manajemen layanan insiden berdasarkan framework ITIL versi 3. Kata kunci: Tata kelola TI, Manajemen insiden, ITIL versi 3, SOP, PT.Genta Semar Mandiri
APA, Harvard, Vancouver, ISO, and other styles
18

Lestari, Endang Sri, Luki Dwiantoro, and Hanifa Maher Denny. "SISTEM PELAPORAN INSIDEN KESELAMATAN PASIEN DI SEBUAH RUMAH SAKIT SWASTA DI KUDUS." Jurnal Keperawatan dan Kesehatan Masyarakat Cendekia Utama 8, no. 2 (November 3, 2019): 169. http://dx.doi.org/10.31596/jcu.v8i2.416.

Full text
Abstract:
Pelaporan insiden keselamatan pasien (IKP) merupakan hal yang penting dalam program peningkatan keselamatan pasien.Pelaporan insiden dapat membantu menemukan dan menyelesaikan masalah dengan mengaplikasikan metode problem solvingsebagai sebuah pembelajaran (learning).Penelitian ini bertujuan mengeksplorasi sistem pelaporan insiden keselamatan pasien (IKP) di sebuah rumah sakit swasta di Kudus.Penelitian ini adalahpenelitian kualitatif yang bersifat deskriptif. Teknik pengambilan data dilakukan dengan purposive sampling. Pengumpulan data dilakukan dengan metode wawancara mendalam (in-depth interview)dan studi dokumentasi. Wawancara dilakukan kepada dua informan utama yaitu kepala Bagian Mutu Akreditasi dan perawat pelaksana yang terkait langsung dengan pelaporan insiden, enam informan penunjang,serta satu informan triangulasi. Data yang telah dikumpulkan dianalisis dengan tahapan reduksi, penyajian dan menarik kesimpulan.Hasil penelitian menunjukkan bahwa pelaporan insiden sudah dilakukan oleh sebuah rumah sakit swasta di Kudus. Struktur organisasi Bagian Mutu Akreditasi dimana terdapat divisimutu klinis. Pedoman dan panduan pelaporan insiden pun sudah dibuat, tetapi petugas dalam struktur organisasi mempunyai peran ganda sehingga uraian tugas tidak dikerjakan secara optimal. Pelaporan insiden di rumah sakit dilakukan ketika terjadi insiden, dengan menggunakan aplikasi SINDEN yang dibuat oleh rumah sakit berdasarkan formulir pelaporan insiden manual yang dikeluarkan oleh Kemenkes.Beberapa jenis insiden yang harus dilaporkan adalah Kejadian Tidak Diharapkan (KTD), Kejadian Tidak Cedera (KTC), Kondisi Potensial Cedera (KPC) atau Kejadian Nyaris Cedera (KNC) yang menimpa pasien atau keluarga dan pengunjung. Pelaporan insiden dilakukan secara lengkap (100%) dan ketepatan sudah mencapai 90%. Penelitian ini menyimpulkan bahwa pelaporan insiden sudah dilakukan sesuai alur yang ditetapkan. Terdapat panduan pelaporan insiden yang disahkan oleh direktur. Pelaporan dilakukan oleh orang yang pertama kali menemukan insiden dan ia segera membuat pelaporan dalam kurun waktu 2x24 jam secara online menggunakan program Sinden. Kata Kunci: Sistem Pelaporan Insiden, Keselamatan Pasien, Organisasi
APA, Harvard, Vancouver, ISO, and other styles
19

Nasser Al-mhiqani, Mohammed, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, and Ameera Natasha Mohammad. "New insider threat detection method based on recurrent neural networks." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1474. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1474-1479.

Full text
Abstract:
<p>Insider threat is a significant challenge in cybersecurity. In comparison with outside attackers, inside attackers have more privileges and legitimate access to information and facilities that can cause considerable damage to an organization. Most organizations that implement traditional cybersecurity techniques, such as intrusion detection systems, fail to detect insider threats given the lack of extensive knowledge on insider behavior patterns. However, a sophisticated method is necessary for an in-depth understanding of insider activities that the insider performs in the organization. In this study, we propose a new conceptual method for insider threat detection on the basis of the behaviors of an insider. In addition, gated recurrent unit neural network will be explored further to enhance the insider threat detector. This method will identify the optimal behavioral pattern of insider actions.</p>
APA, Harvard, Vancouver, ISO, and other styles
20

Adnyani, Ni Luh Gede Sekar, I. Nyoman Adikarya Nugraha, and I. Gusti Lanang Made Rudiartha. "EVALUASI PELAPORAN INSIDEN KESELAMATAN PASIEN DI RUMAH SAKIT UMUM DAERAH KARANGASEM." Jurnal Ilmiah Keperawatan (Scientific Journal of Nursing) 8, no. 4 (October 31, 2022): 537–49. http://dx.doi.org/10.33023/jikep.v8i4.1217.

Full text
Abstract:
Pendahuluan: Rumah Sakit Umum Daerah Karangasem telah menerapkan pelaporan insiden keselamatan pasien pada setiap unit pelayanan, namun pelaksanaan pelaporan insiden keselamatan pasien tersebut masih banyak mengalami kendala sehingga diperlukan suatu evaluasi untuk mengetahui permasalahan yang terjadi. Tujuan: untuk mengevaluasi pelaporan insiden keselamatan pasien di RSUD Karangasem. Metode: Jenis penelitian yang digunakan adalah kualitatif dengan menggunakan pendekatan studi kasus, proses pengambilan data dengan teknik wawancara mendalam terhadap 18 partisipan . Tahapan analisis data terdiri dari persiapan analisis data, mencermati data, interpretasi data, verifikasi data serta representasi data. Hasil: RSUD Karangasem telah memiliki pedoman pelaporan insiden keselamatan pasien, namun ketaatan petugas dalam melakukan pelaporan insiden keselamatan pasien masih rendah. Alur pelaporan internal insiden keselamatan pasien sudah dilaksanakan sesuai pedoman, tetapi masih terdapat permasalahan yang ditemui. Faktor yang menjadi penghambat pelaporan insiden keselamatan pasien adalah kurangnya pengetahuan serta adanya pelaporan insiden secara lisan melalui telepon, dan faktor yang menjadi pendukung pelaporan insiden keselamatan pasien yaitu adanya motivasi, serta budaya tidak menyalahkan. Kesimpulan: RSUD Karangasem telah menerapkan pelaporan insiden keselamatan pasien, namun dalam penerapannya masih mengalami kendala, hal ini dikarenakan kurangnya ketaatan petugas dalam melakukan pelaporan insiden keselamatan pasien
APA, Harvard, Vancouver, ISO, and other styles
21

He, Guanming, and David Marginson. "The impact of insider trading on analyst coverage and forecasts." Accounting Research Journal 33, no. 3 (May 28, 2020): 499–521. http://dx.doi.org/10.1108/arj-08-2019-0148.

Full text
Abstract:
Purpose The purpose of this study is to examine the effect of insider trading on analyst coverage and the properties of analyst earnings forecasts. Given the central role of analysts for information diffusion in stock markets, advancing understanding of the role insider trades may play in analyst coverage and forecasts, especially in the context of a changing legal environment (e.g. the implementation of Regulation Fair Disclosure [Reg FD]), should be a worthy goal. Design/methodology/approach To address the research questions, the authors run regressions in which the authors identify and control for as many possible determinants of analyst coverage and forecasts (e.g. firm size, information asymmetry and earnings performance) that are correlated with insider trades. To alleviate endogeneity concerns, the authors use three approaches. First, the authors extend the sample period to the post-Reg-FD period in which managers are not allowed to provide private information to financial analysts. Second, the authors measure analyst coverage in a window that is lagged by insider trades. Third, the authors employ firm-fixed-effects regressions in all the multivariate tests. Finally, following Larcker and Rusticus (2010), the authors conduct the impact threshold for a confounding variable test to assure that all regression analyses are indeed immune to the potential correlated-omitted-variable bias. Findings The authors find that the level of analyst coverage is positively related to the intensity of insider trades and that analyst coverage is more strongly associated with insider purchases than with insider sales. The authors also find that the positive association between analyst coverage and insider trades is less pronounced after the passage of Reg FD. Further investigations reveal that analysts revise their earnings forecasts upward following insider purchases, the informativeness of analyst forecast revisions significantly increases following insider purchases and optimistic bias in analyst forecast revisions is reduced as a result of insider purchases; the authors do not find similar evidence for insider sales. Research limitations/implications A large body of insider trading literature (Johnson et al., 2009; Badertscher et al., 2011; Thevenot 2012; Skaife et al., 2013; Billings and Cedergren 2015; Dechow et al., 2016) provides evidence that insiders actively trade on their private information, such as their foreknowledge of price-relevant corporate events. This literature suggests that insider trades are potentially value-relevant and are informative about a firm’s future prospects. However, less research attention has been paid to investigating how insider trades might affect market participants’ (especially sophisticated participants’) behavior. This study contributes to understanding the role that insider trading may play in shaping analyst behavior. Practical implications Prior research (Frankel and Li, 2004; Lustgarten and Mande, 1995; Carpenter and Remmers, 2001; Seyhun, 1990) maintains that insider sales are less informative about a firm’s future prospects than are insider purchases because insider sales might take place for the liquidity and diversification purposes. By probing the stock price responses to insider selling activities, Lakonishok and Lee (2001), Jeng et al. (2003) and Fidrmuc et al. (2006) infer that insider selling is not informative about future firm performance. However, for such an inference, the authors cannot rule out the possibility that insider sales do convey value-relevant information, but the stock market does not react correctly to such trading information (Beneish and Vargus, 2002). Because the authors focus on examining analysts’ responses to insider sales, and analysts are supposed to be sophisticated in information processing, this study adds more compelling evidence for the notion that insider sales convey less information about a firm’s future prospects than do insider purchases. Social implications There is an ongoing debate about the benefits and drawbacks of insider trading. Opponents of insider trading view insider trades as inequitable and immoral and assert that restricting insider trades curbs resource misallocation and benefits the whole society. Proponents contend that insider trading accelerates the price discovery process, increases market efficiency (Leland, 1992; Bernhardt et al., 1995; Choi et al., 2016) and may even play a role in rewarding and motivating executives (Roulstone, 2003; Denis and Xu, 2013). The authors add to this debate by documenting that insider trading increases the amount of information valuable to analyst research activities and helps enhance analyst services. Originality/value To the best of the authors’ knowledge, this study is the first to offer firm-level evidence of a positive association between insider trades and analyst coverage. By accounting for the post-Reg-FD regime, this paper is also the first to provide evidence on how analysts, in the absence of access to management’s private information because of the regime change by Reg FD, react to insider trades.
APA, Harvard, Vancouver, ISO, and other styles
22

Azizah, Ainul. "Criminal sanctions for insider trading: Comparison with Singapore." Jurnal Dinamika Hukum 19, no. 2 (December 26, 2019): 484. http://dx.doi.org/10.20884/1.jdh.2019.19.2.2405.

Full text
Abstract:
Insider trading is one of the crimes in the capital market that causes a lot of material loss to the victim. Such a large loss has caused fears of investors to trade on the capital market in Indonesia. For this reason, the government is trying to prevent insider trading, the government has made a Capital Market Law, but this is not enough. For this reason, policies need to be made relating to criminal sanctions for perpretators insider trading in the future. The research method used is the normative legal research method. With a conceptual approach, comparison and Law. The legal issues that will be examined are the legal and philosophical foundations of criminal sanctions for perpetrators insider trading and criminal law policies relating to criminal sanctions for perpetrators insider trading in the future? The result is a legal basis for criminal sanctions for perpetrators insider trading is to provide a deterrent effect to the perpetrators so that it does not happen again and protect the public from insider trading. Policies relating to criminal sanctions for perpetrators insider trading are the use of schikking in resolving insider trading and by using non-litigation methods.Keyword : criminal sanctions; insider trading; comparison.
APA, Harvard, Vancouver, ISO, and other styles
23

Pyo, G. "Insider trading and informed trading patterns." Finance: Theory and Practice 26, no. 1 (February 26, 2022): 91–102. http://dx.doi.org/10.26794/2587-5671-2022-26-1-91-102.

Full text
Abstract:
This paper aims to examine how corporate insider trading influences trading patterns of foreign and institutional investors especially in firms with high discretionary accruals and low book-to-market ratios as proxies for information uncertainty. This study uses methods such as trading patterns of informed traders who are considered to gather more precise information before and after insider trading and tests how insider trading affects informed traders. The results of this study provide evidence that insider trading is likely to influence informed traders’ trading patterns. After controlling for firm-specific factors, this study finds that the event and the amount of insider trading affect significantly foreign and institutional trading patterns. Furthermore, the relation between informed trading and insider trading is more enhanced when firms have a high level of discretionary accruals and a low book-to-market ratio. Prior studies have focused on the association between abnormal returns of insider trading and types of insider information disseminated, while informed trading patterns and insider trading with information uncertainty have not been specifically considered. This study enables practitioners to interpret corporate insider trading with information uncertainty on informed trading patterns.
APA, Harvard, Vancouver, ISO, and other styles
24

Berkovic, Danielle, Darshini Ayton, Andrew M. Briggs, and Ilana N. Ackerman. "The View From the Inside: Positionality and Insider Research." International Journal of Qualitative Methods 19 (January 1, 2020): 160940691990082. http://dx.doi.org/10.1177/1609406919900828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pyo, Gyungmin. "Insider Trading, Stock Volatility, and Market Liquidity in the Korean Capital Market." Studies in Business and Economics 17, no. 3 (December 1, 2022): 175–89. http://dx.doi.org/10.2478/sbe-2022-0054.

Full text
Abstract:
Abstract While the positive and negative effects of insider trading have been discussed in the each firm levels, there is little evidence for the effects of insider trading on financial markets. This paper aims to provide empirical evidence for the effects of insider trading in the capital market. This study examines the association between insider trading and information asymmetry in firms with certain information environments. If capital market regulation for insider trading is effective and companies are well-governed, the positive rather than negative effects of insider trading in the capital market will be enhanced. The empirical results indicate that insider selling (buying) in firms with high ratios of foreign share ownership is associated with a decrease in stock volatility (market liquidity). The results in this paper enables policy makers and practitioners to understand the impact of corporate insider trading on outsiders in the capital market. Our findings may also help to reform regulation of insider trading as it is applied in real business environments, especially in firms with high levels of information asymmetry.
APA, Harvard, Vancouver, ISO, and other styles
26

Al-Mhiqani, Mohammed Nasser, Rabiah Ahmad, Z. Zainal Abidin, Warusia Yassin, Aslinda Hassan, Karrar Hameed Abdulkareem, Nabeel Salih Ali, and Zahri Yunos. "A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations." Applied Sciences 10, no. 15 (July 28, 2020): 5208. http://dx.doi.org/10.3390/app10155208.

Full text
Abstract:
Insider threat has become a widely accepted issue and one of the major challenges in cybersecurity. This phenomenon indicates that threats require special detection systems, methods, and tools, which entail the ability to facilitate accurate and fast detection of a malicious insider. Several studies on insider threat detection and related areas in dealing with this issue have been proposed. Various studies aimed to deepen the conceptual understanding of insider threats. However, there are many limitations, such as a lack of real cases, biases in making conclusions, which are a major concern and remain unclear, and the lack of a study that surveys insider threats from many different perspectives and focuses on the theoretical, technical, and statistical aspects of insider threats. The survey aims to present a taxonomy of contemporary insider types, access, level, motivation, insider profiling, effect security property, and methods used by attackers to conduct attacks and a review of notable recent works on insider threat detection, which covers the analyzed behaviors, machine-learning techniques, dataset, detection methodology, and evaluation metrics. Several real cases of insider threats have been analyzed to provide statistical information about insiders. In addition, this survey highlights the challenges faced by other researchers and provides recommendations to minimize obstacles.
APA, Harvard, Vancouver, ISO, and other styles
27

Dalko, Viktoria, and Michael H. Wang. "Why is insider trading law ineffective? Three antitrust suggestions." Studies in Economics and Finance 33, no. 4 (October 3, 2016): 704–15. http://dx.doi.org/10.1108/sef-03-2016-0074.

Full text
Abstract:
Purpose The purpose of this paper is to uncover the essence of insider trading, explain why insider trading law is ineffective and provide implications of the effectiveness of the law. Design/methodology/approach This conceptual paper offers three propositions. The first two are based on a literature review of 62 articles in empirical research to develop an understanding of the essence of insider trading and identify the areas in which insider trading is ineffective. This analysis is used in the third proposition to provide a direction in suggesting effective measures to improve insider trading law. Findings The essence of insider trading is that corporate insiders exercise informational monopoly power over their trades. This understanding explains why insider trading law is ineffective because it has not taken away the monopoly power that corporate insiders possess and exercise. This understanding also leads to three antitrust suggestions aimed at improving insider trading law. Practical implications The findings may provide assistance to the lawmakers and regulators to make insider trading law more effective and enforcement more simplified. Originality/value This paper is of value to other researchers attempting to understand the essence of insider trading and to policymakers concerned about the existence of monopolistic behavior in the equity market and income inequality due to corporate insiders’ trading profit.
APA, Harvard, Vancouver, ISO, and other styles
28

Huang, Robin Hui. "Enforcement of Chinese Insider Trading Law: An Empirical and Comparative Perspective." American Journal of Comparative Law 68, no. 3 (September 1, 2020): 517–75. http://dx.doi.org/10.1093/ajcl/avaa018.

Full text
Abstract:
Abstract This Article conducts the first comprehensive and systematic empirical analysis of all relevant insider trading cases in China from the birth of Chinese securities markets in the early 1990s until mid-2017, shedding light on the way in which China’s insider trading law has been enforced by the regulator and criminal courts in practice. First, the Article generates descriptive statistics on features of insider trading cases, such as the total number of cases over the study period, the temporal distribution of the cases, the identity of the insider, and the nature of the insider information. Second, it measures the intensity of insider trading enforcement and compares the Chinese situation with six overseas jurisdictions, including the United States, the United Kingdom, Australia, Canada, Singapore, and Hong Kong. Third, using multiple regression analyses, it identifies potential factors determining the administrative and criminal penalties for insider trading. The results of the empirical study indicate that China has significantly stepped up its efforts to crack down on insider trading in recent years, resulting in a sharp increase in insider trading cases, particularly criminal cases since 2008. While the Chinese insider trading law was essentially transplanted from overseas jurisdictions, its; enforcement has exhibited distinctive features in its local environment. Judging by the type, magnitude, and frequency of the sanctions imposed, the intensity of insider trading enforcement in China seems to be at a level comparable to relevant jurisdictions overseas. Administrative and criminal penalties against insider trading are found to be significantly influenced by some factors, notably the amount of illegal proceeds, the magnitude of social impact, the presence of mitigating circumstances, and whether the trader used others’ accounts to trade. The hope is that the empirical findings will help inform the policy debate over the regulation of insider trading in China and beyond.
APA, Harvard, Vancouver, ISO, and other styles
29

Tiovita, Angela Merici, Febria Listina, and Dwi Yulia Maritasari. "Evaluasi Pelaporan Insiden Keselamatan Pasien di RS Swasta di Lampung Tahun 2022." Jurnal Formil (Forum Ilmiah) Kesmas Respati 7, no. 3 (September 30, 2022): 249. http://dx.doi.org/10.35842/formil.v7i3.449.

Full text
Abstract:
Pelaporan insiden merupakan subsistem dalam keselamatan pasien. Tidak dilaksanakannya pelaporan insiden berdampak pada peningkatan insiden keselamatan pasien. Namun berdasarkan data, terjadi penurunan pelaporan insiden pada 5 tahun terakhir, bahkan tidak ada laporan KPC pada tahun 2021. Tujuan penelitian ini adalah diketahuinya evaluasi pelaporan insiden keselamatan pasien di RS Swasta di Lampung tahun 2022.Penelitian kualitatif ini dengan studi kasus. Informan berjumlah 14 orang, yang dipilih menggunakan teknik purpossive sampling. Terdiri dari 1 informan kunci yaitu ketua komite PMKP, 1 informan utama yaitu sub komite keselamatan pasien, serta 12 informan pendukung yaitu PIC mutu. Pengumpulan data dengan wawancara mendalam (in-depth interview) dan observasi dokumen. Analisa data dilakukan dengan cara reduksi, penyajian data dan penarikan kesimpulan.Hasil penelitian ini adalah bahwa dari segi input sudah ada subkomite keselamatan pasien, namun belum ada SK pengangkatan PIC pelaporan insiden yang disertai uraian tugas dan wewenang, staf yang bertanggung-jawab dalam pelaporan insiden sampai analisa belum terlatih. Belum ada regulasi khusus tentang keselamatan pasien, belum dilakukan PDCA sebagai metode penyelesaian masalah dan pelaporan masih dilakukan secara manual. Dari segi proses ditemui kendala yaitu kepala ruang/unit belum paham jenis-jenis insiden, pengumpulan data belum valid, belum ada sistem terintegrasi dalam pengolahan, penyajian dan analisa data insiden. Dari segi output, rendahnya pelaporan insiden disebabkan oleh persepsi takut disalahkan. Pengambilan keputusan untuk menyelesaikan masalah belum maksimal terhambat analisa data pelaporan insiden. Diperlukan regulasi dan SK penetapan yang jelas, pengajuan pelatihan SDM untuk peningkatan kompetensi sesuai sasaran, dan sosialisasi terkait keselamatan pasien perlu lebih agresif.
APA, Harvard, Vancouver, ISO, and other styles
30

Shevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Sofia Boiko. "INSIDERS AND INSIDER INFORMATION: ESSENCE, THREATS, ACTIVITIES AND LEGAL RESPONSIBILITY." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 175–85. http://dx.doi.org/10.28925/2663-4023.2022.15.175185.

Full text
Abstract:
The constant development of information technologies, the growing role at the present stage of human potential create new internal threats to the information security of enterprises. The article investigates and analyzes the problems of information security associated with internal violators of companies and their insider activity. Economic reports and analytical materials allowed to determine the relevance and importance of this work. Based on scientific literature, a review of various approaches to the definition of "insider" and "insider information" was carried out. The main key indicators of the insider and signs of insider information are described. The classification of data sources for the study of insider threats is presented, among which real data of the system journal and data from social networks are allocated; analytical information with synthetic anomalies; simulated data due to the formation of stochastic models; theoretical and gaming approach. Insider threat detection algorithms are described depending on intentions, behavior, capabilities of insiders, how resources are used, as well as models involving several algorithms. The normative issues of protection of insider information from unauthorized disclosure and legal responsibility for illegal use of insider information in Ukrainian legislation are covered.
APA, Harvard, Vancouver, ISO, and other styles
31

Yi, Bingsheng, Jang Shee Barry Lin, and Jane Mooney. "Equity ownership structure and corporate performance using industry-adjusted measures." Corporate Ownership and Control 7, no. 4 (2010): 49–61. http://dx.doi.org/10.22495/cocv7i4sip7.

Full text
Abstract:
This paper applies a more robust methodology in industry-adjustment on measuring firm performance as related to ownership structure. We consider insider ownership, institutional ownership, and blockholder ownership. Even after controlling for the endogeneity of insider ownership, we still find positive effect of insider ownership on firm performance, which is conflicting with results found by other recent studies. We find a non-linearity in the relationship between insider ownership and firm performance, but our results do not support a relationship as neat as the inverse U-shape effect found by earlier studies. Our results indicate that the effects of the insider and square of insider on performance are positive, yet the effect of the cubic of insider ownership on firm performance is negative. As no other study based on U.S. data used the cubic of insider ownership and document its effect, our finding is new. We find strong negative effect of blockholder ownership on firm performance, and our results indicate that institutional investors are efficient monitors whose existence helps improving firm value and protecting outside minority shareholders.
APA, Harvard, Vancouver, ISO, and other styles
32

KEIBER, KARL LUDWIG. "INSIDER TRADING RULES AND PRICE FORMATION IN SECURITIES MARKETS: AN ENTROPY ANALYSIS OF STRATEGIC TRADING." International Journal of Theoretical and Applied Finance 09, no. 08 (December 2006): 1215–43. http://dx.doi.org/10.1142/s0219024906004013.

Full text
Abstract:
This paper addresses the issue of how insider trading rules affect price formation in securities markets and suggests the application of information theory to market microstructure theory. We analyze a variant of the setting in [20] by simply introducing a more general criterion for informational efficiency borrowed from information theory — namely maximum information transmission. The analysis shows that both the insider's optimal trading strategy and the market price of the risky security depend on the insider trading restriction. Insider trading restrictions are reported to be detrimental to the liquidity of the securities market. We find that a unique insider trading rule exists which implements semi-strong form informational efficiency of the securities market. Alternative restrictions on insider trading give rise to either underreaction or overreaction in securities prices. Too strict insider trading rules are shown to account for excess volatility in securities prices. Contrary to common notion, the uninformed investors are shown to be hurt by too restrictive insider trading rules. We conclude that loose insider trading rules are preferred by the group of investors as a whole.
APA, Harvard, Vancouver, ISO, and other styles
33

Mustika, Komang Ayu Pradnyatiwi, and Dewa Ayu Dian Sawitri. "PENGATURAN TEKNIS PEMBUKTIAN INSIDER TRADING DI INDONESIA." Kertha Semaya : Journal Ilmu Hukum 10, no. 10 (August 5, 2022): 2267. http://dx.doi.org/10.24843/ks.2022.v10.i10.p06.

Full text
Abstract:
Penelitian ini mempunyai tujuan untuk memberikan pemahaman mengenai pengaturan pengaturan perlindungan investor pada insider trading pada pasar modal Indonesia serta untuk memberikan pengetahuan terkait pengaturan teknis pembuktian insider trading di Indonesia. Metode yang dipergunakan pada penelitian terkait pengaturan teknis pembuktian insider trading di Indonesia ini menggunakan penelitian hukum yuridis normatif, pendekatannya yakni pendekatan perundang-undangan untuk melakukan analisis isu hukum penelitian ini. Penelitian ini pada akhirnya menghasilkan yakni jika Perlindungan investor terhadap insider trading dalam pasar modal Indonesia pada hakikatnya diatur dalam UU No. 8/1995, tercantum dalam bab XI dengan judul Penipuan, Manipulasi Pasar, dan Perdagangan Orang Dalam. Konsep serupa juga terdapat pada UU No. 40/ 2007 yang mana direksi serta komisaris wajib melaksanakan tugas serta fungsi dalam keperluan perusahaan yang memiliki kesesuaian makna serta tujuan perusahaan. Selanjutnya terkait pengaturan teknis pembuktian insider trading di Indonesia belum terdapat pengaturan secara khusus sehingga memprsulit pembuktian pada kasus insider trading di Indonesia sehingga para pelaku insider trading di Indonesia dapat dengan mudah mendapatkan putusan bebas. This study aims to provide an understanding of the regulation of investor protection against insider trading in the Indonesian capital market and to find out the technical arrangements for proving insider trading in Indonesia. The method used in this article related to the technical arrangements for proving insider trading in Indonesia uses normative juridical legal research, with a statutory approach to analyze the legal issues of this article. The result of this study is that if the protection of investors against insider trading in the Indonesian capital market is essentially regulated in Law no. 8/1995 concerning the Capital Market, it is stated in chapter XI with the title Fraud, Market Manipulation, and Insider Trading. A similar concept is also found in Article 92 paragraph (1) and Article 108 paragraph (2) of Law no. 40/2007 concerning Limited Liability Companies in which the directors and commissioners are obliged to carry out their duties and functions in the company's needs that have a conformity with the meaning and purpose of the company. Furthermore, regarding the technical arrangements for proving insider trading in Indonesia, there are no specific arrangements that make it difficult to prove in cases of insider trading in Indonesia so that the perpetrators of insider trading in Indonesia can easily get an acquittal.
APA, Harvard, Vancouver, ISO, and other styles
34

Al-Shebli, Abdullah. "Insider Dealing in Kuwait: A comparative study with United Kingdom and the United States." مجلة جامعة الشارقة للعلوم القانونية 16, no. 2 (December 31, 2019): 1–28. http://dx.doi.org/10.36394/jls.v16.i2.28.

Full text
Abstract:
Insider dealing involves the use of information that is not disclosed to the public. Insider dealing has a long and controversial history with regard to securities laws, because some people believe that insider dealing should not be banned by law. However, nearly every country bans insider dealing, although it is done in different ways. This article considers insider dealing as an example of fraud on the stock exchange. It examines protection of individual investors form insider dealing under the Kuwait Capital Markets Act of 2010 (the Act) and suggests recommendations that have the potential to provide more protection to such investors. In order to achieve this aim, this article discusses the existing legal framework for the regulation of insider dealing in the Kuwait and the UK stock markets. It also looks at American law, because the United States has a long history and extensive experience in this regard.
APA, Harvard, Vancouver, ISO, and other styles
35

Faradiza, Sekar Akrom, and Ratna Listiana Dewanti. "Ethical Orientation and Personal Benefit in Insider Trading." Winners 13, no. 1 (March 30, 2012): 9. http://dx.doi.org/10.21512/tw.v13i1.663.

Full text
Abstract:
Most of people think insider trading is an unfair activity because the parties that involved have unequal information. In a certain condition, unequal information used in a transaction is a fraud. The BAPEPAM’s act have regulated that insider trading is illegal. Nevertheless it is not easy to bring perpetrators to the court due to some difficulties to prove. Insider trading is motivated by self attentiveness or personal advantage. However, ethical orientation can mitigate insider trading because it can mediate personal benefit. Through a survey administrated to the students, this study would like to examine how ethical orientation can prevent insider trading. Using multiple regressions, this study found that ethical orientation could not mediate the effect of personal benefit to perpetrators behavior of insider trading. Therefore, we concluded that it is important to give ethical education as soon as possible to all the people to prevent unethical behavior like insider trading.
APA, Harvard, Vancouver, ISO, and other styles
36

Esqueda, Omar, Thanh Ngo, and Daphne Wang. "The information content of managerial insider trading: evidence from analyst forecasts." Asian Review of Accounting 29, no. 3 (June 29, 2021): 332–61. http://dx.doi.org/10.1108/ara-04-2020-0062.

Full text
Abstract:
PurposeThis paper examines the effect of managerial insider trading on analyst forecast accuracy, dispersion and bias. Specifically, the authors test whether insider-trading information is positively associated with the precision of earnings forecasts. In addition, this relationship between Regulation Fair Disclosure (FD) and the Galleon insider trading case is examined.Design/methodology/approachPooled ordinary least squares (Pooled OLS) rregressions with year-fixed effects, firm-fixed effects, and firm-level clustered standard errors are used. Our proxies for forecast precision are regressed on alternative measures of insider trading activities and a vector of control variables.FindingsInsider-trading information is positively associated with the precision of earnings forecasts. Analysts provide better forecast accuracy, less forecast dispersion and lower forecast bias among firms with insider trading in the six months leading to the forecast issues. In addition, bullish (bearish) insider trades are associated with increased (decreased) forecast bias. Insider trading information complements analysts' independent opinion and increases the precision of their forecast.Practical implicationsRegulators may pursue rules that promote the rapid disclosure of managerial insider trades, particularly given the increasing availability of Internet tools. Securities regulators may attempt to increase transparency and enhance the reporting procedures of corporate insiders, for example, using Internet sources with direct release to the public to ensure more timely information dissemination.Originality/valueThe authors document a positive association between earnings forecast precision and managerial insider trading up to six months prior to the forecast issue. This relationship is stronger after the Securities and Exchange Commission (SEC) prohibited the selective disclosure of material nonpublic information through Regulation FD. In addition, the association between insider trading and forecast accuracy has weakened after the Galleon insider trading case.
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Shehari, Taher, and Rakan A. Alsowail. "An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques." Entropy 23, no. 10 (September 27, 2021): 1258. http://dx.doi.org/10.3390/e23101258.

Full text
Abstract:
Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and public organizations, as an insider attack can cause extensive damage to organization assets much more than external attacks. Most existing approaches in the field of insider threat focused on detecting general insider attack scenarios. However, insider attacks can be carried out in different ways, and the most dangerous one is a data leakage attack that can be executed by a malicious insider before his/her leaving an organization. This paper proposes a machine learning-based model for detecting such serious insider threat incidents. The proposed model addresses the possible bias of detection results that can occur due to an inappropriate encoding process by employing the feature scaling and one-hot encoding techniques. Furthermore, the imbalance issue of the utilized dataset is also addressed utilizing the synthetic minority oversampling technique (SMOTE). Well known machine learning algorithms are employed to detect the most accurate classifier that can detect data leakage events executed by malicious insiders during the sensitive period before they leave an organization. We provide a proof of concept for our model by applying it on CMU-CERT Insider Threat Dataset and comparing its performance with the ground truth. The experimental results show that our model detects insider data leakage events with an AUC-ROC value of 0.99, outperforming the existing approaches that are validated on the same dataset. The proposed model provides effective methods to address possible bias and class imbalance issues for the aim of devising an effective insider data leakage detection system.
APA, Harvard, Vancouver, ISO, and other styles
38

Jenita, Albina, Yuni Sufyanti Arief, and Eka Misbahatul. "Analisis Faktor yang Berhubungan dengan Pelaporan Insiden Keselamatan Pasien pada Perawat." Fundamental and Management Nursing Journal 2, no. 1 (April 1, 2019): 7. http://dx.doi.org/10.20473/fmnj.v2i1.12341.

Full text
Abstract:
Pendahuluan: Insiden keselamatan pasien (IKP) masih menjadi masalah utama di rumah sakit dan setiap insiden perlu dicatat dan dilaporkan secara baik. Tujuan penelitian ini adalah untuk menganalisis faktor yang berhubungan dengan pelaporan insiden keselamatan pasien pada perawat berdasarkan pendekatan teori Kopelman.Metode: Desain penelitian deskriptif analitik dengan Cross-sectional design. Populasi semua perawat dan sampel 121 perawat yang diambil dengan menggunakan cluster random sampling. Variabel independen adalah pengetahuan, motivasi, imbalan, pelatihan dan umpan balik. Variabel dependen adalah pelaporan insiden keselamatan pasien. Instrumen menggunakan kuesioner dan observasi dengan analisis uji regresi logistik.Hasil: Ada hubungan antara imbalan (p=0,011), pelatihan (p=0,007) dan umpan balik (p=0,030) dengan pelaporan insiden keselamatan pasien. Namun tidak ada hubungan antara pengetahuan dan motivasi dengan pelaporan insiden keselamatan pasien. Hasil regresi logistik menunjukkan pelatihan sebagai faktor yang paling berhubungan dengan pelaporan insiden keselamatan pasien.Kesimpulan: Peningkatan imbalan, pelatihan, dan umpan balik merupakan suatu hal yang berpengaruh pada pelaporan IKP. Sehingga diperlukan dukungan manajemen dalam pelaporan IKP untuk meningkatkan mutu pelayanan di rumah sakit.
APA, Harvard, Vancouver, ISO, and other styles
39

Hendra, Rizky, and Margaretha Hanita. "THE IMPLEMENTATION OF CYBER INCIDENT MANAGEMENT FRAMEWORKS IN INDONESIA." Jurnal Teknologi Informasi dan Pendidikan 13, no. 2 (August 12, 2020): 9–16. http://dx.doi.org/10.24036/tip.v13i2.326.

Full text
Abstract:
Maraknya serangan siber yang terjadi di Indonesia berpotensi menyebabkan terjadinya insiden pada institusi/perusahaan. Guna mengantisipasi terjadinya insiden, maka setiap institusi/perusahaan dapat mempersiapkan diri dengan melakukan penerapan manajemen insiden yang baik. Banyak framework manajemen insiden yang dapat digunakan sebagai panduan dalam penerapannnya. Namun disisi lain, terkadang pada institusi/perusahaan kesulitan dalam memilih framework mana tepat dan cocok untuk mereka gunakan. Metode penelitian yang digunakan adalah kualitatif deskriptif. Sedangkan teknik analisis data yang digunakan adalah analisis perbandingan terhadap data berasal dari studi pustaka dan dokumentasi yang terkait dengan framework SIM3 dan CREST. Berdasarkan penelitian yang dilakukan, didapatkan hasil bahwa terdapat perbedaan pada 2 (dua) framework manajemen insiden yang dibandingkan. Perbedaan tersebut dilihat dari sisi pendefinisian skema pelevelan aktifitas, pendefinisian tingkat kematangan penerapan manajemen insiden, dan jumlah aktifitas dalam framework yang dapat diimplementasikan. Diharapkan dengan adanya penelitian ini, setiap institusi/perusahaan mendapatkan gambaran terkait framework mana yang akan digunakan serta pendekatan tingkat level mana yang sesuai dengan kemampuan dan kebutuhan institusi/perusahaan dalam menerapkan manajemen insiden siber.
APA, Harvard, Vancouver, ISO, and other styles
40

Habibah, Tamaamah, and Inge Dhamanti. "Faktor yang Menghambat Pelaporan Insiden Keselamatan Pasien di Rumah Sakit: Literature Review." Jurnal Kesehatan Andalas 9, no. 4 (February 24, 2021): 449. http://dx.doi.org/10.25077/jka.v9i4.1460.

Full text
Abstract:
Pelaporan insiden keselamatan pasien merupakan hal yang sangat penting dalam sistem perawatan kesehatan, karena bermanfaat untuk mengidentifikasi risiko dasar dan mencegah kesalahan yang sama terulang kembali. Rendahnya tingkat pelaporan insiden keselamatan pasien di rumah sakit menyebabkan sulitnya identifikasi kesalahan dan melakukan investigasi lebih lanjut. Tujuan: Menentukan faktor yang menghambat atau mempengaruhi pelaporan insiden keselamatan pasien di rumah sakit. Metode: Penelusuran artikel dilakukan melalui database PubMed, Sciencedirect, dan Google Scholar menggunakan kata kunci "patient safety incident" AND "incident reporting" OR "medical error reporting" AND "barriers incident reporting" OR "under reporting" AND "hospital". Total temuan artikel sebanyak 385, tetapi hanya 12 artikel yang sesuai dengan kriteria inklusi. Hasil: Terdapat total studi pada 23 rumah sakit di sembilan negara yang menunjukkan bahwa masing-masing rumah sakit memiliki beberapa faktor yang menghambat atau mempengaruhi pelaporan insiden keselamatan pasien. Paling banyak ditemukan yaitu ketakutan staf terhadap hukuman dan intimidasi, kurangnya pengetahuan terhadap prosedur melapor, rendahnya umpan balik yang positif dari manajemen, serta undang-undang yang tidak melindungi pelapor. Simpulan: Hambatan pelaporan insiden keselamatan pasien di rumah sakit dipengaruhi oleh 3 faktor penting yaitu faktor individu, faktor organisasi, dan faktor pemerintah.Kata kunci: hambatan pelaporan insiden, insiden keselamatan pasien, pelaporan insiden, rumah sakit
APA, Harvard, Vancouver, ISO, and other styles
41

Seise, Claudia. "The Muslim Researcher Reflections on Insider/ Outsider Research in Indonesia (Peniliti Muslim Refleksi Penilitian Insider dan Outsider di Indonesia)." Journal of Islam in Asia (E-ISSN: 2289-8077) 16, no. 1 (April 12, 2019): 297–324. http://dx.doi.org/10.31436/jia.v16i1.787.

Full text
Abstract:
The article takes up the topic of religious insider and outsider research and looks especially at the issue of advantages and disadvantages of being a religious insider doing qualitative research in religious communities similar to one’s own. As a case study serves my personal experience of being a convert Muslim woman doing research among Islamic communities in Indonesia. During research, I came to understand that the plurality of different Islamic practices found in Indonesia makes it difficult to become a ’true’ and ‘complete‘ insider to this variety of Islamic teachings and practices. My main argument is that, at least in the Indonesian context, it is impossible to be a complete religious insider to each aspect of the plurality of Islamic practices despite being an insider to Islam, a Muslim. This in turn leads me to discuss advantages and disadvanatges of being a religious insider. Keywords: Muslim Researcher, Research Methodology, Research in Indonesia, Qualitative Research, Southeast Asia, Islam. Abstrak Artikel ini membicarakan tema tentang peniliti insider atau outsider dengan fokus peniliti yang beragama. Artikel ini khususnya menganalisiskan manfaat dan mudarat menjadi seorang insider yang mempunyai agama yang sama dengan orang yang ditiliti. Sebagai contoh saya memandang kasus personil saya sendiri sebagai peniliti Muslim mualaf yang melakukan penilitian diantara komunitas-komunitas Muslim di Indonesia. Melalui penilitian saya, saya memahami bahwa pluralitas praktek orang Muslim di Indonesia membuat sulit untuk menjadi seorang insider yang sebenarnya untuk semua keanekaragaman pemahaman Islam yang ada di Indonesia. Argumen utama saya adalah bahwa dalam kontex Indonesia, tidak mungkin untuk menjadi insider religi yang sebenarnya untuk seluruh aspek-aspek pluralitas Islam. Walaupun menjadi seorang Muslim sekalipun. Pemahaman tersebut membawa saya untuk membicarakan manfaat dan mudarat menjadi seorang insider agama. Kata Kunci: Peniliti Muslim, Metodologi Penilitian, Penilitian di Indonesia, Qualitative Research, Asia Tenggara, Islam.
APA, Harvard, Vancouver, ISO, and other styles
42

Hariono, Wisnu Satrio. "PERLINDUNGAN HUKUM BAGI INVESTOR TERHADAP KEJAHATAN INSIDER TRADING DALAM PASAR MODAL INDONESIA." JURNAL MEDIA HUKUM DAN PERADILAN 4, no. 2 (October 30, 2018): 199–219. http://dx.doi.org/10.29062/jmhp.v4i2.13.

Full text
Abstract:
Insider Trading or insider trading is a form of banned trading in securities transactions in the capital market. The practice of insider trading is one form of violation of the principle of openness which is the soul of the capital market industry. This research is motivated by the number of insider trading practices in securities transactions. The main problem to be answered through this research is to know the extent of Capital Market Law in handling insider trading practices in Indonesia capital market. This research uses normative juridical approach and comparison of laws. In this research can be found the existence of legal efforts that can be done by investors who are harmed by the crime of insider trading by filing a lawsuit Unlawful Act, as a form of legal protection for investors.
APA, Harvard, Vancouver, ISO, and other styles
43

Ellis, Adam, and Olga Marques. "The Advancement of Thug Criminology: Towards the Decolonization of ‘Street/Gang’ Research and Pedagogy." Decolonization of Criminology and Justice 4, no. 2 (November 30, 2022): 35–58. http://dx.doi.org/10.24135/dcj.v4i2.43.

Full text
Abstract:
This paper presents a dialectical conversation between an insider/outsider vs insider/insider gang researcher, wherein a new criminology is advanced - Thug Criminology. In challenging current disciplinary accounts, we argue that: a) gang research has largely reinforced, maintained, and reified stereotypical views of ‘gangs’ and their behaviour; b) insider/insider gang researcher voices have not been privileged within academia; and c) those posited as ‘expert’ gang scholars, and whose knowledges have been accorded authority, are outsiders. As such, laws and practices, which negatively affect gang-involved populations, have been largely informed by an uncritical and unchallenged position of privilege. Thug Criminology seeks to create an academic space for insider ‘gang’ or street scholars to contribute to knowledge, policies, and practices that are less harmful to those who are targeted and deemed a threat.
APA, Harvard, Vancouver, ISO, and other styles
44

Diala, Lucy Uche, and Robert Houmes. "The impact of high insider ownership on SOX 404 internal controls." Corporate Governance: The International Journal of Business in Society 20, no. 1 (October 5, 2019): 106–22. http://dx.doi.org/10.1108/cg-03-2019-0087.

Full text
Abstract:
Purpose This study aims to investigate the effect of high insider ownership on firms’ internal controls over financial reporting. In particular, it examines how high insider ownership affects the likelihood of an adverse Sarbanes–Oxley Act Section (SOX Section 404) opinion and its subsequent remediation. Design/methodology/approach Tests of hypotheses use ineffective controls and remediation models. The initial tests in this study use ineffective internal controls over financial reporting probit regression models to investigate how high insider ownership affects the ex-post likelihood of an adverse 404 opinion. Two remediation models – a multinominal probit regression and probit regression model – are used to investigate the effect of high insider ownership on the likelihood of successfully remediating an adverse 404 opinion. Findings Results show that while the ex-ante likelihood of an adverse SOX Section 404 auditor’s internal control opinion increases with high insider ownership, high insider ownership firms are more likely to remediate ineffective 404 controls. This study rationalizes these diverse findings by asserting that prior to an adverse 404 opinion, entrenched managers avoid internal control financial reporting oversight and monitoring. After an adverse opinion, however, and within the context of an imminent and explicit value reducing 404 opinion, powerful high insider owner managers are motivated to remedy ineffective controls. Originality/value This research synthesizes existing streams of literature on insider ownership and the effectiveness of internal control over financial reporting quality to provide new information on the effects of high insider ownership on firms’ internal controls.
APA, Harvard, Vancouver, ISO, and other styles
45

Soleha, Ayu Nuraini, and Serri Hutahaean. "Hubungan Iklim Organisasi Dan Handover Perawat Terhadap Insiden Keselamatan Pasien." Jurnal Kepemimpinan dan Manajemen Keperawatan 4, no. 2 (November 30, 2021): 135–42. http://dx.doi.org/10.32584/jkmk.v4i2.1243.

Full text
Abstract:
Perawat sebagai satu diantara Sumber Daya Manusia terbesar di institusi pelayanan kesehatan rumah sakit mempunyai kontribusi penting dalam memberikan asuhan keperawatan. Pelayanan kesehatan dapat beresiko menimbulkan insiden keselamatan pasien. Kondisi tersebut dapat disebabkan dari kualitas iklim organisasi dan pelaksanaan handover yang tidak efektif. Tujuan penelitian ini untuk menganalisa hubungan iklim organisasi dan handover perawat terhadap insiden keselamatan pasien di Ruang Rawat Inap RSU UKI. Desain penelitian deksriptif analitik dengan pendekatan cross sectional. Sampel berjumlah 45 perawat menggunakan purposive sampling. Hasil uji Chi Square menunjukkan gambaran iklim organisasi tertutup sebanyak 23 perawat (51,1%). Handover pada perawat sebanyak 23 perawat (51,1%) menjawab efektif. Insiden keselamatan pasien menunjukkan 44,4% terjadi insiden dan 55,6% tidak terjadi insiden. Didapatkan p-value = 0,868 Tidak ada hubungan yang signifikan antara iklim organisasi dengan insiden keselamatan pasien dan nilai p-value = 0,005 Ada hubungan yang signifikan antara handover dengan insiden keselamatan pasien. Rumah sakit perlu memperhatikan hak-hak perawat seperti permasalahan mengenai imbalan yang belum sepadan dan mengadakan evaluasi secara berkelanjutan tentang iklim organisasi dan pelaksanaan handover secara efektif.
APA, Harvard, Vancouver, ISO, and other styles
46

Wasiuzzaman, Shaista, and Kean Hua Lim. "Does institutional investors’ monitoring substitute for litigation in curbing insider trading? The case of Malaysia." Managerial Finance 43, no. 1 (January 9, 2017): 141–51. http://dx.doi.org/10.1108/mf-12-2015-0335.

Full text
Abstract:
Purpose The ineffectiveness of external governance mechanisms (laws and regulations) designed to curb insider trading in Malaysia leads this study to focus on the role of internal governance of firms in helping to reduce insider trading incidences. The purpose of this paper is to investigate the influence on institutional shareholders on insider trading activity. Design/methodology/approach The study uses data collected from a sample of 115 firms listed on the Bursa Malaysia over a five-year period (from year 2010 to 2014). Ordinary least squares technique is used to achieve the objective of this study. Findings The findings of this study points toward asymmetric information as a motivator for insider trading activity. Unlike previous studies which find the presence of institutional investors helping to reduce insider trading, this study finds results to the contrary. Originality/value This study focuses on the influence of institutional shareholdings on insider trading. The results provide more insight into the effectiveness of the role of institutions in curbing insider trading and suggest a closer monitoring of institutional shareholders.
APA, Harvard, Vancouver, ISO, and other styles
47

Wu, Ching-Chih, and Tung-Hsiao Yang. "Insider Trading and Institutional Holdings in Seasoned Equity Offerings." Journal of Risk and Financial Management 11, no. 3 (September 10, 2018): 53. http://dx.doi.org/10.3390/jrfm11030053.

Full text
Abstract:
We investigate three issues about the impact of insider trades and institutional holdings on seasoned equity offerings (SEOs). First, we test how insider trades affect the trading behavior of institutional investors in SEOs. Second, we test whose trading behavior, either insiders or institutional investors, has greater explanatory power for the performance of SEO firms after issuing new stocks. Third, we analyze the industry-wide spillover effects of insider trades and institutional holdings. Empirically, we find that insiders and institutional investors of SEO firms may utilize similar information in their transactions because insider trades induce similar trading behavior for institutional investors. In addition, insider trades, relative to institutional holdings, have greater explanatory power for SEO firm’s long-term performance. Finally, compared with insider trades, institutional holdings have a more significant spillover effect in the industry of SEO firms.
APA, Harvard, Vancouver, ISO, and other styles
48

Kerr, Roslyn, and Damion Sturm. "Moving Beyond “Insider or Outsider”: The Ethnographic Challenges of Researching Elite Sport Facilities in New Zealand." Qualitative Inquiry 25, no. 9-10 (March 28, 2019): 1137–47. http://dx.doi.org/10.1177/1077800419838592.

Full text
Abstract:
Recently, several researchers have highlighted the difficulty with the binary terms “insider–outsider” within qualitative research. We similarly critique the insider/outsider binary in this article, but offer an alternative by utilizing Bourdieu’s theoretical concepts of capital, habitus, and field to compare two researcher’s ethnographic accounts of researching sports facilities in New Zealand. One of the ethnographers, D.S., describes himself as closer to an outsider than an insider in the context of the velodrome he was examining, while R.K. describes herself as an insider in the field of gymnastics. Through comparing their accounts, we show how the language of insider/outsider can be limiting. Instead, we argue that Bourdieu’s framework provides a more nuanced account of researcher positionality that moves beyond the insider/outsider binary, while affording insights into the reflexive and fluid researcher performances that shape the ethnographically researched field.
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Jasmine Qiuyue. "A Contemporary Analysis of the Application of Sentencing Factors in Insider Trading Cases." Deakin Law Review 22, no. 1 (February 23, 2018): 107. http://dx.doi.org/10.21153/dlr2017vol22no1art724.

Full text
Abstract:
Insider trading is a complex issue that involves both corporate and criminal law. Since the introduction of civil penalties, the Australian Securities and Investments Commission (ASIC) has only pursued one civil proceeding against insider trading. ASIC prefers criminal proceedings for their deterrent effects. This paper examines various features of Australian convicted insider trading cases from 2004 to the end of 2015 and provides a broad overview of the distribution of these cases. Further, this paper assesses the consistent application of sentencing factors and the determination of criminalities of different kinds of insider trading activities. Finally, this paper proposes renaming current insider trading laws to ‘dealing with privileged information’.
APA, Harvard, Vancouver, ISO, and other styles
50

Soleh, Musdi Muhammad. "A Study Case in NTMC POLRI: Reducing Data Breach Risk from Insider Threats by Using Risk IT Framework." ACMIT Proceedings 3, no. 1 (March 18, 2019): 171–79. http://dx.doi.org/10.33555/acmit.v3i1.41.

Full text
Abstract:
Risks is not only merely comes from external threats, it is also comes from inside - internal actor. Vormetric Insider Threat mentioned that in 800 surveyed enterprise companies, 89% vulnerable to insider attacks [1]. It mentioned that Data Breach issue the highest risk happened to the company caused by insider threats. This paper will analyse the insider attacks, Risk IT framework will be used toreduce to reduce and prevent these vulnerabilities in valuable assets.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography