Spelling suggestions: "subject:"commercial crimes"" "subject:"eommercial crimes""
21 |
Acquisition and diffusion of technology innovationRansbotham, Samuel B., III 31 March 2008 (has links)
In the first essay, I examine value created through external acquisition of nascent technology innovation. External acquisition of new technology is a growing trend in the innovation process, particularly in high technology industries, as firms complement internal efforts with aggressive acquisition programs. Yet, despite its importance, there is little empirical research on the timing of acquisition decisions in high technology environments. I examine the impact of target age on value created for the buyer. Applying an event study methodology to technology acquisitions in the telecommunications industry from 1995 to 2001, empirical evidence supports acquiring early in the face of uncertainty. The equity markets reward the acquisition of younger companies.
In sharp contrast to the first essay, the second essay examines the diffusion of negative innovations. While destruction can be creative, certainly not all destruction is creative. Some is just destruction. I examine two fundamentally different paths to information security compromise an opportunistic path and a deliberate path. Through a grounded approach using interviews, observations, and secondary data, I advance a model of the information security compromise process. Using one year of alert data from intrusion detection devices, empirical analysis provides evidence that these paths follow two distinct, but interrelated diffusion patterns. Although distinct, I find empirical evidence that these paths both converge and escalate. Beyond the specific findings in the Internet security context, the study leads to a richer understanding of the diffusion of negative technological innovation.
In the third essay, I build on the second essay by examining the effectiveness of reward-based mechanisms in restricting the diffusion of negative innovations. Concerns have been raised that reward-based private infomediaries introduce information leakage which decreases social welfare. Using two years of alert data, I find evidence of their effectiveness despite any leakage which may be occurring. While reward-based disclosures are just as likely to be exploited as non-reward-baed disclosures, exploits from reward-based disclosures are less likely to occur in the first week after disclosure. Further the overall volume of alerts is reduced. This research helps determine the effectiveness of reward mechanisms and provides guidance for security policy makers.
|
22 |
Acquisition and diffusion of technology innovationRansbotham, III, Samuel B. January 2008 (has links)
Thesis (M. S.)--Management, Georgia Institute of Technology, 2008. / Committee Chair: Sabyasachi Mitra; Committee Member: Frank Rothaermel; Committee Member: Sandra Slaughter; Committee Member: Sridhar Narasimhan; Committee Member: Vivek Ghosal.
|
23 |
Environmental crime and justice : the organizational composition of corporate noncompliance /Wolf, Brian Christopher. January 2005 (has links)
Thesis (Ph. D.)--University of Oregon, 2005. / Typescript. Includes vita and abstract. Includes bibliographical references (leaves 140-148). Also available for download via the World Wide Web; free to University of Oregon users.
|
24 |
An examination of the factors that influence an auditor's decision to use a decision aid in their assessment of management fraud.Hayes, Thomas Patrick 05 1900 (has links)
In recent years, the accounting profession has faced increased scrutiny because of scandals involving management fraud (e.g., Enron, WorldCom). In response, Statement on Auditing Standards (SAS) #99 has expanded auditors' responsibility for detecting fraud, requiring auditors to gather significantly more information in their assessment of fraud. In addition, the Public Company Accounting Oversight Board (PCAOB) will focus on fraud detection through their inspections of registered accounting firms. In light of the increased emphasis on auditors' responsibility for detecting fraud, public accounting firms face the challenge of improving their fraud detection process, including their assessment of management fraud risk. Decision aids are one way for auditors to improve their assessment of management fraud risk. In fact, several studies from the decision aid literature suggest that aids are useful tools for a variety of tasks, including fraud risk assessment. At the same time, another stream of the decision aid reliance literature, which looks at people's willingness to rely on decision aids, suggests that individuals tend to be reluctant to accept the output given by an aid. Thus, the primary focus of this paper is on uncovering factors that would encourage one to voluntarily use and rely upon a decision aid. Toward that end, 132 senior-level auditors participated in an experiment that examined how several factors (confidence, perceived usefulness, client size, and conformity pressure) affect decision aid usage and reliance. The results show that perceived usefulness and decision aid reliance are significantly related. Further, the results suggest that perceived usefulness affects reliance more than variables examined in prior studies (e.g., confidence). Finally, the results suggest that decision aid usage mediates the relationship between perceived usefulness and reliance. The results of the current study have important implications for research in both the information systems and decision aid reliance areas. First, the study shows that perceived usefulness, a significant construct from the technology acceptance model (TAM) literature, is also a significant factor in determining decision aid usage and reliance. Second, the study further delineates how certain factors affect decision aid reliance.
|
25 |
The analysis of bank account statements to establish evidence of illicit financial activityJordaan, Jason 31 October 2007 (has links)
The analysis of bank account statements to establish evidence of illicit financial activity is an established financial investigation methodology in countries such as the United States and the United Kingdom, but it is still in its infancy in South Africa. This is further highlighted by virtue of the fact that no uniform analysis methodology is used in South Africa for the analysis of bank account statements. The purpose of the research was to explore the role of such analysis, and the current practises in South Africa and New Jersey in the United States. This was to determine a practical model for the analysis of bank account statements in the South African context. Empirical research led to a proposed process model for such analysis, which was synthesised from current practises in South Africa and New Jersey in the United States. This model is proposed as the basis for the development of a uniform analysis methodology for the examination of bank account statements. / Die analise van bankrekeningstate om bewys van onwettige finasiële aktiwiteite te bepaal is 'n vasgestelde finansiële ondersoek metode in lande soos die Verenigde State en die Verenigde Koningkryk, maar in Suid-Afrika is dit steeds in die begin stadium. Dit is verder beklemtoon deur die feit dat daar geen eenvormige analise metode in Suid-Afrika in gebruik is vir die analise van bankrekeningstate. Die doel van die navorsing was om die rol van hierdie tipe analise, en die huidige praktyk in Suid-Afrika en New Jersey in die Verenigde State te bepaal. Dit was om 'n praktiese model vir die analise van bankrekeningstate in Suid-Afrika te bepaal. Empiriese navorsing het gelui tot 'n voorgestelde proses model vir hierdie tipe analise, wat 'n samesmelting van die huidige Suid-Afrikaanse en New Jersey in die Verenigde State praktyk is. Hierdie model word voorgestel as die beginpunt vir die ontwikkeling van 'n eenvormige analise metode vir die ondersoek van bankrekening state. / Criminology / M.Tech. (Forensic Investigation)
|
26 |
White collar crime: major bank fraud cases inHong KongWong, Yuk-see., 黃玉司. January 1990 (has links)
published_or_final_version / Sociology / Master / Master of Social Sciences
|
27 |
A study of corporate crime control on the supply of unsafe toys and children's products in Hong KongWong, Kwai-shim., 黃桂嬋. January 1996 (has links)
published_or_final_version / Criminology / Master / Master of Social Sciences
|
28 |
The analysis of bank account statements to establish evidence of illicit financial activityJordaan, Jason 31 October 2007 (has links)
The analysis of bank account statements to establish evidence of illicit financial activity is an established financial investigation methodology in countries such as the United States and the United Kingdom, but it is still in its infancy in South Africa. This is further highlighted by virtue of the fact that no uniform analysis methodology is used in South Africa for the analysis of bank account statements. The purpose of the research was to explore the role of such analysis, and the current practises in South Africa and New Jersey in the United States. This was to determine a practical model for the analysis of bank account statements in the South African context. Empirical research led to a proposed process model for such analysis, which was synthesised from current practises in South Africa and New Jersey in the United States. This model is proposed as the basis for the development of a uniform analysis methodology for the examination of bank account statements. / Die analise van bankrekeningstate om bewys van onwettige finasiële aktiwiteite te bepaal is 'n vasgestelde finansiële ondersoek metode in lande soos die Verenigde State en die Verenigde Koningkryk, maar in Suid-Afrika is dit steeds in die begin stadium. Dit is verder beklemtoon deur die feit dat daar geen eenvormige analise metode in Suid-Afrika in gebruik is vir die analise van bankrekeningstate. Die doel van die navorsing was om die rol van hierdie tipe analise, en die huidige praktyk in Suid-Afrika en New Jersey in die Verenigde State te bepaal. Dit was om 'n praktiese model vir die analise van bankrekeningstate in Suid-Afrika te bepaal. Empiriese navorsing het gelui tot 'n voorgestelde proses model vir hierdie tipe analise, wat 'n samesmelting van die huidige Suid-Afrikaanse en New Jersey in die Verenigde State praktyk is. Hierdie model word voorgestel as die beginpunt vir die ontwikkeling van 'n eenvormige analise metode vir die ondersoek van bankrekening state. / Criminology and Security Science / M.Tech. (Forensic Investigation)
|
29 |
The role of structural factors underlying incidences of extreme opportunism in financial marketsBruce, Johannes Conradie 30 September 2007 (has links)
A sociological approach is used to analyze incidences of extreme opportunism in financial markets. Through an analysis of arguably the most widely publicized "rogue" trader events in recent history, a determination is made of the validity of explaining these events as aberrations, attributable to the actions of "rogues". The primary focus is the role of structural factors underlying these incidences of extreme opportunism in financial markets. A diverse range of documentary and other sources is used to avoid any form of bias as far as possible. It was found that structural factors act as countervailing forces to inhibit such behavior or as motivators and facilitators acting as catalysts for extreme opportunism. The balance between these factors largely determines the level of opportunistic behavior in a particular environment. Extreme opportunism is therefore not an aberration or "rogue" occurrence but a manageable phenomenon intrinsic to the social structural context within which it occurs.
By conceptualizing these factors as countervailing forces one is forced to view structural factors, like compensation structures and formal and informal restraints, relative to one another and no longer in isolation. This realization translates into the conclusion that restraints and oversight systems for example, should be designed relative to the relevant motivators and facilitators in its area of application. In an environment where traders of highly geared financial products are motivated with multimillion USD incentive packages, a low budget oversight system and inexperienced regulatory staff, is clearly not the appropriate tools to control and manage extreme opportunism. / Criminology / D.Phil. (Sociology)
|
30 |
Utilisation of the financial intelligence centre as a crime intelligence sourceMostert, Derick 11 1900 (has links)
The research was conducted as a result of the researcher‟s concern that the possibility exists that members of the different law enforcement agencies in South Africa might have a misconception about the mandate and functions of the Financial Intelligence Centre. If such a misconception in fact exists, it poses a huge challenge towards fruitful co-operation among the Centre and the different law enforcement agencies. The researcher identified certain practical problems, namely, that investigators are not aware of the types of intelligence that the Centre could provide them with, and that investigators might not be informed about the specific procedures to follow when they need to request intelligence from the Centre.
The research has shown that, in the past, the Centre has been a useful source of crime intelligence concerning a range of predicate offences including narcotics, fraud and tax related crimes. The research has further found that, although the majority of participants gained a lot of experience in law enforcement and investigations, they had limited awareness about the Financial Intelligence Centre and its functions.
This research project studied the utilisation of the Financial Intelligence Centre as a crime intelligence source. / Police Practice / M. Tech. (Forensic Investigation)
|
Page generated in 0.0663 seconds