Search results for "security regulation"

showing 2 items of 2 documents

Incentives in Corporate Governance: The Role of Self-Regulation

2004

Corporate governance stems from the interplay of legal norms, security regulation, self-regulation and best practices. Recent scandals and frauds have forced governments to update laws on corporate governance: the legislation process has been very fast in some countries, others have lagged. Law and regulation intervene and become effective only ex-post, when damages have been done and malpractice is self-evident. On the contrary, self-regulation is a quicker and more flexible response to changing market conditions and of great impact on the relationship between firms and their environment. A self-regulatory organization (SRO) such as the stock exchange could administer the screening device,…

Flexible responseglobal financebusiness.industryBest practiceCorporate governancecorporate governanceStakeholderAccountingregulationsecurity regulationMarketing. Distribution of productsHF5410-5417.5http://dx.doi.org/10.4468/2004.1.05dibetta.amenta [Corporate Governance; Regulation; Security Regulation; Self- Regulation; Corporate Governance Code; Global Finance; Global Investors DOI]self- regulationIncentiveStock exchangeCorporate Governance; Regulation; Security Regulation; Self- Regulation; Corporate Governance Code; Global Finance; Global InvestorsMalpracticeBusinesscorporate governance codeglobal investorsCorporate securitySymphonya. Emerging Issues in Management
researchProduct

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct