3,311 research outputs found
How do Securities Laws Influence Affect, Happiness, & Trust?
This Article advocates that securities regulators promulgate rules based upon taking into consideration their impacts upon investors\u27 and others\u27 affect, happiness, and trust. Examples of these impacts are consumer optimism, financial stress, anxiety over how thoroughly securities regulators deliberate over proposed rules, investor confidence in securities disclosures, market exuberance, social moods, and subjective well-being. These variables affect and are affected by traditional financial variables, such as consumer debt, expenditures, and wealth; corporate investment; initial public offerings; and securities market demand, liquidity, prices, supply, and volume. This Article proposes that securities regulators can and should evaluate rules based upon measures of affect, happiness, and trust in addition to standard observable financial variables. This Article concludes that the organic statutes of the United States Securities and Exchange Commission are indeterminate despite mandating that federal securities laws consider efficiency among other goals. This Article illustrates analysis of affective impacts of these financial regulatory policies: mandatory securities disclosures; gun-jumping rules for publicly registered offerings; financial education or literacy campaigns; statutory or judicial default rules and menus; and continual reassessment and revision of rules. These regulatory policies impact and are impacted by investors\u27 and other people\u27s affect, happiness, and trust. Thus, securities regulators can and should evaluate such affective impacts to design effective legal policy
Killing Conscience: The Unintended Behavioral Consequences of Pay for Performance
Contemporary lawmakers and reformers often argue that ex ante incentive contracts providing for large material rewards are the best and possibly only way to motivate corporate executives and other employees to serve their firms\u27 interests. This Article offers a critique of the pay for performance approach. In particular, it explores why, for a variety of mutually reinforcing reasons, workplaces that rely on ex ante incentive contracts suppress unselfish prosocial behavior (conscience) and promote selfishness and opportunism. The end result may not be more efficient, but more uncooperative, unethical, and illegal employee behavior
Killing Conscience: The Unintended Behavioral Consequences of Pay for Performance
Contemporary lawmakers and reformers often argue that ex ante incentive contracts providing for large material rewards are the best and possibly only way to motivate corporate executives and other employees to serve their firms\u27 interests. This Article offers a critique of the pay for performance approach. In particular, it explores why, for a variety of mutually reinforcing reasons, workplaces that rely on ex ante incentive contracts suppress unselfish prosocial behavior (conscience) and promote selfishness and opportunism. The end result may not be more efficient, but more uncooperative, unethical, and illegal employee behavior
Killing Conscience: The Unintended Behavioral Consequences of Pay for Performance
Contemporary lawmakers and reformers often argue that ex ante incentive contracts providing for large material rewards are the best and possibly only way to motivate corporate executives and other employees to serve their firms\u27 interests. This Article offers a critique of the pay for performance approach. In particular, it explores why, for a variety of mutually reinforcing reasons, workplaces that rely on ex ante incentive contracts suppress unselfish prosocial behavior (conscience) and promote selfishness and opportunism. The end result may not be more efficient, but more uncooperative, unethical, and illegal employee behavior
Assessing the Presence of Mindfulness within Cyber and Non-Cybersecurity groups
Corporations and individuals continue to be under Phishing attack. Researchers categorizes methods corporations and individuals can employ to reduce the impact of being caught in a Phishing scheme. Corporation enable technical mechanisms such as automated filtering, URL blacklisting, and manipulation of browser warning messages to reduce phishing susceptibility costing billions of dollars annually. However, even with robust efforts to educate employees about phishing techniques through security awareness training the abundance of attacks continues to plague organizations. This study aims to identify whether a correlation exists between mindfulness and phishing susceptibility. The goal of this research is to determine if mindful individuals are less susceptible to phishing. By showing individuals with increased awareness are significantly able to identify areas that phishing attempts exploit.
Based on a review of the literature a misconception exists between end-users, corporation and Internet Service Providers (ISP) regarding ownership of Phishing identification. Specifically, individuals blame ISPs and corporate information technology departments for failing to protect them from Phishing attacks. Still, the truth of the matter is that the end-user is ultimately the weakest link in the phishing identification chain. The methodology of this study polled participants through initial screening focusing on whether the individuals were mindful using the Mindful Attention Awareness Scale (MAAS) survey. Conclusions seen in this study in contrast with other studies saw no significant correlation between Mindfulness and phishing susceptibility, increase in cogitative ability or increase in Phishing identification. Thus, continued use of MAAS survey questionnaire is necessary to screen other groups for phishing awareness prior to focusing on other phishing cues
Digital Deception in the Online Dating Space: A Study of Tinder
As technology continues to impart its worldview, the role of communication in the navigation of dating in online spaces has also evolved. This study examines the relationship between communication and digital deception within a selected population of Tinder users. Tinder is a geo-social, location-aware dating application that is used by millions of people around the world. There are three fundamentally specific objectives of this research, which include: first, examining the ways in which dating apps increase the possibility of digital deception; second, exploring ways in which Tinder\u27s design and functionality contribute to the occurrence of digital deception; and finally, identifying and examining the impacts of online deception, particularly in the context of dating apps, on human communication and relationship formation. To obtain first-hand perceptions of online representation and digital deception on Tinder (and as with other online social platforms), 51 Tinder users from Nigeria and Canada were surveyed through their responses to a questionnaire distributed on June 20 and July 11, 2023. The findings of this study suggest that the use of dating apps among youths has increased, leading to prevalent lying and distrust. In the context of using Tinder among the sampled population, Tinder\u27s design, functionality, and online communication in general facilitate and contribute to instances of digital deception, as its affordances only give room to do little, hence, there is often an attempt to ‘put best foot forward’ and the tendency of lying becomes imminent. Appearance influences deception, but some still trust online dating for meaningful connections; platforms should promote honesty
Recommended from our members
Perceptions of online fraud and the impact on the countermeasures for the control of online fraud in Saudi Arabian financial institutions
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonThis study addresses the impact of countermeasures in the control and prevention of online fraud in Saudi Arabia and the influence of the environmental context. Combatting online fraud is facilitated when the public is fully educated and is aware of its types and of the prevention methods available. People are reliant on the Internet; the possibility of being breached by hackers and fraudsters is growing, especially as socialising, online shopping and banking are carried out through personal computers or mobile devices. Online fraud has been described as an epidemic that has spread to most online activities. Its prevalence has been noted to be in regions where there is high adoption of e-commerce, and, along with it, large online financial transactions. The argument is therefore the measures taken are either are inadequate or have failed to effectively address all the issues because of the organisational and environmental context of the country. This research aims to examine online fraud perceptions and the countermeasures designed and used by financial institutions in Saudi Arabia to control and prevent online fraud in its environmental context, to examine the effectiveness/impact of the countermeasures and to examine the factors that may affect/influence the impact of the countermeasures. The qualitative method approach was chosen to ensure balanced coverage of the subject matter. The nature of the research requires a broader, in-depth, examination of the experiences of the participants from their own perspective. Meanwhile levels of awareness are low, because of lack of knowledge and training, a lack of government sensitisation and the religious inclinations of the population. The findings also confirm the efforts of organisations to put in place countermeasures using various technological means, coupled with procedural controls and checks. The measures create obstacles to most customers, who find it cumbersome to engage in online activities because of those procedures and checks. The findings also show two types of regulations: government and organisational rules, with different foci and purposes, which are mostly centred on the monitoring of Internet operations and operational guidelines. The enforcement of rules in the light of prosecuting offenders has also been minimal and passive. The countermeasures of most banks/organisations mostly focus on prevention and detection. However, the findings suggest that the activities in each component and their interrelationships have a collective impact on combatting online fraud. The success of any effort or approach to combat fraudulent activities therefore depends on the activities of the four countermeasure components
Recommended from our members
AI and blockchain adoption in corporate governance
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonPurpose
The purpose of this doctoral thesis sets out to explore and elaborate on the impact of
artificial intelligence (AI) and blockchain adoption in corporate governance from ethical
perspectives. Positioned within the corporate governance domain, this study adopts
an explicit business perspective to study corporate governance change with emerging
AI and blockchain technological tools in general and focuses on the ethical use of
technologies specifically. As such, this empirical investigation aims to help
organizations understand the ethical benefits and ethical dilemmas of using AI and
blockchain in businesses and draw plans on how to govern these technologies
ethically for the benefit of the business and society.
Design/Methodology/Approach:
This study adopts specific techniques and a pragmatic, step-by-step netnography
approach to investigate online traces from social media sites and extends these online
explorations with online semi-structured interviews. The research design of this
investigation follows step-by-step procedures that are methodologically sound to
ensure rigor in this investigation to enhance the trustworthiness of this study. In total,
this research collects an abundance of data: 34 LinkedIn Posts with Comments; 12
Webinars; 22 YouTube Videos; 19 Videos; 10 Podcasts, and 17 semi-structured
interview videos. The video, audio, and interview data have been transcribed into
textual data total of 453065 words for thematic analysis using NVivo software. Enough
time has been allocated to the iterative process of data collection and data analysis.
The analysis moves back and forth to the point when theoretical saturation is achieved.
The data structure extracts from data in this study illustrate the analytic claims that
match the analysis and data together, to ensure a good fit between described method
and reported analysis are consistent.
Findings:
This study develops a thematic framework that constitutes the corporate governance
transformation with the ethical use of AI and blockchain technology. This framework
provides a holistic understanding of why corporate governance needs to change,
especially with the emergence of blockchain and AI technologies, what changes will
corporate governance encounter, and how corporate governance can imperatively
respond to the ethical use of these technologies. Specifically, it explicitly provides
comprehensive understanding of the ethical benefits and ethical concerns of using AI
and blockchain technologies in corporate governance, and reveals how companies
can govern the use of these technologies ethically.
In general terms, the findings of this study support the notion of corporate governance
change to transform business models and processes to leverage the new capabilities
of AI and blockchain technologies, to priories creativity, speed, and accountability, to
replace the old business model, to foster agile or collaborative governance to deal with
uncertainty, agility, adaptiveness, and cooperation in the digital world, to foster a network and platform strategies to drive success. This study goes beyond the extant
corporate governance scholarship to assess the technological impact to capture
values for companies in ethical ways to sustain future growth.
Additionally, the notion of corporate governance is further specified and significantly
expanded by this study to assess the adoption of AI and blockchain as new corporate
governance tools or mechanisms, to enhance ethical benefits when used properly,
and mitigate ethical dilemmas with proper checks and balances, safeguards in place,
to help organizations stay relevant in this digital transformation and be ethical and
sustainable.
This study empirically corroborates that in theory, the use of blockchain and AI can
enhance ethical practice by detecting fraud and anomaly activities, due to the unique
capabilities of blockchain and AI technologies. Further, this research adds depth and
specificity by identifying the ethical concerns of using blockchain and AI in corporate
governance. The study empirically reveals the ethical concerns of privacy issues,
unethical use of data, job transformation and replacement, and algorithm bias that
companies will encounter when they use these technologies. In addition, the findings
of this study suggest how companies can ethically govern the use of these
technologies in socially responsible ways as they transform digitally.
Originality/Value:
The emergent thematic framework is constructed from the empirical and analytical
procedures specifically and purposely designed for this study. This study makes
theoretical contributions to knowledge and enriches the extant works of literature, and
also provides practical contributions to the ethical use of disruptive technologies, future
workforce, and regulations. However, the study was conducted within certain
theoretical, methodological, empirical, and pragmatic conditions, which might
constitute particular limitations and constraints. Therefore, the last section of this
thesis elucidates and suggests the directions for future research
Journalism in an emerging power : how the roles of journalists are evolving in India
Professional project report submitted in partial fulfillment of the requirements for the degree of Masters of Arts in Journalism from the School of Journalism, University of Missouri--Columbia.Aware that independent journalism is at risk in their country, seven Indian journalists from different cultural and professional backgrounds discuss how they perceive their role in India's current political and economic climate, what challenges they face and what purpose they think journalism needs to serve in the emerging democracy. Despite the commercialization of the news, these professionals fight to tell the truth and engage communities around difficult, often heart-wrenching issues. They take the risks to expose scams and corrupted officials, travel to the most remote villages of India to raise awareness about hunger and poverty, and challenge social norms to talk about child marriage, female infanticide and acid attacks. Some journalists are guilty of nothing more than working for greedy, corrupt owners who use their editorial platform to highlight or ignore issues to suit their interests, but the professionals featured in this piece care about the job they do and do it the best they can. To borrow the expression from Sam Miller, a former BBC correspondent in South Asia, Indian journalists are 'undergoing an acid test' in which they are expected to prove their commitment to the ordinary people and to the basic objective of the profession itself. While striving to remain grounded and true to their goals, they have adapted their journalistic practices to the realities of India's bedlam, often flirting with activism and redefining the journalists' code of ethics. They know that without a stronger ethical stance, a better technical and editorial training, a significant impact from watchdog work and an effort in spreading media literacy, they will not be able to serve the purpose of their profession -- advancing democracy. This article aims to understand where Indian journalism currently stands, and more importantly, where it is heading
Exploring recipients' perceptions of impression management in the workplace : insights from comparing fraudster and non-fraudster executives
This qualitative study focuses on recipients of the impression management process engaged in by Australian executives. Goffman’s impression management is viewed as part of daily interaction, in which individuals participate as actors on a social stage by managing a stream of impressions to their audience (recipients). The projection of image is only able to succeed when the audience, detecting the necessary conditions of authenticity and morality of the representation, reciprocates with belief. Executive fraud is usually committed in multiple acts over time with co-workers genuinely oblivious. This raises questions of why the recipients were unaware when fraudsters were ‘giving off’ impression management which was clearly inauthentic and immoral.In this study the recipients were co-workers of the phenomenon of executive impression management. The data were collected from two groups who either worked with executives who have been convicted of an indictable offence of fraud (therefore clearly fraudulent), and executives who were not. As the study is of social processes, a constructivist approach was used. A convenience sample generated data from 17 in-depth interviews, which were coded and categorised with theoretical sampling using grounded theory. The applicability of known factors of fraud was also examined and analysed from the recipients’ data.Five concepts of executive impression management emerged from the analysis. Two issues of consistency and received power positioning of the actor’s impression management were dominant for the recipients. This led to the development of a conceptual framework of Executive Impression Management, which outlined the various types of impression management that emerged from the data. Fraudster executives were found to use a distinctive form of impression management labelled Disguised Inconsistent Malevolent. The hallmarks of this impression management are that strips (or cracks) occur in the impression management presentation over time, but recipients regard these as insignificant. The discovery of the fraud is a great shock, which demonstrates the powerful nature of the impression management ‘given off’. It was also found that Goffman’s ‘fateful moment’ was demonstrated when fraudsters were challenged at discovery. Furthermore, known fraud factors from Red Flags, social psychology, psychopathology and impression management authenticity and morality did not hold true with the recipients studied. There is a discussion about the significance of these findings as well as how impression management can be used to understand the complex process of long-term executive fraud. Finally, limitations of the study and directions for future research are also considered
- …