284 research outputs found

    Agents of transparency: How sell-side financial analysts make corporate governance visible.

    Get PDF
    This thesis examines the phenomenon of sell-side financial analysts (analysts hereafter) "doing" corporate governance. The term "doing" is used in the current study to designate the various ways in which some analysts in the US and the UK, across the past decade or so, have made corporate governance visible. The thesis examines how this has occurred, and the mechanisms and devices that have made it possible. Analysts, it is suggested, can be viewed as "agents of transparency", in so far as they have taken the evaluation of companies beyond the financials, to include corporate governance issues. The thesis focuses primarily on the corporate governance reports produced by analysts, the official documents issued by various organisations and institutions, selected financial and business newspapers and magazines, together with other documents such as textbooks of corporate governance, as well as academic and practioner publications on corporate governance. Through an examination of these materials, the thesis investigates the pre-conditions that made possible the appearance and development of the corporate governance work pursued by analysts in the early twenty-first century. It examines the evaluations performed by analysts of the corporate governance procedures adopted by companies. In particular, it focuses on the ways in which analysts benchmarked the corporate governance procedures of companies against formal regulations, and how comparisons of the governance procedures adopted by different companies were undertaken and facilitated by analysts. Benchmarking, and the making of comparisons of corporate governance practices through a range of devices, are examined. The thesis also examines the linking of corporate governance to the financials (such as profitability, stock price performance, and equity valuation) in the investment analyses performed by analysts. It concentrates on the way in which analysts integrated corporate governance issues in the investment decision making process. Attention is paid to the ideas that shaped and articulated the integration, as well as to the tools and devices deployed by analysts. This thesis argues that greater attention is needed to the "doing" of corporate governance by analysts, and its implications for these "agents of transparency" that have broadened the parameters through which transparency is assessed

    Numerical Modeling of Shallow Flows over Irregular Topography

    Get PDF
    Source: ICHE Conference Archive - https://mdi-de.baw.de/icheArchiv

    An Omnidirectional Approach to Touch-based Continuous Authentication

    Full text link
    This paper focuses on how touch interactions on smartphones can provide a continuous user authentication service through behaviour captured by a touchscreen. While efforts are made to advance touch-based behavioural authentication, researchers often focus on gathering data, tuning classifiers, and enhancing performance by evaluating touch interactions in a sequence rather than independently. However, such systems only work by providing data representing distinct behavioural traits. The typical approach separates behaviour into touch directions and creates multiple user profiles. This work presents an omnidirectional approach which outperforms the traditional method independent of the touch direction - depending on optimal behavioural features and a balanced training set. Thus, we evaluate five behavioural feature sets using the conventional approach against our direction-agnostic method while testing several classifiers, including an Extra-Tree and Gradient Boosting Classifier, which is often overlooked. Results show that in comparison with the traditional, an Extra-Trees classifier and the proposed approach are superior when combining strokes. However, the performance depends on the applied feature set. We find that the TouchAlytics feature set outperforms others when using our approach when combining three or more strokes. Finally, we highlight the importance of reporting the mean area under the curve and equal error rate for single-stroke performance and varying the sequence of strokes separately

    Mahalanobis Distance Map Approach for Anomaly Detection

    Get PDF
    Web servers and web-based applications are commonly used as attack targets. The main issues are how to prevent unauthorised access and to protect web servers from the attack. Intrusion Detection Systems (IDSs) are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. In this paper, we focus on the detection of various web-based attacks using Geometrical Structure Anomaly Detection (GSAD) model and we also propose a novel algorithm for the selection of most discriminating features to improve the computational complexity of payload-based GSAD model. Linear Discriminant method (LDA) is used for the feature reduction and classification of the incoming network traffic. GSAD model is based on a pattern recognition technique used in image processing. It analyses the correlations between various payload features and uses Mahalanobis Distance Map (MDM) to calculate the difference between normal and abnormal network traffic. We focus on the detection of generic attacks, shell code attacks, polymorphic attacks and polymorphic blending attacks. We evaluate accuracy of GSAD model experimentally on the real-world attacks dataset created at Georgia Institute of Technology. We conducted preliminary experiments on the DARPA 99 dataset to evaluate the accuracy of feature reduction
    corecore