Search Results
JEL Code: C89

26,170 Total downloads

Viewing: 1 - 50 of 151 papers

1.

Common Risk Factors in International Stock Markets

Financial Markets and Portfolio Management, 2019, Volume 33, Issue 3, pp 213–241,
Number of pages: 79 Posted: 12 Jan 2011 Last Revised: 13 Jan 2020
Accepted Paper Series
University of Zurich - Department of Banking and Finance, ETH Zürich, Bank for International Settlements (BIS) - Monetary and Economic Department, University of Zurich - Department of Banking and Finance and University of Kassel
Downloads 2,354
2.

An Alternative Interpretation of the Discontinuity in Earnings Distributions

Number of pages: 55 Posted: 20 Jan 2004
Working Paper Series
Stanford University, Stanford University and Texas Christian University - Department of Accounting
Downloads 1,525
3.

Digital Forensics: Challenges and Future Research Directions

Simon M and Choo K-K R 2014. Digital forensics: Challenges and future research directions. In Il-Su Kim and Jianhong Liu (editors), Contemporary Trends in Asian Criminal Justice: Paving the Way for the Future, pp. 105-146, Seoul: South Korea, Korean Institute of Criminology
Number of pages: 62 Posted: 08 Apr 2014
Accepted Paper Series
University of South Australia and The University of Texas at San Antonio
Downloads 1,373
4.

Google Drive: Forensic Analysis of Cloud Storage Data Remnants

Journal of Network and Computer Applications, Forthcoming
Number of pages: 31 Posted: 15 Oct 2013
Accepted Paper Series
Government of South Australia and The University of Texas at San Antonio
Downloads 1,219
5.

Technology Mediated Dispute Resolution (Tmdr): A New Paradigm for Adr

Ohio State Journal on Dispute Resolution, Vol. 21, No. 3, p. 629, 2006
Number of pages: 58 Posted: 16 Nov 2006
Accepted Paper Series
Mitchell | Hamline School of Law
Downloads 1,217
6.

Earnings Management: A Methodological Review of the Distribution of Reported Earnings Approach

Number of pages: 17 Posted: 07 Apr 2004
Working Paper Series
affiliation not provided to SSRN
Downloads 1,068
7.

Forensic Analysis of Windows Thumbcache Files

Quick D, Tassone C and Choo K-K R 2014. Forensic Analysis of Windows Thumbcache files. In 20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Accepted Paper Series
Government of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 779
8.

Cyber Crime

Oxford Handbook of Organized Crime, L. Paoli, Oxford University Press, 2013, DOI: 10.1093/oxfordhb/9780199730445.013.003
Number of pages: 31 Posted: 17 Oct 2013
Accepted Paper Series
The University of Texas at San Antonio and School of Regulation & Global Governance (RegNet)
Downloads 741
9.

In Pursuit of Happiness Research: Is it Reliable? What Does it Imply for Policy?

Cato Institute Policy Analysis Series, No. 590, April 11, 2007
Number of pages: 44 Posted: 14 Jul 2007
Accepted Paper Series
Cato Institute
Downloads 625
10.

The Cyber Threat Landscape: Challenges and Future Research Directions

Computers and Security, 30(8): 719–731, 2011,
Number of pages: 39 Posted: 14 Oct 2013
Working Paper Series
The University of Texas at San Antonio
Downloads 608
11.

Data Reduction and Data Mining Framework for Digital Forensic Evidence: Storage, Intelligence, Review and Archive

Trends & Issues in Crime and Criminal Justice 480: 1-11, 2014
Number of pages: 11 Posted: 19 Sep 2014 Last Revised: 23 Sep 2014
Accepted Paper Series
Government of South Australia and The University of Texas at San Antonio
Downloads 596
12.

Privacy and Data-Based Research

Number of pages: 29 Posted: 15 Sep 2013
Working Paper Series
Cornell University - S.C. Johnson Graduate School of Management and California Institute of Technology - Department of Computing and Mathematical Sciences & Division of Humanities and Social Sciences

Multiple version iconThere are 2 versions of this paper

Downloads 590
13.

Modeling Total Accruals in an International Environment: The Impact of Alternative Measures

Number of pages: 38 Posted: 28 Dec 1998
Working Paper Series
La Trobe University, University of Auckland and La Trobe University - Faculty for Regional Development
Downloads 554
14.

Important Characteristics, Weaknesses and Errors in German Equity Data from Thomson Reuters Datastream and Their Implications for the Size Effect

Number of pages: 39 Posted: 06 Apr 2013
Working Paper Series
Humboldt University of Berlin - School of Business and Economics
Downloads 547
15.

Earnings Management and Accounting Income Aggregation

Number of pages: 69 Posted: 16 Aug 2005
Working Paper Series
University of Colorado at Boulder - Department of Accounting and London School of Economics & Political Science (LSE) - Department of Accounting and Finance
Downloads 538
16.

Holding Period Return-Risk Modeling: Ambiguity in Estimation

ERIM Report Series Reference No. ERS-2003-063-F&A
Number of pages: 22 Posted: 15 Oct 2003
Working Paper Series
Robeco Asset Management, Quantitative Investment Research
Downloads 475
17.

Cloud Computing and Digital Forensics

Martini B, Quick D and Choo K-K R 2013. Cloud Computing and Digital Forensics. In Kim, I-S, editor, Information Society and Cybercrime: Challenges for Criminology and Criminal Justice, Research Report Series 13-B-01: 111–125, Korean Institute of Criminology,
Number of pages: 21 Posted: 11 Dec 2013
Accepted Paper Series
University of South Australia, Government of South Australia and The University of Texas at San Antonio
Downloads 429
18.

Topic Sentiment Asset Pricing with DNN Supervised Learning

Number of pages: 54 Posted: 20 Aug 2018 Last Revised: 23 Sep 2018
Working Paper Series
National University of Singapore (NUS) - Department of Statistics and Applied Probability and National University of Singapore
Downloads 423
19.

Holding Period Return-Risk Modeling: The Importance of Dividends

ERIM Report Series Reference No. ERS-2003-064-F&A
Number of pages: 24 Posted: 15 Oct 2003
Working Paper Series
Robeco Asset Management, Quantitative Investment Research
Downloads 419
20.

IOS Anti-Forensics: How Can We Securely Conceal, Delete and Insert Data?

47th Hawaii International Conference on System Sciences (HICSS 2014)
Number of pages: 10 Posted: 14 Oct 2013
Working Paper Series
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 415
21.

TableMaker: An Excel Macro for Publication-Quality Tables

Hlavac, Marek. (2016). "TableMaker: An Excel Macro for Publication-Quality Tables", Journal of Statistical Software, Vol. 70, Code Snippet No. 3.
Number of pages: 12 Posted: 13 Oct 2014 Last Revised: 24 May 2017
Accepted Paper Series
Central European Labour Studies Institute (CELSI)
Downloads 412
22.

Implementing Robust and Low-Maintenance Robotic Process Automation (RPA) Solutions in Large Organisations

Number of pages: 29 Posted: 02 Jan 2019 Last Revised: 08 Feb 2019
Working Paper Series
PwC Switzerland Data Analytics and PwC Switzerland Cyber Security
Downloads 400
23.

Make Them Giggle: Auto/Ethnography as Stand Up Comedy - A Response to Denzin's Call to Performance

Creative Approaches to Research, Vol. 1, No. 2
Number of pages: 14 Posted: 13 Jan 2020 Last Revised: 13 Jan 2020
Working Paper Series
University of California, San Diego (UCSD)
Downloads 391
24.

Indonesian Sugar Production and Recommendations for Industry Recovery

Number of pages: 16 Posted: 19 Oct 2015
Working Paper Series
University of Tribhuwana Tunggadewi and University of Queensland
Downloads 382
25.

Cloud Computing and Its Implications for Cybercrime Investigations in Australia

Computer Law and Security Review 29(2): 152-163, 2013
Number of pages: 21 Posted: 17 Oct 2013
Accepted Paper Series
Monash University, University of South Australia and The University of Texas at San Antonio
Downloads 369
26.

Bridging the Air Gap: Inaudible Data Exfiltration by Insiders

20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems, Forthcoming
Number of pages: 12 Posted: 03 May 2014
Accepted Paper Series
University of South Australia and The University of Texas at San Antonio
Downloads 361
27.

Economic and Environmental Sustainability: A Dynamic Approach in Insular Systems

FEEM Working Paper No. 21.2002
Number of pages: 20 Posted: 16 Apr 2002
Working Paper Series
Università degli Studi del Molise - Dipartimento di Scienze Economiche Gestionali e Sociali and University of Messina
Downloads 349
28.

Four Factor Model in Indian Equities Market

Indian Institute of Management, Ahmedabad Working Paper No. 2013-09-05
Number of pages: 21 Posted: 02 Oct 2013 Last Revised: 09 Sep 2014
Working Paper Series
Indian Institute of Management (IIM) Ahmedabad, Indian Institute of Management and Indian Institute of Management (IIM), Ahmedabad
Downloads 316
29.

Qualitative Research Process Using Abductive Approach

Number of pages: 1 Posted: 12 Jun 2013
Working Paper Series
University of Dundee, University of Dundee and University of Dundee
Downloads 284
30.

Web Programming and Dataviz with Stata

Number of pages: 8 Posted: 29 Jul 2013 Last Revised: 11 Nov 2014
Working Paper Series
Data-Pop Alliance
Downloads 275
31.

Building the Next Generation of Cyber Security Professionals

Martini B and Choo K-K R 2014. Building the next generation of cyber security professionals. In 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9-11 June 2014 (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Accepted Paper Series
University of South Australia and The University of Texas at San Antonio
Downloads 259
32.

Should There Be a New Body of Law for Cyber Space?

Jones D and Choo K-K R 2014. Should there be a new body of law for cyber space?. In 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9-11 June 2014 (Forthcoming)
Number of pages: 7 Posted: 02 May 2014
Accepted Paper Series
University of South Australia and The University of Texas at San Antonio
Downloads 251
33.

Exfiltrating Data from Android Devices

Computers & Security, 2014, DOI: 10.1016/j.cose.2014.10.016
Number of pages: 28 Posted: 31 Oct 2014 Last Revised: 15 Nov 2014
Accepted Paper Series
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 233
34.

Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users

Imgraben J, Engelbrecht A and Choo K-K R. Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users. Behaviour & Information Technology, Forthcoming
Number of pages: 37 Posted: 10 Jun 2014
Accepted Paper Series
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 204
35.

The Future of Technology in Customer Identification & Relationship Risk

Thomson Reuters Accelus, pp. 1-13, November 2013
Number of pages: 13 Posted: 03 May 2014
Accepted Paper Series
University of South Australia and The University of Texas at San Antonio
Downloads 173
36.

Robin Hood and His Outliers: A Case Study in Introductory Statistics for the Arithmetically Averse - Chapter One

Number of pages: 21 Posted: 01 Feb 2008 Last Revised: 15 Apr 2008
Working Paper Series
Institute of World Politics
Downloads 150
37.

Understanding the Information Security Awareness Process in Real Estate Organizations Using the Seci Model

20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems, Forthcoming
Number of pages: 11 Posted: 03 May 2014
Accepted Paper Series
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 144
38.

Linked Open Economy: Take Full Advantage of Economic Data

Number of pages: 10 Posted: 15 Feb 2016
Working Paper Series
Software and Knowledge Engineering Laboratory, IIT, NCSR-“Demokritos”, Software and Knowledge Engineering Laboratory, IIT, NCSR-“Demokritos”, Department of Computer Science and Biomedical Informatics, School of Sciences, University of Thessaly, National Technical University of Athens (NTUA), University of Piraeus - University of Piraeus Research Centre and Software and Knowledge Engineering Laboratory, IIT, NCSR-“Demokritos”
Downloads 142
39.

Projection of Supply and Use Tables: Methods and their Empirical Assessment

Number of pages: 38 Posted: 21 Jan 2010 Last Revised: 26 Jan 2010
Working Paper Series
Loyola Andalucia University, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 129
40.

An Analysis of the Reasons for the Asymmetries Surrounding Earnings Benchmarks

Number of pages: 48 Posted: 06 Feb 2008
Working Paper Series
affiliation not provided to SSRN and Massey University
Downloads 122
41.

Statistical Models in Educational Assessment: Three Studies

Univ. Pompeu Fabra, Economics and Business Working Paper No. 421
Number of pages: 26 Posted: 23 May 2000
Working Paper Series
Universitat Pompeu Fabra
Downloads 115
42.

Pattern-Based Target Selection Applied to Fund Raising

ERIM Report Series Reference No. ERS-2001-56-LIS
Number of pages: 17 Posted: 18 Feb 2003
Working Paper Series
Erasmus Research Institute of Management (ERIM), Erasmus University Rotterdam - Department of Computer Science and Erasmus University Rotterdam (EUR) - Faculty of Economics - Department of Computer Science
Downloads 109
43.

Web Intelligence: The Tenth Type of Multiple Intelligences?

Number of pages: 9 Posted: 16 Feb 2016
Working Paper Series
Software and Knowledge Engineering Laboratory, IIT, NCSR-“Demokritos”
Downloads 109
44.

New Payment Methods: A Review of 2010-2012 FATF Mutual Evaluation Reports

Computers & Security 36 (2013): 12-26
Number of pages: 29 Posted: 17 Oct 2013
Accepted Paper Series
The University of Texas at San Antonio
Downloads 108
45.

Draft Pakistan Electronic Crimes Act, 2004: The Proposed E-Law in a Judge’s Perspective

Pakistan Law Journal, p. 333, 2005
Number of pages: 11 Posted: 21 Aug 2011
Accepted Paper Series
Lahore High Court
Downloads 105
46.

The Dynamics of the Contemporary Law School Classroom: Looking at Laptops Through a Learning Style Lens

University of Dayton Law Review, Vol. 39, No. 2, 2014
Number of pages: 29 Posted: 08 May 2015 Last Revised: 13 May 2015
Accepted Paper Series
Regent University - School of Law
Downloads 101
47.

Enhancing User Privacy on Android Mobile Devices via Permissions Removal

47th Annual Hawaii International Conference on System Sciences (HICSS), 2014
Number of pages: 10 Posted: 15 Oct 2013
Working Paper Series
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 100
48.

Remote Programmatic vCloud Forensics

Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), September 2014, Forthcoming
Number of pages: 8 Posted: 22 Jul 2014
Accepted Paper Series
University of South Australia and The University of Texas at San Antonio
Downloads 94
49.

Common Risk Factors and the Macroeconomy: New Evidence from the Japanese Stock Market

CER-ETH Working Paper No. 12/160
Number of pages: 27 Posted: 24 Apr 2012
Working Paper Series
ETH Zürich - CER-ETH - Center of Economic Research at ETH Zurich and ETH Zürich - CER-ETH - Center of Economic Research at ETH Zurich
Downloads 93
50.

A Study of Ten Popular Android Mobile Voip Applications: Are the Communications Encrypted?

47th Annual Hawaii International Conference on System Sciences (HICSS), 2014
Number of pages: 10 Posted: 15 Oct 2013 Last Revised: 01 May 2014
Accepted Paper Series
University of South Australia, The University of Texas at San Antonio and University of South Australia
Downloads 92