Results 1 - 10
of
145,768
Herding Among Security Analysts
- Quarterly Journal of Economics
, 2000
"... The paper shows that the buy or sell recommendations of security analysts have a significant positive influence on the recommendations of the next two analysts. This influence can be traced to short-lived information in the most recent revisions. In contrast, the influence of the prevailing consensu ..."
Abstract
-
Cited by 99 (0 self)
- Add to MetaCart
The paper shows that the buy or sell recommendations of security analysts have a significant positive influence on the recommendations of the next two analysts. This influence can be traced to short-lived information in the most recent revisions. In contrast, the influence of the prevailing
Do Security Analysts Reduce Noise?
"... This study investigates the role of security analysts in reducing noise in stock price fluctuations. Using a sample of analyst coverage initiations between 1984 and 2006, the study finds that (1) noise is significantly reduced in the year following the initiation and (2) the extent of the noise redu ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This study investigates the role of security analysts in reducing noise in stock price fluctuations. Using a sample of analyst coverage initiations between 1984 and 2006, the study finds that (1) noise is significantly reduced in the year following the initiation and (2) the extent of the noise
The Work of Intrusion Detection: Rethinking The Role of Security Analysts
, 2004
"... Intrusion detection (ID) systems have become increasingly accepted as an essential layer in the information security infrastructure. However, there has been little research into understanding the human component of ID work. Currently, security analysts face an increasing workload as their environmen ..."
Abstract
-
Cited by 16 (3 self)
- Add to MetaCart
Intrusion detection (ID) systems have become increasingly accepted as an essential layer in the information security infrastructure. However, there has been little research into understanding the human component of ID work. Currently, security analysts face an increasing workload
Can investors profit from the prophets? Security analyst recommendations and stock returns
- Journal of Finance
, 2001
"... We document that purchasing ~selling short! stocks with the most ~least! favorable consensus recommendations, in conjunction with daily portfolio rebalancing and a timely response to recommendation changes, yield annual abnormal gross returns greater than four percent. Less frequent portfolio rebala ..."
Abstract
-
Cited by 135 (5 self)
- Add to MetaCart
transactions costs and leading to abnormal net returns for these strategies that are not reliably greater than zero. THIS STUDY EXAMINES WHETHER INVESTORS can profit from the publicly available recommendations of security analysts. Academic theory and Wall Street practice are clearly at odds regarding
Certified Security Analyst |EC-Council
"... Modern cyber defense requires a realistic and thorough understanding of web application security issues. Anyone can learn to sling a few web hacks, but web application penetration testing requires something deeper. Major web application flaws and their exploitation, a field-tested and repeatable pro ..."
Abstract
- Add to MetaCart
Modern cyber defense requires a realistic and thorough understanding of web application security issues. Anyone can learn to sling a few web hacks, but web application penetration testing requires something deeper. Major web application flaws and their exploitation, a field-tested and repeatable
The Role of Security Analysts and its Implications for Regulation FD
, 2001
"... We are grateful to workshop participants at the University of Illinois at Chicago for their comments on the paper. We thank the University of Illiniois at Chicago for financial support of this project. The Role of Security Analysts and its Implications for Regulation FD We examine analysts ’ earning ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
We are grateful to workshop participants at the University of Illinois at Chicago for their comments on the paper. We thank the University of Illiniois at Chicago for financial support of this project. The Role of Security Analysts and its Implications for Regulation FD We examine analysts
When security analysts talk who listens
, 2005
"... *Corresponding authorWhen Security Analysts Talk Who Listens? Regulators ’ interest in analyst recommendations stems from the belief that small investors are unaware of the conflicts sell-side analysts face and may, as a consequence, be misled into making suboptimal investment decisions. We examine ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
*Corresponding authorWhen Security Analysts Talk Who Listens? Regulators ’ interest in analyst recommendations stems from the belief that small investors are unaware of the conflicts sell-side analysts face and may, as a consequence, be misled into making suboptimal investment decisions. We examine
DO SECURITY ANALYSTS SPEAK IN TWO TONGUES?
, 2009
"... Why do security analysts issue overly positive recommendations? We propose a novel empirical strategy to assess the relative importance of the leading explanations: strategic distortion, which reflects incentives to trigger small-investor purchases and please management, and non-strategic distortion ..."
Abstract
- Add to MetaCart
Why do security analysts issue overly positive recommendations? We propose a novel empirical strategy to assess the relative importance of the leading explanations: strategic distortion, which reflects incentives to trigger small-investor purchases and please management, and non
Mutual Forbearance and Competition among Security Analysts•
"... Abstract. Research in industrial organization and strategic management has shown that rivals competing with each other in multiple markets are more willing to show each other mutual forbearance, i.e., compete less aggressively. Sell-side equity analysts typically cover multiple stocks in common with ..."
Abstract
- Add to MetaCart
with their rivals. In this paper, we examine the impact of this “multipoint contact ” on two key dimensions of competition among security analysts: forecast accuracy and information leadership (issuing earnings forecasts or stock recommendations that influence rival analysts). We find that multipoint contact
The Sarbanes-Oxley Act, Security Analyst Monitoring Activity, and Firm Value
"... In this study we examine the complementary monitoring activity that takes place via the Sarbanes-Oxley Act (SOX) and its effect on security analyst monitoring activity and firm value of large and small public firms. Our findings indicate that security analyst monitoring activity has decreased post-S ..."
Abstract
- Add to MetaCart
In this study we examine the complementary monitoring activity that takes place via the Sarbanes-Oxley Act (SOX) and its effect on security analyst monitoring activity and firm value of large and small public firms. Our findings indicate that security analyst monitoring activity has decreased post
Results 1 - 10
of
145,768