• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 145,768
Next 10 →

Herding Among Security Analysts

by Ivo Welch, Mark Britten-jones, David Hirshleifer, Olivier Ledoit, Mary Ellen Nichols, Russ Vulkanov For - Quarterly Journal of Economics , 2000
"... The paper shows that the buy or sell recommendations of security analysts have a significant positive influence on the recommendations of the next two analysts. This influence can be traced to short-lived information in the most recent revisions. In contrast, the influence of the prevailing consensu ..."
Abstract - Cited by 99 (0 self) - Add to MetaCart
The paper shows that the buy or sell recommendations of security analysts have a significant positive influence on the recommendations of the next two analysts. This influence can be traced to short-lived information in the most recent revisions. In contrast, the influence of the prevailing

Do Security Analysts Reduce Noise?

by Maria Schutte, Emre Unlu
"... This study investigates the role of security analysts in reducing noise in stock price fluctuations. Using a sample of analyst coverage initiations between 1984 and 2006, the study finds that (1) noise is significantly reduced in the year following the initiation and (2) the extent of the noise redu ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This study investigates the role of security analysts in reducing noise in stock price fluctuations. Using a sample of analyst coverage initiations between 1984 and 2006, the study finds that (1) noise is significantly reduced in the year following the initiation and (2) the extent of the noise

The Work of Intrusion Detection: Rethinking The Role of Security Analysts

by John R. Goodall, Anita Komlodi, Wayne G. Lutters , 2004
"... Intrusion detection (ID) systems have become increasingly accepted as an essential layer in the information security infrastructure. However, there has been little research into understanding the human component of ID work. Currently, security analysts face an increasing workload as their environmen ..."
Abstract - Cited by 16 (3 self) - Add to MetaCart
Intrusion detection (ID) systems have become increasingly accepted as an essential layer in the information security infrastructure. However, there has been little research into understanding the human component of ID work. Currently, security analysts face an increasing workload

Can investors profit from the prophets? Security analyst recommendations and stock returns

by Brad Barber, Reuven Lehavy, Maureen Mcnichols, Brett Trueman - Journal of Finance , 2001
"... We document that purchasing ~selling short! stocks with the most ~least! favorable consensus recommendations, in conjunction with daily portfolio rebalancing and a timely response to recommendation changes, yield annual abnormal gross returns greater than four percent. Less frequent portfolio rebala ..."
Abstract - Cited by 135 (5 self) - Add to MetaCart
transactions costs and leading to abnormal net returns for these strategies that are not reliably greater than zero. THIS STUDY EXAMINES WHETHER INVESTORS can profit from the publicly available recommendations of security analysts. Academic theory and Wall Street practice are clearly at odds regarding

Certified Security Analyst |EC-Council

by Adam Ali. Zare Hudaib
"... Modern cyber defense requires a realistic and thorough understanding of web application security issues. Anyone can learn to sling a few web hacks, but web application penetration testing requires something deeper. Major web application flaws and their exploitation, a field-tested and repeatable pro ..."
Abstract - Add to MetaCart
Modern cyber defense requires a realistic and thorough understanding of web application security issues. Anyone can learn to sling a few web hacks, but web application penetration testing requires something deeper. Major web application flaws and their exploitation, a field-tested and repeatable

The Role of Security Analysts and its Implications for Regulation FD

by Leonard C. Soffer, Huai Zhang , 2001
"... We are grateful to workshop participants at the University of Illinois at Chicago for their comments on the paper. We thank the University of Illiniois at Chicago for financial support of this project. The Role of Security Analysts and its Implications for Regulation FD We examine analysts ’ earning ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
We are grateful to workshop participants at the University of Illinois at Chicago for their comments on the paper. We thank the University of Illiniois at Chicago for financial support of this project. The Role of Security Analysts and its Implications for Regulation FD We examine analysts

When security analysts talk who listens

by Michael B. Mikhail, Beverly R. Walther, Richard H. Willis , 2005
"... *Corresponding authorWhen Security Analysts Talk Who Listens? Regulators ’ interest in analyst recommendations stems from the belief that small investors are unaware of the conflicts sell-side analysts face and may, as a consequence, be misled into making suboptimal investment decisions. We examine ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
*Corresponding authorWhen Security Analysts Talk Who Listens? Regulators ’ interest in analyst recommendations stems from the belief that small investors are unaware of the conflicts sell-side analysts face and may, as a consequence, be misled into making suboptimal investment decisions. We examine

DO SECURITY ANALYSTS SPEAK IN TWO TONGUES?

by Ulrike Malmendier, Devin Shanthikumar , 2009
"... Why do security analysts issue overly positive recommendations? We propose a novel empirical strategy to assess the relative importance of the leading explanations: strategic distortion, which reflects incentives to trigger small-investor purchases and please management, and non-strategic distortion ..."
Abstract - Add to MetaCart
Why do security analysts issue overly positive recommendations? We propose a novel empirical strategy to assess the relative importance of the leading explanations: strategic distortion, which reflects incentives to trigger small-investor purchases and please management, and non

Mutual Forbearance and Competition among Security Analysts•

by Joel A. C. Baum, Anne Bowers, Partha Mohanram
"... Abstract. Research in industrial organization and strategic management has shown that rivals competing with each other in multiple markets are more willing to show each other mutual forbearance, i.e., compete less aggressively. Sell-side equity analysts typically cover multiple stocks in common with ..."
Abstract - Add to MetaCart
with their rivals. In this paper, we examine the impact of this “multipoint contact ” on two key dimensions of competition among security analysts: forecast accuracy and information leadership (issuing earnings forecasts or stock recommendations that influence rival analysts). We find that multipoint contact

The Sarbanes-Oxley Act, Security Analyst Monitoring Activity, and Firm Value

by Sheryl-ann K. Stephen, Vincent P. Apilado
"... In this study we examine the complementary monitoring activity that takes place via the Sarbanes-Oxley Act (SOX) and its effect on security analyst monitoring activity and firm value of large and small public firms. Our findings indicate that security analyst monitoring activity has decreased post-S ..."
Abstract - Add to MetaCart
In this study we examine the complementary monitoring activity that takes place via the Sarbanes-Oxley Act (SOX) and its effect on security analyst monitoring activity and firm value of large and small public firms. Our findings indicate that security analyst monitoring activity has decreased post
Next 10 →
Results 1 - 10 of 145,768
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University