نتایج جستجو برای: managerial compliance policies

تعداد نتایج: 198216  

2008
Steven Callander

I study a model of dynamic policy making in which citizens do not have complete knowledge of how policies are mapped into outcomes. They learn about the mapping through repeated elections as policies are implemented and outcomes observed. I characterize for this environment the policy trajectory with impatient voters. I find that through experimentation good policies are frequently found. Howev...

2017
Wolfgang Mayer Pompeu Casanovas Markus Stumptner Louis de Koker Danuta Mendelson

Investigations conducted by law enforcement agencies depend on information that is obtained from a variety of sources, internal and external to the organization. Considering that investigations frequently span multiple jurisdictions and government agencies with varying objectives and powers, assessing and ensuring compliance with their policies and the legal framework is challenging. We present...

2009
Robert Hauswald

This paper analyzes the optimal design of banking regulation when three layers of agency conflicts between society and banks, society and supervisors, and bank owners and managers are present. We argue that regulatory rules, supervisory incentives, and managerial compensation form an interdependent nexus. Since managerial incentives reveal information about banks’ operating policies comprehensi...

2015
Esther Brainin

The chapter considers the complexities of cultural differences for global enterprise resource planning (ERP) implementation. An extensive review of the literature related to societal and organizational culture is followed by a delineation of the stages of ERP implementation and the actors involved in each stage, reflecting the basic assumption that global ERP systems are not universally accepta...

2006
Kirsten Foss Nicolai J. Foss Xosé H. Vázquez Sven Haugland Thorbjørn Knudsen Keld Laursen Torben Pedersen

We discuss and examine empirically a firm-level equivalent of the ancient problem of ‘tying the King’s hands’, namely how to avoid managerial intervention that is undertaken to reap private benefits but is harmful to overall value creation, that is, ‘managerial opportunism’. The link from managerial intervention to firm-level value-creation is moderated by employee motivation. Thus, interventio...

2011
David A. Basin Matús Harvan Felix Klaedtke Eugen Zalinescu

Determining whether the usage of sensitive, digitally stored data complies with regulations and policies is a growing concern for companies, administrations, and end users alike. Classical examples of policies used for protecting and preventing the misuse of data are history-based access-control policies like the Chinese-wall policy and separation-of-duty constraints. Other policies from more s...

2014
Brett Danaher Michael D. Smith Rahul Telang

Digitization raises a variety of important academic and managerial questions around firm strategies and public policies for the content industries, with many of these questions influenced by the erosion of copyright caused by Internet file-sharing. At the same time, digitization has created many new opportunities to empirically analyze these questions by leveraging new data sources and abundant...

2009
Wallace J. Hopp Seyed M.R. Iravani Biying Shou Robert Lien

In this article, we study the design and control of manufacturing cells with a mix of manual and automated equipment, operating under a CONWIP pull protocol, and staffed by a single agile (cross-trained) worker. For a three-station line with one automated station, we fully characterize the structure of the optimal control policy for the worker and show that it is a static priority policy. Using...

2008
Sandra Julieta Rueda Dave King Trent Jaeger

In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe operations despite have the authority to perform unsafe operations; for example, initialization programs, administrative programs, root network daemons, etc. Currently, these programs are trusted without concrete justi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید