نتایج جستجو برای: managerial compliance policies
تعداد نتایج: 198216 فیلتر نتایج به سال:
I study a model of dynamic policy making in which citizens do not have complete knowledge of how policies are mapped into outcomes. They learn about the mapping through repeated elections as policies are implemented and outcomes observed. I characterize for this environment the policy trajectory with impatient voters. I find that through experimentation good policies are frequently found. Howev...
Investigations conducted by law enforcement agencies depend on information that is obtained from a variety of sources, internal and external to the organization. Considering that investigations frequently span multiple jurisdictions and government agencies with varying objectives and powers, assessing and ensuring compliance with their policies and the legal framework is challenging. We present...
This paper analyzes the optimal design of banking regulation when three layers of agency conflicts between society and banks, society and supervisors, and bank owners and managers are present. We argue that regulatory rules, supervisory incentives, and managerial compensation form an interdependent nexus. Since managerial incentives reveal information about banks’ operating policies comprehensi...
The chapter considers the complexities of cultural differences for global enterprise resource planning (ERP) implementation. An extensive review of the literature related to societal and organizational culture is followed by a delineation of the stages of ERP implementation and the actors involved in each stage, reflecting the basic assumption that global ERP systems are not universally accepta...
We discuss and examine empirically a firm-level equivalent of the ancient problem of ‘tying the King’s hands’, namely how to avoid managerial intervention that is undertaken to reap private benefits but is harmful to overall value creation, that is, ‘managerial opportunism’. The link from managerial intervention to firm-level value-creation is moderated by employee motivation. Thus, interventio...
Determining whether the usage of sensitive, digitally stored data complies with regulations and policies is a growing concern for companies, administrations, and end users alike. Classical examples of policies used for protecting and preventing the misuse of data are history-based access-control policies like the Chinese-wall policy and separation-of-duty constraints. Other policies from more s...
Digitization raises a variety of important academic and managerial questions around firm strategies and public policies for the content industries, with many of these questions influenced by the erosion of copyright caused by Internet file-sharing. At the same time, digitization has created many new opportunities to empirically analyze these questions by leveraging new data sources and abundant...
In this article, we study the design and control of manufacturing cells with a mix of manual and automated equipment, operating under a CONWIP pull protocol, and staffed by a single agile (cross-trained) worker. For a three-station line with one automated station, we fully characterize the structure of the optimal control policy for the worker and show that it is a static priority policy. Using...
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe operations despite have the authority to perform unsafe operations; for example, initialization programs, administrative programs, root network daemons, etc. Currently, these programs are trusted without concrete justi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید