Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (1)
- Computer Law (1)
- Computer Sciences (1)
- Corporate Finance (1)
- Data Storage Systems (1)
-
- Digital Communications and Networking (1)
- Electronic Devices and Semiconductor Manufacturing (1)
- Forensic Science and Technology (1)
- Hardware Systems (1)
- Information Security (1)
- Law (1)
- Legal Studies (1)
- Other Computer Engineering (1)
- Physical Sciences and Mathematics (1)
- Social and Behavioral Sciences (1)
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
Is Tech M&A Value-Additive?, Ani Deshmukh
Is Tech M&A Value-Additive?, Ani Deshmukh
Undergraduate Economic Review
Given rising M&A deal volume across all high-tech subsectors, the ability to measure post-acquisition performance becomes critical. Despite this growth, the relevant academic literature is severely lacking (Kohers and Kohers 2000). Using an event-study approach, I find that acquirers and targets both realize statistically significant day-0 abnormal returns (1.23% [p<0.1] and 8.1% [p<0.01], respectively). As positive stock returns signal positive growth prospects in a semi-strong efficient market, AR regressions found that firms' technological relatedness, deal financing, purchase price premiums, and the relative book to market ratio, explained most variance. Overall, high-tech transactions are value-additive for both targets and acquirers.
Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman
Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman
Journal of Digital Forensics, Security and Law
The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s …