Open Access. Powered by Scholars. Published by Universities.®
Portfolio and Security Analysis Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Portfolio and Security Analysis
The Impact Of Nasd Rule 2711 And Nyse Rule 472 On Analyst Behavior: The Strategic Timing Of Recommendations Issued On Weekends, Yi Dong, Nan Hu
The Impact Of Nasd Rule 2711 And Nyse Rule 472 On Analyst Behavior: The Strategic Timing Of Recommendations Issued On Weekends, Yi Dong, Nan Hu
Research Collection School Of Computing and Information Systems
Amendments to NASD Rule 2711 and NYSE Rule 472, enacted in May 2002, mandate that sell-side analysts disclose the distribution of their security recommendations by buy, hold and sell category. This regulation enhances the transparency of analysts' information and mitigates the long-recognized optimistic bias in their recommendations. However, we find that analysts are more likely to issue sell recommendations or downgrade revisions on weekends when investors have limited attention after these rule changes. This pattern is more pronounced for prestigious analysts, who are more likely to influence stock prices. Market reaction tests reveal an incomplete immediate response and a greater …
An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, Linda Betz
CCE Theses and Dissertations
Financial services institutions maintain large amounts of data that include both intellectual property and personally identifiable information for employees and customers. Due to the potential damage to individuals, government regulators hold institutions accountable for ensuring that personal data are protected and require reporting of data security breaches. No company wants a data breach, but finding a security incident or breach early in the attack cycle may decrease the damage or data loss a company experiences. In multiple high profile data breaches reported in major news stories over the past few years, there is a pattern of the adversary being inside …