2014
DOI: 10.1007/s10551-014-2413-3
|View full text |Cite
|
Sign up to set email alerts
|

Late Disclosure of Insider Trades: Who Does It and Why?

Abstract: We attempt to understand the personal incentives that motivate corporate insiders to engage in unethical behavior such as delayed trade disclosure. Delayed disclosure affects corporate transparency and other shareholders in the firm potentially suffer investment losses because they are unaware of insiders' activities. Using archival data from the 300 largest Australian firms between 2007 and 2011, the results show that risk factors such as insider age and tenure and wealth effects in the form of insider shareh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 47 publications
0
4
0
Order By: Relevance
“…As opportunistic sales are often based on information obtained through the insider's position in the firm, which is an information channel outsiders cannot access through their own independent and lawful due diligence, we argue that this behavior is considered unethical as well as unfair from the rights-based angle (Klaw & Mayer, 2019;McGee, 2008). In this case, the rights of other shareholders are violated because they have no legal access to the information on which the insider trading activity is done (Chang & Lim, 2016). From a utilitarian point of view, an action is viewed as good if the result is the greatest good for the greatest number (Mill, 1861(Mill, /1879.…”
Section: Relevant Literature and Hypothesis Developmentmentioning
confidence: 93%
“…As opportunistic sales are often based on information obtained through the insider's position in the firm, which is an information channel outsiders cannot access through their own independent and lawful due diligence, we argue that this behavior is considered unethical as well as unfair from the rights-based angle (Klaw & Mayer, 2019;McGee, 2008). In this case, the rights of other shareholders are violated because they have no legal access to the information on which the insider trading activity is done (Chang & Lim, 2016). From a utilitarian point of view, an action is viewed as good if the result is the greatest good for the greatest number (Mill, 1861(Mill, /1879.…”
Section: Relevant Literature and Hypothesis Developmentmentioning
confidence: 93%
“…Dishonest behaviors by corporate managers or insiders have led to many corporate scandals over the past few decades. Since corporate scandals can cause serious damage to the company, many companies have implemented an integrity program based on the principle of legal compliance, the content of which is similar to the aforementioned prevention programs (Chen et al, 2020;Chang & Lim, 2016). A code of conduct program can infiltrate enterprises into the entire work environment through screening new employees, education and training, reward and punishment systems, and hiring integrity supervisors.…”
Section: Prevention Programsmentioning
confidence: 99%
“…Specifically, compared to the amount of work done on logging software and algorithmic modelling approaches, relatively less work has been carried out to clarify the important psychological and sociological factors for cyber security and for insider threat. Importantly, much of the psychological data is scant and focuses on correlations between the so-called Big Five personality traits (i.e., extraversion, openness to experience, agreeableness, emotional stability, conscientiousness; John & Srivastava, 1999; see Axelrad, Sticha, Brdiczka, & Shen, 2013, for an example of a Bayesian network model of insider threat using the Big Five traits) or demographic variables (e.g., gender and age; see Chang & Lim, 2014) with insider threat activity. Thus, the focus of this chapter is to articulate the major challenges for understanding insider threat in the context of cyber security, particularly from a personality and person-specific perspective.…”
Section: Understanding Personality and Person-specific Predictors Of mentioning
confidence: 99%