Information Content of Non-GAAP Earnings of Cross-Listed Companies (open access)

Information Content of Non-GAAP Earnings of Cross-Listed Companies

To supplement earnings reported under generally accepted accounting principles (GAAP), public companies often voluntarily report alternative measures of earnings called non-GAAP earnings (NGE). These companies assert that NGE exclude the effect of non-recurring transactions, thereby helping users of financial information to better assess the company's past performance and prospects. Because NGE measures are not well defined, managers can exploit the inherent discretion in calculating NGE to mislead users. Prior studies provide arguments and evidence on the informative as well as opportunistic use of NGE. However, the studies have examined the characteristics and informativeness of NGE with a focus on U.S. companies. The results of studies that consider the NGE disclosure by U.S. companies may not be generalizable to the cross-listed companies because foreign financial reporting standards are different from the U.S. GAAP. Further, prior studies report a difference in earnings quality of U.S. firms and cross-listed firms, which can also result in a difference in the informativeness of their NGE. To fill this gap in literature, I examine whether the informativeness of NGE of cross-listed companies is different from that of U.S. companies. This study contributes to the debate on the informativeness of NGE. It provides evidence that in general, …
Date: May 2018
Creator: Adhikari, Subash
System: The UNT Digital Library
Three Essays on Information Security Risk Management (open access)

Three Essays on Information Security Risk Management

Today's environment is filled with the proliferation of cyber-attacks that result in losses for organizations and individuals. Hackers often use compromised websites to distribute malware, making it difficult for individuals to detect. The impact of clicking through a link on the Internet that is malware infected can result in consequences such as private information theft and identity theft. Hackers are also known to perpetrate cyber-attacks that result in organizational security breaches that adversely affect organizations' finances, reputation, and market value. Risk management approaches for minimizing and recovering from cyber-attack losses and preventing further cyber-attacks are gaining more importance. Many studies exist that have increased our understanding of how individuals and organizations are motivated to reduce or avoid the risks of security breaches and cyber-attacks using safeguard mechanisms. The safeguards are sometimes technical in nature, such as intrusion detection software and anti-virus software. Other times, the safeguards are procedural in nature such as security policy adherence and security awareness and training. Many of these safeguards fall under the risk mitigation and risk avoidance aspects of risk management, and do not address other aspects of risk management, such as risk transfer. Researchers have argued that technological approaches to security risks are rarely …
Date: May 2018
Creator: Ogbanufe, Obiageli
System: The UNT Digital Library
Creating Supply Chain Resilience with Information Communication Technology (open access)

Creating Supply Chain Resilience with Information Communication Technology

Supply chain resilience refers to the capability of a supply chain to both withstand and adapt to unexpected disturbances. In today's turbulent business environment, firms are continually seeking to create more resilience within their supply chain through increased information communication technology use and enhanced business-to-business relationships. The focus of this dissertation is the investigation of how information communication technology creates resilience at the differing process levels of supply chain operations. Past research into information communication technology use within supply chains has often been conducted at the macro-level of supply chain phenomena. As such, there is still much to understand about how decision-makers interact with information communication technology at the micro-level of supply chain decision-making. A more in-depth, broad coverage of this interaction will provide both practitioners and academics a better understanding of how to leverage information communication technology in achieving supply chain resilience. To meet this aim, this dissertation contains three essays that re-orient conceptual thinking about supply chain phenomenon, explore how advances in information communication technology influence business-to-business relationships, and identify how information communication technology effects the decision-making of supply chain managers.
Date: May 2018
Creator: Glassburner, Aaron
System: The UNT Digital Library
A Foot in Two Worlds: Exploring Organizational and Professional Dual Identification (open access)

A Foot in Two Worlds: Exploring Organizational and Professional Dual Identification

Who am I? Who are you? Who are we? These are some of the fundamental questions that identity scholars have grappled with since the 1900s when researchers across multiple disciplines first began to theorize about the self, identity, and identification. While the benefits and consequences of singular identities has been largely studied, recent scholars have argued for the importance of multiple identity research, as multiple identities have become increasingly salient to individuals due to societal and organizational changes including globalization and technological advancements. An important phenomenon within multiple identity research is dual identification, of which I explore a specific type– identification with both one's organization and one's profession. Using a three-study, quantitative design spanning two industries, I studied the effects of dual identification and identity conflict on individual psychological outcomes, turnover intentions, and OCB engagement. Findings from these three studies, holistically, indicate that when individuals experience identity conflict between their organizational and professional identities, they experience negative outcomes. These negative outcomes – increased emotional exhaustion, psychological distress, and turnover intentions, in addition to reduced OCB engagement – have important ramifications for the individuals themselves and their organization. However, post-hoc results indicate that dual identification – through the main effects of …
Date: May 2018
Creator: Ostermeier, Kathryn
System: The UNT Digital Library
Factors that Drive New Technology Product and Service Use and Continuance (open access)

Factors that Drive New Technology Product and Service Use and Continuance

Understanding information technology and its related products and services is increasingly important because the everyday use of technology continues to expand and broaden. Despite this need for greater understanding, the extant theories that explore the dominant factors that drive intention to use a new technology are limited. The Technology Acceptancy Model (TAM) is the most popular model in explaining traditional technology adoption. The limitations of the TAM in grasping the overall evaluation of technology or service are one of motivations for developing new models in this dissertation. The two antecedents of the TAM- perceived usefulness and perceived ease of use- only capture partial utility of a service (or product). In addition, some researchers argued that key factors used in an initial acceptance model such as perceived usefulness and perceived ease of use are not strong predictors of future continuance intention of the service because they do not consider future switching intention in the later stage. Hence, one goal of this dissertation is to develop and test new models to predict factors that drive intention and continuance intention decisions of new technology related products or services. This research involves three studies that examine different aspects of adoption and continuance intention decisions …
Date: May 2018
Creator: Liu, Xiaotong
System: The UNT Digital Library