sophisticated machine learning. JEL Classification: C45, G34, M14 Keywords: corporate culture, board gender diversity, female directors, corporate governance, machine learning, textual analysis, agency theory 2
(1) the changing IT usage in business practices, (2) the increasingly sophisticated technical approaches and mechanisms of cyber threats, (3) the revisions to preventive measures for addressing
on their behalf by those agents. As sophisticated investors with influence, often including voting rights, institutional https://www.sec.or.th/cgthailand/TH/Documents/Assessment/ICGN%20Institutional
their interests and on their behalf by those agents. As sophisticated investors with influence, often including voting rights, institutional https://www.sec.or.th/cgthailand/TH/Documents/Assessment/ICGN
(ThaiCERT). Given the more sophisticated cyber risks, financial institutions as service providers, and customers as users, are increasingly vulnerable to losses. In terms of cyber security readiness, however
properly communicating its transition strategy or greenwashing? Physical Risk • How susceptible are the company’s value chain, including its supply chain, its own operations, and its customers, to chronic
, businesses and payment have shifted into the digital realm. Meanwhile, cyber threats have become more sophisticated, as seen from their application of state- of-the-art technologies. Against this backdrop
exemption or light-touch track for offers made to sophisticated investors or private placements. However, the SEC proposes that ICO for “investment participation” be initially allowed for institutional
are often subject to being counterfeited or copied. Some products, in particular leather goods, perfumes and cosmetics, are susceptible to being distributed in parallel retail networks, including online
on current, transparent and qualified data. The credit approval processes and systems are designed to align with customers’ characteristics. Medium and Large Business customers with sophisticated