The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
This paper deals with the securities industry in Malaysia, in particular the Kuala Lumpur Stock Exchange (KLSE), the new exchange, MESDAQ, which is yet to be established, and the development of the Securities Commission (SC) as the regulatory body supervising the development of the capital market...
| Main Author: | Yong, Soon Ching |
|---|---|
| Format: | Project Paper Report |
| Language: | English English |
| Published: |
1997
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/7898/ http://psasir.upm.edu.my/id/eprint/7898/1/GSM_1997_15_A.pdf |
Similar Items
The Wealth Effect of the Securities Commission and the Central Bank Announcement
by: Yu, Kee Su
Published: (1997)
by: Yu, Kee Su
Published: (1997)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Society perception towards security officers in Malaysia: the analysis
by: Maurice Budit, Vernon Valentine
Published: (2019)
by: Maurice Budit, Vernon Valentine
Published: (2019)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Food security and policy responses with special reference to the poultry industry
by: Shamsudin, Mad Nasir
Published: (2013)
by: Shamsudin, Mad Nasir
Published: (2013)
Predictors of financial security among female-headed households in Malaysia
by: Ahmad, Siti Yuliandi
Published: (2016)
by: Ahmad, Siti Yuliandi
Published: (2016)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
How Many Securities Make A Diversified Portfolio In
Klse Stocks?
by: G.S. Gupta, G.S. Gupta, et al.
Published: (2001)
by: G.S. Gupta, G.S. Gupta, et al.
Published: (2001)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
Corporate Planning for Kuala Lumpur City Securities Sdn. Bhd.
by: Yong, Wooi Kee
Published: (1999)
by: Yong, Wooi Kee
Published: (1999)
Jordan's National Security Under King Hussein
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
A perception assessment on security awareness in Malaysian government agencies by Rasch model / Mohd Ismail Ahmad, Azrilah Abdul Aziz and Mohd Saidfudin Masodi
by: Ahmad, Mohd Ismail, et al.
Published: (2008)
by: Ahmad, Mohd Ismail, et al.
Published: (2008)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Australia's 'New Security' Challenges
by: Hubbard, Christopher
Published: (2004)
by: Hubbard, Christopher
Published: (2004)
‘Securing’ the Indian Ocean? Competing regional security constructions
by: Rumley, Dennis, et al.
Published: (2012)
by: Rumley, Dennis, et al.
Published: (2012)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Uncovering Assumptions in Information Security
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
Security and quality issues in IT projects
by: El Desouki, Hassan, et al.
Published: (2010)
by: El Desouki, Hassan, et al.
Published: (2010)
Pricing Asset-backed Securities: A Revised Model
by: Bradka, Lukas
Published: (2008)
by: Bradka, Lukas
Published: (2008)
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
The election commission: history and functions
by: Tunku Mohd Mokhtar, Tunku Mohar
Published: (2013)
by: Tunku Mohd Mokhtar, Tunku Mohar
Published: (2013)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
US-Pakistan cooperation and Pakistan's security post 9/11
by: Tamana, Aazar
Published: (2010)
by: Tamana, Aazar
Published: (2010)
A Foucauldian governmentality analysis of security sector reform in Tunisia
by: Keskes, Hanen
Published: (2023)
by: Keskes, Hanen
Published: (2023)
Water security and sustainable tourism as antecedents of local community’s quality of life in Mabul Island, Malaysia
by: Khairuddin, Fatin Nornajla
Published: (2019)
by: Khairuddin, Fatin Nornajla
Published: (2019)
Concept of social security in Islam with special reference to zakat, waqaf and faraid
by: Mohamad Amin, Noor Shuhadawati, et al.
Published: (2016)
by: Mohamad Amin, Noor Shuhadawati, et al.
Published: (2016)
Effects of population on food security, health care and education expenditure in China and India
by: Nordin, Nurhaiza
Published: (2016)
by: Nordin, Nurhaiza
Published: (2016)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Similar Items
-
The Wealth Effect of the Securities Commission and the Central Bank Announcement
by: Yu, Kee Su
Published: (1997) -
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025) -
Society perception towards security officers in Malaysia: the analysis
by: Maurice Budit, Vernon Valentine
Published: (2019) -
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013) -
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)