Now showing items 15-18 of 18

  • Thumbnail

    Over-investment and Free Cash Flow: Evidence from Thailand 

    Nopphon Tangjitprom (2015-04)

    This paper examines whether there is a relation between over-investment and free cash flow. In perfect capital market, it is expected that investment decision should not be influenced by the level of cash flow. However, the free cash flow hypothesis predicts that firms with higher free cash flow will be vulnerable to the agency problem like over-investment. Using the data from listed firms in the Stock Exchange of Thailand during 2001-2013, the result indicates that there is a positive relation between over-investment and free cash flow. ...
  • Thumbnail

    The possibility of applying the philosophy of sufficiency economy in organizational purchasing 

    Suppasit Sornsri (2016-12)

    The main objective of this research is to explore the possibility of applying the Sufficiency Economy Philosophy in purchasing of the organizations. The Sufficiency Economy Philosophy is initiated by His Majesty the King Bhumibol Adulyadej of Thailand. The philosophy reflecting the principle of Thai culture is a method of development on the three foundations of moderation, reasonableness, and self-immunity. These three bases are performed with the provision of knowledge and integrity as well as the intelligence and perseverance leading to the ...
  • type-icon
  • Thumbnail

    Security Concerns in Cloud Computing for Knowledge Management Systems 

    Thanyatida Gunadham; Pramote Kuacharoen (2016)

    This study discusses major security issues and concerns related to cloud computing environment in regard to knowledge management system processes such as knowledge creation, refining, storing, sharing, and utilization. This study uses the exploratory approach to address major security concerns and whether they need consideration for each knowledge management process. The result of this study reveals main cloud computing security concerns such as data security and confidentiality issues, access controls, data loss or leakage prevention, ...