The Evolution of Security Designs

نویسندگان

  • THOMAS H. NOE
  • MICHAEL J. REBELLO
  • JUN WANG
چکیده

We consider a competitive and perfect financial market in which agents have heterogeneous cash flow valuations. Instead of assuming that agents are endowed with rational expectations, we model their behavior as the product of adaptive learning. Our results demonstrate that adaptive learning affects security design profoundly, with securities mispriced even in the long run and optimal designs trading off underpricing against intrinsic value maximization. The evolutionary dominant security design calls for issuing securities that engender large losses with a small but positive probability, but that otherwise produce stable payoffs, almost the exact opposite of the pure state claims that are optimal in the rational expectations framework. The real operations of the economy produce random cash flows. If investors have varying attitudes toward risk, they will have different valuations of these risky cash flows. For this reason, the received wisdom is that investor welfare can be improved by sharing rules that allocate risky cash flows among investors. Financial markets can serve as a mechanism for implementing such welfare-improving risk sharing. These markets enable agents with different risk preferences to trade securities and, through their trades, establish equilibrium prices for risky assets. In equilibrium, state prices are determined by the marginal investor’s valuation; and the marginal investor may be different in different states of the world. Although the welfare-enhancing effects of dividing and marketing cash flows have long been recognized, Allen and Gale (1988) are the first researchers to consider the matrix of risksharing securities not as an exogenous datum but rather as an endogenous product of design. In particular, Allen and Gale develop a model of financial markets in which corporations profit by designing securities. They show that, in the absence of transactions costs, the optimal security design calls for the issuance of pure state securities, that is, firms should issue a bundle of many securities, with each security paying off only in a single state of the world and only one security paying off in any given state. Such a design captures the highest marginal valuation for each security across the heterogeneous pool of investors. However, in actuality, corporations tend to issue only a few securities that often provide positive payoffs simultaneously by splitting the cash flows associated with individual states across multiple securities. Indeed, Allen and Gale show further that given transaction costs that are proportional to the number of securities a firm issues, a firm will reduce the number of securities it issues by issuing bundles of pure securities and thereby bundling together cash flows from multiple states. Nevertheless, splitting a given state’s cash flow among multiple securities is still suboptimal. By relaxing the assumptions of no transactions costs, free information, and competitive financial markets, the extant literature attempts to rationalize the stylized fact of firms issuing a narrow range of securities in a world with a broad range of investor preferences. For instance, Madan and Soubra (1991) show that marketing costs can make both the bundling and splitting

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs

The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Comparative study of the tiles of Ebrahim Khan School with Kerman carpet designs in the Qajar period

Some years after the Qajar attack to Kerman, Ibrahim Khan Zahir al-Doleh was elected governor of the city. With the beginning of Ibrahim Khan's rule in Kerman, the construction of useful buildings and the improvement of people's livelihood were on his agenda. After that, arts such as carpet weaving, which had lost their prosperity, were revived. The buildings were decorated with colorful tiles ...

متن کامل

Security of Sponge structures

Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...

متن کامل

Evolution of MTA Architecture: The Impact of Security

As the Internet matured, security became more important and formerly adequate designs became inadequate. One of the victims of the increased need for security was sendmail. This paper shows how its competitors improved on its design in response to the increased need for security. The designers of qmail and Postfix used well-known patterns to achieve better security without hurting performance; ...

متن کامل

Model and Pattern of Safavid Brocaded Textiles (Case Study: Human Shape Designs)

Brocaded textile is made of gold or silver threads. This textile was produced during the Achaemenid period and in the Sassanid era, various designs were added, hence the evolution of this fabric proceeded. It was very much considered in the Timurid period with decorative effects and then was influenced by the narrative and illustrative aspects of Persian painting. With the domination of human i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005