Security Design, Insider Monitoring, and Financial Market Equilibrium

نویسنده

  • HIROSHI OSANO
چکیده

This paper considers a problem of security design in the presence of monitoring done by a large investor to discipline the management of a firm. Since the large investor enjoys only part of the benefits generated by her monitoring activities but incurs all the associated costs, the design and amount of security need to be structured so as to motivate her to maintain an efficient level of monitoring, if no other mechanism exists to make her commit to specific levels of monitoring in advance. By assuming that the large investor takes account of the effect of the issued amount of security on the revenues received, we show that the optimal security is a debt-like security such as standard debt with a positive probability of default, or debt with call options. We also verify that the financial market equilibrium is constrained Pareto optimal.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Insider Attack and Cyber Security Beyond the Hacker Advances in Information Security

This paper reports on a workshop in June 2007 on the topic of the insider threat. Attendees represented academia and research institutions, consulting firms, industry—especially the financial services sector, and government. Most participants were from the United States. Conventional wisdom asserts that insiders account for roughly a third of the computer security loss. Unfortunately, there is ...

متن کامل

Reflections on the Insider Threat

This paper reports on a workshop in June 2007 on the topic of the insider threat. Attendees represented academia and research institutions, consulting firms, industry—especially the financial services sector, and government. Most participants were from the United States. Conventional wisdom asserts that insiders account for roughly a third of the computer security loss. Unfortunately, there is ...

متن کامل

The Insider Threat Prediction and Specification Language

Various information security surveys and case studies indicate the importance and manifestation of the insider threat problem. One of the most important tools to address insider threats is to enable the researchers to build case studies and express/replay threat scenarios. The Insider Threat Prediction and Specification Language (ITPSL) is a Domain Specific Language (DSL) created to provide a s...

متن کامل

Insider Trading With Different Risk Attitudes

This paper investigates the effect of different risk attitudes on the financial decisions of two insiders trading in the stock market. We consider a static version of the Kyle (1985) model with two insiders. Insider 1 is risk neutral while insider 2 is risk averse with negative exponential utility. First, we prove the existence of a unique linear equilibrium. Second, we obtain somewhat surprisi...

متن کامل

Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals

Insider threat is a great challenge for most organizations in today’s digital world. It has received substantial research attention as a significant source of information security threat that could cause more financial losses and damages than any other threats. However, designing an effective monitoring and detection framework is a very challenging task. In this paper, we examine the use of hum...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999