Security Design, Insider Monitoring, and Financial Market Equilibrium
نویسنده
چکیده
This paper considers a problem of security design in the presence of monitoring done by a large investor to discipline the management of a firm. Since the large investor enjoys only part of the benefits generated by her monitoring activities but incurs all the associated costs, the design and amount of security need to be structured so as to motivate her to maintain an efficient level of monitoring, if no other mechanism exists to make her commit to specific levels of monitoring in advance. By assuming that the large investor takes account of the effect of the issued amount of security on the revenues received, we show that the optimal security is a debt-like security such as standard debt with a positive probability of default, or debt with call options. We also verify that the financial market equilibrium is constrained Pareto optimal.
منابع مشابه
Insider Attack and Cyber Security Beyond the Hacker Advances in Information Security
This paper reports on a workshop in June 2007 on the topic of the insider threat. Attendees represented academia and research institutions, consulting firms, industry—especially the financial services sector, and government. Most participants were from the United States. Conventional wisdom asserts that insiders account for roughly a third of the computer security loss. Unfortunately, there is ...
متن کاملReflections on the Insider Threat
This paper reports on a workshop in June 2007 on the topic of the insider threat. Attendees represented academia and research institutions, consulting firms, industry—especially the financial services sector, and government. Most participants were from the United States. Conventional wisdom asserts that insiders account for roughly a third of the computer security loss. Unfortunately, there is ...
متن کاملThe Insider Threat Prediction and Specification Language
Various information security surveys and case studies indicate the importance and manifestation of the insider threat problem. One of the most important tools to address insider threats is to enable the researchers to build case studies and express/replay threat scenarios. The Insider Threat Prediction and Specification Language (ITPSL) is a Domain Specific Language (DSL) created to provide a s...
متن کاملInsider Trading With Different Risk Attitudes
This paper investigates the effect of different risk attitudes on the financial decisions of two insiders trading in the stock market. We consider a static version of the Kyle (1985) model with two insiders. Insider 1 is risk neutral while insider 2 is risk averse with negative exponential utility. First, we prove the existence of a unique linear equilibrium. Second, we obtain somewhat surprisi...
متن کاملInside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals
Insider threat is a great challenge for most organizations in today’s digital world. It has received substantial research attention as a significant source of information security threat that could cause more financial losses and damages than any other threats. However, designing an effective monitoring and detection framework is a very challenging task. In this paper, we examine the use of hum...
متن کامل