Rational Information Leakage

نویسندگان

  • Raffi Indjejikian
  • Hai Lu
  • Liyan Yang
چکیده

Empirical evidence suggests that information leakage in capital markets is common. We present a trading model to study the incentives of an informed trader (e.g., a well informed insider) to voluntarily leak information about an asset’s value to another independent trader. Our model shows that, while leaking information dissipates the insider’s information advantage about the asset’s value, it enhances his information advantage about the asset’s execution price relative to other informed traders. These two effects are countervailing. When the profit impact from enhanced information about the execution price dominates, the insider has incentives to leak some of his private information. We label this rational information leakage and discuss its implications for empirical research and the regulation of insider trading.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Approch to Decoding of Rational Irreducible Goppa code

Abstract— The interesting properties of classical Goppa code and its effective decoding algorithm (algorithm of patterson) make the most appropriate candidate for use in the MC Eliece cryptosystem. Information leakage which results from the relationship between the error vector weight and the number of iterations in the decoding algorithm, presented a weakness of the cryptosystem. In this paper...

متن کامل

Why Bubble-bursting Is Unpredictable: Welfare Effects of Anti-bubble Policy When Central Banks Make Mistakes

1 We would like to thank participants of Session 24B of the Southern Economic Association 75 th Annual Conference, 2005, for their invaluable comments on this paper's first draft. All mistakes are ours. ABSTRACT This paper examines the effect of bubble-bursting policy in the case where the central bank sometimes tries to deflate an asset which is not, in fact, overpriced. We consider the case o...

متن کامل

Defending Against Man-In-The-Middle Attack in Repeated Games

The Man-in-the-Middle (MITM) attack has become widespread in networks nowadays. The MITM attack would cause serious information leakage and result in tremendous loss to users. Previous work applies game theory to analyze the MITM attack-defense problem and computes the optimal defense strategy to minimize the total loss. It assumes that all defenders are cooperative and the attacker know defend...

متن کامل

A Competition Game with Knowledge Accumulation and Spillovers

In this paper a repeated game is proposed to model competition among firms, with profit maximizing resource allocation. The proposed model differs from the usual competition models because efforts that players exert are not seen as sunk costs, but they accumulate to form a stock of knowledge that has a cost-reducing effect. In modelling knowledge accumulation, we also consider the (knowledge) s...

متن کامل

Hiding in Groups: On the Expressiveness of Privacy Distributions

Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic primitives needed to completely shield their information from unauthorized reads. All known privacy protocols that scale to the anticipated sizes of RFID systems achieve at most modest levels of protection. Previous an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Management Science

دوره 60  شماره 

صفحات  -

تاریخ انتشار 2014