Investment Decision on Information System Security: A Scenario Approach

Size: px
Start display at page:

Download "Investment Decision on Information System Security: A Scenario Approach"

Transcription

1 Association for Information Systems AIS Electronic Library (AISeL) AMCIS 009 Proceedings Americas Conference on Information Systems (AMCIS) 009 Investment Decision on Information System Security: A Scenario Approach C. Derrick Huang Florida Atlantic University, dhaung@fau.edu Jahyun Goo Florida Atlantic University, jgoo@fau.edu Follow this and additional works at: Recommended Citation Huang, C. Derrick and Goo, Jahyun, ": A Scenario Approach" (009). AMCIS 009 Proceedings This material is brought to you by the Americas Conference on Information Systems (AMCIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in AMCIS 009 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org.

2 : A Scenario Approach C. Derrick Huang Florida Atlantic University dhuang@fau.edu Jahyun Goo Florida Atlantic University jgoo@fau.edu ABSTRACT This paper presents scenarios of information security defending against directed security threats, risk-averse firm s willingness to invest, and attacker s propensity to security measures each enhancing our understanding of a firm s information security investment under different circumstances. We find that, when a firm tries to defend against directed attacks, the relative size of potential losses is an important factor in determining the level of optimal investment, and the total investment may drop when the system vulnerability is high. And a firm should carefully weight its and the potential attacker s levels of aversion to risks in order to determine the most optimal level information security investments. The implications, limitations, and future directions of this research are also discussed. Keywords Information security, security investment, directed attack INTRODUCTION Managing information security has become an integral part of company s day-to-day operations. The number of security incidents, ranging from those by hackers with benign consequences, to attacks aimed at stealing valuable information, to cyber-terrorism, has increased significantly in recent years. To protect against such risks, organizations are investing heavily in information security-related products and services, in addition to the manpower and management attention dedicated to protecting the data and systems and recovering from virus infections and occasional breaches (Gordon et al. 006). Given the potential damages of information security events and the unattainable goal of complete security in today s business environment, it only makes sense for decision makers to wonder if their investments are made wisely and effectively. Firms are likely inclined to know how they would determine the optimal amount of investment and what to invest in. Those seemingly straightforward questions, however, are complicated by the fact that the information security is a complex system of many variables, many of which are outside the control of the firms in question. In order to address information security investment issues, one needs to study carefully the possible scenarios to which firms are exposed. This paper is intended to fill the research gap by building a generalized model for information system security investment and then applying the model to different security scenarios. This paper is organized as follows. We first review the literature on information security investment, pointing out the major findings and gaps in research. We next build a general model for managing information security investment. In the following sections, we present and apply the general models to different scenarios of information system security, including directed attacks, risk-averse decision maker, and attacker propensity. We conclude the study by discussing the implication of our research, its limitations, and future research directions. RESEARCH BACKGROUND The first issue of information security investment is to determine its optimal level for the firm in question. This issue is often addressed via the traditional decision analysis to compare the security risk and return of investments. Schechter (005) proposes an econometric model, in which risk is evaluated as security risk = (likelihood of loss event) * (cost of loss event). The return of security investment, on the other hand, comes from reduced security risks that a firm is facing. Based on this formulation, Gordon and Loeb in their seminal paper (00a) analyze the economics of security investment for a risk-neutral firm by comparing the cost of the investment and the potential loss caused by possible security breaches. They find that the optimal security investment would be far less than (with a theoretical maximum of 36.8% of) the potential loss if a security breach does happen, and that the optimal security investment does not necessarily increase with system vulnerability. In extending the Gordon and Loeb model, Huang et al. (008) adopt the expected utility theory to study the behavior of a riskaverse decision maker and find that optimal information security investment only exists when potential loss reaches a Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th 009 1

3 minimum level; above that minimum, optimal investment increases with potential loss. In addition, contrary to the riskneutral case, a risk-averse decision maker may continue to invest in information security until the spending is close to (but never exceeds) the potential loss. After the amount of investment is determined (by optimization, budget, or other constraints), a firm needs to decide what security measures to invest in. Often, selection of the right investments is aided by traditional management tools as costbenefit analysis and financial analyses based on such measures as return on investment (ROI), net present value (NPV), and internal rate of return (IRR) (Gordon and Loeb, 00b). However, none of the methodologies have been identified as effective all the time. It is with this knowledge that we approach the analysis of information security investment based on scenarios. BASIC MODEL We model the attack based on the breach probability and expected loss, following closely the approach in Huang et al. (008) and Gordon and Loeb (00a). Our focus is to use the same modeling assumptions to examine scenarios such as attacker s propensity. Following their formulations, we assume that security adversaries generate attacks on the information systems with a threat probability t. The security property of the information systems is determined by the system vulnerability and security investment. The system vulnerability, v, is assumed to be a direct result of the topology and connectivity of the firm s information systems: The more accessible and connected the systems, the more intrinsically susceptible they are to attacks. To protect against the system vulnerability being exploited by threat agents, the firm invests S in security measures. The probability of a security breach to occur can then be considered as a function of the behavior of the attack agents, as described by the threat probability, and the security property of the information systems, which, in our model, is determined by the system vulnerability and investments in security measures. In other words, the breach probability p can be written as the following: p= p( t, v, S). (1) For simplicity, we require that both t and v to be between 0 and 1. We note that for any given system, the higher the security threat and the more susceptible to attacks, the higher breach probability; that is, both 0 and 0. Further, the effect of the security investment is to reduce the breach probability, or p 0 p t p v. () We assume that this reduction is governed by the law of diminishing return, which implies that p 0. (3) We also require the following boundary condition p ( t, v,0) = tv. That is, when the firm does not make any security investment, the breach probability is solely determined by and can be described as a product of the threat and the intrinsic system vulnerability. A common definition of risk is the combination of the likelihood and the consequence of a specified hazard being realized (Schechter, 005). The security risk R the firm faces can therefore be written as R= pl, (4) where L is potential economic loss caused by a security breach. For our model, we make the simplifying assumption that L > 0 is a fixed amount, as estimated by the firm based on the type of attack. From the boundary condition p ( t, v,0) = tv, we know that the security risk a company faces when no investment is made is tvl. To protect against the attack, the firm makes investment S to reduce the breach probability such that the information security risks is reduced by R= ( tv p) L. In other words, the net benefit of the security investments would be B( S, t, v) = ( tv p) L S. (5) Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th 009

4 The task of optimizing the security investments is to maximize their benefits. In later sections, we apply this model to various scenarios to optimize the investment S by setting the first-order partial differentiation of B in (5) with respect to S; B that is, = 0. For it to be valid, we check to see that this operation indeed yields maximum, not minimum, of B: because of (3). SCENARIO 1: DIRECTED ATTACKS B p = L 0, (6) In this scenario, we consider the case when the attacks are directed at a particular firm s systems or properties. We follow a derivation that has its root in scale-free networks (Albert et al., 1999; Faloutsos et al., 1999; Kumar et al., 000). It has been shown that the connectedness of the Internet and the worldwide web resembles that of a scale-free, small-world network, distinguished by a limited number of highly connected nodes (called hubs ) as well as by its structural independence of the system s size N (Barabási and Albert, 1999; Watts and Strogatz, 1998). In a scale-free network, the probability that a node connects with k other nodes is roughly proportional to k -γ, where γ is between and 3 for most real networks such as the Internet (Barabási and Albert, 1999). To examine how the scale free network can shed light on the directed attacks, we follow the derivation of Chang and Young (005) and Pastor-Satorras and Vespignani (001) to consider the case that an epidemic event starts spreading in a scale-free network. The rate of epidemic spreading, λ, is determined by r, the infection rate of a previously uninfected node if it is connected to an infected one, and δ, the remediation rate of an infected node: λ r δ =. (7) Let P k (t) denote the relative density of infected nodes with k connections that is the probability that a node with k connections is infected at time t. The mean field rate equation gives (Pastor-Satorras and Vespignani, 001) Pk ( t) = Pk ( t) + λk[1 Pk ( t)] Θ( λ) t, (8) where Θ(λ) is the probability that any given connection points to an infected node, which can be given in the lowest order of λ (Chang and Young, 005): λ e n Θ λ) = λn (, (9) where n is the minimum number of nodes available for connection in such a network. Solving for P k in a steady state (i.e., P k ( t) = 0 t ), we get kλθ( λ) = 1+ kλθ( λ) P k. (10) When averaging P k over k, we get the average infection probability of any node in the network (Pastor-Satorras and Vespignani, 001): where c is a normalization constant. 1 λn P= ce, (11) To extend this result to security investment of the firm s information systems, we assume that the firm s information systems can be represented as a node in such a network. Further, we assume that the effect of security investment S can be shown in the reduction of the infection rate λ in (9). We further observe that λ and S satisfy certain boundary conditions. First, the attack would be spread freely to the node without any security investment; in other words, λ = 1 when S = 0. Second, any finite security investments, no matter how large, would never be able to fully block all attacks; in other words, λ 0 only Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th 009 3

5 when S. Without loss of generality, we assume a linear inverse relationship between security investment and infection rate. Such relationship with the above boundary conditions can be expressed in the following manner: 1 κs + 1 λ, (1) where κ, normalized to between 0 and 1, is a scaling factor for S: The higher the κ, the greater reduction of the infection rate for any given security investment S. Our next set of observations is on the system vulnerability v. We note that since v represents the connectivity of the information systems in question, v would be strictly increasing in n, which represents the extent of connections in such a scale-free network. Further, when n = 0, v = 0. On the other hand, v 1 when n ; that is, the systems are highly vulnerable to the epidemic, or security attacks in our case, when they are completely open. We assign the following relationship between c and n that satisfies all the above conditions: 1 n v e. (13) When the systems are under directed attack, the scale-free network effectively becomes a regular randomly connected network to the attackers, because the attacker has to initiate the attack from a connected node regardless of the topology of the overall network. The vulnerability, in this case, can be regarded as the probability of an attacker successfully identifying any connecting node to initiate such an attack. The probability of a breach by such a directed attack can therefore be represented as the product of the vulnerability v, the infection rate λ, and the threat probability t. In other words, we can write the breach probability for a directed attack as: p = tv κ S +1. (14) Before we proceed, we have to establish an important boundary condition. Before a firm makes the first ever security investment, it has to assume that such investment generates positive benefit. This is true, because otherwise no firms would be making any information security investment. Such boundary condition can be expressed as B ( t, v, S = 0) 0 We first apply (15) to S to produce the following boundary conditions: B (0) 0 v 1 tκl. (15) ; (16) In this case, we solve for optimal investments by taking the partial derivative of (16) with respect to one while holding the other constant: Because we have Substituting (18) into (17), we get B ( S * ) = 0 ρ t κ v = ( κ S +1) Rearranging the terms in (19) and solving for S*, we have t κ vl 1= 0. * ( κs + 1), (17) ; (18) (19) t vκl 1 S * =. (0) κ Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th 009 4

6 Plotting out Eq. (0), along with boundary condition (16), we can see that S* increases with v initially, starts to drop after certain v, and eventually becomes a strictly increasing function of v when v is large. To summarize, the optimal total investment S* in information security in the case of concurrent attack, with no additional constraints, becomes nonzero above some minimum vulnerability v and increases with v thereafter. When v becomes large, S* starts to drop, but eventually becomes a strictly increasing function of v. These results are consistent with those of Gordon and Loeb (00a). SCENARIO : SECURITY INVESTMENT IN THE CASE OF RISK-AVERSE FIRM Our second scenario involves a closer look at how much a firm is willing to invest against security threat. In the case of riskneutral firm, as represented by (5), such willingness is trivial: Firms always respond in a linear fashion. However, when the firm is risk-averse, the amount of investment a firm is willing to make in order to reduce the security can be an interesting subject. We follow the assumptions and derivations of Huang et al. (008) in assuming that such firms would tend to maximize a utility function u = u(b) and that the risk aversion coefficient α is constant: We arrive at the form of the appropriate u(b): u ( B) α = 0. u ( B) (1) B u( B) = αe α. We can then use this utility function as the subject for maximization, as shown in Huang et al. (008), instead of the B itself, to find the willingness to invest. In the next scenario, we will extend the behavior assumption to the attacker as well. SCENARIO 3: HACKER S PROPENSITY TO ATTACK When a firm makes investment in information security, potential attackers actions may be affected: Protective measures taken by the directed firm are likely to influence the decision of the potential attackers on whether and how to attack (Cremonini and Nizovtsev, 006). In this section, we consider the scenario where security investment made by the directed firm is felt by the security adversaries. To compare the reaction of the attacker and the firm under attack, we adopt the assumption of a risk-averse firm as in Scenario. Further, we adopt the derivation by Huang et al. (008) but consider only the directed attack, because, by definition, whoever that initiated random attacks would not be affected by the measure of any of the firms that are randomly under attack. In this case, the threat probability is no longer an exogenous parameter, but a function of the directed firm s security investment; i.e., t = t(s). To model the attackers reactions to directed firm s security investment, it is reasonable to assume that the more protective measures taken by the directed firm, the more likely is the attacker taking notice and reacting accordingly. Without loss of generality, we assume the rate of decrease in the incentive to attack (thus the threat probability) is proportional to the security investment made by the directed firm. This can be written as the following: t( S) ln = ϕs, t 0 where t 0 is the attack probability when the directed firms takes no protective measures. The factor φ in (3), which we define as the attack propensity parameter, represents the degree of reaction of an attacker to the directed firm s protective actions. A potential attacker who is more unwilling to face a failed attack and its consequences and more averse to the risk of getting caught would have a higher φ. Based on (3), we have ( 0 () (3) κs t S) = t e. (4) A generic plot of t(s) is presented in Figure 1: the decrease in t is small when S is small, but t drops off rapid when S becomes large. In practice, this means that the attacker is not deterred much when the directed firm only makes scant effort toward information security; however, when the protective measures grow extensive, the incentive for the potential attacker to attack is quickly reduced. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th 009 5

7 Figure 1. Threat Probability as a Function of S With (4), the directed breach probability in (14) can becomes ϕs vt0e p=. κs + 1 (5) And p ϕs vt0e = ( κs + 1) ( κ + ϕ+ κϕs ). (6) To see the effect of this new form of breach probability, we borrow the optimization condition from Huang et al. (008) for the risk-averse firm facing directed attacks: p ( e α L L 1) + α( e α 1) p+ α = 0. (7) Plugging in (5) and (6) into the optimization condition (7), and after rearranging terms, we have * * αl ϕsi * * αl ϕsi α ϕ)( e 1) vt0e ( κs I + 1) + α( κs + 1) κ ( e 1) vt0e = 0. (8) ( A quick examination of (8) shows that a closed-form solution of S* is impossible, so we resort to simulation to study its properties. Figures and 3 show the behavior of optimal investment with respect to system vulnerability v and expected loss L, respectively. We also include the base case (i.e., φ = 0) as a comparison. First thing we note is that, everything else being equal, the optimal investment S* is always higher when attack propensity φ is nonzero. This is not surprising, given that, in this scenario, the more investment a firm makes, the lower the threat probability is. And perhaps because of the investment effect on attack probability, the minimum vulnerability for nonzero optimal investment against directed attacks (Huang et al., 008) disappear (Figure 3), although the minimum expected loss, proposed by Huang et al (008), still applies. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th 009 6

8 Figure. Optimal Investment vs. System Vulnerability in the Presence of Attack Propensity Figure 3. Optimal Investment vs. Potential Loss in the Presence of Attack Propensity When an attacker is aware of and averse to the security investment made by the directed firm, the investment itself becomes more effective. Thus, intuitively, S* would increase with φ. However, such strictly increasing relationship does not exist when we plot S* against φ, as shown in Figure 4. Instead, S* increases first with larger φ, reaches a maximum, then starts to decline quickly, given L and v. In other words, when attacker s awareness and aversion to directed firm s action are high, optimal investment decreases with attack propensity. An important practical implication of this finding is that, when the potential attackers are likely to be deterred by a firm s security measures, it is to the firm s advantage to announce and advertise such measures as much as possible. By doing so, the firm can actually lower its investment on information security. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th 009 7

9 Figure 4. Optimal Investment vs. Attack Propensity It is perhaps most interesting to note that, in Figure 4, S* reaches a maximum when φ = α. That is, the optimal investment is the highest when attacker s propensity matches directed firm s risk aversion parameter. This can be best understood by examining closely the meanings of φ and α. As structured in the model, both represent the level of risk tolerance α indicates the directed firm s risk aversion, and φ does the attacker s. As such, when φ < α, S* increases with φ, because the directed firm is more averse to the security risk and more willing to invest against it. However, when the attacker is highly aware of and averse to (the risk of being caught or simply defended against by) the security measures taken up the directed firm, the directed firm may not need to invest as much. Therefore, when φ > α, S* tend to decline with increasing φ. Combining these two arguments, we can see that S* reaches a maximum when φ = α. CONCLUSION In this paper, we present scenarios of information security: directed attack threats, risk-aversion firm, and attacker s propensity to security measures. Each enhances our understanding of a firm s information security investment under different circumstances. When a firm tries to defend against directed or directed attacks, the relative size of potential losses is an important factor in determining the level of optimal investment, and the total investment may drop when the system vulnerability is high. A risk-averse firm would always invest more than the information security risk but never more than the expected loss. And lastly, a firm should study its and the potential attacker s levels of aversion to risks in order to determine the most optimal level information security investments. This research, like all studies, has its limitations. All parameters adopted in the mathematical models are assumed to be well behaved, that is, continuous and twice differentiable. Likewise, certain boundary conditions, such as extremely large expected loss, are excluded to preserve the integrity of the models. Additionally, the assumptions we adopt in the mathematical models are unavoidably a simplified representation of reality. This study points to a few future research directions. First, a natural extension of the current research would be to verify its results with real data. It would also be useful to relax some of the limitations posed by the mathematically modeling. Further, this paper establishes a path of research for future studies to follow and examine other possible scenarios of information security faced by organizations. It would also be interesting if one can combine all or several of such scenarios. Finally, future research can couple the mathematical modeling technique with other methodologies, such as qualitative case study or action research, to extend the usefulness and applicability of optimal information security investment. Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th 009 8

10 REFERENCES 1. Albert, R., Jeong, H, and Barabási, A.-L. Diameter of the world-wide web. Nature, 401 (1999), Barabási, A.-L., and Albert, R. Emergence of scaling in random networks. Science, 86 (1999), Chang, D.B., and Young, C.S. Infection dynamics on the Internet. Computers & Security, 4 (005), Cremonini, D., and Nizovtsev, M. Understanding and influencing attackers' decisions: implications for security investment strategies. The Fifth Workshop on the Economics of Information Security (WEIS06), Cambridge, England, June 6-8, 006, online at 5. Faloutsos, M., Faloutsos, P., and Faloutsos, C. On power-law relationships of the Internet topology. ACM SIGCOMM Computer Communication Review, 9, 4 (1999), Gordon, L.A., and Loeb, M.P. (00a) The Economics of Information Security Investment, ACM Transactions on Information and Systems Security, 5(4), Gordon, L.A., and Loeb, M.P. (00b) Return on Information Security Investments: Myths vs. realities, Strategic Finance, 84(5), Gordon, L.A., Loeb, M. P., Lucyshyn, W., and Richardson, R. (005) Tenth Annual CSI/FBI Computer Crime and Security Survey. Computer Security Institute. 9. Huang, C.D., Hu, Q., and Behara, R.S. (008) Economics of Information Security Investment in the Case of Simultaneous Attacks, International Journal of Production Economics, 114 (), Jonsson, E. and Olovsson, T. (1997) A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior, IEEE Transactions on Software Engineering, 3(4), Kumar, R., Raghavan, P., Rajagopalan, S., Sivakumar, D., Tomkins, A., and Upfal, E. The web as a graph. Proceedings of the Nineteenth ACM Symposium on Principles of Database Systems, Dallas, Texas, May 15-17, 000, Liu, P., Zang, W. and Yu, M. (005) Incentive-Based Modeling and Inference of Attacker Intent, Objectives, and Strategies, ACM Transactions on Information and System Security, 8(1), Leeson P.T. and Coyne, C.J. (006) The Economics of Computer Hacking, Journal of Law, Economics and Policy, forthcoming. 14. Mercuri, R. T. (003) Analyzing Security Costs, Communications of the ACM, 46(6), Pastor-Satorras, R., and Vespignani, A. Epidemic spreading in scale-free networks. Physical Review Letters, 86, 14 (001), Schechter, S.E. Toward econometric models of the security risk from remote attacks. IEEE Security & Privacy, 3, 1 (005), Watts, D.J., and Strogatz, S.H. Collective dynamics of small-world networks. Nature, 393 (1998), Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6 th -9 th 009 9

Power-Law Networks in the Stock Market: Stability and Dynamics

Power-Law Networks in the Stock Market: Stability and Dynamics Power-Law Networks in the Stock Market: Stability and Dynamics VLADIMIR BOGINSKI, SERGIY BUTENKO, PANOS M. PARDALOS Department of Industrial and Systems Engineering University of Florida 303 Weil Hall,

More information

Chapter 5 Fiscal Policy and Economic Growth

Chapter 5 Fiscal Policy and Economic Growth George Alogoskoufis, Dynamic Macroeconomic Theory, 2015 Chapter 5 Fiscal Policy and Economic Growth In this chapter we introduce the government into the exogenous growth models we have analyzed so far.

More information

Standard Risk Aversion and Efficient Risk Sharing

Standard Risk Aversion and Efficient Risk Sharing MPRA Munich Personal RePEc Archive Standard Risk Aversion and Efficient Risk Sharing Richard M. H. Suen University of Leicester 29 March 2018 Online at https://mpra.ub.uni-muenchen.de/86499/ MPRA Paper

More information

Characterization of the Optimum

Characterization of the Optimum ECO 317 Economics of Uncertainty Fall Term 2009 Notes for lectures 5. Portfolio Allocation with One Riskless, One Risky Asset Characterization of the Optimum Consider a risk-averse, expected-utility-maximizing

More information

Eco504 Spring 2010 C. Sims FINAL EXAM. β t 1 2 φτ2 t subject to (1)

Eco504 Spring 2010 C. Sims FINAL EXAM. β t 1 2 φτ2 t subject to (1) Eco54 Spring 21 C. Sims FINAL EXAM There are three questions that will be equally weighted in grading. Since you may find some questions take longer to answer than others, and partial credit will be given

More information

Information Security Risk Assessment by Using Bayesian Learning Technique

Information Security Risk Assessment by Using Bayesian Learning Technique Information Security Risk Assessment by Using Bayesian Learning Technique Farhad Foroughi* Abstract The organisations need an information security risk management to evaluate asset's values and related

More information

Optimizing Modular Expansions in an Industrial Setting Using Real Options

Optimizing Modular Expansions in an Industrial Setting Using Real Options Optimizing Modular Expansions in an Industrial Setting Using Real Options Abstract Matt Davison Yuri Lawryshyn Biyun Zhang The optimization of a modular expansion strategy, while extremely relevant in

More information

Investment in Information Security Measures: A Behavioral Investigation

Investment in Information Security Measures: A Behavioral Investigation Association for Information Systems AIS Electronic Library (AISeL) WISP 2015 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-13-2015 Investment in Information Security

More information

CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION

CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION Szabolcs Sebestyén szabolcs.sebestyen@iscte.pt Master in Finance INVESTMENTS Sebestyén (ISCTE-IUL) Choice Theory Investments 1 / 65 Outline 1 An Introduction

More information

Multistage risk-averse asset allocation with transaction costs

Multistage risk-averse asset allocation with transaction costs Multistage risk-averse asset allocation with transaction costs 1 Introduction Václav Kozmík 1 Abstract. This paper deals with asset allocation problems formulated as multistage stochastic programming models.

More information

An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking

An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking Mika Sumida School of Operations Research and Information Engineering, Cornell University, Ithaca, New York

More information

Part A: Answer Question A1 (required) and Question A2 or A3 (choice).

Part A: Answer Question A1 (required) and Question A2 or A3 (choice). Ph.D. Core Exam -- Macroeconomics 10 January 2018 -- 8:00 am to 3:00 pm Part A: Answer Question A1 (required) and Question A2 or A3 (choice). A1 (required): Cutting Taxes Under the 2017 US Tax Cut and

More information

Mossin s Theorem for Upper-Limit Insurance Policies

Mossin s Theorem for Upper-Limit Insurance Policies Mossin s Theorem for Upper-Limit Insurance Policies Harris Schlesinger Department of Finance, University of Alabama, USA Center of Finance & Econometrics, University of Konstanz, Germany E-mail: hschlesi@cba.ua.edu

More information

Evaluating the Macroeconomic Effects of a Temporary Investment Tax Credit by Paul Gomme

Evaluating the Macroeconomic Effects of a Temporary Investment Tax Credit by Paul Gomme p d papers POLICY DISCUSSION PAPERS Evaluating the Macroeconomic Effects of a Temporary Investment Tax Credit by Paul Gomme POLICY DISCUSSION PAPER NUMBER 30 JANUARY 2002 Evaluating the Macroeconomic Effects

More information

A lower bound on seller revenue in single buyer monopoly auctions

A lower bound on seller revenue in single buyer monopoly auctions A lower bound on seller revenue in single buyer monopoly auctions Omer Tamuz October 7, 213 Abstract We consider a monopoly seller who optimally auctions a single object to a single potential buyer, with

More information

A Note on Ramsey, Harrod-Domar, Solow, and a Closed Form

A Note on Ramsey, Harrod-Domar, Solow, and a Closed Form A Note on Ramsey, Harrod-Domar, Solow, and a Closed Form Saddle Path Halvor Mehlum Abstract Following up a 50 year old suggestion due to Solow, I show that by including a Ramsey consumer in the Harrod-Domar

More information

Pricing Dynamic Solvency Insurance and Investment Fund Protection

Pricing Dynamic Solvency Insurance and Investment Fund Protection Pricing Dynamic Solvency Insurance and Investment Fund Protection Hans U. Gerber and Gérard Pafumi Switzerland Abstract In the first part of the paper the surplus of a company is modelled by a Wiener process.

More information

Sample Size for Assessing Agreement between Two Methods of Measurement by Bland Altman Method

Sample Size for Assessing Agreement between Two Methods of Measurement by Bland Altman Method Meng-Jie Lu 1 / Wei-Hua Zhong 1 / Yu-Xiu Liu 1 / Hua-Zhang Miao 1 / Yong-Chang Li 1 / Mu-Huo Ji 2 Sample Size for Assessing Agreement between Two Methods of Measurement by Bland Altman Method Abstract:

More information

Lastrapes Fall y t = ỹ + a 1 (p t p t ) y t = d 0 + d 1 (m t p t ).

Lastrapes Fall y t = ỹ + a 1 (p t p t ) y t = d 0 + d 1 (m t p t ). ECON 8040 Final exam Lastrapes Fall 2007 Answer all eight questions on this exam. 1. Write out a static model of the macroeconomy that is capable of predicting that money is non-neutral. Your model should

More information

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models IEOR E4707: Foundations of Financial Engineering c 206 by Martin Haugh Martingale Pricing Theory in Discrete-Time and Discrete-Space Models These notes develop the theory of martingale pricing in a discrete-time,

More information

Effective Cost Allocation for Deterrence of Terrorists

Effective Cost Allocation for Deterrence of Terrorists Effective Cost Allocation for Deterrence of Terrorists Eugene Lee Quan Susan Martonosi, Advisor Francis Su, Reader May, 007 Department of Mathematics Copyright 007 Eugene Lee Quan. The author grants Harvey

More information

Crowdfunding, Cascades and Informed Investors

Crowdfunding, Cascades and Informed Investors DISCUSSION PAPER SERIES IZA DP No. 7994 Crowdfunding, Cascades and Informed Investors Simon C. Parker February 2014 Forschungsinstitut zur Zukunft der Arbeit Institute for the Study of Labor Crowdfunding,

More information

Information Processing and Limited Liability

Information Processing and Limited Liability Information Processing and Limited Liability Bartosz Maćkowiak European Central Bank and CEPR Mirko Wiederholt Northwestern University January 2012 Abstract Decision-makers often face limited liability

More information

Security Metrics, Security Investment Models and Intro to R. Outline. Motivation. Security cost and benefits. Notes. Notes. Notes. Notes.

Security Metrics, Security Investment Models and Intro to R. Outline. Motivation. Security cost and benefits. Notes. Notes. Notes. Notes. Security Metrics, Security Investment Models and Intro to R Tyler Moore CSE 7338 Computer Science & Engineering Department, SMU, Dallas, TX Lecture 2 Outline 1 Managing security investment 2 3 R 4 5 6

More information

16 MAKING SIMPLE DECISIONS

16 MAKING SIMPLE DECISIONS 247 16 MAKING SIMPLE DECISIONS Let us associate each state S with a numeric utility U(S), which expresses the desirability of the state A nondeterministic action A will have possible outcome states Result

More information

Chapter 9 Dynamic Models of Investment

Chapter 9 Dynamic Models of Investment George Alogoskoufis, Dynamic Macroeconomic Theory, 2015 Chapter 9 Dynamic Models of Investment In this chapter we present the main neoclassical model of investment, under convex adjustment costs. This

More information

Lecture 7: Optimal management of renewable resources

Lecture 7: Optimal management of renewable resources Lecture 7: Optimal management of renewable resources Florian K. Diekert (f.k.diekert@ibv.uio.no) Overview This lecture note gives a short introduction to the optimal management of renewable resource economics.

More information

Expansion of Network Integrations: Two Scenarios, Trade Patterns, and Welfare

Expansion of Network Integrations: Two Scenarios, Trade Patterns, and Welfare Journal of Economic Integration 20(4), December 2005; 631-643 Expansion of Network Integrations: Two Scenarios, Trade Patterns, and Welfare Noritsugu Nakanishi Kobe University Toru Kikuchi Kobe University

More information

Revenue Management Under the Markov Chain Choice Model

Revenue Management Under the Markov Chain Choice Model Revenue Management Under the Markov Chain Choice Model Jacob B. Feldman School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jbf232@cornell.edu Huseyin

More information

Implementation of a Perfectly Secure Distributed Computing System

Implementation of a Perfectly Secure Distributed Computing System Implementation of a Perfectly Secure Distributed Computing System Rishi Kacker and Matt Pauker Stanford University {rkacker,mpauker}@cs.stanford.edu Abstract. The increased interest in financially-driven

More information

Macro Consumption Problems 33-43

Macro Consumption Problems 33-43 Macro Consumption Problems 33-43 3rd October 6 Problem 33 This is a very simple example of questions involving what is referred to as "non-convex budget sets". In other words, there is some non-standard

More information

Financial Giffen Goods: Examples and Counterexamples

Financial Giffen Goods: Examples and Counterexamples Financial Giffen Goods: Examples and Counterexamples RolfPoulsen and Kourosh Marjani Rasmussen Abstract In the basic Markowitz and Merton models, a stock s weight in efficient portfolios goes up if its

More information

1 The Solow Growth Model

1 The Solow Growth Model 1 The Solow Growth Model The Solow growth model is constructed around 3 building blocks: 1. The aggregate production function: = ( ()) which it is assumed to satisfy a series of technical conditions: (a)

More information

Government Debt, the Real Interest Rate, Growth and External Balance in a Small Open Economy

Government Debt, the Real Interest Rate, Growth and External Balance in a Small Open Economy Government Debt, the Real Interest Rate, Growth and External Balance in a Small Open Economy George Alogoskoufis* Athens University of Economics and Business September 2012 Abstract This paper examines

More information

1 Asset Pricing: Bonds vs Stocks

1 Asset Pricing: Bonds vs Stocks Asset Pricing: Bonds vs Stocks The historical data on financial asset returns show that one dollar invested in the Dow- Jones yields 6 times more than one dollar invested in U.S. Treasury bonds. The return

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter Microeconomics of Consumer Theory The two broad categories of decision-makers in an economy are consumers and firms. Each individual in each of these groups makes its decisions in order to achieve

More information

14.05: SECTION HANDOUT #4 CONSUMPTION (AND SAVINGS) Fall 2005

14.05: SECTION HANDOUT #4 CONSUMPTION (AND SAVINGS) Fall 2005 14.05: SECION HANDOU #4 CONSUMPION (AND SAVINGS) A: JOSE ESSADA Fall 2005 1. Motivation In our study of economic growth we assumed that consumers saved a fixed (and exogenous) fraction of their income.

More information

The Effect of Trading Volume on PIN's Anomaly around Information Disclosure

The Effect of Trading Volume on PIN's Anomaly around Information Disclosure 2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore The Effect of Trading Volume on PIN's Anomaly around Information Disclosure

More information

Feedback Effect and Capital Structure

Feedback Effect and Capital Structure Feedback Effect and Capital Structure Minh Vo Metropolitan State University Abstract This paper develops a model of financing with informational feedback effect that jointly determines a firm s capital

More information

Notes II: Consumption-Saving Decisions, Ricardian Equivalence, and Fiscal Policy. Julio Garín Intermediate Macroeconomics Fall 2018

Notes II: Consumption-Saving Decisions, Ricardian Equivalence, and Fiscal Policy. Julio Garín Intermediate Macroeconomics Fall 2018 Notes II: Consumption-Saving Decisions, Ricardian Equivalence, and Fiscal Policy Julio Garín Intermediate Macroeconomics Fall 2018 Introduction Intermediate Macroeconomics Consumption/Saving, Ricardian

More information

DEPARTMENT OF ECONOMICS Fall 2013 D. Romer

DEPARTMENT OF ECONOMICS Fall 2013 D. Romer UNIVERSITY OF CALIFORNIA Economics 202A DEPARTMENT OF ECONOMICS Fall 203 D. Romer FORCES LIMITING THE EXTENT TO WHICH SOPHISTICATED INVESTORS ARE WILLING TO MAKE TRADES THAT MOVE ASSET PRICES BACK TOWARD

More information

Auditing in the Presence of Outside Sources of Information

Auditing in the Presence of Outside Sources of Information Journal of Accounting Research Vol. 39 No. 3 December 2001 Printed in U.S.A. Auditing in the Presence of Outside Sources of Information MARK BAGNOLI, MARK PENNO, AND SUSAN G. WATTS Received 29 December

More information

Chapter 3 The Representative Household Model

Chapter 3 The Representative Household Model George Alogoskoufis, Dynamic Macroeconomics, 2016 Chapter 3 The Representative Household Model The representative household model is a dynamic general equilibrium model, based on the assumption that the

More information

For students electing Macro (8702/Prof. Smith) & Macro (8701/Prof. Roe) option

For students electing Macro (8702/Prof. Smith) & Macro (8701/Prof. Roe) option WRITTEN PRELIMINARY Ph.D EXAMINATION Department of Applied Economics June. - 2011 Trade, Development and Growth For students electing Macro (8702/Prof. Smith) & Macro (8701/Prof. Roe) option Instructions

More information

1 Dynamic programming

1 Dynamic programming 1 Dynamic programming A country has just discovered a natural resource which yields an income per period R measured in terms of traded goods. The cost of exploitation is negligible. The government wants

More information

Problem 1 / 20 Problem 2 / 30 Problem 3 / 25 Problem 4 / 25

Problem 1 / 20 Problem 2 / 30 Problem 3 / 25 Problem 4 / 25 Department of Applied Economics Johns Hopkins University Economics 60 Macroeconomic Theory and Policy Midterm Exam Suggested Solutions Professor Sanjay Chugh Fall 00 NAME: The Exam has a total of four

More information

Dynamic Macroeconomics: Problem Set 2

Dynamic Macroeconomics: Problem Set 2 Dynamic Macroeconomics: Problem Set 2 Universität Siegen Dynamic Macroeconomics 1 / 26 1 Two period model - Problem 1 2 Two period model with borrowing constraint - Problem 2 Dynamic Macroeconomics 2 /

More information

Growth with Time Zone Differences

Growth with Time Zone Differences MPRA Munich Personal RePEc Archive Growth with Time Zone Differences Toru Kikuchi and Sugata Marjit February 010 Online at http://mpra.ub.uni-muenchen.de/0748/ MPRA Paper No. 0748, posted 17. February

More information

BACKGROUND RISK IN THE PRINCIPAL-AGENT MODEL. James A. Ligon * University of Alabama. and. Paul D. Thistle University of Nevada Las Vegas

BACKGROUND RISK IN THE PRINCIPAL-AGENT MODEL. James A. Ligon * University of Alabama. and. Paul D. Thistle University of Nevada Las Vegas mhbr\brpam.v10d 7-17-07 BACKGROUND RISK IN THE PRINCIPAL-AGENT MODEL James A. Ligon * University of Alabama and Paul D. Thistle University of Nevada Las Vegas Thistle s research was supported by a grant

More information

Axioma Research Paper No January, Multi-Portfolio Optimization and Fairness in Allocation of Trades

Axioma Research Paper No January, Multi-Portfolio Optimization and Fairness in Allocation of Trades Axioma Research Paper No. 013 January, 2009 Multi-Portfolio Optimization and Fairness in Allocation of Trades When trades from separately managed accounts are pooled for execution, the realized market-impact

More information

Lecture 3 Growth Model with Endogenous Savings: Ramsey-Cass-Koopmans Model

Lecture 3 Growth Model with Endogenous Savings: Ramsey-Cass-Koopmans Model Lecture 3 Growth Model with Endogenous Savings: Ramsey-Cass-Koopmans Model Rahul Giri Contact Address: Centro de Investigacion Economica, Instituto Tecnologico Autonomo de Mexico (ITAM). E-mail: rahul.giri@itam.mx

More information

The Theory of the Firm

The Theory of the Firm The Theory of the Firm I. Introduction: A Schematic Comparison of the Neoclassical Approaches to the Studies Between the Theories of the Consumer and the Firm A. The Theory of Consumer Choice: Consumer

More information

Corporate Finance, Module 21: Option Valuation. Practice Problems. (The attached PDF file has better formatting.) Updated: July 7, 2005

Corporate Finance, Module 21: Option Valuation. Practice Problems. (The attached PDF file has better formatting.) Updated: July 7, 2005 Corporate Finance, Module 21: Option Valuation Practice Problems (The attached PDF file has better formatting.) Updated: July 7, 2005 {This posting has more information than is needed for the corporate

More information

DRAFT. 1 exercise in state (S, t), π(s, t) = 0 do not exercise in state (S, t) Review of the Risk Neutral Stock Dynamics

DRAFT. 1 exercise in state (S, t), π(s, t) = 0 do not exercise in state (S, t) Review of the Risk Neutral Stock Dynamics Chapter 12 American Put Option Recall that the American option has strike K and maturity T and gives the holder the right to exercise at any time in [0, T ]. The American option is not straightforward

More information

ON INTEREST RATE POLICY AND EQUILIBRIUM STABILITY UNDER INCREASING RETURNS: A NOTE

ON INTEREST RATE POLICY AND EQUILIBRIUM STABILITY UNDER INCREASING RETURNS: A NOTE Macroeconomic Dynamics, (9), 55 55. Printed in the United States of America. doi:.7/s6559895 ON INTEREST RATE POLICY AND EQUILIBRIUM STABILITY UNDER INCREASING RETURNS: A NOTE KEVIN X.D. HUANG Vanderbilt

More information

Maturity, Indebtedness and Default Risk 1

Maturity, Indebtedness and Default Risk 1 Maturity, Indebtedness and Default Risk 1 Satyajit Chatterjee Burcu Eyigungor Federal Reserve Bank of Philadelphia February 15, 2008 1 Corresponding Author: Satyajit Chatterjee, Research Dept., 10 Independence

More information

Partial privatization as a source of trade gains

Partial privatization as a source of trade gains Partial privatization as a source of trade gains Kenji Fujiwara School of Economics, Kwansei Gakuin University April 12, 2008 Abstract A model of mixed oligopoly is constructed in which a Home public firm

More information

Mandatory Social Security Regime, C Retirement Behavior of Quasi-Hyperb

Mandatory Social Security Regime, C Retirement Behavior of Quasi-Hyperb Title Mandatory Social Security Regime, C Retirement Behavior of Quasi-Hyperb Author(s) Zhang, Lin Citation 大阪大学経済学. 63(2) P.119-P.131 Issue 2013-09 Date Text Version publisher URL http://doi.org/10.18910/57127

More information

The Fuzzy-Bayes Decision Rule

The Fuzzy-Bayes Decision Rule Academic Web Journal of Business Management Volume 1 issue 1 pp 001-006 December, 2016 2016 Accepted 18 th November, 2016 Research paper The Fuzzy-Bayes Decision Rule Houju Hori Jr. and Yukio Matsumoto

More information

A Note about the Black-Scholes Option Pricing Model under Time-Varying Conditions Yi-rong YING and Meng-meng BAI

A Note about the Black-Scholes Option Pricing Model under Time-Varying Conditions Yi-rong YING and Meng-meng BAI 2017 2nd International Conference on Advances in Management Engineering and Information Technology (AMEIT 2017) ISBN: 978-1-60595-457-8 A Note about the Black-Scholes Option Pricing Model under Time-Varying

More information

Online Appendix for Missing Growth from Creative Destruction

Online Appendix for Missing Growth from Creative Destruction Online Appendix for Missing Growth from Creative Destruction Philippe Aghion Antonin Bergeaud Timo Boppart Peter J Klenow Huiyu Li January 17, 2017 A1 Heterogeneous elasticities and varying markups In

More information

Section 9, Chapter 2 Moral Hazard and Insurance

Section 9, Chapter 2 Moral Hazard and Insurance September 24 additional problems due Tuesday, Sept. 29: p. 194: 1, 2, 3 0.0.12 Section 9, Chapter 2 Moral Hazard and Insurance Section 9.1 is a lengthy and fact-filled discussion of issues of information

More information

Projects to Avoid Catastrophes

Projects to Avoid Catastrophes Projects to Avoid Catastrophes Robert S. Pindyck April 10, 2013 Abstract How should we evaluate public policies or projects that are intended to reduce the likelihood or potential impact of a catastrophic

More information

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program August 2017

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program August 2017 Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program August 2017 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

Getting Started with CGE Modeling

Getting Started with CGE Modeling Getting Started with CGE Modeling Lecture Notes for Economics 8433 Thomas F. Rutherford University of Colorado January 24, 2000 1 A Quick Introduction to CGE Modeling When a students begins to learn general

More information

Equity, Vacancy, and Time to Sale in Real Estate.

Equity, Vacancy, and Time to Sale in Real Estate. Title: Author: Address: E-Mail: Equity, Vacancy, and Time to Sale in Real Estate. Thomas W. Zuehlke Department of Economics Florida State University Tallahassee, Florida 32306 U.S.A. tzuehlke@mailer.fsu.edu

More information

Iteration. The Cake Eating Problem. Discount Factors

Iteration. The Cake Eating Problem. Discount Factors 18 Value Function Iteration Lab Objective: Many questions have optimal answers that change over time. Sequential decision making problems are among this classification. In this lab you we learn how to

More information

Economics 325 Intermediate Macroeconomic Analysis Problem Set 1 Suggested Solutions Professor Sanjay Chugh Spring 2009

Economics 325 Intermediate Macroeconomic Analysis Problem Set 1 Suggested Solutions Professor Sanjay Chugh Spring 2009 Department of Economics University of Maryland Economics 325 Intermediate Macroeconomic Analysis Problem Set Suggested Solutions Professor Sanjay Chugh Spring 2009 Instructions: Written (typed is strongly

More information

The Zero Lower Bound

The Zero Lower Bound The Zero Lower Bound Eric Sims University of Notre Dame Spring 4 Introduction In the standard New Keynesian model, monetary policy is often described by an interest rate rule (e.g. a Taylor rule) that

More information

3.4 Copula approach for modeling default dependency. Two aspects of modeling the default times of several obligors

3.4 Copula approach for modeling default dependency. Two aspects of modeling the default times of several obligors 3.4 Copula approach for modeling default dependency Two aspects of modeling the default times of several obligors 1. Default dynamics of a single obligor. 2. Model the dependence structure of defaults

More information

SDP Macroeconomics Final exam, 2014 Professor Ricardo Reis

SDP Macroeconomics Final exam, 2014 Professor Ricardo Reis SDP Macroeconomics Final exam, 2014 Professor Ricardo Reis Answer each question in three or four sentences and perhaps one equation or graph. Remember that the explanation determines the grade. 1. Question

More information

16 MAKING SIMPLE DECISIONS

16 MAKING SIMPLE DECISIONS 253 16 MAKING SIMPLE DECISIONS Let us associate each state S with a numeric utility U(S), which expresses the desirability of the state A nondeterministic action a will have possible outcome states Result(a)

More information

A comparison of optimal and dynamic control strategies for continuous-time pension plan models

A comparison of optimal and dynamic control strategies for continuous-time pension plan models A comparison of optimal and dynamic control strategies for continuous-time pension plan models Andrew J.G. Cairns Department of Actuarial Mathematics and Statistics, Heriot-Watt University, Riccarton,

More information

13.1 Quantitative vs. Qualitative Analysis

13.1 Quantitative vs. Qualitative Analysis 436 The Security Risk Assessment Handbook risk assessment approach taken. For example, the document review methodology, physical security walk-throughs, or specific checklists are not typically described

More information

Online Appendix: Extensions

Online Appendix: Extensions B Online Appendix: Extensions In this online appendix we demonstrate that many important variations of the exact cost-basis LUL framework remain tractable. In particular, dual problem instances corresponding

More information

Working Paper October Book Review of

Working Paper October Book Review of Working Paper 04-06 October 2004 Book Review of Credit Risk: Pricing, Measurement, and Management by Darrell Duffie and Kenneth J. Singleton 2003, Princeton University Press, 396 pages Reviewer: Georges

More information

Part 1: q Theory and Irreversible Investment

Part 1: q Theory and Irreversible Investment Part 1: q Theory and Irreversible Investment Goal: Endogenize firm characteristics and risk. Value/growth Size Leverage New issues,... This lecture: q theory of investment Irreversible investment and real

More information

Adapting to rates versus amounts of climate change: A case of adaptation to sea level rise Supplementary Information

Adapting to rates versus amounts of climate change: A case of adaptation to sea level rise Supplementary Information Adapting to rates versus amounts of climate change: A case of adaptation to sea level rise Supplementary Information Soheil Shayegh, Juan Moreno-Cruz, Ken Caldeira We formulate a dynamic model to solve

More information

Chapter 3 Dynamic Consumption-Savings Framework

Chapter 3 Dynamic Consumption-Savings Framework Chapter 3 Dynamic Consumption-Savings Framework We just studied the consumption-leisure model as a one-shot model in which individuals had no regard for the future: they simply worked to earn income, all

More information

FIGURE A1.1. Differences for First Mover Cutoffs (Round one to two) as a Function of Beliefs on Others Cutoffs. Second Mover Round 1 Cutoff.

FIGURE A1.1. Differences for First Mover Cutoffs (Round one to two) as a Function of Beliefs on Others Cutoffs. Second Mover Round 1 Cutoff. APPENDIX A. SUPPLEMENTARY TABLES AND FIGURES A.1. Invariance to quantitative beliefs. Figure A1.1 shows the effect of the cutoffs in round one for the second and third mover on the best-response cutoffs

More information

Valuing Early Stage Investments with Market Related Timing Risk

Valuing Early Stage Investments with Market Related Timing Risk Valuing Early Stage Investments with Market Related Timing Risk Matt Davison and Yuri Lawryshyn February 12, 216 Abstract In this work, we build on a previous real options approach that utilizes managerial

More information

General Examination in Macroeconomic Theory. Fall 2010

General Examination in Macroeconomic Theory. Fall 2010 HARVARD UNIVERSITY DEPARTMENT OF ECONOMICS General Examination in Macroeconomic Theory Fall 2010 ----------------------------------------------------------------------------------------------------------------

More information

Comments on Michael Woodford, Globalization and Monetary Control

Comments on Michael Woodford, Globalization and Monetary Control David Romer University of California, Berkeley June 2007 Revised, August 2007 Comments on Michael Woodford, Globalization and Monetary Control General Comments This is an excellent paper. The issue it

More information

Appendix A: Introduction to Queueing Theory

Appendix A: Introduction to Queueing Theory Appendix A: Introduction to Queueing Theory Queueing theory is an advanced mathematical modeling technique that can estimate waiting times. Imagine customers who wait in a checkout line at a grocery store.

More information

A PRODUCER OPTIMUM. Lecture 7 Producer Behavior

A PRODUCER OPTIMUM. Lecture 7 Producer Behavior Lecture 7 Producer Behavior A PRODUCER OPTIMUM The Digital Economist A producer optimum represents a solution to a problem facing all business firms -- maximizing the profits from the production and sales

More information

Revenue Equivalence and Income Taxation

Revenue Equivalence and Income Taxation Journal of Economics and Finance Volume 24 Number 1 Spring 2000 Pages 56-63 Revenue Equivalence and Income Taxation Veronika Grimm and Ulrich Schmidt* Abstract This paper considers the classical independent

More information

Part A: Answer Question A1 (required) and Question A2 or A3 (choice).

Part A: Answer Question A1 (required) and Question A2 or A3 (choice). Ph.D. Core Exam -- Macroeconomics 13 August 2018 -- 8:00 am to 3:00 pm Part A: Answer Question A1 (required) and Question A2 or A3 (choice). A1 (required): Short-Run Stabilization Policy and Economic Shocks

More information

Chapter 6: Supply and Demand with Income in the Form of Endowments

Chapter 6: Supply and Demand with Income in the Form of Endowments Chapter 6: Supply and Demand with Income in the Form of Endowments 6.1: Introduction This chapter and the next contain almost identical analyses concerning the supply and demand implied by different kinds

More information

Monopoly Power with a Short Selling Constraint

Monopoly Power with a Short Selling Constraint Monopoly Power with a Short Selling Constraint Robert Baumann College of the Holy Cross Bryan Engelhardt College of the Holy Cross September 24, 2012 David L. Fuller Concordia University Abstract We show

More information

Strategic Trading of Informed Trader with Monopoly on Shortand Long-Lived Information

Strategic Trading of Informed Trader with Monopoly on Shortand Long-Lived Information ANNALS OF ECONOMICS AND FINANCE 10-, 351 365 (009) Strategic Trading of Informed Trader with Monopoly on Shortand Long-Lived Information Chanwoo Noh Department of Mathematics, Pohang University of Science

More information

Modelling Anti-Terrorist Surveillance Systems from a Queueing Perspective

Modelling Anti-Terrorist Surveillance Systems from a Queueing Perspective Systems from a Queueing Perspective September 7, 2012 Problem A surveillance resource must observe several areas, searching for potential adversaries. Problem A surveillance resource must observe several

More information

Properties of IRR Equation with Regard to Ambiguity of Calculating of Rate of Return and a Maximum Number of Solutions

Properties of IRR Equation with Regard to Ambiguity of Calculating of Rate of Return and a Maximum Number of Solutions Properties of IRR Equation with Regard to Ambiguity of Calculating of Rate of Return and a Maximum Number of Solutions IRR equation is widely used in financial mathematics for different purposes, such

More information

Introducing nominal rigidities. A static model.

Introducing nominal rigidities. A static model. Introducing nominal rigidities. A static model. Olivier Blanchard May 25 14.452. Spring 25. Topic 7. 1 Why introduce nominal rigidities, and what do they imply? An informal walk-through. In the model we

More information

Analysing the IS-MP-PC Model

Analysing the IS-MP-PC Model University College Dublin, Advanced Macroeconomics Notes, 2015 (Karl Whelan) Page 1 Analysing the IS-MP-PC Model In the previous set of notes, we introduced the IS-MP-PC model. We will move on now to examining

More information

Discussion. Benoît Carmichael

Discussion. Benoît Carmichael Discussion Benoît Carmichael The two studies presented in the first session of the conference take quite different approaches to the question of price indexes. On the one hand, Coulombe s study develops

More information

Fiscal Policy and Economic Growth

Fiscal Policy and Economic Growth Chapter 5 Fiscal Policy and Economic Growth In this chapter we introduce the government into the exogenous growth models we have analyzed so far. We first introduce and discuss the intertemporal budget

More information

Reply to the Second Referee Thank you very much for your constructive and thorough evaluation of my note, and for your time and attention.

Reply to the Second Referee Thank you very much for your constructive and thorough evaluation of my note, and for your time and attention. Reply to the Second Referee Thank you very much for your constructive and thorough evaluation of my note, and for your time and attention. I appreciate that you checked the algebra and, apart from the

More information

Savings, Investment and the Real Interest Rate in an Endogenous Growth Model

Savings, Investment and the Real Interest Rate in an Endogenous Growth Model Savings, Investment and the Real Interest Rate in an Endogenous Growth Model George Alogoskoufis* Athens University of Economics and Business October 2012 Abstract This paper compares the predictions of

More information

Insurance versus Investigation Driven Approach for the Computation of Optimal Security Investment

Insurance versus Investigation Driven Approach for the Computation of Optimal Security Investment Association for Information Systems AIS Electronic Library (AISeL) PACIS 2015 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2015 Insurance versus Investigation Driven Approach for

More information

Homework 2: Dynamic Moral Hazard

Homework 2: Dynamic Moral Hazard Homework 2: Dynamic Moral Hazard Question 0 (Normal learning model) Suppose that z t = θ + ɛ t, where θ N(m 0, 1/h 0 ) and ɛ t N(0, 1/h ɛ ) are IID. Show that θ z 1 N ( hɛ z 1 h 0 + h ɛ + h 0m 0 h 0 +

More information