Firms often disclose information security risk factors in public filings such as 10-K reports. The internal information associated with disclosures may be positive or negative. In this paper, we ...evaluate how the nature of the disclosed security risk factors, believed to represent the firm's internal information regarding information security, is associated with future breach announcements reported in the media. For this purpose, we build a decision tree model, which classifies the occurrence of future security breaches based on the textual contents of the disclosed security risk factors. The model is able to accurately associate disclosure characteristics with breach announcements about 77% of the time. We further explore the contents of the security risk factors using text-mining techniques to provide a richer interpretation of the results. The results show that the disclosed security risk factors with risk-mitigation themes are less likely to be related to future breach announcements. We also investigate how the market interprets the nature of information security risk factors in annual reports. We find that the market reaction following the security breach announcement is different depending on the nature of the preceding disclosure. Thus, our paper contributes to the literature in information security and sheds light on how market participants can better interpret security risk factors disclosed in financial reports at the time when financial reports are released.
Building upon the ideas introduced in their previous book, Derivatives in Financial Markets with Stochastic Volatility, the authors study the pricing and hedging of financial derivatives under ...stochastic volatility in equity, interest-rate, and credit markets. They present and analyze multiscale stochastic volatility models and asymptotic approximations. These can be used in equity markets, for instance, to link the prices of path-dependent exotic instruments to market implied volatilities. The methods are also used for interest rate and credit derivatives. Other applications considered include variance-reduction techniques, portfolio optimization, forward-looking estimation of CAPM 'beta', and the Heston model and generalizations of it. 'Off-the-shelf' formulas and calibration tools are provided to ease the transition for practitioners who adopt this new method. The attention to detail and explicit presentation make this also an excellent text for a graduate course in financial and applied mathematics.
Codes of finance Lepinay, Vincent Antonin
2011., 20110808, 2011, 2011-08-08, 20110101, 2011-08
eBook, Book
The financial industry's invention of complex products such as credit default swaps and other derivatives has been widely blamed for triggering the global financial crisis of 2008. Codes of Finance ...takes readers behind the scenes of the equity derivatives business at one of the world's leading investment banks before the crisis, providing a detailed firsthand account of the creation, marketing, selling, accounting, and management of these financial instruments--and of how they ultimately created havoc inside and outside the bank.
Ascertaining which enforcement mechanisms work to protect investors has been both a focus of recent work in academic finance and an issue for policy-making at international development agencies. ...According to recent academic work, private enforcement of investor protection via both disclosure and private liability rules goes hand in hand with financial market development, but public enforcement fails to correlate with financial development and, hence, is unlikely to facilitate it. Our results confirm the disclosure result but reverse the results on both liability standards and public enforcement. We use securities regulators’ resources to proxy for regulatory intensity of the securities regulator. When we do, financial depth regularly, significantly, and robustly correlates with stronger public enforcement. In horse races between these resource-based measures of public enforcement intensity and the most common measures of private enforcement, public enforcement is overall as important as disclosure in explaining financial market outcomes around the world and more important than private liability rules. Hence, policymakers who reject public enforcement as useful for financial market development are ignoring the best currently available evidence.
Given that information technology (IT) security has emerged as an important issue in the last few years, the subject of security information sharing among firms, as a tool to minimize security ...breaches, has gained the interest of practitioners and academics. To promote the disclosure and sharing of cyber security information among firms, the U.S. federal government has encouraged the establishment of many industry-based Information Sharing and Analysis Centers (ISACs) under Presidential Decision Directive (PDD) 63. Sharing security vulnerabilities and technological solutions related to methods for preventing, detecting, and correcting security breaches is the fundamental goal of the ISACs. However, there are a number of interesting economic issues that will affect the achievement of this goal. Using game theory, we develop an analytical framework to investigate the competitive implications of sharing security information and investments in security technologies. We find that security technology investments and security information sharing act as "strategic complements" in equilibrium. Our results suggest that information sharing is more valuable when product substitutability is higher, implying that such sharing alliances yield greater benefits in more competitive industries. We also highlight that the benefits from such information-sharing alliances increase with the size of the firm. We compare the levels of information sharing and technology investments obtained when firms behave independently (Bertrand-Nash) to those selected by an ISAC, which maximizes social welfare or joint industry profits. Our results help us predict the consequences of establishing organizations such as ISACs, Computer Emergency Response Team (CERT), or InfraGard by the federal government.
This book considers some of the fundamental issues concerning the legal framework that has been established to support a single EU securities market. It focuses particularly on how the emerging legal ...framework will affect issuers' access to the primary and secondary market. The Financial Services Action Plan (FSAP, 1999) was an attempt to equip the community better to meet the challenges of monetary union and to capitalise on the potential benefits of a single market in financial services. It led to extensive change in securities market regulation: new laws; new law making processes, and more attention to the mechanisms for the supervision of securities market activity and legal enforcement. With the FSAP nearing completion, it is a good time to take stock of what has been achieved, and to identify the challenges that lie ahead.
The last several decades have witnessed a shift away from a fully rational paradigm of financial markets toward one in which investor behavior is influenced by psychological biases. Two principal ...factors have contributed to this evolution: a body of evidence showing how psychological bias affects the behavior of economic actors; and an accumulation of evidence that is hard to reconcile with fully rational models of security market trading volumes and returns. In particular, asset markets exhibit trading volumes that are high, with individuals and asset managers trading aggressively, even when such trading results in high risk and low net returns. Moreover, asset prices display patterns of predictability that are difficult to reconcile with rational expectations-based theories of price formation. In this paper, we discuss the role of overconfidence as an explanation for these patterns.