Showing 1 - 10 of 26
Trust and trust management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. The recent spate of national and global high-impact cyber security compromises threats, vulnerabilities and exposures leads to fundamental questioning of trust as...
Persistent link: https://www.econbiz.de/10014120820
This is the first research report with specific technical focus on cryptographic ‘proof of work' in the context of virtual crypto-currencies such as Bitcoin. Situated somewhere along the trajectory between real money and quantum money, virtual crypto-currencies based upon ‘cryptographic...
Persistent link: https://www.econbiz.de/10012963816
By adopting and integrating the 3 levels of specific frameworks discussed herein, a financial institution can develop, maintain, improve, and sustain its enterprise risk management and compliance frameworks. The proposed risk management framework identifies 3 levels for bridging the gaps in...
Persistent link: https://www.econbiz.de/10012969074
This presentation advances upon recent world leading Cybersecurity-CyberFinance Computational Risk Analytics Research selected for 30 SSRN Top-10 Research Ranking Awards and invited for presentation at the 2015 Princeton Quantitative Trading Conference. The primary focus of the presentation is...
Persistent link: https://www.econbiz.de/10012969088
To avert the impending global Cyber-Finance Insurance Crisis based upon large-scale commercial reliance upon quantitative models with inherent model risks, tail risks, and systemic risks in current form, this post-doctoral thesis makes the following key contributions: Develops the first known...
Persistent link: https://www.econbiz.de/10012972233
[Update: Within four weeks of the original publication of this research report, Risk Magazine reported in its 28th February 2012 issue story titled 'Goodbye VaR? Basel to Consider Other Risk Metrics': "A review of trading book capital rules, due to be launched in March by the Basel Committee on...
Persistent link: https://www.econbiz.de/10013024329
According to computer scientists at Columbia University, “A vulnerability inside all current Cisco IP phones allows hackers to take complete control of the devices… It's relatively easy to penetrate any corporate phone system, any government phone system…” reported IEEE Spectrum article....
Persistent link: https://www.econbiz.de/10013029601
Markov chain Monte Carlo (MCMC) methods have an important role in solving high dimensionality stochastic problems characterized by computational complexity. Given their critical importance, there is need for network and security risk management research to relate the MCMC quantitative...
Persistent link: https://www.econbiz.de/10013029835
In aftermath of the Financial Crisis, some risk management practitioners advocate wider adoption of Bayesian inference to replace Value-at-Risk (VaR) models for minimizing risk failures (Borison & Hamm, 2010). They claim reliance of Bayesian inference on subjective judgment, the key limitation...
Persistent link: https://www.econbiz.de/10013031477
Socio-Technological and Behavioral Analyses of Why Knowledge Management Systems Fail and How to Pre-Empt and Prevent Such Failures for Enhancing Individual and Organizational Performance Outcomes: Information Technology, Information, and Knowledge: Effective Use, Misuse, and Abuse
Persistent link: https://www.econbiz.de/10012891887