Understanding Optimal Investment in Cyber Terrorism

2011 ◽  
Vol 1 (2) ◽  
pp. 18-34
Author(s):  
Tridib Bandyopadhyay

In this work, the author develops and explains a set of economic models under the decision theoretic framework to conceptualize the requisite levels of investment in the defense against cyber terrorism. This paper begins with a naïve model of cyber defense, on which the author progressively implements aspects of layered defense and domain conditionality to investigate practicable investment levels for countering cyber terrorism related risks. The proposed model characterizes the minimum budget below which a defending nation cannot feasibly contemplate to deploy more than one layer of defense against cyber terrorism. Beyond budgetary considerations, the paper also calculates the relative technological capabilities that the defending nation must possess to deploy a detection regime behind the first layer of protection regime. Finally, the author calculates and presents the optimal bifurcation of budget between the prevention and detection regimes should the defending nation possesses adequate funds to deploy layered defense in cyber terrorism.

Author(s):  
Cosmena Mahapatra

Recent attacks on Indian Bank customers have exposed the vulnerability of banking networks in India and the ignorance that prevails in the system. Unlike their foreign counterparts Indian banking networks are not aware of solutions easily available in market to counter cyber theft and cyber terrorism. SIEM or Security Information and Event Management is one such solution which could have easily negated these attacks. This chapter focuses on studying various cyber security mechanisms including SIEM for implementation of cyber defense effectively.


2020 ◽  
Vol 2 (2) ◽  
pp. 172-178
Author(s):  
Hussein Y. AbuMansour ◽  
Fahad S. Almekhlafi

The number of twitter users in Arab countries at a rapid pace of growth. As for the social networking platforms, they are a suitable environment for luring innocent users and commit different forms of crimes against them by cyber predators through claiming something they are not such as fake ID, age or gender targeting certain segments of the society. This have resulted in a huge number of cybercrimes including Phishing, harassment, cyber terrorism and many other forms.  In this context, a number of different research efforts in the literature are available for English but very rare for Arabic texts. This article proposes an intelligent technique for enhancing text preprocessing that impacting the accuracy and performance of the classification task. The proposed model was evaluated against recently collected dataset from Arabic twitter users using different classifiers including naïve bays and neural networks to predict age attribute.


Mathematics ◽  
2021 ◽  
Vol 9 (9) ◽  
pp. 1058
Author(s):  
Antoine Tonnoir ◽  
Ioana Ciotir ◽  
Adrian-Liviu Scutariu ◽  
Octavian Dospinescu

The Covid-19 pandemic has generated major changes in society, most of them having a negative impact on the quality of life and income obtained by the population and businesses. The negative consequences have been highlighted in the decrease of the GPD level for regions, countries and even continents. Returning to pre-pandemic levels is a considerable effort for both economic and political decision-makers. This article deals with the construction of a mathematical model for economic aspects in the context of variable productivity in time. Through this mathematical model, we propose to maximize revenues in pandemic conditions, in order to limit the economic consequences of the lockdown. One advantage of the proposed model consists in the fact that it is based on units that can be regions, economic branches, economic units or fields of investment. Another strength of the model is determined by the fact that it offers the possibility to choose between two different investment strategies, based on the specific options of the decision makers: the consistent increase of the state revenues or the amelioration of the disparity phenomenon. Furthermore, our model extends previous approaches from the literature by adding some generalization options and the proposed model can be applied in lockdown cases and seasonal situations.


2018 ◽  
pp. 1146-1150
Author(s):  
Cosmena Mahapatra

Recent attacks on Indian Bank customers have exposed the vulnerability of banking networks in India and the ignorance that prevails in the system. Unlike their foreign counterparts Indian banking networks are not aware of solutions easily available in market to counter cyber theft and cyber terrorism. SIEM or Security Information and Event Management is one such solution which could have easily negated these attacks. This chapter focuses on studying various cyber security mechanisms including SIEM for implementation of cyber defense effectively.


2014 ◽  
Vol 521 ◽  
pp. 782-785
Author(s):  
Yi Sun ◽  
Hai Feng Huang ◽  
Jie Han

China government will introduce the Renewable Portfolios Standards (RPS) to promote the wind power accommodation. As a result, investors face three sources of uncertainty, namely, investment costs, electricity prices and subsidies. This paper adopts a real options approach to analyze investment timing and capacity choice for wind power projects considering these uncertainties under RPS. Simulation results indicate that lower investment costs encourage earlier investment, and higher electricity prices and subsidies create incentives for earlier investment and larger capacity of wind power projects. Besides, the proposed model can be used by policy makers to make appropriate policies.


Author(s):  
Andreas Lichtenstern ◽  
Rudi Zagst

AbstractIn this article we consider the post-retirement phase optimization problem for a specific pension product in Germany that comes without guarantees. The continuous-time optimization problem is defined consisting of two specialties: first, we have a product-specific pension adjustment mechanism based on a certain capital coverage ratio which stipulates compulsory pension adjustments if the pension fund is underfunded or significantly overfunded. Second, due to the retiree’s fear of and aversion against pension reductions, we introduce a total wealth distribution to an investment portfolio and a buffer portfolio to lower the probability of future potential pension shortenings. The target functional in the optimization, that is to be maximized, is the client’s expected accumulated utility from the stochastic future pension cash flows. The optimization outcome is the optimal investment strategy in the proposed model. Due to the inherent complexity of the continuous-time framework, the discrete-time version of the optimization problem is considered and solved via the Bellman principle. In addition, for computational reasons, a policy function iteration algorithm is introduced to find a stationary solution to the problem in a computationally efficient and elegant fashion. A numerical case study on optimization and simulation completes the work with highlighting the benefits of the proposed model.


2022 ◽  
pp. 649-675
Author(s):  
Edison Ishikawa ◽  
Eduardo Wallier Vianna ◽  
João Mello da Silva ◽  
Jorge Henrique Cabral Fernandes ◽  
Paulo Roberto de Lira Gondim ◽  
...  

Providing cyber defense in a country is complex. It involves ensuring the security of various products and services that are part of a global supply chain. In this complex scenario, the challenge is the development of a cyber defense business ecosystem that, reaching a minimum level of maturity, guarantees the security of products and services in cyberspace. This work proposes a cyber defense business ecosystem of ecosystems (BEoE) model with two ecosystems that must be created or fostered, the human resources training ecosystem and the product and service homologation and certification ecosystem. These two cyber defense ecosystems are key to the sustainable growth of an entire chain of production and sourcing of cyber defense goods and services. The proposed model allows the Cyber Defense BEoE to evolve, so that different actors (companies and government agencies) with different levels of maturity in defense and cybersecurity may emerge. In this way, a country's Cyber Defense BEoE may be able to provide products and services at different levels of security for its defense system.


Author(s):  
Edison Ishikawa ◽  
Eduardo Wallier Vianna ◽  
João Mello da Silva ◽  
Jorge Henrique Cabral Fernandes ◽  
Paulo Roberto de Lira Gondim ◽  
...  

Providing cyber defense in a country is complex. It involves ensuring the security of various products and services that are part of a global supply chain. In this complex scenario, the challenge is the development of a cyber defense business ecosystem that, reaching a minimum level of maturity, guarantees the security of products and services in cyberspace. This work proposes a cyber defense business ecosystem of ecosystems (BEoE) model with two ecosystems that must be created or fostered, the human resources training ecosystem and the product and service homologation and certification ecosystem. These two cyber defense ecosystems are key to the sustainable growth of an entire chain of production and sourcing of cyber defense goods and services. The proposed model allows the Cyber Defense BEoE to evolve, so that different actors (companies and government agencies) with different levels of maturity in defense and cybersecurity may emerge. In this way, a country's Cyber Defense BEoE may be able to provide products and services at different levels of security for its defense system.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Ruitao Gu ◽  
Qingjuan Chen ◽  
Qiaoyun Zhang

Traditional portfolio selection models mainly obtain the optimized portfolio ratio by focusing on the prices of financial products. However, investors’ multiple preferences and risk appetites are also significant factors that should be taken into account. In consideration of these two factors simultaneously, we propose a double-hierarchy model in this paper. Specifically, the first hierarchy quantifies investors’ risk appetite based on a historical simulation method and probabilistic preference theory. This hierarchy can be utilized to describe investors’ variable risk appetites and ensure the obtained investment ratios meet investors’ immediate risk requirements. Then, using the cross-efficiency evaluation principle, the optimal investment ratios can be derived by fusing investors’ multiple preferences and risk appetites in the second hierarchy. Lastly, an illustrative example about evaluating the 10 largest capitalized stocks on the Shenzhen Stock Exchange is given to verify the feasibility and effectiveness of our newly proposed model. We make the theoretical contribution to improve the traditional portfolio selection model, especially considering investors’ subjective preferences and risk appetite. Moreover, the proposed model can be practical for assisting investors with their investment strategies in real life.


Mathematics ◽  
2019 ◽  
Vol 7 (9) ◽  
pp. 857 ◽  
Author(s):  
Helu Xiao ◽  
Tiantian Ren ◽  
Yanfei Bai ◽  
Zhongbao Zhou

Most of the existing literature on optimal investment-reinsurance only studies from the perspective of insurers and also treats the investment-reinsurance decision as a continuous process. However, in practice, the benefits of reinsurers cannot be ignored, nor can decision-makers engage in continuous trading. Under the discrete-time framework, we first propose a multi-period investment-reinsurance optimization problem considering the joint interests of the insurer and the reinsurer, among which their performance is measured by two generalized mean-variance criteria. We derive the time-consistent investment-reinsurance strategies for the proposed model by maximizing the weighted sum of the insurer’s and the reinsurer’s mean-variance objectives. We discuss the time-consistent investment-reinsurance strategies under two special premium principles. Finally, we provide some numerical simulations to show the impact of the intertemporal restrictions on the time-consistent investment-reinsurance strategies. These results indicate that the intertemporal restrictions will urge the insurer and the reinsurer to shrink the position invested in the risky asset; however, for the time-consistent reinsurance strategy, the impact of the intertemporal restrictions depends on who is the leader in the proposed model.


Sign in / Sign up

Export Citation Format

Share Document