Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage

Size: px
Start display at page:

Download "Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage"

Transcription

1 Analyzng Self-Defense Investments n Internet Securty Under Cyber-Insurance Coverage Ranjan Pal Department of Computer Scence Unv. of Southern Calforna Emal: rpal@usc.edu Leana Golubchk Department of Computer Scence Unv. of Southern Calforna Emal: leana@usc.edu Abstract Internet users such as ndvduals organzatons are subject to dfferent types of epdemc rsks such as worms, vruses, botnets. To reduce the probablty of rsk, an Internet user generally nvests n self-defense mechansms lke antvrus antspam software. However, such software does not completely elmnate rsk. Recent works have consdered the problem of resdual rsk elmnaton by proposng the dea of cyber-nsurance. In ths regard, an mportant decson for Internet users s ther amount of nvestment n self-defense mechansms when nsurance solutons are offered. In ths paper, we nvestgate the problem of self-defense nvestments n the Internet, under full partal cyber-nsurance coverage models. By the term self-defense nvestment, we mean the monetary-cum-precautonary cost that each user needs to nvest n employng rsk mtgatng self-defense mechansms, gven that t s fully or partally nsured by the Internet nsurance agences. We propose a general mathematcal framework by whch co-operatve non-co-operatve Internet users can decde whether or not to nvest n self-defense for ensurng both, ndvdual socal welfare. Our results show that (1) co-operaton amongst users results n more effcent self-defense nvestments than those n a non-cooperatve settng, under a full nsurance coverage model (2) partal nsurance coverage motvates non-cooperatve Internet users to nvest more effcently n self-defense mechansms when compared to full nsurance coverage. Keywords: cyber-nsurance, Internet rsks, self-defense nvestments, cyber-nsurance coverage, co-operatve non-cooperatve users I. INTRODUCTION The Internet has become a fundamental an ntegral part of our daly lves. Bllons of people nowadays are usng the Internet for varous types of applcatons that dem dfferent levels of securty. For example, commercal government organzatons run applcatons that requre a hgh level of securty, snce securty breaches would lead to sgnfcant fnancal damage loss of publc reputaton. On the other h, an ordnary ndvdual, for nstance, generally uses a computng devce for purposes that do not dem strct securty requrements. There are other Internet applcatons runnng as well, whch requre ntermedate levels of securty. However, all these applcatons are runnng on a network, that was bult under assumptons, some of whch are no longer vald for today s applcatons, e.g., that all users on the Internet can be trusted that the computng devces connected to the Internet are statc objects. Today, the Internet comprses of both, good malcous users. The malcous users perform llegal actvtes, are able to affect many users n a short tme perod, at the same tme reduce ther chances of beng dscovered. Presently the users protect themselves through ant-spam software, frewalls, other add-ons. However, new worms, vruses, botnets emerge rapdly, as a result these self-protecton tools are not always effectve securty solutons. They only ad an Internet user n partally reducng ts rsk. Lttle attenton has been pad to an alternatve approach to hlng rsks, specfcally that of transferrng rsk to a dfferent entty. An example of such a wdely popular technque n modern lfe s nsurance [3]. The rsks are transferred to nsurance companes, n return for a fee,.e., the nsurance premum. For nstance, the works n [5][6][1] dscuss cybernsurance, n general, but wthout much focus on Internet nsurance. In several recent papers [10][9][8][14], the authors show that (1) nsurance would ncrease securty on the Internet, (2) nvestments n both self-defense mechansms nsurance schemes are qute nter-related n mantanng a socally effcent level of securty on the Internet, (3) wthout regulaton, nsurance s not a good ncentve for self-defense. The work n [10] also gves condtons for jontly ensurng vablty of nsurance companes mprovng network securty. In a recent work [11], the authors have nvestgated rsk management usng cyber-nsurance under dfferent nformaton avalablty scenaros between the nsurer the user, wth respect to user securty levels. In a stark contrast to exstng works, they show that under all possble stuatons there s no market for cyber-nsurance on the Internet (.e., cybernsurance ncreases ndvdual user utlty but weakens user ncentves to mprove overall network securty). The authors defne the network securty level as the the probablty that Internet users are attacked. They however, do not consder the nterplay of self-defense nvestments cyber-nsurance nvestments, whch plays an mportant part n mprovng user securty levels. It s not surprsng that the probablty of users not beng attacked may not be mproved usng cybernsurance 1, but the judcous nvestments n both, self-defense cyber-nsurance can defntely mprove ndvdual user securty,.e., the probablty of attacks beng successful wll 1 The ntentons of malcous users to attack the network generally do not change, unless there are mechansms to track punsh them. Cybernsurance does not provde a mechansm to track punsh the gulty.

2 2 be lowered, leadng to a robust Internet (mprovng socal welfare). To the best of our knowledge, none of the prevous efforts n [10][9][8][14][11] consder the co-operatve the noncooperatve nature of network users the effect ths has on the overall level of securty approprate user selfdefense nvestments. We note that the case of co-operatng users s mportant for the followng reasons: (1) It nvtes an opportunty for a user to beneft from the postve externalty 2 that ts nvestment poses on the other users n the network, (2) Although, the majorty of Internet users today are non co-operatve selfsh n nature,.e., they are prmarly nterested n maxmzng ther own performance wthout carng for the overall system performance, there exst Internet applcatons co-operaton amongst users s encouraged (e.g., dstrbuted fle sharng n peer-to-peer envronments, multcastng, effcent network resource sharng). Although, n such applcatons Internet users cooperate to mprove performance, t s not evdent that the same users are ncentvzed to co-operate on ther securty parameters (e.g., self-defense nvestment) as well. Hence n ths paper, we nvestgate the problem of approprate self-defense nvestments under nsurance regulaton 3, gven that Internet users are fully or partally covered by Internet nsurance that Internet users can be both, co-operatve non-co-operatve wth respect to ther self-defense nvestment amounts. The contrbutons of our work are as follows: We quanttatvely analyze an n-agent model, usng botnet rsks as a representatve applcaton, propose a general mathematcal framework through whch co-operatve non-co-operatve Internet users can decde whether to nvest n self-defense mechansms, gven that each user s fully nsured (see Secton III). Our framework s applcable to all rsk types that nflct drect /or ndrect losses to users. Under full nsurance coverage, we perform a mathematcal comparatve study to show that co-operaton amongst Internet users results n better self-defense nvestments when the rsks faced by the users n the Internet are nterdependent (see Secton IV). We use basc concepts from both, co-operatve non-co-operatve game theory to support the clams we make n Sectons III IV. Our results are applcable to co-operatve (e.g., dstrbuted fle sharng) non-cooperatve Internet applcatons a user has the opton to be ether co-operatve or noncooperatve wth respect to securty parameters. We mathematcally prove that n stuatons cooperaton amongst network users s not feasble at all, partal nsurance coverage motvates users to nvest more n self-protecton when compared to full nsurance coverage, thereby resultng n an ncrease n overall socal 2 An externalty s a postve (external beneft) or negatve (external cost) mpact on a user not drectly nvolved n an economc transacton. 3 The term nsurance regulaton refers to the act of makng sure that nsurance contracts are enforced by concerned partes n a proper legal manner. welfare (see Secton V). We note that n practce, currently there exsts vrtually no nsurance-lke rsk management capabltes n the present Internet [12]. However, cyber-nsurance s a hot topc n Internet securty s beng consdered serously by the research communty for a potental soluton to rsk-free securty guarantees for the next generaton Internet [7]. We frmly beleve that wth the evoluton of the Internet over tme, the concept wll become real prove benefcal n the long run. II. ECONOMIC MODEL In ths secton we descrbe our proposed model. To ground the dscusson n real systems, we frst gve a bref descrpton of a representatve applcaton. That s, for purposes of clarty ease of presentaton, we frst descrbe a representatve applcaton, namely that of botnets, as ths s a reasonably rch representatve example of Internet threats. However, we would lke to note that our approach can be appled to other applcatons wth drect/ndrect rsk scenaros (for nstance, such as worms vruses). A. Representatve applcaton A bot s an end-user machne contanng code that can be controlled by a remote admnstrator (bot herder) va a comm control network. Bots are created by fndng vulnerabltes n computer systems. The vulnerabltes are exploted wth malware the malware s then nserted nto the systems. A bot herder can subsequently program the bots nstruct them to perform varous types of cyberattacks. A malware nfected computng devce s susceptble to nformaton theft from t. The nfected devce can become part of a botnet n turn can be used to scan for vulnerabltes n other computer systems connected to the Internet, thus creatng a cycle that rapdly nfects vulnerable computer systems. Hence, bots result n both drect ndrect losses. Drect losses result when the bot herder nfects machnes that lack a securty feature, as ndrect losses result due to the contagon process of one machne gettng nfected by ts neghbors. Rsks posed by bots are extremely common spread rapdly. In a recent study, Symantec corporaton observed approxmately fve mllon dstnct bot-nfected computers wthn a perod of just sx months between July, 2007 December, 2007[10]. Here, we assume that Internet users could buy nsurance from ther Internet servce provders (ISPs) to cover the rsks posed by botnets. For nstance, the coverage could be n the form of money or protecton aganst lost data. B. Model We consder n dentcal 4 ratonal rsk-averse users n a network. The users could be (1) entrely non co-operatve n nature,.e., the network supports Internet applcatons users are not ncentvzed to co-operate wth other users n 4 In general, Internet users are not dentcal. However, our am n ths paper s to study certan general nvestment trends whch we show, reman ntact even f users are heterogenous.

3 3 any capacty (e.g., web surfng) or (2) co-operatve to a varable degree,.e, the network supports Internet applcatons users co-operate wth other users n some capacty to mprove overall system performance but may or may not cooperate entrely. The users could ether voluntarly co-operate by sharng nformaton wth other network users about ther ntentons to nvest n self-defense, or be bound to co-operate due to a network regulaton whch requres partcpatng users to share self-defense nvestment nformaton. Each user has ntal wealth w 0 s exposed to a substantal rsk of sze R wth a certan probablty p 0. (Here, rsk represents the negatve wealth accumulated by a user when t s affected by botnet threats.) We also assume there exst markets for self-defense cyber-nsurance. A user nvestng n self-defense mechansms reduces ts rsk probablty. For an amount x, nvested n self-defense, a user faces a rsk probablty of p(x), whch s a contnuous twce dfferentable decreasng functon of nvestment,.e., p (x) < 0, p (x) > 0, lm x p(x) = 0, lm x p (x) = 0. The nvestment x s a functon of the amount of securty software the user buys the effort t spends on mantanng securty settngs on ts computng devce. In addton to nvestng n self-defense mechansms, a user may also buy full or partal cyber-nsurance coverage at a partcular premum to elmnate ts resdual rsk. A user does not buy nsurance for hgh probablty low rsk events because 1) these events are extremely common does not cause suffcent damage to dem nsurance solutons 2) the nsurance company also has reservatons n nsurng every knd of rsk for proft purposes. We assume that the nsurance market s perfectly compettve wth no barrers to entry ext, whch results n actuarally far premums. We also account for the fact that the system does not face the moral hazard problem,.e., a user nsulated from rsk does not behave dfferently from the way t would behave f t were fully exposed to the rsk. An Internet user apart from beng drectly affected by threats may be ndrectly nfected by the other Internet users. We denote the ndrect rsk facng probablty of a user as q( x, n), x = (x 1,..., x 1, x +1,..., x n ) s the vector of self-defense nvestments of users other than. An ndrect nfecton spread s ether perfect or mperfect n nature. In a perfect spread, nfecton spreads from a user to other users n the network wth probablty 1, as n case of mperfect spread, nfecton spreads from a user to others wth probablty less than 1. For a perfect nformaton spread q( x, n) = 1 n j=1,j (1 p(x j)), as n the case of mperfect spread, q( x, n) < 1 n j=1,j (1 p(x j)). In ths paper, we consder perfect spread only, wthout loss of generalty because the probablty of gettng nfected by others n the case of mperfect spread s less than that n the case of perfect spread, as a result ths case s subsumed by the results of the perfect spread case. Under perfect spread, the rsk probablty of a user s gven as p(x ) + (1 p(x ))q( x, n) = 1 (1 p(x j )) j=1 ts expected fnal wealth upon facng rsk s denoted as w 0 x (1 n j=1 (1 p(x j)) IC) R + IC, (1 n j=1 (1 p(x j)) IC s the far premum IC denotes the nsurance coverage. In ths paper, we use the terms fnal wealth expected fnal wealth nterchangeably. The am of a network user s to nvest n self-defense mechansms n such a manner so as to maxmze ts expected utlty of fnal wealth. III. MATHEMATICAL FRAMEWORK FOR FULL INSURANCE COVERAGE In ths secton, we assume full cyber-nsurance coverage propose a general mathematcal framework for decdng on the approprate self-defense nvestment of an Internet user. We model the followng rsk management scenaros: (1) users do not co-operate do not get nfected by other users n the network, (2) users co-operate may get nfected by other users n the network, (3) users do not co-operate but may get nfected by other users n the network, (4) users co-operate but do not get nfected by other users n the network. We note that Case 4 s a specal case of Case 2 thus s subsumed n the results of Secton III-B. A. Case 1: No Co-operaton, No Infecton Spread Under full nsurance, the rsk s equal to the nsurance coverage, users determne ther optmal amount of selfdefense nvestment by maxmzng ther level of fnal wealth, whch n turn s equvalent to maxmzng ther expected utlty of wealth [4]. We can determne the optmal amount of selfdefense nvestment for each user by solvng for the value of p that maxmzes the followng constraned optmzaton problem: or argmax x F W (x ) = w 0 x p(x )R R + IC subject to argmax x F W (x ) = w 0 x p(x )R 0 p(x ) p 0, F W s the fnal wealth of user p(x )R s the actuarally far premum for full nsurance coverage. Takng the frst second dervatves of F W wth respect to x, we obtan F W (x ) = 1 p (x )R F W (x ) = p (x )R < 0 Thus, our objectve functon s globally concave. Let be the optmal x obtaned by equatng the frst dervatve to 0. Thus, we have: p ( )R = 1. (1)

4 4 Economc Interpretaton: The left h sde (LHS) of Equaton (1) s the margnal beneft of nvestng an addtonal dollar n self-protecton mechansms, as the rght h sde (RHS) denotes the margnal cost of the nvestment. A user equates the LHS wth the RHS to determne ts self-defense nvestment. Condtons for Investment: We frst nvestgate the boundary costs. The user wll not consder nvestng n self-defense f p (0)R 1 because ts margnal cost of nvestng n any defense mechansm,.e., -1, wll be relatvely equal to or lower than the margnal beneft when no nvestment occurs. In ths case, = 0. If the user nvests such that t has no exposure to rsk, =. When p (0)R < 1, the costs do not le on the boundary,.e., 0 < <, the user nvests to partally elmnate rsk (see Equaton (1)). B. Case 2: Co-operaton, Infecton spread Under full nsurance coverage, user s expected fnal wealth s gven by F W = F W (x, x ) = w 0 x (1 (1 p(x j )))R j=1 When Internet users co-operate, they jontly determne ther optmal self-defense nvestments. We assume that co-operaton barganng costs are nl. In such a case, accordng to Coase theorem [13], the optmal nvestments for users are determned by solvng for the socally optmal nvestment values that maxmze the aggregate fnal wealth (AFW) of all users. Thus, we have the followng constraned optmzaton problem: n argmax x, x AF W = nw 0 x n(1 (1 p(x j )))R =1 0 p (x ) p 0, j=1 Takng the frst the second partal dervatves of the aggregate fnal wealth wth respect to x, we obtan (AF W ) = 1 np (x ) (1 p(x j ))R x 2 x 2 (AF W ) = np (x ) j=1,j j=1,j (1 p(x j ))R < 0 The objectve functon s globally concave, whch mples the exstence of a unque soluton ( x ), for each x. Our maxmzaton problem s symmetrc for all, thus the optmal soluton s gven by ) = xopt j j ) for all j = 2,..., n. We obtan the optmal soluton by equatng the frst dervatve to zero, whch gves us the followng equaton np ( ( x )) (1 p(x ))R = 1 (2) j=1,j Economc Interpretaton: The left h sde (LHS) of Equaton (2) s the margnal beneft of nvestng n self-defense. The rght h sde (RHS) of Equaton (2) s the margnal cost of nvestng n self-defense,.e., -1. We obtan the former term of the margnal beneft by nternalzng the postve externalty 5,.e., by accountng for the self-defense nvestments of other users n the network. The external well-beng posed to other users by user when t nvests an addtonal dollar n selfdefense s p (x ) n j=1,j (1 p(x )). Ths s the amount by whch the lkelhood of each of the other users gettng nfected s reduced, when user nvests an addtonal dollar. Condtons for Investment: If np (0) n j=1,j (1 p(x j ))R 1, t s not optmal to nvest any amount n self-defense because the margnal cost of nvestng n defense mechansms s relatvely equal to or less than the margnal beneft of the jont reducton n rsks to ndvduals when no nvestment occurs. In ths case, the optmal value s a boundary nvestment,.e., ( x ) = 0. If the user nvests such that t has no exposure to rsk, =. In cases np (0) n j=1,j (1 p(x j))r < 1, the optmal probabltes do not le on the boundary the user nvests to partally elmnate rsk (see Equaton (2)). C. Case 3: No Co-operaton, Infecton Spread We assume that users do not co-operate wth each other on the level of nvestment,.e., users are selfsh. In such a case, the optmal level of self-defense nvestment s the pure strategy Nash equlbra of the normal form game, G = (N, A, u (s)), played by the users [2]. The game conssts of two players,.e., N = n; the acton set of G s A = n =1 A, A ɛ [0, ], the utlty/payoff functon u (s) for each player s ther ndvdual fnal wealth, s ɛ n =1 A. The pure strategy Nash equlbra of a normal form game s the ntersecton of the best response functons of each user [2]. We defne the best response functon of user, ( x ), as ( x ) ɛ argmax x F W (x, x ), F W (x, x ) = w 0 x (1 (1 p(x j )))R j=1 Takng the frst second partal dervatve of F W (x, x )wth respect to x equatng t to zero, we obtan x (F W (x, x )) = 1 p (x ) 2 x 2 (F W (x, x )) = p (x ) j=1,j j=1,j (1 p(x j ))R (1 p(x j ))R < 0 Thus, our objectve functon s globally concave, whch mples a unque soluton ( x ) for each x. We also observe that a partcular user s strategy complements user j s strategy for all j, whch mples that only symmetrc pure 5 Internalzng a postve externalty refers to rewardng a user, who contrbutes postvely wthout compensaton, to the well-beng of other users, through ts actons.

5 5 strategy Nash equlbra exst. The optmal nvestment for user s determned by the followng equaton: (F W (x, x )) = x 1 p (x ) (1 p(x j ))R = 0 (3) j=1,j Economc Interpretaton: The left h sde (LHS) of Equaton (3) s the margnal beneft of nvestng n selfdefense. The rght h sde (RHS) of Equaton (3) s the margnal cost of nvestng n self-defense,.e., -1. Snce the users cannot co-operate on the level of nvestment n selfdefense mechansms, t s not possble for them to beneft from the postve externalty that ther nvestments pose to each other. Condtons for Investment: If p (0) n j=1,j (1 p(x j))r 1, t s not optmal to nvest any amount n self-defense because the margnal cost of nvestng n defense mechansms s greater than the margnal beneft of the jont reducton n rsks to ndvduals when no nvestment occurs. In ths case, the optmal value s a boundary nvestment,.e., ( x ) = 0. If the user nvests such that t has no exposure to rsk, =. In cases p (0) n j=1,j (1 p(x j))r < 1, the optmal probabltes do not le on the boundary the user nvests to partally elmnate rsk (see Equaton (3)). Multplcty of Nash Equlbra: Due to the symmetry of our pure strategy Nash equlbra the ncreasng nature of the best response functons, there always exsts an odd number of pure-strategy Nash equlbra,.e., j ( j ) for all j = 2,..., n. IV. COMPARATIVE STUDY ( ) = In ths secton, we compare the optmal level of nvestments n the context of varous cases dscussed n the prevous secton. Our results are applcable to Internet applcatons a user has the opton to be ether co-operatve (e.g., dstrbuted fle sharng applcatons) or non-cooperatve wth respect to securty parameters. A. Case 3 versus Case 1 (3) The followng lemma gves the result of comparng Case 3 Case 1. Lemma 1. If Internet users do not co-operate on ther self-defense nvestments (.e., do not account for the postve externalty posed by other Internet users), n any Nash equlbrum n Case 3, the users neffcently under-nvest n self-defense as compared to the case users do not cooperate there s no nfecton spread. Proof. In Case 1, the condton for any user not nvestng n any self-defense s p (0)R 1. The condton mples that 1 p (0) n j=1,j (1 p(x j))r < 0 for all x. The latter expresson s the condton for non-nvestment n Case 3. Thus, for all users, = 0 n Case 1 mples = 0 n Case 3,.e., ) = xbest ) = 0,. The condton for optmal nvestment of user n Case 1 s 1 p (x )R = 0. Hence, 1 p (x ) n j=1,j (1 p(x j))r < 0, for all x. Thus, n stuatons of self-nvestment for user, > 0 n Case 1 mples 0 <, for all x, n Case 3,.e., ) > xbest ) 0,. Therefore, under non-cooperatve settngs, a user always under-nvests n self-defense mechansms. B. Case 3 versus Case 2 The followng lemma gves the result of comparng Case 3 Case 2. Lemma 2. Under envronments of nfecton spread, an Internet user co-operatng wth other users on ts self-defense nvestment (.e., accounts for the postve externalty posed by other Internet users), always nvests at least as much as n the case when t does not co-operate. Proof. In Case 2, the condton for any user not nvestng n any self-defense mechansm s 1 np (0)(1 p(0)) n 1 R 0. The condton also mples that 1 np (0)(1 p(0)) n 1 R 0. The latter expresson s the condton n Case 3 for an Internet user not nvestng n any self-defense mechansm. Thus, for all users, = 0 n Case 2 mples = 0, for all Nash equlbrum n Case 3,.e., ) = xbest ) = 0,. The condton for optmal nvestment of each user n Case 2 s 1 np ( )(1 p( ))n 1 R = 0. The latter expresson mples 1 p ( )(1 p(xopt ))n 1 R < 0. Hence ) > xbest ) 0,. Therefore, under envronments of nfecton spread, a user n Case 3 always under nvests n self-defense mechansms when compared to a user n Case 2. C. Case 2 versus Case 1 The followng lemma gves the result of comparng Case 2 Case 1. Lemma 3. In any n-agent cyber-nsurance model, p(0) < 1 n 1 1 n, t s always better for Internet users to nvest more n self-defense n a co-operatve settng wth nfecton spread than n a non-co-operatve settng wth no nfecton spread. Proof. In Case 1, the condton for any user not nvestng n any self-defense s p (0)R 1. The condton mples that 1 np (0)(1 p(0)) n 1 R 0 for all p 0 < 1 n 1 1 n. Thus, for all, ) = 0 n Case 1 mples xopt ) 0 n Case 3 f only f p 0 < 1 n 1 1 n. In stuatons of non-zero nvestment 1 np (x ( x ))(1 p(x ( x )) n 1 )R > 1 p (x ( x )),, x ( x ),

6 6 f only f p(x ( x )) < 1 n 1 1 n. Hence, 1 np ( 1 p ( )(1 p(xopt ))n 1 )R > )),, ) s the optmal nvestment n Case 2. Snce the expected fnal wealth of a user n Case 1 s concave n x ( x ), ) n Case 2 s greater than xopt ) n Case 1. Thus, we nfer that nvestments made by users n Case 2 are always greater than those made by users n Case 1 when the rsk probablty s less than a threshold value that decreases wth ncrease n the number of Internet users. Hence, n the lmt as the number of users tends towards nfnty, the lemma holds for all p 0. The basc ntuton behnd the results n the above three lemmas s that nternalzng the postve effects on other Internet users leads to better approprate self-defense nvestments for users. We also emphasze that our result trends hold true n case of heterogenous network users because rrespectve of the type of users, co-operatng on nvestments always leads to users accountng for the postve externalty nvestng more effcently. The only dfference n case of heterogenous network user scenaros could be the value of probablty thresholds.e., p(0) (ths value would be dfferent for each user n the network), under whch the above lemmas hold. Based on the above three lemmas, we have the followng theorem. Theorem 1. If Internet users cannot contract on the externaltes, n any Nash equlbrum, Internet users neffcently under-nvest n self-defense, that s compared to the socally optmal level of nvestment n self-defense. In addton, n any Nash equlbrum, a user nvests less n self-defense than f they dd not face the externalty. Furthermore, f p(0) < 1 n 1 1 n, the socally optmal level of nvestment n self-defense s hgher compared to the level f Internet users dd not face the externalty. Proof. The proof follows drectly from the results n Lemmas 1, 2, 3. V. MATHEMATICAL FRAMEWORK FOR PARTIAL INSURANCE COVERAGE In the prevous secton, we proved that Internet users neffcently under-nvest n self-defense mechansms f they do not co-operate wth other users n a network. In ths secton, we show that n non-cooperatve envronments, chargng a deductble on the user nsurance amount (partal cybernsurance), results n mprovement n ndvdual socal welfare when compared to the case n Secton III-C. The ntuton behnd chargng a deductble s that each user wll bear part of ts own loss therefore s more lkely to nvest more n self-defense mechansms than f t had full cybernsurance coverage. Snce our goal s to smply show that partal cyber-nsurance n a non-cooperatve network settng mproves welfare, for ease of exposton we analyze a twouser model to arrve at our result. We denote the users as j. Our result s applcable to a network wth any number of users. A. Case A: No Co-operaton, No Infecton Spread Under partal nsurance, users determne ther optmal amount of self-defense nvestment by maxmzng ther expected utlty of fnal wealth, whch s not equvalent to maxmzng the expected fnal wealth [4]. Thus, we have to perform our analyss based on utlty functons rather than based on the expected value of fnal wealth. Let U() be an ncreasng concave utlty functon for each user n the network such that U > 0 U < 0. We can determne the optmal amount of self-defense nvestment for each user by solvng for the value of p that maxmzes the followng constraned optmzaton problem: argmax p UF W (p ) = U(w 0 x(p 0 p ) p (R D)) 0 p p 0, UF W s the utlty of fnal wealth of a user, x( p), a functon of the dfference of p 0 p, represents user s cost of reducng the rsk probablty from p 0 to p, p = p 0 p, 0 < D < R s the deductble n cyber-nsurance. We assume that x s monotoncally ncreasng twce dfferentable wth x(0) = 0, x (0) > 0, x (0) > 0, p (R D) s the actuarally far premum for user s partal nsurance coverage. Takng the frst second dervatves of UF W wth respect to p, we obtan UF W (p ) = U (A) B, A = w 0 x(p 0 p ) (R D), B = [x (p 0 p ) (R D)] UF W (p ) = U (A) B 2 + C U (A) < 0, C = [ x (p 0 p ) (R D)] Thus, our objectve functon s globally concave wth p opt beng the optmal p obtaned by equatng the frst dervatve to 0. Accordng to our hypothess, U () > 0. Thus, any user wll not consder nvestng n self-defense f x (0) R D because ts margnal cost of nvestng n any defense mechansm wll be relatvely equal or hgher than ts beneft of reducng the expected rsk. In ths case, p opt = p 0. If x (p 0 ) < R D, then = 0 because the margnal cost of completely elmnatng p opt the probablty of rsk s small relatve to the magntude of the rsk tself. In ths case, the user wll nvest such that t has absolutely no exposure to rsk. When x (0) < R D < x (p 0 ), the probabltes do not le on the boundary,.e., 0 < p opt < p 0, the user nvests to partally elmnate rsk. It s evdent that wth D > 0 the condton for nvestment n self-defense mechansms s more relaxed than that n Secton III-A. Thus, a user havng partal nsurance coverage s more motvated

7 7 to nvest n self-defense mechansms under non-cooperatve scenaros. The followng lemma states our result. Lemma 4. In a 2-user network, the users are not ncentvzed to co-operate, a postve deductble on the nsurance coverage always motvates the users to nvest more n self-defense mechansms as compared to a full nsurance coverage scenaro. Proof. The proof follows drectly from the reasonng n the prevous paragraph. B. Case B: No Co-operaton, Infecton Spread As mentoned earler, enforcng a deductble n partal nsurance coverage scenaros may lead to better self-defense nvestments on part of Internet users n turn contrbute to socal ndvdual welfare. In ths secton, we derve condtons for optmally chargng a strctly postve deductble, show that welfare s ndeed mproved when compared to a non-cooperatve scenaro wth full nsurance coverage. Smlarly to Secton III-C, under partal nsurance coverage, user s expected utlty of fnal wealth s determned as UF W = UF W (p, p j, D) = α + β, α = (1 p )(1 p j )U(w 0 x( p ) P (D)) β = (p + (1 p )p j )U(w 0 x(p 0 p ) P (D) D) We defne P (D) as the actuarally far premum, t s expressed as P (D) = (p + (1 p )(R D) We denote the best response of user under a deductble as the soluton to the followng constraned optmzaton problem: p bestd (p j, D) ɛ argmax p UF W (p, p j ) 0 p, p j 1 Then, the followng lemma states the condtons for strctly postve deductbles. Lemma 5. For a 2-user network, gven that x (p 0 p best ) > R, the optmally enforced deductble s strctly postve f only f, for each user : () (1 p best ) 2 R > (1 (1 p best )) 2 x (p 0 p best ), () p best 1 < 1 2, pbest s the rsk probablty n a Nash equlbrum, under full nsurance coverage. Proof. Let p bestd (D) denote the symmetrc pure strategy Nash equlbrum of the optmzaton problem defned n ths secton,.e., p bestd (D) = p bestd (p best j (D), D) = p bestd j (p best (D), D). The Nash equlbrum satsfes the frst order condton gven by E1 + E2 + E3 = 0, (4) E1 = (1 p bestd (D)) (α1 β1), E2 = K1 α2, E3 = K2 α3, α1 = U(w 0 x(p 0 p bestd (D)) P (D) D), β1 = U(w 0 x(p 0 p bestd (D)) P (D)), K1 = (1 p bestd (D)) 2 K11, K11 = (x (p 0 p bestd (D)) (1 p bestd (D))(R D)), α2 = U (w 0 x(p 0 p bestd (D)) P (D)), K2 = p bestd (D)(2 p bestd (D)) K11, α3 = U (w 0 x(p 0 p bestd (D)) P (D) D), Substtutng D = 0, n the frst order condton, we obtan x (p 0 p bestd (0)) (1 p bestd (0))R = 0 For a partcular D, the expected utlty of fnal wealth for user s UF W (p bestd (D), p bestd (D), D) = I + J, I = (1 p bestd (D)) 2 ζ J = 2 p bestd (D))p bestd (D) η ζ = U(w 0 x(p 0 p bestd (D)) P (D)) η = U(w 0 x(p 0 p bestd (D)) P (D) D) Takng the frst dervatve of the expected utlty wth respect to D substtutng D = 0, we obtan UF W (p bestd (D), p bestd (D), D) = G UT, G = p bestd (0)(1 p bestd (0))R UT = U (w 0 x(p 0 p bestd (0)) P (0)) We determne the sgn of the frst dervatve of the expected utlty by mplctly dfferentatng the frst order condton wth respect to D evaluatng t to 0. We obtan the followng relaton p bestd (0)(R x (p 0 p bestd (0))) = 0 From the above relaton, we observe that p bestd (0) = 0 f only f (R x (p 0 p bestd (0))) 0. We also note that when D = 0, the Nash equlbra of the noncooperatve game concdes wth those when full nsurance

8 8 coverage s offered. We now prove that n a 2-user noncooperatve network wth nfecton spread, under full nsurance coverage, x (p 0 p best (0)) > R s a condton satsfed under all Nash equlbra. We defne the best response functon of user, p best (p j ), as p best (p j ) ɛ argmax p F W (p, p j ) = w 0 x( p ) P R ()R P R () = p +(1 p )p j. Takng the frst dervatve wth respect to p equatng t to zero, we obtan x (p 0 p best (p j )) (1 p j )R = 0 Dfferentatng agan wth respect to p j, we obtan Therefore, p best (p j ) x (p 0 p best (p j )) + R = 0 R p best (p j ) = x (p 0 p best (p j )) > 0 Snce 0 < p best (p j ) < 1, x (p 0 p best (0)) > R, for all symmetrc pure Nash equlbra. Thus, UF W (p bestd (D), p bestd (D), D) = 0 We now determne the sgn of the second dervatve of expected utlty of fnal wealth evaluated at D = 0. The second dervatve evaluated at D = 0 gves 2 UF W (p bestd (D), p bestd (D), D) = E + F, (5) E = p bestd (0)(1 p bestd (0))RU (w 0 x(p 0 p bestd (0)) P (0)) F = (1 p bestd (0)) 2 p bestd (0)(2 p bestd (0)) UT, UT = U (w 0 x(p 0 p bestd (0)) P (0)) Double dfferentatng the frst order condton, n Equaton (4), mplctly wth respect to D, substtutng D = 0 we get the value of p bestd (0) as M equals p bestd (0) = M Z, (6) (1 p bestd (0))(1 2(1 p bestd (0)) 2 ) UT Z = (R x (p 0 p bestd (0))) UT It s evdent from Equaton (6) that a value of p bestd (0) < ensures p bestd (0) < 0. Hence, for such a value of p bestd (0), small deductble amounts ncrease the selfdefense nvestment of Internet users n turn contrbutes to an mprovement n both, socal ndvdual welfare when compared to the case of non-cooperaton wth full nsurance coverage. Substtutng Equaton (6) nto Equaton (5), we obtan 2 UF W (p bestd (D), p bestd (D), D) = γ δ γ = 1 (1 p bestd (0)) 2 (1 2(1 pbestd (0)) 2 )R (R x (p 0 p bestd (0))) ) δ = (1 p bestd (0)) 2 U (w 0 x(p 0 p bestd (0)) P (0)) A strctly postve deductble s postve f only f 2 UF W (p bestd (D), p bestd (D), D) that occurs f only f (1 p bestd ) 2 R > (1 (1 p bestd > 0 )) 2 x (p 0 p bestd ). The basc ntuton behnd our results s that addtonal nvestments n self-defense create an external beneft through the postve externalty that exsts between the Internet users. Our stated theorems specfy the condtons under whch ths beneft outweghs the cost of users bearng part of the rsk. Our results are scalable when n users are present n the network. It can be conjectured that n the lmt when n, postve deductbles result for all Nash equlbra p bestd. More generally, we also conjecture that n a network wth n users, postve deductbles result for p bestd < 1 n 1 n. Based on Lemmas 4 5, we state the followng theorem summarzng our results. Theorem 2. In a 2-user network, postve deductbles always motvate non-cooperatve users to nvest more n self-defense nvestments when compared to full coverage scenaros, thereby help n ncreasng ndvdual socal welfare when there s no nfecton spread; they do so n cases of nfecton spread f only f p bestd 1 < 1 2. Proof: The proof follows drectly from the results n Lemmas 4 5. VI. CONCLUSIONS AND FUTURE DIRECTIONS In ths paper, we nvestgated the problem of self-defense nvestments n the Internet, under the full nsurance partal nsurance coverage models. We showed that (1) cooperaton amongst users results n more effcent self-defense nvestments than those n a non-cooperatve settng, under a full nsurance coverage model (2) partal nsurance motvates non-cooperatve Internet users to nvest effcently n self-defense mechansms. Cyber-nsurance s a relatvely new area of research, wth many open questons n both, theoretcal systems drectons. For nstance, one could consder the presence of

9 9 nformatonal asymmetry between the nsurer the nsured. The problem s more on the nsurer sde as the nsured have the freedom to hde nformaton from the nsurer. Ths mght lead to poor unproftable busness models on behalf of the cyber-nsurance company. One could also consder usng ntermedary organzatons between the nsurer the nsured to make sure that there are mnmal or no nformatonal asymmetres between the nsurer the nsured, whch would result n a transparent envronment wthn whch Internet users could make correct approprate nvestments. There are also nterestng drectons to pursue n the context of dstrbuted systems. For nstance, we note that n cooperatve scenaros, dstrbuted applcatons could consder addng nformaton, to already exstng protocol messages, ndcatng whether or not a partcular user/node (partcpatng n the applcaton) has nvested n cyber-nsurance. For example, we could magne a peer-to-peer fle downloadng applcaton, users jonng the peer-to-peer overlay could nclude (n ther jon messages) nformaton about the protecton n whch they have nvested; of course, such nformaton could also be pggybacked on update messages whch are typcal of dstrbuted applcatons. Moreover, we could magne modfyng peer-to-peer protocols to nclude a bas towards exchangng data wth nodes that do nvest n protecton - e.g., nodes could be (a) more based towards beng neghbors (n the overlay) of nodes that do nvest n protecton /or (b) more based towards exchangng data wth nodes that nvest n protecton. It would also be nterestng to consder whether addng nformaton about the level of nvestment s useful n such applcatons what are the possble effects, on the applcatons, of provdng such nformaton as well as the degree of user truthfulness needed n such nformaton n order to produce postve effects. In ths regard, we could look at truth bndng mechansm desgn models n games. Lastly, t would also be nterestng to explore how our model could be appled (or adapted) n the context of moble wreless networks. Although presently our model does not consder user moblty, t may stll provde nterestng nsghts as we do not make assumptons that prevent ts applcablty n such a doman. [5] J.Kesan, R.Majuca, W.Yurck. The economc case for cybernsurance: In Securng Prvacy n the Internet Age. Stanford Unversty Press, [6] J.Kesan, R.Majuca, W.Yurck. Cybernsurance as a market-based soluton to the problem of cybersecurty: A case study. In WEIS, [7] J.Walr. Personal Communcaton. [8] M.Lelarge J.Bolot. Cyber nsurance as an ncentve for nternet securty. In WEIS, [9] M.Lelarge J.Bolot. A new perspectve on nternet securty usng nsurance. In IEEE INFOCOM, [10] M.Lelarge J.Bolot. Economc ncentves to ncrease securty n the nternet: The case for nsurance. In IEEE INFOCOM, [11] N.Shetty, G.Schwarz, M.Feleghyaz, J.Walr. Compettve cybernsurance nternet securty. In WEIS, [12] R.Anderson, R.Boehme, R.Clayton, T.Moore. Securty economcs european polcy. In WEIS, [13] R.H.Coase. The problem of socal cost. Journal of Law Economcs, 3, [14] S.Radosavac, J.Kempf, U.C.Kozat. Usng nsurance to ncrease nternet securty. In ACM NetEcon, VII. ACKNOWLEDGEMENTS We would lke to sncerely thank Professor Konstantnos Psouns for hs nsghtful comments. We would also lke to thank the anonymous revewers for ther feedback, used n mprovng the paper. Ths work was supported n part by the USC Provost Fellowshp, the IBM Faculty Award, the NSF grants. REFERENCES [1] B.Schneer. Its the economcs, stupd. In WEIS, [2] D.Fudenberg J.Trole. Game Theory. MIT Press, [3] H.Kunreuther G.Heal. Interdependent securty. Journal of Rsk Uncertanty, 26, [4] I.Ehrlck G.S. Becker. Market nsurance, self-nsurance, selfprotecton. Journal of Poltcal Economy, 80(4), 1972.

Internet can be trusted and that there are no malicious elements propagating in the Internet. On the contrary, the

Internet can be trusted and that there are no malicious elements propagating in the Internet. On the contrary, the Prcng and Investments n Internet Securty 1 A Cyber-Insurance Perspectve Ranjan Pal, Student Member, IEEE, Leana Golubchk, Member, IEEE, arxv:submt/0209632 [cs.cr] 8 Mar 2011 Abstract Internet users such

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Cyber-Insurance for Cyber-Security A Solution to the Information Asymmetry Problem

Cyber-Insurance for Cyber-Security A Solution to the Information Asymmetry Problem Cyber-Insurance for Cyber-Securty A Soluton to the Informaton Asymmetry Problem Ranjan Pal Unversty of Southern Calforna Emal: rpal@usc.edu Abstract Internet users such as ndvduals and organzatons are

More information

Economic Models for Cloud Service Markets

Economic Models for Cloud Service Markets Economc Models for Cloud Servce Markets Ranjan Pal and Pan Hu 2 Unversty of Southern Calforna, USA, rpal@usc.edu 2 Deutsch Telekom Laboratores, Berln, Germany, pan.hu@telekom.de Abstract. Cloud computng

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

HowHow to Choose a Good Stock Broker For 2010

HowHow to Choose a Good Stock Broker For 2010 On A Way to Improve Cyber-Insurer Profts When a Securty Vendor Becomes the Cyber-Insurer Ranan Pal Unversty of Southern Calforna Emal: rpal@uscedu Leana Golubchk Konstantnos Psouns Unversty of Southern

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Chapter 11 Practice Problems Answers

Chapter 11 Practice Problems Answers Chapter 11 Practce Problems Answers 1. Would you be more wllng to lend to a frend f she put all of her lfe savngs nto her busness than you would f she had not done so? Why? Ths problem s ntended to make

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Economic Models for Cloud Service Markets Pricing and Capacity Planning

Economic Models for Cloud Service Markets Pricing and Capacity Planning Economc Models for Cloud Servce Markets Prcng and Capacty Plannng Ranjan Pal 1 and Pan Hu 2 1 Unversty of Southern Calforna, USA, rpal@usc.edu 2 Deutsch Telekom Laboratores, Berln, Germany, pan.hu@telekom.de

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

1. Math 210 Finite Mathematics

1. Math 210 Finite Mathematics 1. ath 210 Fnte athematcs Chapter 5.2 and 5.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Ths artcle appeared n a ournal publshed by Elsever. The attached copy s furnshed to the author for nternal non-commercal research educaton use, ncludng for nstructon at the authors nsttuton sharng wth

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143 1. ath 210 Fnte athematcs Chapter 5.2 and 4.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Abteilung für Stadt- und Regionalentwicklung Department of Urban and Regional Development

Abteilung für Stadt- und Regionalentwicklung Department of Urban and Regional Development Abtelung für Stadt- und Regonalentwcklung Department of Urban and Regonal Development Gunther Maer, Alexander Kaufmann The Development of Computer Networks Frst Results from a Mcroeconomc Model SRE-Dscusson

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

17 Capital tax competition

17 Capital tax competition 17 Captal tax competton 17.1 Introducton Governments would lke to tax a varety of transactons that ncreasngly appear to be moble across jursdctonal boundares. Ths creates one obvous problem: tax base flght.

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

How Bad are Selfish Investments in Network Security?

How Bad are Selfish Investments in Network Security? 1 How Bad are Selfsh Investments n Networ Securty? Lbn Jang, Venat Anantharam and Jean Walrand EECS Department, Unversty of Calforna, Bereley {ljang,ananth,wlr}@eecs.bereley.edu Abstract Internet securty

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120 Kel Insttute for World Economcs Duesternbrooker Weg 45 Kel (Germany) Kel Workng Paper No. Path Dependences n enture Captal Markets by Andrea Schertler July The responsblty for the contents of the workng

More information

Optimality in an Adverse Selection Insurance Economy. with Private Trading. November 2014

Optimality in an Adverse Selection Insurance Economy. with Private Trading. November 2014 Optmalty n an Adverse Selecton Insurance Economy wth Prvate Tradng November 2014 Pamela Labade 1 Abstract Prvate tradng n an adverse selecton nsurance economy creates a pecunary externalty through the

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

Uncrystallised funds pension lump sum payment instruction

Uncrystallised funds pension lump sum payment instruction For customers Uncrystallsed funds penson lump sum payment nstructon Don t complete ths form f your wrapper s derved from a penson credt receved followng a dvorce where your ex spouse or cvl partner had

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

Cautiousness and Measuring An Investor s Tendency to Buy Options

Cautiousness and Measuring An Investor s Tendency to Buy Options Cautousness and Measurng An Investor s Tendency to Buy Optons James Huang October 18, 2005 Abstract As s well known, Arrow-Pratt measure of rsk averson explans a ratonal nvestor s behavor n stock markets

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Quasi-Hyperbolic Discounting and Social Security Systems

Quasi-Hyperbolic Discounting and Social Security Systems Quas-Hyperbolc Dscountng and Socal Securty Systems Mordecha E. Schwarz a and Eytan Sheshnsk b May 22, 26 Abstract Hyperbolc countng has become a common assumpton for modelng bounded ratonalty wth respect

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

Optmal Revocatons n Ephemeral Networks

Optmal Revocatons n Ephemeral Networks Optmal Revocatons n Ephemeral Networks: A Game-Theoretc Framework Igor Blogrevc, Mohammad Hossen Manshae, Maxm Raya and Jean-Perre Hubaux Laboratory for computer Communcatons and Applcatons (LCA1), EPFL,

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

Evolution of Internet Infrastructure in the 21 st century: The Role of Private Interconnection Agreements

Evolution of Internet Infrastructure in the 21 st century: The Role of Private Interconnection Agreements Evoluton of Internet Infrastructure n the 21 st century: The Role of Prvate Interconnecton Agreements Rajv Dewan*, Marshall Fremer, and Pavan Gundepud {dewan, fremer, gundepudpa}@ssb.rochester.edu Smon

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

Optimality in an Adverse Selection Insurance Economy. with Private Trading. April 2015

Optimality in an Adverse Selection Insurance Economy. with Private Trading. April 2015 Optmalty n an Adverse Selecton Insurance Economy wth Prvate Tradng Aprl 2015 Pamela Labade 1 Abstract An externalty s created n an adverse selecton nsurance economy because of the nteracton between prvate

More information

How To Compare Frm To An Isac

How To Compare Frm To An Isac Informaton Systems Research Vol. 16, No. 2, June 2005, pp. 186 208 ssn 1047-7047 essn 1526-5536 05 1602 0186 nforms do 10.1287/sre.1050.0053 2005 INFORMS The Economc Incentves for Sharng Securty Informaton

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR 8S CHAPTER 8 EXAMPLES EXAMPLE 8.4A THE INVESTMENT NEEDED TO REACH A PARTICULAR FUTURE VALUE What amount must you nvest now at 4% compoune monthly

More information

Pricing Model of Cloud Computing Service with Partial Multihoming

Pricing Model of Cloud Computing Service with Partial Multihoming Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:ru528369@mal.dhu.edu.cn Abstract

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Criminal Justice System on Crime *

Criminal Justice System on Crime * On the Impact of the NSW Crmnal Justce System on Crme * Dr Vasls Sarafds, Dscplne of Operatons Management and Econometrcs Unversty of Sydney * Ths presentaton s based on jont work wth Rchard Kelaher 1

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Problem Set 3. a) We are asked how people will react, if the interest rate i on bonds is negative.

Problem Set 3. a) We are asked how people will react, if the interest rate i on bonds is negative. Queston roblem Set 3 a) We are asked how people wll react, f the nterest rate on bonds s negatve. When

More information

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers Prce Competton n an Olgopoly Market wth Multple IaaS Cloud Provders Yuan Feng, Baochun L, Bo L Department of Computng, Hong Kong Polytechnc Unversty Department of Electrcal and Computer Engneerng, Unversty

More information

Buy-side Analysts, Sell-side Analysts and Private Information Production Activities

Buy-side Analysts, Sell-side Analysts and Private Information Production Activities Buy-sde Analysts, Sell-sde Analysts and Prvate Informaton Producton Actvtes Glad Lvne London Busness School Regent s Park London NW1 4SA Unted Kngdom Telephone: +44 (0)0 76 5050 Fax: +44 (0)0 774 7875

More information

Combinatorial Agency of Threshold Functions

Combinatorial Agency of Threshold Functions Combnatoral Agency of Threshold Functons Shal Jan Computer Scence Department Yale Unversty New Haven, CT 06520 shal.jan@yale.edu Davd C. Parkes School of Engneerng and Appled Scences Harvard Unversty Cambrdge,

More information

Addendum to: Importing Skill-Biased Technology

Addendum to: Importing Skill-Biased Technology Addendum to: Importng Skll-Based Technology Arel Bursten UCLA and NBER Javer Cravno UCLA August 202 Jonathan Vogel Columba and NBER Abstract Ths Addendum derves the results dscussed n secton 3.3 of our

More information

Loss analysis of a life insurance company applying discrete-time risk-minimizing hedging strategies

Loss analysis of a life insurance company applying discrete-time risk-minimizing hedging strategies Insurance: Mathematcs and Economcs 42 2008 1035 1049 www.elsever.com/locate/me Loss analyss of a lfe nsurance company applyng dscrete-tme rsk-mnmzng hedgng strateges An Chen Netspar, he Netherlands Department

More information

The Stock Market Game and the Kelly-Nash Equilibrium

The Stock Market Game and the Kelly-Nash Equilibrium The Stock Market Game and the Kelly-Nash Equlbrum Carlos Alós-Ferrer, Ana B. Ana Department of Economcs, Unversty of Venna. Hohenstaufengasse 9, A-1010 Venna, Austra. July 2003 Abstract We formulate the

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Adverse selection in the annuity market when payoffs vary over the time of retirement

Adverse selection in the annuity market when payoffs vary over the time of retirement Adverse selecton n the annuty market when payoffs vary over the tme of retrement by JOANN K. BRUNNER AND SUSANNE PEC * July 004 Revsed Verson of Workng Paper 0030, Department of Economcs, Unversty of nz.

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

What should (public) health insurance cover?

What should (public) health insurance cover? Journal of Health Economcs 26 (27) 251 262 What should (publc) health nsurance cover? Mchael Hoel Department of Economcs, Unversty of Oslo, P.O. Box 195 Blndern, N-317 Oslo, Norway Receved 29 Aprl 25;

More information

Oligopoly Theory Made Simple

Oligopoly Theory Made Simple Olgopoly Theory Made Smple Huw Dxon Chapter 6, Surfng Economcs, pp 5-60. Olgopoly made smple Chapter 6. Olgopoly Theory Made Smple 6. Introducton. Olgopoly theory les at the heart of ndustral organsaton

More information

Stress test for measuring insurance risks in non-life insurance

Stress test for measuring insurance risks in non-life insurance PROMEMORIA Datum June 01 Fnansnspektonen Författare Bengt von Bahr, Younes Elonq and Erk Elvers Stress test for measurng nsurance rsks n non-lfe nsurance Summary Ths memo descrbes stress testng of nsurance

More information

Trust Formation in a C2C Market: Effect of Reputation Management System

Trust Formation in a C2C Market: Effect of Reputation Management System Trust Formaton n a C2C Market: Effect of Reputaton Management System Htosh Yamamoto Unversty of Electro-Communcatons htosh@s.uec.ac.jp Kazunar Ishda Tokyo Unversty of Agrculture k-shda@noda.ac.jp Toshzum

More information

Valuing Customer Portfolios under Risk-Return-Aspects: A Model-based Approach and its Application in the Financial Services Industry

Valuing Customer Portfolios under Risk-Return-Aspects: A Model-based Approach and its Application in the Financial Services Industry Buhl and Henrch / Valung Customer Portfolos Valung Customer Portfolos under Rsk-Return-Aspects: A Model-based Approach and ts Applcaton n the Fnancal Servces Industry Hans Ulrch Buhl Unversty of Augsburg,

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

How to Sell Innovative Ideas: Property right, Information. Revelation and Contract Design

How to Sell Innovative Ideas: Property right, Information. Revelation and Contract Design Presenter Ye Zhang uke Economcs A yz137@duke.edu How to Sell Innovatve Ideas: Property rght, Informaton evelaton and Contract esgn ay 31 2011 Based on James Anton & ennes Yao s two papers 1. Expropraton

More information

Optimal Transfers and Participation Decisions in International Environmental Agreements 1

Optimal Transfers and Participation Decisions in International Environmental Agreements 1 Optmal Transfers and Partcpaton Decsons n Internatonal Envronmental Agreements 1 by Carlo Carraro 2, Johan Eyckmans 3 and Mchael Fnus 4 Abstract The lterature on nternatonal envronmental agreements has

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

Finite Math Chapter 10: Study Guide and Solution to Problems

Finite Math Chapter 10: Study Guide and Solution to Problems Fnte Math Chapter 10: Study Gude and Soluton to Problems Basc Formulas and Concepts 10.1 Interest Basc Concepts Interest A fee a bank pays you for money you depost nto a savngs account. Prncpal P The amount

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Price Impact Asymmetry of Block Trades: An Institutional Trading Explanation

Price Impact Asymmetry of Block Trades: An Institutional Trading Explanation Prce Impact Asymmetry of Block Trades: An Insttutonal Tradng Explanaton Gdeon Saar 1 Frst Draft: Aprl 1997 Current verson: October 1999 1 Stern School of Busness, New York Unversty, 44 West Fourth Street,

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Capacity Reservation for Time-Sensitive Service Providers: An Application in Seaport Management

Capacity Reservation for Time-Sensitive Service Providers: An Application in Seaport Management Capacty Reservaton for Tme-Senstve Servce Provders: An Applcaton n Seaport Management L. Jeff Hong Department of Industral Engneerng and Logstcs Management The Hong Kong Unversty of Scence and Technology

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

FINANCIAL MATHEMATICS. A Practical Guide for Actuaries. and other Business Professionals

FINANCIAL MATHEMATICS. A Practical Guide for Actuaries. and other Business Professionals FINANCIAL MATHEMATICS A Practcal Gude for Actuares and other Busness Professonals Second Edton CHRIS RUCKMAN, FSA, MAAA JOE FRANCIS, FSA, MAAA, CFA Study Notes Prepared by Kevn Shand, FSA, FCIA Assstant

More information

SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies

SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies SQUARE Project: Cost/Beneft Analyss Framework for Informaton Securty Improvement Projects n Small Companes System Qualty Requrements Engneerng (SQUARE) Team Nck (Nng) Xe Nancy R. Mead, Advsor Contrbutors:

More information

Supply network formation as a biform game

Supply network formation as a biform game Supply network formaton as a bform game Jean-Claude Hennet*. Sona Mahjoub*,** * LSIS, CNRS-UMR 6168, Unversté Paul Cézanne, Faculté Sant Jérôme, Avenue Escadrlle Normande Némen, 13397 Marselle Cedex 20,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information