Cyber-Insurance: Copula Pricing Framework and Implications for Risk Management

Size: px
Start display at page:

Download "Cyber-Insurance: Copula Pricing Framework and Implications for Risk Management"

Transcription

1 Cyber-Insurance: Copula Prcng Framework and Implcatons for Rsk Management Hemantha S. B. Herath Assocate Professor, Department of Accountng, Faculty of Busness, 40 Taro Hall, 500 Glenrdge Avenue, St. Catharnes, Ontaro, Canada LS 3A, Tejaswn C. Herath Ph.D. Canddate, Department of Management Scence and Systems, Jacobs Management Center, Unversty at Buffalo, Amherst, NY 460, ABSTRACT In recent years there has been a growng stream of research focusng on cyber-nsurance. Rsk transference wth nsurance has been suggested by both practtoners and academcs to absorb losses caused by securty breaches as well as to supplement the exstng set of securty tools to manage IT securty resdual rsk after IT securty nvestments are made. In ths paper, we nvestgate prcng of cyber-nsurance products usng the emergng copula methodology for modelng dependent rsks from an actuaral approach whch s dfferent to the process approaches of Bohme and Katara (006 and Mukhopadhyay et. al. (006. We dscuss a framework for assessng the emprcal dollar loss dstrbuton from the emprcal dstrbuton of the number of nfected computers. We develop a cyber-nsurance model and demonstrate the Gumbel copula to prce nsurance premums usng a numercal example wth ICSA data. Key Words: Cyber-Insurance; Copula; Correlated Rsk, Copula Dependency, Informaton Securty Rsk Management. Acknowledgements: Dr. Hemantha Herath acknowledges fnancal support from the Socal Scences and Humantes Research Councl (SSHRC of Canada.. Introducton The survey results of fnancal losses due to nformaton securty breaches gve us an overall glmpse of the severty of the problem of vrus, hacker and denal of servce attacks. Recent ncdents (005; 006 of securty breaches have resulted organzatons mllons of dollars n losses due to lost revenues not wthstandng the ntangble losses such as lost productvty, loss of customer goodwll/reputaton and lost busness opportuntes. The recent CSI/FBI survey report notes that majorty of the organzatons

2 use or have securty tools n place wth almost 99% usng Antvrus software, 98% havng frewalls, 7% havng proxy servers, and 68% havng ntruson detecton systems. However, n spte of the large use of securty measures the losses due to breaches are stll extremely hgh. Anderson (00 explans ths phenomenon clearly. It s dffcult for securty managers n any organzaton to know about and elmnate all the ponts of vulnerablty n a system (.e. create a fool proof system, when t only takes a hacker to explot just one these ponts of vulnerablty. Smlarly, as Schneer (00 pont out, a new vrus can easly compromse the permeter securty devces before a sgnature s avalable and mplemented for ant-vrus tools to track t down. Recognzng that the elmnaton of securty breach rsk s close to mpossble, NIST recommends several rsk mtgaton technques that are based on techncal as well as other non-techncal controls. These nclude (Stoneburner et al. 00:. Rsk Assumpton: To accept the potental rsk and contnue operatng the IT system or to mplement controls to lower the rsk to an acceptable level. Rsk Avodance: To avod the rsk by elmnatng the rsk cause and/or consequence (e.g., forgo certan functons of the system or shut down the system when rsks are dentfed 3. Rsk Lmtaton: To lmt the rsk by mplementng controls that mnmze the adverse mpact of a threat s exercsng a vulnerablty (e.g., use of supportng, preventve, detectve controls 4. Rsk Plannng: To manage rsk by developng a rsk mtgaton plan that prortzes, mplements, and mantans controls 5. Research and Acknowledgment: To lower the rsk of loss by acknowledgng the vulnerabltes or flaws and researchng controls to correct them 6. Rsk Transference: To transfer the rsk by usng other optons to compensate for the loss, such as purchasng nsurance. In ths paper, we focus on rsk transference as a tool to mnmze some of the fnancal losses to frms. Rsk transference wth nsurance has been suggested by both practtoners and academcs to absorb loss caused by securty breaches as well as to supplement the exstng set of securty tools to manage IT securty resdual rsk after IT securty nvestments are made (see (Böhme 005; Böhme and Katara 006; Gordon et al. 003; Mukhopadhyay et al. 006; Ogut et al. 005 among others. Typcally an ndvdual or organzaton employs a combnaton of these rsk management optons smultaneously retanng some of the rsk, mtgatng some and nsurng the rest(schneer 00. Whle there are some smlartes n cyber-nsurance that are generc to other nsurance products, there are certan characterstcs unque to IT securty. These unque characterstcs, makes the prcng of cyber nsurance challengng. Frst, nternet related rsks are unque, n terms of locaton, degree, vsblty and tradtonal polces do not comprehensvely address the addtonal rsks that frms face as a result of beng part of the dgtal economy (Gordon et al. 003; and second, although ssues related to prcng, adverse selecton and moral hazard are common to all forms of nsurance; an understandng of these ssues related to cyber rsks s warranted n desgnng nsurance products.

3 These unque challenges create a plethora of research questons that need to be addressed from the pont of vew of nsurance companes (supply sde as well as the nsured (demand sde. For nstance, prcng nsurance products tradtonally reles on actuaral tables constructed from hstorcal records. The nternet s relatvely new, and as such data about securty breaches and losses does not exst or does so only n small quanttes. Ths s further exacerbated wth the reluctance of organzatons to reveal detals of securty breaches due to loss of market share, reputaton etc.(gordon et al Although nsurance companes currently provde cyber-nsurance products, the accuracy of the prcng and whether or not nsurance provders are chargng the rght premums s stll an open queston (Gordon et al. 003; Radclff 00. In recent years there has been a growng stream of research focusng on cybernsurance. Gordon and Loeb (003 n ther artcle ncely lay out a framework for usng cyber-nsurance as a rsk management technque. In addton, they dscuss the unque features of cyber-nsurance as well as smlartes n respect of prcng, adverse selecton and moral hazard. Ogut et. al (005, nvestgates the cyber-nsurance problem from the ssue of moral hazard and adverse selecton. They show that the nterdependency of IT securty rsk of dfferent frms mpact a frm s ncentve to nvest n cyber-nsurance products. Böhme (005 provdes an ntutve dscusson of the ssue of correlated rsk n cyber-nsurance and argues whether the structural characterstcs of the nternet tself (.e., the monopoly of a domnant platform(s wll restrct the creaton of a proper market for cyber-nsurance. Hs arguments are through and clearly vald, and have mplcaton for prcng. Usng an ndemnty nsurance model, he evaluates the condtons under whch nsurance can be provded and model dfferent premums for users of domnant and alternate platforms. Extendng Böhme (005 work further, Böhme and Katara (006 nvestgate the correlated cyber-rsks n a two-step rsk arrval process, that s, wthn the frm (ntra-frm rsk correlaton and external to the frm (global rsk correlaton. In order to capture the global rsk correlatons the authors use the t-copula whch s used to model correlaton of extreme events. Mukhopadhyay et. al. (006, use a copula approach wth the Bayesan Belef Networks (BBN technque to quantfy the e-rsk assocated wth onlne transactons that would be affected by securty breaches. They use the mutvarate normal copula to descrbe the jont dstrbuton whch s thereafter used to compute the condtonal dstrbuton at each node on the BBN. Usng the software FULLBNT they are able to dentfy the probabltes assocated wth the specfc causes of the securty breaches. Usng these probabltes for the rsk of a breach and makng a strong smplfyng assumpton that the dollar losses at each node n the network are dstrbuted bnomally wth assumed specfc values, they prce the cyber-nsurance premums as a functon of the expected value of the clam severty and ts standard devaton. The clam severty s the product of the expected dollar loss amount and the probablty of the loss. All of the above papers make a very sgnfcant contrbuton to understandng the ssues of cyberrsk nsurance. In ths paper, we nvestgate cyber-nsurance prcng usng the emergng copula methodology for modelng dependent rsks from an actuaral approach whch s dfferent 3

4 to the approaches of Böhme and Katara (006 and Mukhopadhyay et. al. (006. Mukhopadhyay et. al. (006 uses a process vew to quantfy the operatonal rsk that s based on modelng the chan of actvtes that consttute an operaton and estmatng the exact rsk of each process. Böhme and Katara (006 work can also be categored as a process approach that focuses on connectvty and system dynamcs. Both these methods are useful for the actuaral approach that we develop n ths paper. The use of copula methodology s unque n each of the three papers, Böhme and Katara (006 uses the t- copula, Mukhopadhyay et. al. (006 uses the mult-varate normal copula and we use two Archmedean copulas - Clayton and Gumbel. Thus our paper makes the followng contrbutons to the lterature. Frst, we use the actuaral approach based on emprcal loss dstrbutons. In partcular, we develop a framework for assessng the emprcal dollar loss dstrbuton from the emprcal dstrbuton of the number of nfected computers. More specfcally, we use the ICSA data of the actual vrus ncdents and the number of computers (modfed at a frm level to assess the emprcal loss dstrbuton. The emprcal loss dstrbuton s dependent on the securty rsk posture of a frm. Second, we provde a detaled survey of copulas (Clayton and Gumbel, dscuss the ft test, how to smulate bvarate data from a known copula and develop a cyber-nsurance model. As noted above, use of copulas s relatvely new to cyber-securty nsurance ndustry. Thrd, we llustrate the model usng a numercal example wth ICSA data. Ths paper s organzed as follows. In Secton, we present a framework for assessng cyber rsk and estmatng the emprcal dstrbuton for dollar losses. Sectons 3 provde a survey of copulas and a cyber-nsurance model. In Secton 4, we llustrate the methodology wth the help of case study. Secton 5 concludes the paper.. Framework for Assessng Cyber Rsk In prcng the premum, t s essental to dentfy the lkelhood of a potental dsaster as well as ts mpact. Rsk s defned as a functon of the lkelhood of a gven threatsource s exercsng a partcular potental vulnerablty, and the resultng mpact of that adverse event on the organzaton (NIST (emphass n orgnal. Lkelhood of threat source s explotng vulnerablty s random and s smlar to stuatons normally faced by nsurance companes such as expectaton of a natural dsaster. Ths lkelhood can be assumed to follow Posson dstrbuton (Conrad 005. Although the occurrence of vrus s random, the possblty of breach may very well depend on the number of vulnerabltes. Number of vulnerabltes can be expected to depend on the securty precautons taken by the frm (securty posture coeffcent - s. For example, daly montorng and update of vrus sgnatures wll be less rsky than f the frm updates the vrus sgnatures weekly. Smlarly, f the frm has resources and can afford hourly montorng and update, the frm s lkely to be safer than daly or weekly montorng. The dollar losses wll depend on the type of computer affected and ts relatve losses. Securty breaches pose varous types of losses: ( lost productvty ( lost revenue, (3 clean up costs and (4 fnancal performance mpact, to name a few (Farahmand et al. 4

5 004. These costs can be expected to be dependent on the type of computer that s breached. For example, f the vrus has crppled the admnstratve PCs, t wll mpose productvty loss of the persons as well as clean up costs related to the attack. If the computer nvolved s a web-server that s mostly used n e-busness type of actvty, n addton to clean up costs t s lkely to result n lost revenues. In general, total losses due to a partcular rsk (e.g. vrus attack can be expressed as a functon of: type of computer affected; losses related to type of computer and securty posture of the frm. Thus the loss functon based on the number of computers can be we wrtten as. L = s α f + s α f + s 3 α 3 f 3 where α + α + α 3 = α n : fracton of computers of type n f n : dollar mpact for computer type n s n : securty posture coeffcent 3. Copula Methodology Copulas are functons that jon or couple multvarate dstrbuton functons to ther one-dmensonal margnal dstrbuton functons. Alternatvely, copulas are multvarate dstrbutons whose one-dmensonal margns are unform on the nterval [0,] (Nelsen 995, Frees and Valdez 998. Copulas have been studed for over forty years. Sklar (959 coned the term copula to descrbe functons whch jon together one-dmensonal dstrbuton functons to form multvarate dstrbuton functons. Copulas are of nterest to statstcans for two man reasons: Frstly, as a way of studyng scale-free measures of dependence; and secondly as a startng pont for constructng famles of bvarate dstrbutons, sometmes wth a vew to smulaton (Fsher 997. Defnton: Sklar (959 Theorem Let X and Y denote contnuous random varables (lower case x, y represent ther values wth bvarate dstrbuton functon H ( x, y and margnal dstrbuton functon F (x and F (y. Let F (. and G (. be the nverse of F and G. Then for any unform random varables U and V wth values u, v [ 0,] (.e. make the probablty transformaton of each varate U = F(X and V = G(Y to get a new par of varates U ~ U (0, and V ~ U (0,, exst a copula C such that for all x, y R = ( H ( x, y C( F( x, G( y = C( u, v If F and G are contnuous then C s unque. An mportant feature of copulas s that any choce of margnal dstrbutons can be used. Hence copulas are constructed based on the assumpton that margnal dstrbuton functons are known. Copulas are mportant because they allow us to study the dependence or assocaton between random varables. There are several ways to measure dependence. The most 5

6 wdely used measures are the Spearman s Rho and Kendall s Tau. Copulas precsely account for the dependence between random varables. For example between two random varables X and Y the dependence propertes of the jont dstrbuton (the manner n whch X and Y move together s precsely captured by the copula for strctly ncreasng functons of each varable. The two standard non-parametrc dependence measure expressed n copula form are as follows: Kendall s Tau s gven by: τ = 4 C( u, vdc( u, v..( I and Spearman s Rho s gven by: ρ = C( u, vdudv 3..(3 I The expressons for Kendall s Tau and Spearman s Rho for some known famles of copulas are presented n Secton 3.0. Copulas provde a way to study scale free measures of dependence. In emprcal applcatons where data s avalable we can use the dependence measure to specfy the form of copula. Genest and Rvest (993 provdes a procedure for dentfyng a copula when bvarate data s avalable. One the correct copula s dentfed t can be used to smulate random outcomes from dependent varables. 3. Survey of Gumbel and Clayton Copula In ths paper we survey two one parameter bvarate Archmedean copulas adopted from Frees and Valdez (998 and Nelsen (999 (Nelsen, 990, pg lsts one parameter famles. Archmedean copulas are easy to apply and have nce propertes. The parameter n each case measures the degree of dependence and controls the assocaton between the two varables. For nstance when 0 there s no dependence and f there s perfect dependence. Schwezer and Wolff (98 show that the dependence parameter whch characterzes each famly of Archmedean copulas can be related to Kendall s Tau. Ths property can be used to emprcally determne the applcable copula form. ( Clayton Copula (978 (a Generator: ϕ ( t = ( t (b Bvarate Copula: C ( u, v = ( u + v (c Laplace Transform: ϕ( t = ( t = ( t ϕ 6

7 (d Kendall s Tau τ = + ( Gumbel Copula (960 (a Generator: ϕ ( t = ( ln( t (b Bvarate Copula: = [ + ] C ( u, v exp ( ln u ( ln v (c Laplace Transform: ϕ( t = ( t = exp( t (d Kendall s Tau = 3. Identfyng a Copula Form τ The frst step n modelng and smulaton s dentfyng the approprate copula form. Genest and Rvest (993 provde the followng procedure (ft test to dentfy an Archmedean copula. The method assumes that a random sample of bvarate data ( X, Y for =,..., n s avalable. Assume that the jont dstrbuton functon H has an assocated Archmedean copula C, and then the ft allows us to select the approprate generatorϕ. The procedure nvolves verfyng how close dfferent copulas ft the data by comparng the closeness of the copula (parametrc verson wth the emprcal (nonparametrc verson. The steps are follows: Step : Estmate the Kendall s correlaton usng the non-parametrc or dstrbuton free measure n τ = E < j ϕ Sgn [( X X ( Y Y ] Step : Identfy an ntermedate varable Z = F( X, Y havng a dstrbuton functon K( z = Pr( Z z. Construct an emprcal (non parametrc estmate of ths dstrbuton as follows: number{ ( X, Y such that X < X and Y < Y } j j j Z = n The emprcal verson of the dstrbuton functon K(z s K E (z = proporton of Z z Step 3: The next step s to construct the parametrc estmate of K (z. The relatonshp ϕ( z between ths dstrbuton functon and the generator s gven by K( z = z, where ϕ ( z j 7

8 ϕ (z s the dervatve of the generator and 0 z. We show below the specfc form of K(z for the three Archmedean copulas surveyed n ths paper. ( Clayton Copula ( Gumbel Copula z( + z K( z =..(4 z( ln z K( z =..(5 Repeat Step 3 for several dfferent famles of copulas,.e., several choces of ϕ (.. By vsually examnng the graph of K (z vs z or usng statstcal measures such as mnmum square error analyss, one can choose the best copula. Ths copula can be used n modelng dependences and smulaton. 3.3 Prcng Cyber-Insurance Copula methodology can be effectvely used for forecastng the dollar value of losses from cyber attacks and prcng cyber-nsurance. In ths secton, we dscuss an applcaton example that uses copula dependency. A key component of nsurance prcng s understandng and modelng multvarate relatonshps. Whle lnear regresson may provde a bass to explan the relatonshp among two (or more varables, the model s based on normalty assumptons and lnear dependence. Lnear regresson would work f the margnal dstrbuton are normal. However, as ICSA data ndcate the margnal dstrbuton for the number of computers affected ( X and the dollar value of losses (Y are not normal. In the case of the varable, number of computers affected ( X the margnal dstrbuton s lkely to be of the type Pareto or Exponental or Webull, snce a fewer number of computer vrus (5%-5% account for (85% - 75% of the number of computes affected. Snce the margnal dstrbutons are non-normal the wdely used classcal Pearson s product moment correlaton ( ρ cannot be used to model the dependency among the two varables. Correlaton ( ρ measures the straght lne assocaton and thus the dependency s lnear. Thus n forecastng the dollar value of losses and prcng cyber-nsurance, the copula dependency s more approprate. In the copula approach for prcng cyber nsurance, the frst step s the use the procedures lad out n Secton 3 above to dentfy the approprate copula for modelng the nonlnear dependence that explan the relatonshp between the two varables of nterest, the number of computers affected ( X and the dollar value of losses (Y. That s, we dentfy the jont dstrbuton of ( X, Y gven by the specfc copula functon say g ( X, Y. Notce that now we can examne the dstrbuton of any known functon of X and Y. Consder, the expected nsurance polcy premum for a frm that has N computers (standalone PCs and servers. Let L and M be the lower and hgher lmts of the number of lkely computers affected to determne the premum. Assumng the dollar value of the lkely losses can be prorated based on the number of computers affected (or exposed, we can wrte the followng functon for prcng the cyber-nsurance: 8

9 a X L Y g( X, Y = a + X 0 X M Y a3 + X 0 f f X < L L X < M f X M (6 where, a, =,, 3 are constants. The expected nsurance premum could be computed usng Monte Carlo smulaton. The steps are as follows: Step : Generate a sequence of b-varate data ( X, Y usng the ftted copula (e, Clayton or Gumbel or any other copula. The procedures for generatng data from Clayton and Gumbel are well summarzed n Frees and Valdez (998, Nelson (999 among others. Step : For a gven ( L, M compute the expected value of the cyber-nsurance premum and the standard devaton as S E[ g( X, Y ] = g( X, Y (7 S S g( X, Y [ E( g( X, Y ] S σ [ g( X, Y ] = (8 S where S s the number of smulaton runs. 4. Case Illustraton In ths secton, we llustrate the copula approach for prcng cyber-nsurance usng data from the ICSA. Consder Frm A that has the followng data pertanng to the number of computers affected ( X for each major computer vruses n 003. Usng the methodologcal framework dscussed n Secton, we estmate the dollar value of losses (Y as gven n Table. Notce, that both the number of computers affected as well as the dollar value of losses are random events. That s, the number of computers affected wll depend on the severty of the vrus, the company s securty posture, and securty polces n place. Smlarly, the dollar value of losses wll be random n the sense, that n rare nstance of the same number of computers affected for two dstnct vruses, the degree of the losses wll not be dentcal because t wll depend on each vruses ablty to penetrate and harm the computers. Also, t wll depend on the computer type affected (.e., the proporton of stand alone computers, servers, network computers etc.. The data for Frm A s gven n Table. = We use the ICSA data for 003, on actual compute vrus ncdences and the actual number of computers affected, scaled down one hundred tmes to frm level. 9

10 Table : Computer Vrus Data for Frm A. Vrus X # of Computers Y $ Losses W3/Blaster 9 $ 355,648.7 W3/Slammer 849 $ 339, W3/Sobg 38 $ 5, W3/Klez 40 $ 65, W3/Yaha 8 $ 45, W3/Swen 08 $ 66, W3/Dumaru 87 $ 39, W3/Mmal 70 $ 9, W3/Nach 63 $ 0, W3/Fzzer 58 $ 0, W3/BugBear 50 $ 0,80.3 W3/Lrva 47 $, W3/Sober $ 6, W3/SrCam $ 5, W3/Ganda 9 $ 7, Mean Standard Devaton $ 75, $ 4,70 In order to prce the cyber-nsurance premum for Frm A, based on the number of computers affected and the dollar value of losses pertanng to each vrus ncdence, we have to smulate b-varate data ( X, Y wth non lnear dependence usng the best ft copula. For the smulaton, we need to dentfy the margnal dstrbutons for the number of computers affected ( X and the dollar value of losses (Y above n Table. We use ARENA software for dentfyng the margnal dstrbutons. The margnal dstrbuton for number of computers affected ( X and the dollar value of losses (Y above both are Webull dstrbuton of the followng form. The ftted margnal dstrbutons are X ~ 8 + Webull(8,0.586 and Y ~ Webull(38900, Notce that both the dstrbutons are shfted Webull dstrbutons. There are several propertes, whch pave way for usng copula dependences to smulate the par of values ( X, Y. Frst, snce the margnal dstrbutons are non-normal ( Webull, one cannot use lnear regresson for smulatng; second, fndng the jont dstrbutons of the two varables s not easy snce they are shfted Webull dstrbutons; and fnally Pearson s product moment or lnear correlaton cannot be use snce the margnals are non-normal. However, the approach as demonstrated below enables us to dentfy the approprate copula to determne a jont dstrbuton that can be used wth any margnal dstrbuton. Furthermore, copula allows modelng nonlnear dependency whch s more approprate for estmatng premums. 0

11 Clayton Emprcal Gumbel Fgure: Best Ft Copula We use Kendall s Tau to measure the dependence between number of computers affected ( X and the dollar value of losses (Y for the data n Table, whch usng the statstcal software SPSS s computed as Next, we obtan values of.5789 and respectvely usng equatons n secton 3. (-(d, and (-(d for Clayton and Gumbel copulas. In order to dentfy the approprate copula we follow the procedure outlned n Secton 3.. The emprcal dstrbuton K E (z and the K(z values for Clayton and Gumbel copulas based on equatons n secton 3. ( and ( and ( are shown n Fgure. Usng a vsual ft t s evdent from Fgure that Gumbel copula provdes the best ft (both are relatvely close. However, mnmzng the mean square error would be a more robust method to select the approprate copula. In order to smulate b-varate outcomes ( X, Y usng the Gumbel copula we use the algorthm suggested by Marshall and Olkn (988. The algorthm s as follows: For the Gumbel copula the generator and Laplace transform are gven n Secton 3. (. The nverse generator s equal to the Laplace transform of a postve Stable varate γ ~ St Θ ( α,,,0 where Θ = cos and > 0 Step : Smulate a postve Stable varate γ ~ St( ˆ,, α Θ,0 Step : Smulate two ndependent unform [0,] random numbers u and u Step 3: Set * * X = F ( u and Y G ( u = where * u = lnu γ ϕ and = ϕ( t exp t for [,] Nolan (005 and Cherubn et. al (004 suggest the followng procedure to smulate a postve random varable γ ~ St( ˆ,, α Θ, δ

12 Step (a: Smulate a unform random varable υ = U, Step (b: Independently draw an exponental random varable (ε wth mean = α Step (c: = arctan tan α and compute 0 Step (d γ = Θz + δ z = cos 0 0 α ε 0 snα( + υ ( cosα cosυ ( ( ( α α α υ + α In order to determne the cyber-nsurance premum for a frm, we smulate a large number of bvarate data ( X, Y by repeatng the algorthm S = 0, 000 tmes. The annual nsurance premum for dfferent levels of L and M wth the followng values for a = 400, 5 a = and a3 = 300are gven n Table. 5. Dscusson Table : Computed Premums L=5 Mean Standard Devaton M=50 $9 $608 M=00 $007 $70 M=50 $67 $83 In ths paper, we use a copula based model for prcng cyber-nsurance. The cyber nsurance prcng model explctly consders the rsk posture of the frms snce both the valuaton parameters - the number of computers affected and the dollar losses depend on the rsk posture of the frm. The framework, proposed for assessng the rsk posture and estmatng the dollar losses consders computer product dversty, lost productvty, lost revenue, and clean up costs among others. Furthermore, as prevously dscussed, the model consders nonlnear dependences for correlated rsks and allows smulatng from a copula model wthout explctly havng to determne the jont dstrbuton for the two gven margnals. Hence, the model s versatle n the sense that any type of margnal dstrbutons can be used. Thus, our paper makes a sgnfcant contrbuton to the lterature n cyber-nsurance rsk modelng and prcng snce we address the problem from an actuaral approach. One of the prmary constrants n prcng cyber-nsurance as dentfed by Gordon and Loeb (003 s the unavalablty of large amounts of hstorc data on e-crmes and related losses. As Gordon and Loeb (003 pont out, t s further exacerbated due to the fact that frms do not reveal detals concernng securty breaches. That s, snce cybernsurance products are new, ts s not known whether the rght premums are beng

13 charged. One of the prmary lmtatons of the proposed model s that t uses hstorc data to determne the approprate copula for prcng the premums. Thus one can argue, that t suffers from the same lack of data problem as current nsurance prcng models. However, the proposed copula based cyber-nsurance model makes a methodologcal contrbuton snce t provdes a dfferent modelng perspectve usng the actuaral approach. Fnally, the framework provdes awareness to managers, that t s mportant to collect data on e-crmes and securty breaches for negotatng for lower premums on cyber-nsurance products. For future research, we hope to develop n more detal the premums based on product dversty, and more specfc securty postures. In ths paper we consder one aspect of rsk (type of loss to elaborate the methodology whle drawng upon what s sparsely avalable data on vrus losses (ICSA labs. Fnally, as future research we hope to attempt to ntegrate other correlated rsks usng the process approaches wth the actuaral approach for a comprehensve model. References "A Chronology of Data Breaches," 005, avalable at: "006 Dsclosures of U.S. Data Incdents," 006, avalable at: Anderson, R. "Why nformaton securty s hard: An economc perspectve,," 7th Annual Computer Securty Applcatons Conference (ACSAC,, New Orleans, LA, 00. Böhme, R. "Cybernsurance Revsted," Workshop on the Economcs of Informaton Securty (WEIS, Harvard Unversty, 005. Böhme, R., and Katara, G. "Models and Measures for Correlaton n Cyber-Insurance," Workshop on the Economcs of Informaton Securty (WEIS, Cambrdge Unversty, UK, 006. Cherubn U., E. Lucano and W. Vecchato 004, Copula Methods n Fnance, John Wley and Sons, West Sussex. Clayton, D. G., 978, "A Model for Assocaton n Bvarate Lfe Tables and ts Applcatons n Epdemologcal Studes of Famlal Tendency n Chronc Dsease Incdence, Bometrka, Vol. 65, pp Conrad, J.R. "Analyzng the Rsks of Informaton Securty Investments wth Monte-Carlo Smulatons," Workshop on the Economcs of Informaton Securty (WEIS, Harvard Unversty, 005. Farahmand, F., Navathe, S., Sharp, G., and Enslow, P. "Evaluatng Damages Caused by Informaton Systems Securty Incdents," n: The Economcs of Informaton Securty, J. Camp and R. Lews (eds., Kluwer, 004, pp Fsher, N. I., 997, "Copulas, n Encyclopeda of Statstcal Scences, Updated Vol., S. Kotz, C. B. Read, abd D. L. Banks, Edtors, John Wley and Sons, New York, pp Frank M. J., 979, "On the Smultaneous Assocatvty of F(x,y and x + y F(x,y, Aequatones Math., Vol. 9, pp Frees E. W., and E. Valdez, 998, "Understandng Relatonshps Usng Copulas, North Amercan Actuaral Journal, Vol., no., pp

14 Genest C., 987, "Frank s Famly of Bvarate Dstrbutons, Bometrka, Vol. 74, pp Genest C., and L. Rvest, 993, "Statstcal Inference Procedures for Bvarate Archmedean Copulas, Journal of the Amercan Statstcal Assocaton, Vol. 88, pp Gordon, L.A., Loeb, M.P., Lucyshyn, W., and Rchardson, R. "006 CSI/FBI Computer Crme and Securty Survey ", Computer Securty Insttute, avalable at: Gordon, L.A., Loeb, M.P., and Sohal, T. "A Framework for Usng Insurance for Cyber- Rsk Management," COMMUNICATIONS OF THE ACM (46: Gumbel E. J., 960, "Dstrbutons des valeurs extremes en plusers dmensons, Publ. Inst. Statst. Unv. Pars, Vol. 9, pp Marshall A. W., and I. Olkn, 988, "Famles of Multvarate Dstrbutons, Journal of the Amercan Statstcal Assocaton, Vol. 83, pp Mukhopadhyay, A., Chatterjee, S., Saha, D., Mahant, A., and Sadhukhan, S.K. "e-rsk Management wth Insurance : A framework usng Copula aded Bayesan Belef Networks," 39th Hawa Internatonal Conference on System Scences, Hawa, 006. Nelsen R. B., 999, An Introducton to Copulas, Sprnger-Verlag New York, Inc. Nelsen R. B. 995, Copulas, Characterzaton, Correlaton and Counterexamples, Mathematcs Magazne, Vol. 68, no. 3 (June, pp Nolan J. P., 005, Stable Dstrbutons: Models for Heavy Taled Data, Forthcomng Ogut, H., Menon, N., and Raghunathan, S. "Cyber Insurance and IT Securty Investment: Impact of Interdependent Rsk," Workshop on the Economcs of Informaton Securty (WEIS, Harvard Unversty, 005. Radclff, D. "Calculatng e-rsk," ComputerWorld (35:7, Feb 00, p 34. Schneer, B. "Computer Securty: It s the Economcs, Stupd," Workshop on Economcs of Informaton Securty (WEIS, 00. Sklar, A. 959, functons de repartton a n dmensons et leurs merges, Publ. Inst. Statst. Unv. Pars, Vol. 8, pp.9-3 Stoneburner, G., Goguen, A., and Fernga, A. "Rsk Management Gude for Informaton Technology Systems," Natonal Insttute of Standards and Technology (NIST, 00. 4

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Testing Adverse Selection Using Frank Copula Approach in Iran Insurance Markets

Testing Adverse Selection Using Frank Copula Approach in Iran Insurance Markets Journal of mathematcs and computer Scence 5 (05) 54-58 Testng Adverse Selecton Usng Frank Copula Approach n Iran Insurance Markets Had Safar Katesar,, Behrouz Fath Vajargah Departmet of Statstcs, Shahd

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

ENTERPRISE RISK MANAGEMENT IN INSURANCE GROUPS: MEASURING RISK CONCENTRATION AND DEFAULT RISK

ENTERPRISE RISK MANAGEMENT IN INSURANCE GROUPS: MEASURING RISK CONCENTRATION AND DEFAULT RISK ETERPRISE RISK MAAGEMET I ISURACE GROUPS: MEASURIG RISK COCETRATIO AD DEFAULT RISK ADIE GATZERT HATO SCHMEISER STEFA SCHUCKMA WORKIG PAPERS O RISK MAAGEMET AD ISURACE O. 35 EDITED BY HATO SCHMEISER CHAIR

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Analysis of Premium Liabilities for Australian Lines of Business

Analysis of Premium Liabilities for Australian Lines of Business Summary of Analyss of Premum Labltes for Australan Lnes of Busness Emly Tao Honours Research Paper, The Unversty of Melbourne Emly Tao Acknowledgements I am grateful to the Australan Prudental Regulaton

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES

CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES In ths chapter, we wll learn how to descrbe the relatonshp between two quanttatve varables. Remember (from Chapter 2) that the terms quanttatve varable

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Copulas. Modeling dependencies in Financial Risk Management. BMI Master Thesis

Copulas. Modeling dependencies in Financial Risk Management. BMI Master Thesis Copulas Modelng dependences n Fnancal Rsk Management BMI Master Thess Modelng dependences n fnancal rsk management Modelng dependences n fnancal rsk management 3 Preface Ths paper has been wrtten as part

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn [email protected]

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

CHAPTER 14 MORE ABOUT REGRESSION

CHAPTER 14 MORE ABOUT REGRESSION CHAPTER 14 MORE ABOUT REGRESSION We learned n Chapter 5 that often a straght lne descrbes the pattern of a relatonshp between two quanttatve varables. For nstance, n Example 5.1 we explored the relatonshp

More information

Justifying Spam and E-mail Virus Security Investments: A Case Study. Hemantha Herath 1 and Tejaswini Herath 2

Justifying Spam and E-mail Virus Security Investments: A Case Study. Hemantha Herath 1 and Tejaswini Herath 2 Justfyng Spam and E-mal Vrus Securty Investments: A Case Study Hemantha Herath 1 and Tejaswn Herath 2 Abstract: Our paper nvestgates the problem of justfyng securty nvestments concernng spam and emal vrus

More information

A Model of Private Equity Fund Compensation

A Model of Private Equity Fund Compensation A Model of Prvate Equty Fund Compensaton Wonho Wlson Cho Andrew Metrck Ayako Yasuda KAIST Yale School of Management Unversty of Calforna at Davs June 26, 2011 Abstract: Ths paper analyzes the economcs

More information

Vasicek s Model of Distribution of Losses in a Large, Homogeneous Portfolio

Vasicek s Model of Distribution of Losses in a Large, Homogeneous Portfolio Vascek s Model of Dstrbuton of Losses n a Large, Homogeneous Portfolo Stephen M Schaefer London Busness School Credt Rsk Electve Summer 2012 Vascek s Model Important method for calculatng dstrbuton of

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Estimating Total Claim Size in the Auto Insurance Industry: a Comparison between Tweedie and Zero-Adjusted Inverse Gaussian Distribution

Estimating Total Claim Size in the Auto Insurance Industry: a Comparison between Tweedie and Zero-Adjusted Inverse Gaussian Distribution Avalable onlne at http:// BAR, Curtba, v. 8, n. 1, art. 3, pp. 37-47, Jan./Mar. 2011 Estmatng Total Clam Sze n the Auto Insurance Industry: a Comparson between Tweede and Zero-Adjusted Inverse Gaussan

More information

Management Quality, Financial and Investment Policies, and. Asymmetric Information

Management Quality, Financial and Investment Policies, and. Asymmetric Information Management Qualty, Fnancal and Investment Polces, and Asymmetrc Informaton Thomas J. Chemmanur * Imants Paegls ** and Karen Smonyan *** Current verson: December 2007 * Professor of Fnance, Carroll School

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Criminal Justice System on Crime *

Criminal Justice System on Crime * On the Impact of the NSW Crmnal Justce System on Crme * Dr Vasls Sarafds, Dscplne of Operatons Management and Econometrcs Unversty of Sydney * Ths presentaton s based on jont work wth Rchard Kelaher 1

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

Binomial Link Functions. Lori Murray, Phil Munz

Binomial Link Functions. Lori Murray, Phil Munz Bnomal Lnk Functons Lor Murray, Phl Munz Bnomal Lnk Functons Logt Lnk functon: ( p) p ln 1 p Probt Lnk functon: ( p) 1 ( p) Complentary Log Log functon: ( p) ln( ln(1 p)) Motvatng Example A researcher

More information

Abstract. 260 Business Intelligence Journal July IDENTIFICATION OF DEMAND THROUGH STATISTICAL DISTRIBUTION MODELING FOR IMPROVED DEMAND FORECASTING

Abstract. 260 Business Intelligence Journal July IDENTIFICATION OF DEMAND THROUGH STATISTICAL DISTRIBUTION MODELING FOR IMPROVED DEMAND FORECASTING 260 Busness Intellgence Journal July IDENTIFICATION OF DEMAND THROUGH STATISTICAL DISTRIBUTION MODELING FOR IMPROVED DEMAND FORECASTING Murphy Choy Mchelle L.F. Cheong School of Informaton Systems, Sngapore

More information

General Iteration Algorithm for Classification Ratemaking

General Iteration Algorithm for Classification Ratemaking General Iteraton Algorthm for Classfcaton Ratemakng by Luyang Fu and Cheng-sheng eter Wu ABSTRACT In ths study, we propose a flexble and comprehensve teraton algorthm called general teraton algorthm (GIA)

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

Survival analysis methods in Insurance Applications in car insurance contracts

Survival analysis methods in Insurance Applications in car insurance contracts Survval analyss methods n Insurance Applcatons n car nsurance contracts Abder OULIDI 1 Jean-Mare MARION 2 Hervé GANACHAUD 3 Abstract In ths wor, we are nterested n survval models and ther applcatons on

More information

Portfolio Loss Distribution

Portfolio Loss Distribution Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

A Multistage Model of Loans and the Role of Relationships

A Multistage Model of Loans and the Role of Relationships A Multstage Model of Loans and the Role of Relatonshps Sugato Chakravarty, Purdue Unversty, and Tansel Ylmazer, Purdue Unversty Abstract The goal of ths paper s to further our understandng of how relatonshps

More information

ECONOMICS OF PLANT ENERGY SAVINGS PROJECTS IN A CHANGING MARKET Douglas C White Emerson Process Management

ECONOMICS OF PLANT ENERGY SAVINGS PROJECTS IN A CHANGING MARKET Douglas C White Emerson Process Management ECONOMICS OF PLANT ENERGY SAVINGS PROJECTS IN A CHANGING MARKET Douglas C Whte Emerson Process Management Abstract Energy prces have exhbted sgnfcant volatlty n recent years. For example, natural gas prces

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

ENVIRONMENTAL MONITORING Vol. II - Statistical Analysis and Quality Assurance of Monitoring Data - Iris Yeung

ENVIRONMENTAL MONITORING Vol. II - Statistical Analysis and Quality Assurance of Monitoring Data - Iris Yeung STATISTICAL ANALYSIS AND QUALITY ASSURANCE OF MONITORING DATA Irs Yeung Cty Unversty of Hong Kong, Kowloon, Hong Kong Keywords: AIC, ARIMA model, BIC, cluster analyss, dscrmnant analyss, factor analyss,

More information

Factors Affecting Outsourcing for Information Technology Services in Rural Hospitals: Theory and Evidence

Factors Affecting Outsourcing for Information Technology Services in Rural Hospitals: Theory and Evidence Factors Affectng Outsourcng for Informaton Technology Servces n Rural Hosptals: Theory and Evdence Bran E. Whtacre Department of Agrcultural Economcs Oklahoma State Unversty [email protected] J.

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Searching and Switching: Empirical estimates of consumer behaviour in regulated markets

Searching and Switching: Empirical estimates of consumer behaviour in regulated markets Searchng and Swtchng: Emprcal estmates of consumer behavour n regulated markets Catherne Waddams Prce Centre for Competton Polcy, Unversty of East Angla Catherne Webster Centre for Competton Polcy, Unversty

More information

ADVERSE SELECTION IN INSURANCE MARKETS: POLICYHOLDER EVIDENCE FROM THE U.K. ANNUITY MARKET *

ADVERSE SELECTION IN INSURANCE MARKETS: POLICYHOLDER EVIDENCE FROM THE U.K. ANNUITY MARKET * ADVERSE SELECTION IN INSURANCE MARKETS: POLICYHOLDER EVIDENCE FROM THE U.K. ANNUITY MARKET * Amy Fnkelsten Harvard Unversty and NBER James Poterba MIT and NBER * We are grateful to Jeffrey Brown, Perre-Andre

More information

Returns to Experience in Mozambique: A Nonparametric Regression Approach

Returns to Experience in Mozambique: A Nonparametric Regression Approach Returns to Experence n Mozambque: A Nonparametrc Regresson Approach Joel Muzma Conference Paper nº 27 Conferênca Inaugural do IESE Desafos para a nvestgação socal e económca em Moçambque 19 de Setembro

More information

Prediction of Disability Frequencies in Life Insurance

Prediction of Disability Frequencies in Life Insurance Predcton of Dsablty Frequences n Lfe Insurance Bernhard Köng Fran Weber Maro V. Wüthrch October 28, 2011 Abstract For the predcton of dsablty frequences, not only the observed, but also the ncurred but

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

DO LOSS FIRMS MANAGE EARNINGS AROUND SEASONED EQUITY OFFERINGS?

DO LOSS FIRMS MANAGE EARNINGS AROUND SEASONED EQUITY OFFERINGS? DO LOSS FIRMS MANAGE EARNINGS AROUND SEASONED EQUITY OFFERINGS? Fernando Comran, Unversty of San Francsco, School of Management, 2130 Fulton Street, CA 94117, Unted States, [email protected] Tatana Fedyk,

More information

The Current Employment Statistics (CES) survey,

The Current Employment Statistics (CES) survey, Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Risk-Adjusted Performance: A two-model Approach Application in Amman Stock Exchange

Risk-Adjusted Performance: A two-model Approach Application in Amman Stock Exchange Internatonal Journal of Busness and Socal Scence Vol. 3 No. 7; Aprl 01 Rsk-Adjusted Performance: A two-model Approach Applcaton n Amman Stock Exchange Hussan Al Bekhet 1 Al Matar Abstract The purpose of

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

Financial Instability and Life Insurance Demand + Mahito Okura *

Financial Instability and Life Insurance Demand + Mahito Okura * Fnancal Instablty and Lfe Insurance Demand + Mahto Okura * Norhro Kasuga ** Abstract Ths paper estmates prvate lfe nsurance and Kampo demand functons usng household-level data provded by the Postal Servces

More information

HARVARD John M. Olin Center for Law, Economics, and Business

HARVARD John M. Olin Center for Law, Economics, and Business HARVARD John M. Oln Center for Law, Economcs, and Busness ISSN 1045-6333 ASYMMETRIC INFORMATION AND LEARNING IN THE AUTOMOBILE INSURANCE MARKET Alma Cohen Dscusson Paper No. 371 6/2002 Harvard Law School

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Depreciation of Business R&D Capital

Depreciation of Business R&D Capital Deprecaton of Busness R&D Captal U.S. Bureau of Economc Analyss Abstract R&D deprecaton rates are crtcal to calculatng the rates of return to R&D nvestments and captal servce costs, whch are mportant for

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Analyzing Search Engine Advertising: Firm Behavior and Cross-Selling in Electronic Markets

Analyzing Search Engine Advertising: Firm Behavior and Cross-Selling in Electronic Markets WWW 008 / Refereed Track: Internet Monetzaton - Sponsored Search Aprl -5, 008 Beng, Chna Analyzng Search Engne Advertsng: Frm Behavor and Cross-Sellng n Electronc Markets Anndya Ghose Stern School of Busness

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Efficiency Test on Taiwan s Life Insurance Industry- Using X-Efficiency Approach

Efficiency Test on Taiwan s Life Insurance Industry- Using X-Efficiency Approach Informaton and Management Scences Volume 18, Number 1, pp. 37-48, 2007 Effcency Test on Tawan s Lfe Insurance Industry- Usng X-Effcency Approach James C. Hao Tamkang Unversty R.O.C. Abstract Usng twenty-three

More information

SIMPLE LINEAR CORRELATION

SIMPLE LINEAR CORRELATION SIMPLE LINEAR CORRELATION Smple lnear correlaton s a measure of the degree to whch two varables vary together, or a measure of the ntensty of the assocaton between two varables. Correlaton often s abused.

More information

Addendum to: Importing Skill-Biased Technology

Addendum to: Importing Skill-Biased Technology Addendum to: Importng Skll-Based Technology Arel Bursten UCLA and NBER Javer Cravno UCLA August 202 Jonathan Vogel Columba and NBER Abstract Ths Addendum derves the results dscussed n secton 3.3 of our

More information

Fuzzy TOPSIS Method in the Selection of Investment Boards by Incorporating Operational Risks

Fuzzy TOPSIS Method in the Selection of Investment Boards by Incorporating Operational Risks , July 6-8, 2011, London, U.K. Fuzzy TOPSIS Method n the Selecton of Investment Boards by Incorporatng Operatonal Rsks Elssa Nada Mad, and Abu Osman Md Tap Abstract Mult Crtera Decson Makng (MCDM) nvolves

More information