An Adversarial Risk Analysis Approach to Fraud Detection

Size: px
Start display at page:

Download "An Adversarial Risk Analysis Approach to Fraud Detection"

Transcription

1 An Adversarial Risk Analysis Approach to Fraud Detection J. Cano 1 D. Ríos Insua 2 1 URJC 2 ICMAT-CSIC, Spain 20th IFORS. Barcelona. July 15, 2014

2 Outline A framework for risk analysis A framework for adversarial risk analysis A framework for risk analysis and adversarial risk analysis Case study: fighting fare evasion 2/25

3 General overview Risk analysis methodology to mitigate negative effects of threats that may harm system performance. Adversarial risk analysis expands RA to deal with intelligent intentional adversaries. Application in fraud detection in relation with access to a paid facility. 3/25

4 1. A framework for risk analysis 4/25

5 Risk analysis influence diagrams and expected utility Hazard Mitigation Option Hazard Extra Mitigation Extra Utility Total Utility Total Utility Basic With risk assessment With risk management ψ = n u(c)π(c)dc, ψ r = q j j=0 u(c)π j (c)dc, n ψ m = max q j (m) u(c)π j (c m)dc m M j=0 5/25

6 2. A framework for adversarial risk analysis 6/25

7 Sequential Defend-Attack model Defence Option Hazard Attack Option Defence Option Hazard Attack Option Defence Option Hazard Attack Option u D u A u D u A Coupled Defender s problem Attacker s problem 7/25

8 Solving strategy Defender aims at finding optimal defense d. Consequences evaluated through utility u D (d,s) ψ D (d a) = u D (d,s)p D (s d,a)ds. Suppose Defender able to assess p D (a d). Then, she can compute ψ D (d) = ψ D (d a)p D (a d)ds. and solve d max d D ψ D (d). 8/25

9 Assessment of Attacker s intentions To obtain p D (a d), solve Attacker s problem (E.U. max.) a (d) = arg max a A u A (a,s)p A (s d,a)ds. Defender lacks knowledge ( u A ( ),p A (s ) ) ( U A,P A ). Approximate p D (a d) through Monte Carlo simulation. Assessment of P A ( ) typically based on p D ( ) Dirichlet distribution (process) for discrete (continuous). For U A, information about Attacker s interests Aggregate with weighted measurable value function. Assume risk proneness. Distributions over weights and risk proneness coefficient. 9/25

10 3. A framework for risk analysis and adversarial risk analysis 10/25

11 General influence diagram Mitigation Option Hazard Attack Attacker Mitigation Extra Attack Attacker Total u D u A Incorporate uncertainty from non-adversarial threats. Defender s u D aggregates consequences from both problems. 11/25

12 4. Case study: fighting fare evasion 12/25

13 Influence diagram Countermeasures Customers Prop. of fraudsters Prop. of colluders Colluders decision Fraud cost operator colluders u D u C 13/25

14 Description of problem Metro operator D protecting from: Fare evasion. Two types of evaders: Standard (standard random process). Colluders (ARA; explicitly modeling intentionality). Role Features d 1 Inspector Prev./rec. Inspect customers. Collect fines d 2 Door guard Prev. Control access points d 3 Guard Prev. Patrol along the facility d 4 Door Prev. New secured automatic access doors d 5 Ticket clerk Prev. Current little implication in security 14/25

15 Feasible portfolios Associated unit costs q 1,q 2,q 3,q 4. d 5 {0,1} (d 5 = 1 clerks involved, incurred costs q 5 ). q 1 d 1 + q 2 d 2 + q 3 d 3 + q 4 d 4 B, d 1,d 2,d 3,d 4 0, d 1,d 2,d 3,d 4 integer, d 4 d 4, d 5 {0,1}, ( d 4 maximum # of doors that may be replaced). 15/25

16 Defender s problem Operator invests d = (d 1,d 2,d 3,d 4,d 5 ). (Constraints) Fare evasion costs (partly mitigated by fines). φ (d) evaders proportion. q(d 1 ) inspection proportion ( φ(d) = φ 0 exp 5 k=1 γ k d k ) + φ r. γk s effect of (d 1,d 2,d 3,d 4,d 5 ) on fraud proportion. (φ 0 + φ r ) current fraud proportion. φ r residual proportion even with infinite resources. Each new inspector # inspected tickets (nonlinear increase). 1 φ(d) N 1 civic customers pay ticket. φ(d)[1 q(d 1 )] N 2 not pay, not caught (loss v). φ(d)q(d 1 ) N 3 do not pay but caught (income f ). 16/25

17 Attacker s problem Colluders see security investments d (Seq D-A). Fare evasion proportion r r, inspection proportion q A (d 1 ) 1 r M 1 pay, abortion (income v). r (1 q A (d 1 )) M 2 not pay, not caught (loss v). r q A (d 1 ) M 3 not pay, caught (income f ). Operational costs, including preparation costs q c A = v(m 2 M 1 ) fm 3 rqm. Colluders risk prone in benefits u A (c A ) = exp(k A c A ), k A > 0. Target: Assess h(r d), Defender s beliefs over proportion of evasion attempts given d. 17/25

18 Solving the Defender s problem Operator benefit/cost balance c D (N 1,N 2,N 3,M 1,M 2,M 3,d) = v(n 2 + M 2 ) + f (N 3 + M 3 ) Operator risk averse to increase in income, u D (c D ) = exp( k D c D ). Evaluate security plan d maximizing expected utility 5 k=1 q k d k. [ ] 1 ψ D (x) = p M1M2M3d pn 1 d p2 N 2 d p3 N 3 d u D(c D ) N 1,N 2,N 3 M 1,M 2,M 3 h(r d)dr. 18/25

19 Results 0.5 3% 3% 6% 6% 12% 12% Expected utility x * x * x * Portfolio 19/25

20 Results p 0 + p r = 0.03,M = p 0 + p r = 0.06,M = p 0 + p r = 0.12,M = x Invest. ψ(x) Income x Invest. ψ(x) x Invest. ψ(x) (1,0,0,0,0) (1,2,0,0,0) (1,3,0,0,0) (1,0,0,0,0) (1,0,0,0,0) (1,0,0,0,0) (0,3,0,0,0) (0,3,0,0,0) (0,3,0,0,0) (0,0,2,0,0) (0,0,2,0,0) (0,0,2,0,0) (0,0,0,1,0) (0,0,0,1,0) (0,0,0,1,0) (0,0,0,0,1) (0,0,0,0,1) (0,0,0,0,1) (0,3,2,1,1) (0,3,2,1,1) (0,3,2,1,1) (0,3,2,1,0) (0,3,2,1,0) (0,3,2,1,0) Optimal portfolio d = (1,0,0,0,0), with ψ(x) = 1.12, associated investment 50,000 euros, and expected losses 22,826 euros (investment plus expected balance between fraud and collected fines, +27, 174 euros). Results sensitive to variations in evasion proportion φ r + φ 0. Operator needs higher investments for higher proportions. Essential that inspectors really carry out their task. 20/25

21 Conclusions RA+ARA methodology. Sequential Defend-Attack model as basic template. Expand basic template with additional uncertainty nodes. Case study in metro security fare evasion. 21/25

22 Current methodological developments ARA (Ríos Insua et al., 2009) approach for multithreat problem over multiple sites. (Ríos Insua et al., 2014b) Multiple uncoordinated attacks. Outcome of attacks might affect each other. Extension to multiple sites. Sequential Defend-Attack for each site/threat. Models related by resource constraints and value aggregation. No particular spatial structure. Case study: metro network protection against Fare evasion. (Ríos Insua et al., 2014a) Pickpocketing by a team. 22/25

23 Future developments Multiple defenders and eventual coordination. Coordination and rationality type of attacks. More complex interactions between defenders and attackers. Mobility of resources. 23/25

24 Acknowledgments This project has received funding from the European Union s Seventh Framework Programme for Research, Technological Development and Demonstration under grant agreement no Work has been also supported by the Spanish Ministry of Economy and Innovation program MTM C03-01, the Government of Madrid RIESGOS-CM program S2009/ESP-1685 and the AXA-ICMAT Chair on Adversarial Risk Analysis. Grateful to TMB experts and stakeholders for fruitful discussion about modeling issues. 24/25

25 Bibliography Ríos Insua, D., J. Cano, M. Pellot, R. Ortega Current Trends in Bayesian Methodology with Applications, chap. From Risk Analysis to Adversarial Risk Analysis. CRC Press, To appear. Ríos Insua, D., J. Cano, M. Pellot, R. Ortega Multithreat Multisite Protection: A Case Study in Metro Security. Submitted for publication. Ríos Insua, D., J. Ríos, D. Banks Adversarial risk analysis. Journal of the American Statistical Association 104(486) /25

Adversarial Risk Analysis Models for

Adversarial Risk Analysis Models for Adversarial Risk Analysis Models for Urban Security Resource Allocation David Ríos Insua, Royal Academy Cesar Gil, U. Rey Juan Carlos Jesús Ríos, IBM Research YH COST Smart Cities Wshop Paris, September

More information

Adversarial Risk Analysis

Adversarial Risk Analysis Adversarial Risk Analysis Concepts, Applications and Challenges David Ríos Insua Royal Academy of Sciences IE Univ, June 12 Outline From risk analysis to adversarial risk analysis Motivation Sequential

More information

Modelling cyber-threats in the Airport domain: a case study from the SECONOMICS project. Alessandra Tedeschi, Deep Blue S.r.

Modelling cyber-threats in the Airport domain: a case study from the SECONOMICS project. Alessandra Tedeschi, Deep Blue S.r. Modelling cyber-threats in the Airport domain: a case study from the SECONOMICS project Alessandra Tedeschi, Deep Blue S.r.L, Rome, Italy Project overview SECONOMICS is a 36 months project funded in the

More information

Exam Introduction Mathematical Finance and Insurance

Exam Introduction Mathematical Finance and Insurance Exam Introduction Mathematical Finance and Insurance Date: January 8, 2013. Duration: 3 hours. This is a closed-book exam. The exam does not use scrap cards. Simple calculators are allowed. The questions

More information

Tutorials: Abstracts and Speakers Bio

Tutorials: Abstracts and Speakers Bio Tutorials: Abstracts and Speakers Bio 1. Name of Speaker: Rene van Dorp Affiliation: George Washington University, Washington, DC Email or other contact info:[email protected] Brief bio: J. Rene van Dorp

More information

Computing the Electricity Market Equilibrium: Uses of market equilibrium models

Computing the Electricity Market Equilibrium: Uses of market equilibrium models Computing the Electricity Market Equilibrium: Uses of market equilibrium models Ross Baldick Department of Electrical and Computer Engineering The University of Texas at Austin April 2007 Abstract We discuss

More information

Individual security and network design

Individual security and network design Individual security and network design Diego Cerdeiro Marcin Dziubiński Sanjeev Goyal FIT 2015 Motivation Networks often face external threats in form of strategic or random attacks The attacks can be

More information

Stackelberg Security Games for Security. Fernando Ordóñez Universidad de Chile

Stackelberg Security Games for Security. Fernando Ordóñez Universidad de Chile Stackelberg Security Games for Security Fernando Ordóñez Universidad de Chile Stackelberg Games for Security Fernando Ordóñez Universidad de Chile Stackelberg Games for Security Fernando Ordóñez Milind

More information

PROJECT RISK MANAGEMENT

PROJECT RISK MANAGEMENT PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized

More information

QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE

QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE I. A. PAPAZOGLOU System Reliability and Industrial Safety Laboratory National Center for Scientific

More information

Discussion of Çakmakli and Altug: Contructing Coincident Economic Indicators for Emerging Economies

Discussion of Çakmakli and Altug: Contructing Coincident Economic Indicators for Emerging Economies : Contructing Coincident Economic Indicators for Emerging Economies Peter European Commission, Joint Research Centre (JRC); CEU and IE-CERS, HAS October 16-17, 2014, Istanbul Disclaimer The views expressed

More information

Stochastic programming approach to ALM in Finnish pension insurance companies p.1/36

Stochastic programming approach to ALM in Finnish pension insurance companies p.1/36 Stochastic programming approach to ALM in Finnish pension insurance companies Aktuaaritoiminnan kehittämissäätiön syysseminaari 17.11.2004 Teemu Pennanen Helsinki School of Economics Stochastic programming

More information

A Game Theoretical Framework for Adversarial Learning

A Game Theoretical Framework for Adversarial Learning A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

ERM Learning Objectives

ERM Learning Objectives ERM Learning Objectives INTRODUCTION These Learning Objectives are expressed in terms of the knowledge required of an expert * in enterprise risk management (ERM). The Learning Objectives are organized

More information

An Open and Safe Europe What s next?

An Open and Safe Europe What s next? An Open and Safe Europe What s next? Private Security Services Industry views to the European Commission public consultation on the Future of DG HOME Policies The Confederation of European Security Services

More information

Targetting Audits Using Predictive Analytics

Targetting Audits Using Predictive Analytics Targetting Audits Using Predictive Analytics Gareth Myles with Nigar Hashimzade, Frank Page, and Matt Rablen Exeter and IFS July 2013 G Myles (Exeter and IFS) Targetting Audits July 2013 1 / 44 Introduction

More information

Machine Learning and Data Analysis overview. Department of Cybernetics, Czech Technical University in Prague. http://ida.felk.cvut.

Machine Learning and Data Analysis overview. Department of Cybernetics, Czech Technical University in Prague. http://ida.felk.cvut. Machine Learning and Data Analysis overview Jiří Kléma Department of Cybernetics, Czech Technical University in Prague http://ida.felk.cvut.cz psyllabus Lecture Lecturer Content 1. J. Kléma Introduction,

More information

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: [email protected] October 17, 2015 Outline

More information

Version Date Comments / Changes 1.0 February 2008 Initial Policy Released 2.0 September 2013 Policy Revised

Version Date Comments / Changes 1.0 February 2008 Initial Policy Released 2.0 September 2013 Policy Revised Page 1 of 5 APPROVED (S) REVISED / REVIEWED SUMMARY Version Date Comments / Changes 1.0 Initial Policy Released 2.0 Policy Revised POLICY As part of an overall strategy to continuously improve workplace

More information

RULES FOR THE REIMBURSEMENT OF TRAVEL AND SUBSISTENCE EXPENSES FOR EXCHANGE OF OFFICIALS

RULES FOR THE REIMBURSEMENT OF TRAVEL AND SUBSISTENCE EXPENSES FOR EXCHANGE OF OFFICIALS EUROPEAN COMMISSION CONSUMERS, HEALTH AND FOOD EXECUTIVE AGENCY Consumers and Food Safety Unit RULES FOR THE REIMBURSEMENT OF TRAVEL AND SUBSISTENCE EXPENSES FOR EXCHANGE OF OFFICIALS CONSUMER PROGRAMME

More information

Sandro Brusco. Education

Sandro Brusco. Education Sandro Brusco Contact information: e-mail: [email protected] Address: Department of Economics Stony Brook University Stony Brook, NY 11794 Education Sep. 1988 - Jan. 1993 Doctoral program in

More information

Urban Transport Security presented by Patrick Dillenseger RATP

Urban Transport Security presented by Patrick Dillenseger RATP Modular Urban Transport Safety and Security Analysis Final Conference 25 26 June 2012, Cologne Urban Transport Security presented by Patrick Dillenseger RATP 1 Table of Contents Urban Transport Security

More information

Asset Liability Management for Life Insurance: a Dynamic Approach

Asset Liability Management for Life Insurance: a Dynamic Approach Risk Consulting CAPITAL MANAGEMENT ADVISORS srl Asset Liability Management for Life Insurance: a Dynamic Approach Dr Gabriele Susinno & Thierry Bochud Quantitative Strategies Capital Management Advisors

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

The Elasticity of Taxable Income: A Non-Technical Summary

The Elasticity of Taxable Income: A Non-Technical Summary The Elasticity of Taxable Income: A Non-Technical Summary John Creedy The University of Melbourne Abstract This paper provides a non-technical summary of the concept of the elasticity of taxable income,

More information

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

PROJECT RISK MANAGEMENT

PROJECT RISK MANAGEMENT 11 PROJECT RISK MANAGEMENT Project Risk Management includes the processes concerned with identifying, analyzing, and responding to project risk. It includes maximizing the results of positive events and

More information

Designing public private crop insurance in Finland

Designing public private crop insurance in Finland Designing public private crop insurance in Finland Liesivaara 1, P., Meuwissen 2, M.P.M. and Myyrä 1, S 1 MTT Agrifood Research Finland 2 Business Economics, Wageningen University, the Netherlands Abstract

More information

ISO 31000:2009 - ISO/IEC 31010 & ISO Guide 73:2009 - New Standards for the Management of Risk

ISO 31000:2009 - ISO/IEC 31010 & ISO Guide 73:2009 - New Standards for the Management of Risk Kevin W Knight AM CPRM; Hon FRMIA; FIRM (UK); LMRMIA: ANZIIF (Mem) ISO 31000:2009 - ISO/IEC 31010 & ISO Guide 73:2009 - New Standards for the Management of Risk History of the ISO and Risk Management Over

More information

Security risk analysis approach for on-board vehicle networks

Security risk analysis approach for on-board vehicle networks 1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle

More information

On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information

On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information Finance 400 A. Penati - G. Pennacchi Notes on On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information by Sanford Grossman This model shows how the heterogeneous information

More information

ECO 317 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 21 Insurance, Portfolio Choice - Questions

ECO 317 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 21 Insurance, Portfolio Choice - Questions ECO 37 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 2 Insurance, Portfolio Choice - Questions Important Note: To get the best value out of this precept, come with your calculator or

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond

Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond AAAI Technical Report SS-12-03 Game Theory for Security, Sustainability and Health Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond Milind Tambe, Bo An Computer

More information

Monte Carlo Simulation

Monte Carlo Simulation Monte Carlo Simulation Palisade User Conference 2007 Real Options Analysis Dr. Colin Beardsley, Managing Director Risk-Return Solutions Pty Limited www.riskreturnsolutions.com The Plot Today We will review

More information

Project Cost Risk Analysis: The Risk Driver Approach Prioritizing Project Risks and Evaluating Risk Responses

Project Cost Risk Analysis: The Risk Driver Approach Prioritizing Project Risks and Evaluating Risk Responses Project Cost Risk Analysis: The Risk Driver Approach Prioritizing Project Risks and Evaluating Risk Responses David T. Hulett, Ph.D. Keith Hornbacher, MBA Waylon T. Whitehead Hulett & Associates, LLC Los

More information

Table 1: Field Experiment Dependent Variable Probability of Donation (0 to 100)

Table 1: Field Experiment Dependent Variable Probability of Donation (0 to 100) Appendix Table 1: Field Experiment Dependent Variable Probability of Donation (0 to 100) In Text Logit Warm1 Warm2 Warm3 Warm5 Warm4 1 2 3 4 5 6 Match (M) 0.731 0.446 0.965 1.117 0.822 0.591 (0.829) (0.486)

More information

Insurance as Operational Risk Management Tool

Insurance as Operational Risk Management Tool DOI: 10.7763/IPEDR. 2012. V54. 7 Insurance as Operational Risk Management Tool Milan Rippel 1, Lucie Suchankova 2 1 Charles University in Prague, Czech Republic 2 Charles University in Prague, Czech Republic

More information

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The

More information

National Infrastructure Protection Center

National Infrastructure Protection Center National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities

More information

The promise and pitfalls of cyber insurance January 2016

The promise and pitfalls of cyber insurance January 2016 www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped

More information

idata Improving Defences Against Targeted Attack

idata Improving Defences Against Targeted Attack idata Improving Defences Against Targeted Attack Summary JULY 2014 Disclaimer: Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does

More information

Safety Risk Impact Analysis of an ATC Runway Incursion Alert System. Sybert Stroeve, Henk Blom, Bert Bakker

Safety Risk Impact Analysis of an ATC Runway Incursion Alert System. Sybert Stroeve, Henk Blom, Bert Bakker Safety Risk Impact Analysis of an ATC Runway Incursion Alert System Sybert Stroeve, Henk Blom, Bert Bakker EUROCONTROL Safety R&D Seminar, Barcelona, Spain, 25-27 October 2006 Contents Motivation Example

More information

COMPARATIVE RESEARCH ON PROJECT MANAGEMENT APPROACH IN THE EUROPEAN EDUCATIONAL INSTITUTIONS

COMPARATIVE RESEARCH ON PROJECT MANAGEMENT APPROACH IN THE EUROPEAN EDUCATIONAL INSTITUTIONS COMPARATIVE RESEARCH ON PROJECT MANAGEMENT APPROACH IN THE EUROPEAN EDUCATIONAL Armenia ANDRONICEANU The Bucharest University of Economic Studies, Bucharest, Romania [email protected] Bianca

More information

Pricing Barrier Option Using Finite Difference Method and MonteCarlo Simulation

Pricing Barrier Option Using Finite Difference Method and MonteCarlo Simulation Pricing Barrier Option Using Finite Difference Method and MonteCarlo Simulation Yoon W. Kwon CIMS 1, Math. Finance Suzanne A. Lewis CIMS, Math. Finance May 9, 000 1 Courant Institue of Mathematical Science,

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation

More information

Chapter 13: Binary and Mixed-Integer Programming

Chapter 13: Binary and Mixed-Integer Programming Chapter 3: Binary and Mixed-Integer Programming The general branch and bound approach described in the previous chapter can be customized for special situations. This chapter addresses two special situations:

More information

www.cgi-group.co.uk Experience the Commitment IHP360 Insurer Hosted Pricing IHP 360 1

www.cgi-group.co.uk Experience the Commitment IHP360 Insurer Hosted Pricing IHP 360 1 Experience the Commitment IHP360 Insurer Hosted Pricing IHP 360 1 The MIB is committed to managing data for the insurance industry to support accurate pricing, a better customer experience and combatting

More information

A MODEL TO SOLVE EN ROUTE AIR TRAFFIC FLOW MANAGEMENT PROBLEM:

A MODEL TO SOLVE EN ROUTE AIR TRAFFIC FLOW MANAGEMENT PROBLEM: A MODEL TO SOLVE EN ROUTE AIR TRAFFIC FLOW MANAGEMENT PROBLEM: A TEMPORAL AND SPATIAL CASE V. Tosic, O. Babic, M. Cangalovic and Dj. Hohlacov Faculty of Transport and Traffic Engineering, University of

More information

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically

More information

Chapter 14 Managing Operational Risks with Bayesian Networks

Chapter 14 Managing Operational Risks with Bayesian Networks Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian

More information

How To Defend Yourself Against Cyber Attacks

How To Defend Yourself Against Cyber Attacks Overview of Cyber Security: Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel,

More information

Schedule Risk Analysis Simulator using Beta Distribution

Schedule Risk Analysis Simulator using Beta Distribution Schedule Risk Analysis Simulator using Beta Distribution Isha Sharma Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana (INDIA) [email protected] Dr. P.K.

More information

On Compulsory Per-Claim Deductibles in Automobile Insurance

On Compulsory Per-Claim Deductibles in Automobile Insurance The Geneva Papers on Risk and Insurance Theory, 28: 25 32, 2003 c 2003 The Geneva Association On Compulsory Per-Claim Deductibles in Automobile Insurance CHU-SHIU LI Department of Economics, Feng Chia

More information

Lecture Note 1 Set and Probability Theory. MIT 14.30 Spring 2006 Herman Bennett

Lecture Note 1 Set and Probability Theory. MIT 14.30 Spring 2006 Herman Bennett Lecture Note 1 Set and Probability Theory MIT 14.30 Spring 2006 Herman Bennett 1 Set Theory 1.1 Definitions and Theorems 1. Experiment: any action or process whose outcome is subject to uncertainty. 2.

More information

Master in International Business

Master in International Business Master in International Business Offered jointly with Introduction Welcome to Barcelona Welcome to UPF Barcelona, located in the Northeastern coast of Spain, is one of Europe s most cosmopolitan cities

More information

The F Word - Why Facilities Matter

The F Word - Why Facilities Matter The F Word - Why Facilities Matter By Martin Pickard Leaders of businesses and organisations don't want to talk about Facilities. It's a dirty word associated with cleaning, maintenance and other non-core

More information

Retirement Financial Planning: A State/Preference Approach. William F. Sharpe 1 February, 2006

Retirement Financial Planning: A State/Preference Approach. William F. Sharpe 1 February, 2006 Retirement Financial Planning: A State/Preference Approach William F. Sharpe 1 February, 2006 Introduction This paper provides a framework for analyzing a prototypical set of decisions concerning spending,

More information

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015 Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected]

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected] This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

Revenue management based hospital appointment scheduling

Revenue management based hospital appointment scheduling ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 11 (2015 No. 3, pp. 199-207 Revenue management based hospital appointment scheduling Xiaoyang Zhou, Canhui Zhao International

More information

Asset Management Contracts and Equilibrium Prices

Asset Management Contracts and Equilibrium Prices Asset Management Contracts and Equilibrium Prices ANDREA M. BUFFA DIMITRI VAYANOS PAUL WOOLLEY Boston University London School of Economics London School of Economics September, 2013 Abstract We study

More information

Total deliverability gas storage analysis methodology and case study

Total deliverability gas storage analysis methodology and case study Risk, Reliability and Societal Safety Aven & Vinnem (eds) 2007 Taylor & Francis Group, London, ISBN 978-0-415-44786-7 Total deliverability gas storage analysis methodology and case study B. Haukelidsæter

More information

Knowledge. Practical guide to competition damages claims in the UK

Knowledge. Practical guide to competition damages claims in the UK Knowledge Practical guide to competition damages claims in the UK Practical guide to competition damages claims in the UK Contents Reforms to damages litigation in the UK for infringements of competition

More information

How To Find Out What Search Strategy Is Used In The U.S. Auto Insurance Industry

How To Find Out What Search Strategy Is Used In The U.S. Auto Insurance Industry Simultaneous or Sequential? Search Strategies in the U.S. Auto Insurance Industry Current version: April 2014 Elisabeth Honka Pradeep Chintagunta Abstract We show that the search method consumers use when

More information

READING 14: LIFETIME FINANCIAL ADVICE: HUMAN CAPITAL, ASSET ALLOCATION, AND INSURANCE

READING 14: LIFETIME FINANCIAL ADVICE: HUMAN CAPITAL, ASSET ALLOCATION, AND INSURANCE READING 14: LIFETIME FINANCIAL ADVICE: HUMAN CAPITAL, ASSET ALLOCATION, AND INSURANCE Introduction (optional) The education and skills that we build over this first stage of our lives not only determine

More information

INT 3 Schedule Risk Analysis

INT 3 Schedule Risk Analysis INT 3 Schedule Risk Analysis David T. Hulett, Ph.D. Hulett & Associates, LLC ICEAA Professional Development and Training Workshop San Diego, CA June 9-12, 2015 1 Agenda Add uncertainty to the schedule,

More information

A HYBRID GENETIC ALGORITHM FOR THE MAXIMUM LIKELIHOOD ESTIMATION OF MODELS WITH MULTIPLE EQUILIBRIA: A FIRST REPORT

A HYBRID GENETIC ALGORITHM FOR THE MAXIMUM LIKELIHOOD ESTIMATION OF MODELS WITH MULTIPLE EQUILIBRIA: A FIRST REPORT New Mathematics and Natural Computation Vol. 1, No. 2 (2005) 295 303 c World Scientific Publishing Company A HYBRID GENETIC ALGORITHM FOR THE MAXIMUM LIKELIHOOD ESTIMATION OF MODELS WITH MULTIPLE EQUILIBRIA:

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

Improving proposal evaluation process with the help of vendor performance feedback and stochastic optimal control

Improving proposal evaluation process with the help of vendor performance feedback and stochastic optimal control Improving proposal evaluation process with the help of vendor performance feedback and stochastic optimal control Sam Adhikari ABSTRACT Proposal evaluation process involves determining the best value in

More information

Cyber Security Research and Development: A Homeland Security Perspective

Cyber Security Research and Development: A Homeland Security Perspective Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Improving pre-operational production efficiency estimates

Improving pre-operational production efficiency estimates Improving pre-operational production efficiency estimates ESRA seminar 28 th January 2015 Classification: Internal Production efficiency (PE) 100% Estimated production loss PE Production efficiency (PE)

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

OPTIMAL CHOICE UNDER SHORT SELL LIMIT WITH SHARPE RATIO AS CRITERION AMONG MULTIPLE ASSETS

OPTIMAL CHOICE UNDER SHORT SELL LIMIT WITH SHARPE RATIO AS CRITERION AMONG MULTIPLE ASSETS OPTIMAL CHOICE UNDER SHORT SELL LIMIT WITH SHARPE RATIO AS CRITERION AMONG MULTIPLE ASSETS Ruoun HUANG *, Yiran SHENG ** Abstract: This article is the term paper of the course Investments. We mainly focus

More information

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture - 36 Location Problems In this lecture, we continue the discussion

More information

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?

More information

Abstract. 1 Introduction

Abstract. 1 Introduction Amir Tomer Amir Tomer is the Director of Systems and Software Engineering Processes at RAFAEL Ltd., Israel,with whom he has been since 1982,holding a variety of systems and software engineering positions,both

More information

Statistical Analysis of Life Insurance Policy Termination and Survivorship

Statistical Analysis of Life Insurance Policy Termination and Survivorship Statistical Analysis of Life Insurance Policy Termination and Survivorship Emiliano A. Valdez, PhD, FSA Michigan State University joint work with J. Vadiveloo and U. Dias Session ES82 (Statistics in Actuarial

More information

Simulation and Risk Analysis

Simulation and Risk Analysis Simulation and Risk Analysis Using Analytic Solver Platform REVIEW BASED ON MANAGEMENT SCIENCE What We ll Cover Today Introduction Frontline Systems Session Ι Beta Training Program Goals Overview of Analytic

More information

Discrete Optimization

Discrete Optimization Discrete Optimization [Chen, Batson, Dang: Applied integer Programming] Chapter 3 and 4.1-4.3 by Johan Högdahl and Victoria Svedberg Seminar 2, 2015-03-31 Todays presentation Chapter 3 Transforms using

More information

An effective approach to preventing application fraud. Experian Fraud Analytics

An effective approach to preventing application fraud. Experian Fraud Analytics An effective approach to preventing application fraud Experian Fraud Analytics The growing threat of application fraud Fraud attacks are increasing across the world Application fraud is a rapidly growing

More information

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No. As your trusted financial partner, Maps Credit Union is committed to helping you assess and manage risks associated with your business online banking. We recommend that you do a periodic risk assessment

More information