Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

Foreign Exchange Intervention By The Bank Of Japan: Bayesian Analysis Using A Bivariate Stochastic Volatility Model, Michael Smith, Andrew Pitts Dec 2005

Foreign Exchange Intervention By The Bank Of Japan: Bayesian Analysis Using A Bivariate Stochastic Volatility Model, Michael Smith, Andrew Pitts

Michael Stanley Smith

A bivariate stochastic volatility model is employed to measure the effect of intervention by the Bank of Japan (BOJ) on daily returns and volume in the USD/YEN foreign exchange market. Missing observations are accounted for, and a data-based Wishart prior for the precision matrix of the errors to the transition equation that is in line with the likelihood is suggested. Empirical results suggest there is strong conditional heteroskedasticity in the mean-corrected volume measure, as well as contemporaneous correlation in the errors to both the observation and transition equations. A threshold model is used for the BOJ reaction function, which is …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …