Interconnectedness amongst financial institutions has been implicated as a significant contributing factor to the 2008-09 crisis, where shocks were amplified to becoming systemic events. We study two types of networks: correlation network based on publicly traded bank returns, and a physical network based on interbank lending transactions and discuss various analytic approaches for studying their connectivity patterns over time. Some key findings include: (i) both networks behave similarly pin the period preceding the 2008-09 crisis, (ii) during the crisis the correlation network shows an increase in interconnectedness while the physical network highlights a marked decrease in interconnectedness. Moreover, these networks respond differently to monetary and macroeconomic shocks. Physical networks forecast liquidity problems, while correlation networks forecast financial crises.
This document summarizes Sheri Markose's presentation on using multi-agent financial network models (MAFNs) and global macro-net models for macroprudential policymaking. It discusses two key issues with traditional approaches: the paradox of volatility in market data and negative externalities. MAFNs can help visualize systemic risk through bilateral financial data to identify super spreaders and assess network stability. The presentation also covers applications in derivatives modeling, sectoral flows of funds, and insights from country network analyses. Eigenvalue analysis of network structures is discussed as a tool for measuring systemic risk and stabilizing financial systems.
This whitepaper discusses next generation financial risk monitoring using a framework called Datashop Alchemy. It summarizes an approach to measuring systemic risk using interconnectedness between financial institutions and their credit ratings. The framework evaluates daily systemic risk scores using this methodology and visualizes the results. It is intended to help central banks, financial institutions, and other industries monitor systemic risk in their networks to identify risks and support decision making.
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...Mansoor Faridi, CISA
This document discusses the need for international standards to regulate aggressive cyber behavior by foreign states. It provides background on how cyber warfare has become an effective new form of attack that lacks regulation. Current frameworks fail to fully address the issue as they focus on individuals rather than states. The document argues that comprehensive global standards are needed, but developing and implementing them faces challenges that require a collaborative effort between nations. It provides recommendations for a roadmap to establish centralized institutions to design, develop, enforce and prosecute violations of new international cyber standards.
discuss how the types of threats discussed in the article.docxbkbk37
The document discusses cyber threats against critical national infrastructure like pipelines that transport fuel and gas. Such attacks could significantly disrupt the economy by interrupting essential services and causing shortages. Implementing diversity and common practices across organizations could help mitigate these threats by making systems more resilient and better able to share information on threats and solutions. Having diverse teams and recruiting from a variety of backgrounds would also strengthen cybersecurity defenses.
This document summarizes a study on the linkage between systemic risk and rate of return, and the impact of regulations on systemic risk. It defines systemic risk and discusses various ways it can be measured. It then outlines regulations introduced by Basel I, II, and III to reduce systemic risk, including increased capital requirements and liquidity ratios. The document analyzes how management of systemic risk through regulation can affect financial institution profitability and rates of return, finding that completely eliminating systemic risk is impractical as it may hinder economic growth.
This document summarizes Sheri Markose's presentation on using multi-agent financial network models (MAFNs) and global macro-net models for macroprudential policymaking. It discusses two key issues with traditional approaches: the paradox of volatility in market data and negative externalities. MAFNs can help visualize systemic risk through bilateral financial data to identify super spreaders and assess network stability. The presentation also covers applications in derivatives modeling, sectoral flows of funds, and insights from country network analyses. Eigenvalue analysis of network structures is discussed as a tool for measuring systemic risk and stabilizing financial systems.
This whitepaper discusses next generation financial risk monitoring using a framework called Datashop Alchemy. It summarizes an approach to measuring systemic risk using interconnectedness between financial institutions and their credit ratings. The framework evaluates daily systemic risk scores using this methodology and visualizes the results. It is intended to help central banks, financial institutions, and other industries monitor systemic risk in their networks to identify risks and support decision making.
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...Mansoor Faridi, CISA
This document discusses the need for international standards to regulate aggressive cyber behavior by foreign states. It provides background on how cyber warfare has become an effective new form of attack that lacks regulation. Current frameworks fail to fully address the issue as they focus on individuals rather than states. The document argues that comprehensive global standards are needed, but developing and implementing them faces challenges that require a collaborative effort between nations. It provides recommendations for a roadmap to establish centralized institutions to design, develop, enforce and prosecute violations of new international cyber standards.
discuss how the types of threats discussed in the article.docxbkbk37
The document discusses cyber threats against critical national infrastructure like pipelines that transport fuel and gas. Such attacks could significantly disrupt the economy by interrupting essential services and causing shortages. Implementing diversity and common practices across organizations could help mitigate these threats by making systems more resilient and better able to share information on threats and solutions. Having diverse teams and recruiting from a variety of backgrounds would also strengthen cybersecurity defenses.
This document summarizes a study on the linkage between systemic risk and rate of return, and the impact of regulations on systemic risk. It defines systemic risk and discusses various ways it can be measured. It then outlines regulations introduced by Basel I, II, and III to reduce systemic risk, including increased capital requirements and liquidity ratios. The document analyzes how management of systemic risk through regulation can affect financial institution profitability and rates of return, finding that completely eliminating systemic risk is impractical as it may hinder economic growth.
TESTING FOR MORAL HAZARD IN FINANCIAL NETWORKSPer Bäckman
This document summarizes a master's thesis that tests for moral hazard in financial networks. It develops a simulation model to show that players in financial markets can exploit their position within a network. The simulation constructs a network where one firm defaults on an external asset, causing the default to spread through the system as the asset is repackaged and resold. However, the initiating firm only bears part of the consequences due to risk sharing in the network, giving it an incentive to engage in risky behavior. The thesis reviews literature on financial contagion theory, network theory and game theory to develop this model. It then outlines the methodology and intended results sections to analyze data from the simulation to determine how different network structures and positions within them influence
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
ARTICLE IN PRESS
Contents lists available at ScienceDirect
Telecommunications Policy
Telecommunications Policy 33 (2009) 706–719
0308-59
doi:10.1
� Cor
E-m
URL: www.elsevierbusinessandmanagement.com/locate/telpol
Cybersecurity: Stakeholder incentives, externalities,
and policy options
Johannes M. Bauer a,�, Michel J.G. van Eeten b
a Department of Telecommunication, Information Studies, and Media; Quello Center for Telecommunication Management and Law,
Michigan State University, East Lansing, Michigan, USA
b Faculty of Technology, Policy and Management, Delft University of Technology, Delft, The Netherlands
a r t i c l e i n f o
Keywords:
Cybersecurity
Cybercrime
Security incentives
Externalities
Information security policy
Regulation.
61/$ - see front matter & 2009 Elsevier Ltd. A
016/j.telpol.2009.09.001
responding author. Tel.: þ1 517 432 8003; fax:
ail addresses: [email protected] (J.M. Bauer), m
a b s t r a c t
Information security breaches are increasingly motivated by fraudulent and criminal
motives. Reducing their considerable costs has become a pressing issue. Although
cybersecurity has strong public good characteristics, most information security
decisions are made by individual stakeholders. Due to the interconnectedness of
cyberspace, these decentralized decisions are afflicted with externalities that can
result in sub-optimal security levels. Devising effective solutions to this problem is
complicated by the global nature of cyberspace, the interdependence of stakeholders, as
well as the diversity and heterogeneity of players. The paper develops a framework for
studying the co-evolution of the markets for cybercrime and cybersecurity. It examines
the incentives of stakeholders to provide for security and their implications for the ICT
ecosystem. The findings show that market and non-market relations in the information
infrastructure generate many security-enhancing incentives. However, pervasive
externalities remain that can only be corrected by voluntary or government-led
collective measures.
& 2009 Elsevier Ltd. All rights reserved.
1. Introduction
Malicious software (‘‘malware’’) has become a serious security threat for users of the Internet. Estimates of the total cost
to society of information security breaches vary but data published by private security firms, non-profit organizations, and
government, all indicate that their cost is non-negligible and increasing. From a societal point of view, not only the direct
cost (e.g., repair cost, losses due to fraud) but also indirect costs (e.g., costs of preventative measures) and implicit costs
(e.g., slower productivity increases due to reduced trust in electronic transactions) have to be attributed to information
security breaches. Bauer, Van Eeten, Chattopadhyay, and Wu (2008) in a meta-study of a broad range of research conclude
that a conservative estimate of these costs may fall between 0.2% and 0.4% of global GDP. A catastrophic security fail ...
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks ESADE
The process of globalization, the emergence of new powers, and the increasing relevance of non-state actors are creating a multipolar and interconnected world. In the international arena, political and ideological diversity among the most relevant parties, diffusion of power, and the impact of changing global economics have added complexity to the geopolitical landscape. Businesses now operate in a much more difficult, heterogeneous environment.
This publication has been prepared by Zurich Insurance Group Ltd and ESADE.
Section 1: Emerging technologies will fundamentally change the nature of cyber risk.
Section 2: An inadequate global cyber governance framework.
Section 3: Toward a new governance framework: challenges and opportunities.
Addressing Policy Challenges of Disruptive TechnologiesAraz Taeihagh
This special issue examines the policy challenges and government responses to disruptive technologies. It explores the risks, benefits, and trade-offs of deploying disruptive technologies, and examines the efficacy of traditional governance approaches and the need for new regulatory and governance frameworks. Key themes include the need for government stewardship, taking adaptive and proactive approaches, developing comprehensive policies accounting for technical, social, economic, and political dimensions, conducting interdisciplinary research, and addressing data management and privacy challenges. The findings enhance understanding of how governments can navigate the complexities of disruptive technologies and develop policies to maximize benefits and mitigate risks.
This document discusses different approaches to regulating cybersecurity in critical infrastructure providers like electricity transmission companies. It compares "rules-based" regulations, where the policymaker dictates specific security requirements, to "risk-based" regulations, where companies assess their own risks and determine security measures. The document presents an economic model analyzing the tradeoffs of these approaches. It finds that the optimal approach depends on incentives - rules may be better in some contexts, while risk-based approaches work better in others. A balanced, nuanced policy is needed that considers different industry conditions.
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMijsc
Insider threats have been a major problem for the US banking sector in recent years, costing billions of
dollars in damages.
To combat this, the implementation of effective cybersecurity measures is essential. This paper investigates
the current state of insider threats to banks in the U.S., the associated costs, and the potential measures
that can be taken to mitigate this risk. The development of a framework for the adoption of cybersecurity
measures within the banking industry is the primary emphasis in order to stop fraud and lessen financial
losses. Through a detailed examination of the literature, in-depth interviews with experts in the banking
sector, and case studies of existing cybersecurity measures, this paper provides a comprehensive overview
of the problem and potential remedies.
Analysis of the research reveals that identity and access management, data encryption, and secure
authentication are key components of any cybersecurity strategy. Furthermore, it is recommended that
banks increase their technical capabilities and improve their employee awareness and training. The study
concludes with a series of suggestions for enhancing banking industry cybersecurity and eventually
reducing the danger of insider attacks.
This paper explores the topic of insider threats in the US banking industry and presents cybersecurity
measures to prevent fraud. Insider threats from people with access to sensitive data and systems present
serious hazards to the banking industry, resulting in monetary losses, reputational harm, and compromised
data integrity.
Insider Threat Prevention in the US Banking Systemijsc
Insider threats have been a major problem for the US banking sector in recent years, costing billions of dollars in damages.
To combat this, the implementation of effective cybersecurity measures is essential. This paper investigates the current state of insider threats to banks in the U.S., the associated costs, and the potential measures that can be taken to mitigate this risk. The development of a framework for the adoption of cybersecurity measures within the banking industry is the primary emphasis in order to stop fraud and lessen financial losses. Through a detailed examination of the literature, in-depth interviews with experts in the banking sector, and case studies of existing cybersecurity measures, this paper provides a comprehensive overview of the problem and potential remedies.
Analysis of the research reveals that identity and access management, data encryption, and secure authentication are key components of any cybersecurity strategy. Furthermore, it is recommended that banks increase their technical capabilities and improve their employee awareness and training. The study concludes with a series of suggestions for enhancing banking industry cybersecurity and eventually reducing the danger of insider attacks.
This paper explores the topic of insider threats in the US banking industry and presents cybersecurity measures to prevent fraud. Insider threats from people with access to sensitive data and systems present serious hazards to the banking industry, resulting in monetary losses, reputational harm, and compromised data integrity.
1) Over half of companies surveyed experienced at least one ICS security incident in the past 12 months, with the average annual financial loss being $347,603. Larger companies experienced higher losses of $497,097 on average.
2) While most companies feel prepared for an ICS attack, the current approaches are somewhat chaotic and specialized security solutions may not be effectively deployed across many businesses.
3) Common ICS security threats included conventional malware and viruses, as well as targeted attacks, while human error was also a significant cause of incidents. Ransomware attacks caused high losses.
Disruption/Risk Management in supply chains- a reviewBehzad Behdani
This paper describes an integrated framework for handling disruptions in supply chains. The integrated framework incorporates two main perspectives on managing disruptions, namely pre- and post-disruption perspectives, which are usually treated as separate in the existing frameworks. Next, the proposed integrated framework is used to review the literature in supply chain risk/disruption management. The review gives an overview of the key aspects and specific methods that can be used for each step in the framework. Based on the review, some main observations are also discussed. The first is that literature has not uniformly discussed different parts of the framework; pre-disruption steps, such as risk identification and risk treatment, have been explored extensively while post-disruption steps such as disruption detection and learning have been given far less attention. Secondly, there is a lack of quantitative (simulation and modeling) studies for handling supply chain disruptions. These two gaps, therefore, represent avenues for future research on supply chain risk/disruption management.
Capstone Team Report -The Vicious Circle of Smart Grid Securityreuben_mathew
The document summarizes challenges facing different stakeholders in securing the smart grid:
- Utilities face rapid deployment, funding shortfalls, technical challenges explaining security, and sophisticated attacks exploiting systems.
- Regulators have inconsistent standards and gaps between policies, creating confusion.
- Equipment manufacturers consider security important but frameworks are not always implemented, leaving systems vulnerable.
Coordinated efforts are needed between utilities, regulators, and manufacturers to address gaps and build a secure smart grid.
Online security – an assessment of the newsunnyjoshi88
This document discusses online security risks and recommendations. It begins with definitions of online security, information security, information warfare, and internet security risk. It then reviews literature finding increasing dependence on the internet, expansion of criminal activity online like identity theft, and growing demand for cybersecurity specialists. Specific examples of data breaches at major organizations are provided. The document recommends a multi-layered approach to online security including collaboration between governments, businesses, and individuals. It also recommends businesses reconsider security strategies with trends like cloud computing and social media increasing risk.
This document summarizes a study assessing the cyber risk to transportation industrial control systems. The study involved auditing a bridge tunnel control system to understand vulnerabilities. Researchers modeled a "Stuxnet-style" cyber attack scenario involving infecting the control system with malware via USB drive. They developed an event tree to estimate the likelihood of such an attack succeeding. They then simulated the attack's effects in a transportation model to analyze regional impact. The study helped raise awareness of cyber risks with operators and leaders. More such assessments are needed to further understanding of vulnerabilities.
The document identifies information security threat trends over the next 2 years. It outlines 3 main themes: 1) Disruption divides and conquers as connectivity increases cyber threats, 2) Complexity conceals fragility as critical systems become more interconnected and vulnerable, and 3) Complacency bites back as data breaches grow costlier due to industry consolidation and regulation failures. The report analyzes each theme's business impacts, such as reputational damage, production delays, and increased costs.
The document summarizes key findings from a report on cyber threats targeting the financial services sector. The top three findings are:
1. Financial services encounters security incidents 300% more frequently than other industries due to being a prime target.
2. 33% of all reconnaissance and lure attacks target financial services, indicating large efforts to compromise financial institutions.
3. Credential stealing attacks are prominent, with the top threats like Rerdom, Vawtrak, and Geodo having credential theft capabilities. Geodo is seen 400% more in financial services.
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
This document discusses cyber security threats and their impact. It provides an overview of some growing cyber risks and how they can threaten the development of the information society. It argues that increased cooperation and information sharing between cyber security groups is needed to effectively address these challenges. Senior executives and governments must play a leading role in overseeing cyber security and minimizing risks through effective IT governance and strategic alignment of security systems. Overall cyber threats are increasing and declining trust in internet users, so concerted efforts are needed from all stakeholders to promote a more secure information environment.
Cybersecurity Business Risk, Literature ReviewEnow Eyong
Cybersecurity poses a significant business risk to social media corporations. These companies generate revenue through targeted advertising based on analyzing user information and engagement. However, cybersecurity threats could diminish the customer experience and engagement, reducing companies' ability to generate revenue. Social media sites must implement best practices from fields like the military to strengthen cyber defense, including developing reliable information systems, collecting intelligence on cyber criminals, and understanding potential cyber attack threats. Failure to address cybersecurity risks could jeopardize the success and sustainability of social media businesses.
Identifying Key Factors Driving Platform Ecosystem to Collapseijtsrd
Many researchers in many fields have experienced tipping point to their complex systems as in financial markets, in ecological system , but no one has experienced in platforms ecosystem systems. One of the biggest issues those platforms ecosystem can face is the collapse. The risk of approaching to the tipping point is unknown. Complex dynamical system ranging from ecosystem to economy can collapse anytime, but predicting the point where the collapse can occur is difficult. We built a mathematical model S C model which incorporating the dynamics, interactions and mutualistic network for platform ecosystem. We use this model to predict the key factors driving platforms ecosystem to collapse. To get our predictions we used an approximation method to get rid from complexity without losing much generality and still explain the same dynamics. To achieve our results we used matlab software and solved the reduced model. The inevitable factors that lead to collapse are suggesting to be used as early indicators of dramatic changes. We developed a system dynamics model of platform group of suppliers and consumers that includes growth, churn, competition, alliance, negative interaction and mutual interaction between users. We use this model to simulate various development paths by varying different factors, which affect the platform’s ecosystem model. Our simulation results show that ds, dc, Bij, ij, and h are the key factors driving the platform ecosystem to collapse. Lamia Loudahi "Identifying Key-Factors Driving Platform Ecosystem to Collapse" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-6 , October 2022, URL: https://www.ijtsrd.com/papers/ijtsrd51825.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathematics/51825/identifying-keyfactors-driving-platform-ecosystem-to-collapse/lamia-loudahi
Tracking Variation in Systemic Risk-2 8-3edward kane
This paper proposes a new measure of systemic risk for US banks from 1974-2013 based on Merton's model of credit risk. The measure treats deposit insurance as an implicit option where taxpayers cover bank losses. Each bank's systemic risk is its contribution to the value of this sector-wide option. The model estimates show systemic risk peaked in 2008-2009 during the financial crisis, and bank size, leverage, and risk-taking were key drivers of systemic risk over time.
Evaluation of Critical Infrastructure Essential Businesses Amidst Covid -19 U...CSCJournals
This study evaluates the use of network optimization models in an essential infrastructure business during a pandemic. As per the Cyber Infrastructure Security Agency (CISA), there are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered vital to the United States. Their incapacitation or destruction would have a debilitating effect on the security, national economic security, national public health or safety, or any combination thereof.
For this study, we primarily focus on the Healthcare and Public Health Sector (HPH). This branch is considered a core sector as it protects the economy from threats such as terrorism, infectious disease outbreaks, and natural disasters. This evaluation provides insights into the network optimization models used by a pharmaceutical company in administrating vaccinations to its local community during the COVID-19 pandemic. The intended result of the study is to provide an optimized delivery strategy by understanding the pros and cons of the network model that is being used currently and suggest a better strategical network model if available to administrate the vaccination program safely and efficiently throughout the United States.
Recently, the machine learning community has expressed strong interest in applying latent variable modeling strategies to causal inference problems with unobserved confounding. Here, I discuss one of the big debates that occurred over the past year, and how we can move forward. I will focus specifically on the failure of point identification in this setting, and discuss how this can be used to design flexible sensitivity analyses that cleanly separate identified and unidentified components of the causal model.
I will discuss paradigmatic statistical models of inference and learning from high dimensional data, such as sparse PCA and the perceptron neural network, in the sub-linear sparsity regime. In this limit the underlying hidden signal, i.e., the low-rank matrix in PCA or the neural network weights, has a number of non-zero components that scales sub-linearly with the total dimension of the vector. I will provide explicit low-dimensional variational formulas for the asymptotic mutual information between the signal and the data in suitable sparse limits. In the setting of support recovery these formulas imply sharp 0-1 phase transitions for the asymptotic minimum mean-square-error (or generalization error in the neural network setting). A similar phase transition was analyzed recently in the context of sparse high-dimensional linear regression by Reeves et al.
More Related Content
Similar to GDRR Opening Workshop - Network Connectivity and Implications for Systemic Risk - George Michailidis, August 6, 2019
TESTING FOR MORAL HAZARD IN FINANCIAL NETWORKSPer Bäckman
This document summarizes a master's thesis that tests for moral hazard in financial networks. It develops a simulation model to show that players in financial markets can exploit their position within a network. The simulation constructs a network where one firm defaults on an external asset, causing the default to spread through the system as the asset is repackaged and resold. However, the initiating firm only bears part of the consequences due to risk sharing in the network, giving it an incentive to engage in risky behavior. The thesis reviews literature on financial contagion theory, network theory and game theory to develop this model. It then outlines the methodology and intended results sections to analyze data from the simulation to determine how different network structures and positions within them influence
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
ARTICLE IN PRESS
Contents lists available at ScienceDirect
Telecommunications Policy
Telecommunications Policy 33 (2009) 706–719
0308-59
doi:10.1
� Cor
E-m
URL: www.elsevierbusinessandmanagement.com/locate/telpol
Cybersecurity: Stakeholder incentives, externalities,
and policy options
Johannes M. Bauer a,�, Michel J.G. van Eeten b
a Department of Telecommunication, Information Studies, and Media; Quello Center for Telecommunication Management and Law,
Michigan State University, East Lansing, Michigan, USA
b Faculty of Technology, Policy and Management, Delft University of Technology, Delft, The Netherlands
a r t i c l e i n f o
Keywords:
Cybersecurity
Cybercrime
Security incentives
Externalities
Information security policy
Regulation.
61/$ - see front matter & 2009 Elsevier Ltd. A
016/j.telpol.2009.09.001
responding author. Tel.: þ1 517 432 8003; fax:
ail addresses: [email protected] (J.M. Bauer), m
a b s t r a c t
Information security breaches are increasingly motivated by fraudulent and criminal
motives. Reducing their considerable costs has become a pressing issue. Although
cybersecurity has strong public good characteristics, most information security
decisions are made by individual stakeholders. Due to the interconnectedness of
cyberspace, these decentralized decisions are afflicted with externalities that can
result in sub-optimal security levels. Devising effective solutions to this problem is
complicated by the global nature of cyberspace, the interdependence of stakeholders, as
well as the diversity and heterogeneity of players. The paper develops a framework for
studying the co-evolution of the markets for cybercrime and cybersecurity. It examines
the incentives of stakeholders to provide for security and their implications for the ICT
ecosystem. The findings show that market and non-market relations in the information
infrastructure generate many security-enhancing incentives. However, pervasive
externalities remain that can only be corrected by voluntary or government-led
collective measures.
& 2009 Elsevier Ltd. All rights reserved.
1. Introduction
Malicious software (‘‘malware’’) has become a serious security threat for users of the Internet. Estimates of the total cost
to society of information security breaches vary but data published by private security firms, non-profit organizations, and
government, all indicate that their cost is non-negligible and increasing. From a societal point of view, not only the direct
cost (e.g., repair cost, losses due to fraud) but also indirect costs (e.g., costs of preventative measures) and implicit costs
(e.g., slower productivity increases due to reduced trust in electronic transactions) have to be attributed to information
security breaches. Bauer, Van Eeten, Chattopadhyay, and Wu (2008) in a meta-study of a broad range of research conclude
that a conservative estimate of these costs may fall between 0.2% and 0.4% of global GDP. A catastrophic security fail ...
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks ESADE
The process of globalization, the emergence of new powers, and the increasing relevance of non-state actors are creating a multipolar and interconnected world. In the international arena, political and ideological diversity among the most relevant parties, diffusion of power, and the impact of changing global economics have added complexity to the geopolitical landscape. Businesses now operate in a much more difficult, heterogeneous environment.
This publication has been prepared by Zurich Insurance Group Ltd and ESADE.
Section 1: Emerging technologies will fundamentally change the nature of cyber risk.
Section 2: An inadequate global cyber governance framework.
Section 3: Toward a new governance framework: challenges and opportunities.
Addressing Policy Challenges of Disruptive TechnologiesAraz Taeihagh
This special issue examines the policy challenges and government responses to disruptive technologies. It explores the risks, benefits, and trade-offs of deploying disruptive technologies, and examines the efficacy of traditional governance approaches and the need for new regulatory and governance frameworks. Key themes include the need for government stewardship, taking adaptive and proactive approaches, developing comprehensive policies accounting for technical, social, economic, and political dimensions, conducting interdisciplinary research, and addressing data management and privacy challenges. The findings enhance understanding of how governments can navigate the complexities of disruptive technologies and develop policies to maximize benefits and mitigate risks.
This document discusses different approaches to regulating cybersecurity in critical infrastructure providers like electricity transmission companies. It compares "rules-based" regulations, where the policymaker dictates specific security requirements, to "risk-based" regulations, where companies assess their own risks and determine security measures. The document presents an economic model analyzing the tradeoffs of these approaches. It finds that the optimal approach depends on incentives - rules may be better in some contexts, while risk-based approaches work better in others. A balanced, nuanced policy is needed that considers different industry conditions.
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMijsc
Insider threats have been a major problem for the US banking sector in recent years, costing billions of
dollars in damages.
To combat this, the implementation of effective cybersecurity measures is essential. This paper investigates
the current state of insider threats to banks in the U.S., the associated costs, and the potential measures
that can be taken to mitigate this risk. The development of a framework for the adoption of cybersecurity
measures within the banking industry is the primary emphasis in order to stop fraud and lessen financial
losses. Through a detailed examination of the literature, in-depth interviews with experts in the banking
sector, and case studies of existing cybersecurity measures, this paper provides a comprehensive overview
of the problem and potential remedies.
Analysis of the research reveals that identity and access management, data encryption, and secure
authentication are key components of any cybersecurity strategy. Furthermore, it is recommended that
banks increase their technical capabilities and improve their employee awareness and training. The study
concludes with a series of suggestions for enhancing banking industry cybersecurity and eventually
reducing the danger of insider attacks.
This paper explores the topic of insider threats in the US banking industry and presents cybersecurity
measures to prevent fraud. Insider threats from people with access to sensitive data and systems present
serious hazards to the banking industry, resulting in monetary losses, reputational harm, and compromised
data integrity.
Insider Threat Prevention in the US Banking Systemijsc
Insider threats have been a major problem for the US banking sector in recent years, costing billions of dollars in damages.
To combat this, the implementation of effective cybersecurity measures is essential. This paper investigates the current state of insider threats to banks in the U.S., the associated costs, and the potential measures that can be taken to mitigate this risk. The development of a framework for the adoption of cybersecurity measures within the banking industry is the primary emphasis in order to stop fraud and lessen financial losses. Through a detailed examination of the literature, in-depth interviews with experts in the banking sector, and case studies of existing cybersecurity measures, this paper provides a comprehensive overview of the problem and potential remedies.
Analysis of the research reveals that identity and access management, data encryption, and secure authentication are key components of any cybersecurity strategy. Furthermore, it is recommended that banks increase their technical capabilities and improve their employee awareness and training. The study concludes with a series of suggestions for enhancing banking industry cybersecurity and eventually reducing the danger of insider attacks.
This paper explores the topic of insider threats in the US banking industry and presents cybersecurity measures to prevent fraud. Insider threats from people with access to sensitive data and systems present serious hazards to the banking industry, resulting in monetary losses, reputational harm, and compromised data integrity.
1) Over half of companies surveyed experienced at least one ICS security incident in the past 12 months, with the average annual financial loss being $347,603. Larger companies experienced higher losses of $497,097 on average.
2) While most companies feel prepared for an ICS attack, the current approaches are somewhat chaotic and specialized security solutions may not be effectively deployed across many businesses.
3) Common ICS security threats included conventional malware and viruses, as well as targeted attacks, while human error was also a significant cause of incidents. Ransomware attacks caused high losses.
Disruption/Risk Management in supply chains- a reviewBehzad Behdani
This paper describes an integrated framework for handling disruptions in supply chains. The integrated framework incorporates two main perspectives on managing disruptions, namely pre- and post-disruption perspectives, which are usually treated as separate in the existing frameworks. Next, the proposed integrated framework is used to review the literature in supply chain risk/disruption management. The review gives an overview of the key aspects and specific methods that can be used for each step in the framework. Based on the review, some main observations are also discussed. The first is that literature has not uniformly discussed different parts of the framework; pre-disruption steps, such as risk identification and risk treatment, have been explored extensively while post-disruption steps such as disruption detection and learning have been given far less attention. Secondly, there is a lack of quantitative (simulation and modeling) studies for handling supply chain disruptions. These two gaps, therefore, represent avenues for future research on supply chain risk/disruption management.
Capstone Team Report -The Vicious Circle of Smart Grid Securityreuben_mathew
The document summarizes challenges facing different stakeholders in securing the smart grid:
- Utilities face rapid deployment, funding shortfalls, technical challenges explaining security, and sophisticated attacks exploiting systems.
- Regulators have inconsistent standards and gaps between policies, creating confusion.
- Equipment manufacturers consider security important but frameworks are not always implemented, leaving systems vulnerable.
Coordinated efforts are needed between utilities, regulators, and manufacturers to address gaps and build a secure smart grid.
Online security – an assessment of the newsunnyjoshi88
This document discusses online security risks and recommendations. It begins with definitions of online security, information security, information warfare, and internet security risk. It then reviews literature finding increasing dependence on the internet, expansion of criminal activity online like identity theft, and growing demand for cybersecurity specialists. Specific examples of data breaches at major organizations are provided. The document recommends a multi-layered approach to online security including collaboration between governments, businesses, and individuals. It also recommends businesses reconsider security strategies with trends like cloud computing and social media increasing risk.
This document summarizes a study assessing the cyber risk to transportation industrial control systems. The study involved auditing a bridge tunnel control system to understand vulnerabilities. Researchers modeled a "Stuxnet-style" cyber attack scenario involving infecting the control system with malware via USB drive. They developed an event tree to estimate the likelihood of such an attack succeeding. They then simulated the attack's effects in a transportation model to analyze regional impact. The study helped raise awareness of cyber risks with operators and leaders. More such assessments are needed to further understanding of vulnerabilities.
The document identifies information security threat trends over the next 2 years. It outlines 3 main themes: 1) Disruption divides and conquers as connectivity increases cyber threats, 2) Complexity conceals fragility as critical systems become more interconnected and vulnerable, and 3) Complacency bites back as data breaches grow costlier due to industry consolidation and regulation failures. The report analyzes each theme's business impacts, such as reputational damage, production delays, and increased costs.
The document summarizes key findings from a report on cyber threats targeting the financial services sector. The top three findings are:
1. Financial services encounters security incidents 300% more frequently than other industries due to being a prime target.
2. 33% of all reconnaissance and lure attacks target financial services, indicating large efforts to compromise financial institutions.
3. Credential stealing attacks are prominent, with the top threats like Rerdom, Vawtrak, and Geodo having credential theft capabilities. Geodo is seen 400% more in financial services.
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
This document discusses cyber security threats and their impact. It provides an overview of some growing cyber risks and how they can threaten the development of the information society. It argues that increased cooperation and information sharing between cyber security groups is needed to effectively address these challenges. Senior executives and governments must play a leading role in overseeing cyber security and minimizing risks through effective IT governance and strategic alignment of security systems. Overall cyber threats are increasing and declining trust in internet users, so concerted efforts are needed from all stakeholders to promote a more secure information environment.
Cybersecurity Business Risk, Literature ReviewEnow Eyong
Cybersecurity poses a significant business risk to social media corporations. These companies generate revenue through targeted advertising based on analyzing user information and engagement. However, cybersecurity threats could diminish the customer experience and engagement, reducing companies' ability to generate revenue. Social media sites must implement best practices from fields like the military to strengthen cyber defense, including developing reliable information systems, collecting intelligence on cyber criminals, and understanding potential cyber attack threats. Failure to address cybersecurity risks could jeopardize the success and sustainability of social media businesses.
Identifying Key Factors Driving Platform Ecosystem to Collapseijtsrd
Many researchers in many fields have experienced tipping point to their complex systems as in financial markets, in ecological system , but no one has experienced in platforms ecosystem systems. One of the biggest issues those platforms ecosystem can face is the collapse. The risk of approaching to the tipping point is unknown. Complex dynamical system ranging from ecosystem to economy can collapse anytime, but predicting the point where the collapse can occur is difficult. We built a mathematical model S C model which incorporating the dynamics, interactions and mutualistic network for platform ecosystem. We use this model to predict the key factors driving platforms ecosystem to collapse. To get our predictions we used an approximation method to get rid from complexity without losing much generality and still explain the same dynamics. To achieve our results we used matlab software and solved the reduced model. The inevitable factors that lead to collapse are suggesting to be used as early indicators of dramatic changes. We developed a system dynamics model of platform group of suppliers and consumers that includes growth, churn, competition, alliance, negative interaction and mutual interaction between users. We use this model to simulate various development paths by varying different factors, which affect the platform’s ecosystem model. Our simulation results show that ds, dc, Bij, ij, and h are the key factors driving the platform ecosystem to collapse. Lamia Loudahi "Identifying Key-Factors Driving Platform Ecosystem to Collapse" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-6 , October 2022, URL: https://www.ijtsrd.com/papers/ijtsrd51825.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathematics/51825/identifying-keyfactors-driving-platform-ecosystem-to-collapse/lamia-loudahi
Tracking Variation in Systemic Risk-2 8-3edward kane
This paper proposes a new measure of systemic risk for US banks from 1974-2013 based on Merton's model of credit risk. The measure treats deposit insurance as an implicit option where taxpayers cover bank losses. Each bank's systemic risk is its contribution to the value of this sector-wide option. The model estimates show systemic risk peaked in 2008-2009 during the financial crisis, and bank size, leverage, and risk-taking were key drivers of systemic risk over time.
Evaluation of Critical Infrastructure Essential Businesses Amidst Covid -19 U...CSCJournals
This study evaluates the use of network optimization models in an essential infrastructure business during a pandemic. As per the Cyber Infrastructure Security Agency (CISA), there are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered vital to the United States. Their incapacitation or destruction would have a debilitating effect on the security, national economic security, national public health or safety, or any combination thereof.
For this study, we primarily focus on the Healthcare and Public Health Sector (HPH). This branch is considered a core sector as it protects the economy from threats such as terrorism, infectious disease outbreaks, and natural disasters. This evaluation provides insights into the network optimization models used by a pharmaceutical company in administrating vaccinations to its local community during the COVID-19 pandemic. The intended result of the study is to provide an optimized delivery strategy by understanding the pros and cons of the network model that is being used currently and suggest a better strategical network model if available to administrate the vaccination program safely and efficiently throughout the United States.
Similar to GDRR Opening Workshop - Network Connectivity and Implications for Systemic Risk - George Michailidis, August 6, 2019 (20)
Recently, the machine learning community has expressed strong interest in applying latent variable modeling strategies to causal inference problems with unobserved confounding. Here, I discuss one of the big debates that occurred over the past year, and how we can move forward. I will focus specifically on the failure of point identification in this setting, and discuss how this can be used to design flexible sensitivity analyses that cleanly separate identified and unidentified components of the causal model.
I will discuss paradigmatic statistical models of inference and learning from high dimensional data, such as sparse PCA and the perceptron neural network, in the sub-linear sparsity regime. In this limit the underlying hidden signal, i.e., the low-rank matrix in PCA or the neural network weights, has a number of non-zero components that scales sub-linearly with the total dimension of the vector. I will provide explicit low-dimensional variational formulas for the asymptotic mutual information between the signal and the data in suitable sparse limits. In the setting of support recovery these formulas imply sharp 0-1 phase transitions for the asymptotic minimum mean-square-error (or generalization error in the neural network setting). A similar phase transition was analyzed recently in the context of sparse high-dimensional linear regression by Reeves et al.
Many different measurement techniques are used to record neural activity in the brains of different organisms, including fMRI, EEG, MEG, lightsheet microscopy and direct recordings with electrodes. Each of these measurement modes have their advantages and disadvantages concerning the resolution of the data in space and time, the directness of measurement of the neural activity and which organisms they can be applied to. For some of these modes and for some organisms, significant amounts of data are now available in large standardized open-source datasets. I will report on our efforts to apply causal discovery algorithms to, among others, fMRI data from the Human Connectome Project, and to lightsheet microscopy data from zebrafish larvae. In particular, I will focus on the challenges we have faced both in terms of the nature of the data and the computational features of the discovery algorithms, as well as the modeling of experimental interventions.
1) The document presents a statistical modeling approach called targeted smooth Bayesian causal forests (tsbcf) to smoothly estimate heterogeneous treatment effects over gestational age using observational data from early medical abortion regimens.
2) The tsbcf method extends Bayesian additive regression trees (BART) to estimate treatment effects that evolve smoothly over gestational age, while allowing for heterogeneous effects across patient subgroups.
3) The tsbcf analysis of early medical abortion regimen data found the simultaneous administration to be similarly effective overall to the interval administration, but identified some patient subgroups where effectiveness may vary more over gestational age.
Difference-in-differences is a widely used evaluation strategy that draws causal inference from observational panel data. Its causal identification relies on the assumption of parallel trends, which is scale-dependent and may be questionable in some applications. A common alternative is a regression model that adjusts for the lagged dependent variable, which rests on the assumption of ignorability conditional on past outcomes. In the context of linear models, Angrist and Pischke (2009) show that the difference-in-differences and lagged-dependent-variable regression estimates have a bracketing relationship. Namely, for a true positive effect, if ignorability is correct, then mistakenly assuming parallel trends will overestimate the effect; in contrast, if the parallel trends assumption is correct, then mistakenly assuming ignorability will underestimate the effect. We show that the same bracketing relationship holds in general nonparametric (model-free) settings. We also extend the result to semiparametric estimation based on inverse probability weighting.
We develop sensitivity analyses for weak nulls in matched observational studies while allowing unit-level treatment effects to vary. In contrast to randomized experiments and paired observational studies, we show for general matched designs that over a large class of test statistics, any valid sensitivity analysis for the weak null must be unnecessarily conservative if Fisher's sharp null of no treatment effect for any individual also holds. We present a sensitivity analysis valid for the weak null, and illustrate why it is conservative if the sharp null holds through connections to inverse probability weighted estimators. An alternative procedure is presented that is asymptotically sharp if treatment effects are constant, and is valid for the weak null under additional assumptions which may be deemed reasonable by practitioners. The methods may be applied to matched observational studies constructed using any optimal without-replacement matching algorithm, allowing practitioners to assess robustness to hidden bias while allowing for treatment effect heterogeneity.
This document discusses difference-in-differences (DiD) analysis, a quasi-experimental method used to estimate treatment effects. The author notes that while widely applicable, DiD relies on strong assumptions about the counterfactual. She recommends approaches like matching on observed variables between similar populations, thoughtfully specifying regression models to adjust for confounding factors, testing for parallel pre-treatment trends under different assumptions, and considering more complex models that allow for different types of changes over time. The overall message is that DiD requires careful consideration and testing of its underlying assumptions to draw valid causal conclusions.
We present recent advances and statistical developments for evaluating Dynamic Treatment Regimes (DTR), which allow the treatment to be dynamically tailored according to evolving subject-level data. Identification of an optimal DTR is a key component for precision medicine and personalized health care. Specific topics covered in this talk include several recent projects with robust and flexible methods developed for the above research area. We will first introduce a dynamic statistical learning method, adaptive contrast weighted learning (ACWL), which combines doubly robust semiparametric regression estimators with flexible machine learning methods. We will further develop a tree-based reinforcement learning (T-RL) method, which builds an unsupervised decision tree that maintains the nature of batch-mode reinforcement learning. Unlike ACWL, T-RL handles the optimization problem with multiple treatment comparisons directly through a purity measure constructed with augmented inverse probability weighted estimators. T-RL is robust, efficient and easy to interpret for the identification of optimal DTRs. However, ACWL seems more robust against tree-type misspecification than T-RL when the true optimal DTR is non-tree-type. At the end of this talk, we will also present a new Stochastic-Tree Search method called ST-RL for evaluating optimal DTRs.
A fundamental feature of evaluating causal health effects of air quality regulations is that air pollution moves through space, rendering health outcomes at a particular population location dependent upon regulatory actions taken at multiple, possibly distant, pollution sources. Motivated by studies of the public-health impacts of power plant regulations in the U.S., this talk introduces the novel setting of bipartite causal inference with interference, which arises when 1) treatments are defined on observational units that are distinct from those at which outcomes are measured and 2) there is interference between units in the sense that outcomes for some units depend on the treatments assigned to many other units. Interference in this setting arises due to complex exposure patterns dictated by physical-chemical atmospheric processes of pollution transport, with intervention effects framed as propagating across a bipartite network of power plants and residential zip codes. New causal estimands are introduced for the bipartite setting, along with an estimation approach based on generalized propensity scores for treatments on a network. The new methods are deployed to estimate how emission-reduction technologies implemented at coal-fired power plants causally affect health outcomes among Medicare beneficiaries in the U.S.
Laine Thomas presented information about how causal inference is being used to determine the cost/benefit of the two most common surgical surgical treatments for women - hysterectomy and myomectomy.
We provide an overview of some recent developments in machine learning tools for dynamic treatment regime discovery in precision medicine. The first development is a new off-policy reinforcement learning tool for continual learning in mobile health to enable patients with type 1 diabetes to exercise safely. The second development is a new inverse reinforcement learning tools which enables use of observational data to learn how clinicians balance competing priorities for treating depression and mania in patients with bipolar disorder. Both practical and technical challenges are discussed.
The method of differences-in-differences (DID) is widely used to estimate causal effects. The primary advantage of DID is that it can account for time-invariant bias from unobserved confounders. However, the standard DID estimator will be biased if there is an interaction between history in the after period and the groups. That is, bias will be present if an event besides the treatment occurs at the same time and affects the treated group in a differential fashion. We present a method of bounds based on DID that accounts for an unmeasured confounder that has a differential effect in the post-treatment time period. These DID bracketing bounds are simple to implement and only require partitioning the controls into two separate groups. We also develop two key extensions for DID bracketing bounds. First, we develop a new falsification test to probe the key assumption that is necessary for the bounds estimator to provide consistent estimates of the treatment effect. Next, we develop a method of sensitivity analysis that adjusts the bounds for possible bias based on differences between the treated and control units from the pretreatment period. We apply these DID bracketing bounds and the new methods we develop to an application on the effect of voter identification laws on turnout. Specifically, we focus estimating whether the enactment of voter identification laws in Georgia and Indiana had an effect on voter turnout.
This document summarizes a simulation study evaluating causal inference methods for assessing the effects of opioid and gun policies. The study used real US state-level data to simulate the adoption of policies by some states and estimated the effects using different statistical models. It found that with fewer adopting states, type 1 error rates were too high, and most models lacked power. It recommends using cluster-robust standard errors and lagged outcomes to improve model performance. The study aims to help identify best practices for policy evaluation studies.
We study experimental design in large-scale stochastic systems with substantial uncertainty and structured cross-unit interference. We consider the problem of a platform that seeks to optimize supply-side payments p in a centralized marketplace where different suppliers interact via their effects on the overall supply-demand equilibrium, and propose a class of local experimentation schemes that can be used to optimize these payments without perturbing the overall market equilibrium. We show that, as the system size grows, our scheme can estimate the gradient of the platform’s utility with respect to p while perturbing the overall market equilibrium by only a vanishingly small amount. We can then use these gradient estimates to optimize p via any stochastic first-order optimization method. These results stem from the insight that, while the system involves a large number of interacting units, any interference can only be channeled through a small number of key statistics, and this structure allows us to accurately predict feedback effects that arise from global system changes using only information collected while remaining in equilibrium.
We discuss a general roadmap for generating causal inference based on observational studies used to general real world evidence. We review targeted minimum loss estimation (TMLE), which provides a general template for the construction of asymptotically efficient plug-in estimators of a target estimand for realistic (i.e, infinite dimensional) statistical models. TMLE is a two stage procedure that first involves using ensemble machine learning termed super-learning to estimate the relevant stochastic relations between the treatment, censoring, covariates and outcome of interest. The super-learner allows one to fully utilize all the advances in machine learning (in addition to more conventional parametric model based estimators) to build a single most powerful ensemble machine learning algorithm. We present Highly Adaptive Lasso as an important machine learning algorithm to include.
In the second step, the TMLE involves maximizing a parametric likelihood along a so-called least favorable parametric model through the super-learner fit of the relevant stochastic relations in the observed data. This second step bridges the state of the art in machine learning to estimators of target estimands for which statistical inference is available (i.e, confidence intervals, p-values etc). We also review recent advances in collaborative TMLE in which the fit of the treatment and censoring mechanism is tailored w.r.t. performance of TMLE. We also discuss asymptotically valid bootstrap based inference. Simulations and data analyses are provided as demonstrations.
We describe different approaches for specifying models and prior distributions for estimating heterogeneous treatment effects using Bayesian nonparametric models. We make an affirmative case for direct, informative (or partially informative) prior distributions on heterogeneous treatment effects, especially when treatment effect size and treatment effect variation is small relative to other sources of variability. We also consider how to provide scientifically meaningful summaries of complicated, high-dimensional posterior distributions over heterogeneous treatment effects with appropriate measures of uncertainty.
Climate change mitigation has traditionally been analyzed as some version of a public goods game (PGG) in which a group is most successful if everybody contributes, but players are best off individually by not contributing anything (i.e., “free-riding”)—thereby creating a social dilemma. Analysis of climate change using the PGG and its variants has helped explain why global cooperation on GHG reductions is so difficult, as nations have an incentive to free-ride on the reductions of others. Rather than inspire collective action, it seems that the lack of progress in addressing the climate crisis is driving the search for a “quick fix” technological solution that circumvents the need for cooperation.
This document discusses various types of academic writing and provides tips for effective academic writing. It outlines common academic writing formats such as journal papers, books, and reports. It also lists writing necessities like having a clear purpose, understanding your audience, using proper grammar and being concise. The document cautions against plagiarism and not proofreading. It provides additional dos and don'ts for writing, such as using simple language and avoiding filler words. Overall, the key message is that academic writing requires selling your ideas effectively to the reader.
Machine learning (including deep and reinforcement learning) and blockchain are two of the most noticeable technologies in recent years. The first one is the foundation of artificial intelligence and big data, and the second one has significantly disrupted the financial industry. Both technologies are data-driven, and thus there are rapidly growing interests in integrating them for more secure and efficient data sharing and analysis. In this paper, we review the research on combining blockchain and machine learning technologies and demonstrate that they can collaborate efficiently and effectively. In the end, we point out some future directions and expect more researches on deeper integration of the two promising technologies.
In this talk, we discuss QuTrack, a Blockchain-based approach to track experiment and model changes primarily for AI and ML models. In addition, we discuss how change analytics can be used for process improvement and to enhance the model development and deployment processes.
More from The Statistical and Applied Mathematical Sciences Institute (20)
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
GDRR Opening Workshop - Network Connectivity and Implications for Systemic Risk - George Michailidis, August 6, 2019
1. Network Connectivity and Systemic Risk
Network Connectivity and its Implications for Systemic Risk
George Michailidis
Department of Statistics and the Informatics Institute
University of Florida
SAMSI GDRR Workshop
2019
George Michailidis Network Connectivity and Systemic Risk 1 / 36
2. Network Connectivity and Systemic Risk
Concept of Systemic Risk - I
Systemic risk is the possibility that an event at an entity (firm, component) level
could trigger severe instability or collapse of an entire system (industry, economy)
(Colloquial definition)
George Michailidis Network Connectivity and Systemic Risk 2 / 36
3. Network Connectivity and Systemic Risk
Concept of Systemic Risk - I
Systemic risk is the possibility that an event at an entity (firm, component) level
could trigger severe instability or collapse of an entire system (industry, economy)
(Colloquial definition)
In the case of a financial system, it leads to widespread instabilities that impair its
proper functioning to the point where welfare and economic growth suffer
materially
George Michailidis Network Connectivity and Systemic Risk 2 / 36
4. Network Connectivity and Systemic Risk
Concept of Systemic Risk - II
The risk of experiencing a strong systemic event
George Michailidis Network Connectivity and Systemic Risk 3 / 36
5. Network Connectivity and Systemic Risk
Concept of Systemic Risk - II
The risk of experiencing a strong systemic event
Such an event adversely affects a number of systemically important intermediaries
or markets (including potentially related infrastructures)
George Michailidis Network Connectivity and Systemic Risk 3 / 36
6. Network Connectivity and Systemic Risk
Concept of Systemic Risk - II
The risk of experiencing a strong systemic event
Such an event adversely affects a number of systemically important intermediaries
or markets (including potentially related infrastructures)
The trigger of the event could be an exogenous shock outside the system under
consideration
George Michailidis Network Connectivity and Systemic Risk 3 / 36
7. Network Connectivity and Systemic Risk
Concept of Systemic Risk - II
The risk of experiencing a strong systemic event
Such an event adversely affects a number of systemically important intermediaries
or markets (including potentially related infrastructures)
The trigger of the event could be an exogenous shock outside the system under
consideration
Alternatively, the event could emerge endogenously from within the system
George Michailidis Network Connectivity and Systemic Risk 3 / 36
8. Network Connectivity and Systemic Risk
Concept of Systemic Risk - II
The risk of experiencing a strong systemic event
Such an event adversely affects a number of systemically important intermediaries
or markets (including potentially related infrastructures)
The trigger of the event could be an exogenous shock outside the system under
consideration
Alternatively, the event could emerge endogenously from within the system
The systemic event is strong when the intermediaries concerned fail or when the
markets concerned become dysfunctional (in theoretical terms this is often a
non-linearity or a regime change)
George Michailidis Network Connectivity and Systemic Risk 3 / 36
9. Network Connectivity and Systemic Risk
Systemic Risk in Financial Systems
There are, in general, three main forms of systemic risk:
1. contagion risk
2. risk of macro shocks causing simultaneous displacements
3. risk of unraveling of imbalances that have built up over time
George Michailidis Network Connectivity and Systemic Risk 4 / 36
10. Network Connectivity and Systemic Risk
(1) Contagion
Usually refers to a supposedly idiosyncratic problem that becomes more
widespread in the cross-sectional dimension, often in a sequential fashion
An example is one bank failure causing the failure of another bank, even though
the second bank initially seemed solvent
George Michailidis Network Connectivity and Systemic Risk 5 / 36
11. Network Connectivity and Systemic Risk
(2) Large exogenous shock
It negatively affects a range of intermediaries and/or markets in a simultaneous
fashion
For example, it has been observed that banks are vulnerable to economic
downturns
George Michailidis Network Connectivity and Systemic Risk 6 / 36
12. Network Connectivity and Systemic Risk
(3) Unraveling of widespread imbalances
It refers to an endogenous shock that was created over time
Example: a lending boom
George Michailidis Network Connectivity and Systemic Risk 7 / 36
13. Network Connectivity and Systemic Risk
Drivers of Systemic Risk in Financial Systems
A variety of market imperfections, including asymmetric information, incomplete
markets, externalities and the public-good character of systemic stability
They lead to a greater fragility of financial systems in comparison with other
economic sectors, because of
the information intensity and inter-temporal nature of financial contracts
the balance sheet structures of financial intermediaries (often exhibiting high
leverage and maturity mismatches) and
the high degree of interconnectedness of wholesale financial activities
The combination of the above market imperfections with the three features of
financial systems paves the way for powerful feedback mechanisms, amplification
and non-linearities
George Michailidis Network Connectivity and Systemic Risk 8 / 36
14. Network Connectivity and Systemic Risk
Systemic risk in financial systems is a complex phenomenon and developing an
aggregate modeling framework that captures realistic features of financial
instability remains a very challenging task
George Michailidis Network Connectivity and Systemic Risk 9 / 36
15. Network Connectivity and Systemic Risk
Systemic risk in financial systems is a complex phenomenon and developing an
aggregate modeling framework that captures realistic features of financial
instability remains a very challenging task
In this talk focus on:
contagion risk and the role of interconnectedness for banks
George Michailidis Network Connectivity and Systemic Risk 9 / 36
16. Network Connectivity and Systemic Risk
Contagion Risk and Interbank Markets
Iinterbank markets have been a primary locus of systemic risk in the financial
crisis of 2008.
One channel for contagion is through the physical exposures among banks in
these markets.
e.g., in case of differential liquidity shocks (e.g. through depositor withdrawals or
changes in asset valuations that differ across banks), it is beneficial to lend to
each other rather than hoarding liquid assets
Whenever the overall amount of liquid assets in the system may not be sufficient
to honour all interbank market contracts, contagious bank failures may occur
(Allen and Gale, 2000)
Hence, the benefits of sharing risks amongst banks comes at the cost of contagion
risk
George Michailidis Network Connectivity and Systemic Risk 10 / 36
17. Network Connectivity and Systemic Risk
Contagion Risk through Information Assymetries
Another channel for interbank contagion emerges through information problems
that lead to adverse selection phenomena (Flannery, 1996)
e.g., the inability of banks to distinguish between good and bad assets or
counterparties leads them to stop lending and hoard liquidity
It represented a powerful transmission mechanism in 2007-08, that also severely
affected non-banking financial institutions (e.g. hedge funds) (Ferguson et al.,
2007, Cifuentes, et al., 2005)
George Michailidis Network Connectivity and Systemic Risk 11 / 36
18. Network Connectivity and Systemic Risk
Contagion through Endogenously Emerging Risks
When one bank fails, its knowledge about their borrowers gets destroyed making
bank loans more illiquid
As a consequence, the common pool of liquidity shrinks and the resulting shortage
may cause other banks to fail (Diamond and Rajan, 2005)
As the number of bank failures increases, the value of such illiquid bank assets
goes down (cash-in-the-market pricing), worsening the problems in the banking
system (Acharya and Yorulmazer, 2008)
George Michailidis Network Connectivity and Systemic Risk 12 / 36
19. Network Connectivity and Systemic Risk
Contagion Risk and Interconnectedness - I
A fairly large body of economic/finance literature has emerged in the last 20
years, studying the role of networks in the propagation of shocks and hence their
relationship to contagion risk
For example, Allen and Gale (2000), Upper (2006), Braverman and Minca
(20014) consider network linkages as the result of common holdings or direct
contractual agreements
A second stream of literature, examines linkages through equity returns. For
example, Cont and Wagalath (2013, 2014) examine such correlations during the
financial crisis and attribute it to liquidation of large positions by market
participants
De Vries (2005) and Acharya and Yorulmazer (2008) show that if banks hold
stakes in the same companies, bank equities are necessarily interdependent
George Michailidis Network Connectivity and Systemic Risk 13 / 36
20. Network Connectivity and Systemic Risk
Contagion Risk and Interconnectedness - II
A third thrust in the literature examines the role that the degree of connectivity
and the topology of the network play in vulnerability/resilience of the banking
(financial) system to withstand shocks (Allen and Gale, 2000; Freixas et al., 2000;
Gai et al., 2011; Elliott et al., 2014; Acemoglu et al., 2015; Glasserman and
Young, 2015)
George Michailidis Network Connectivity and Systemic Risk 14 / 36
21. Network Connectivity and Systemic Risk
Analysis of Physical and Correlation Networks
Physical networks ← interbank lending
Correlation network ← common asset holdings
Key questions of interest:
How did these two networks behave over time and during the 2008 crisis?
What is their information content and how their structure is correlated to
exogenous shocks?
Implications for systemic risk and macro-prudential dimension of financial
supervision
George Michailidis Network Connectivity and Systemic Risk 15 / 36
22. Network Connectivity and Systemic Risk
An Accounting Framework for linking the two networks
Leveraging work by Shin (2009) and Elliott et al. (2014)
Soem notation:
yi,k denotes the market value of bank i’s assets including loans to firms and
households as well as k asset classes (equities, bonds, commodities, etc.)
wi,k is the weight invested in each of the k assets by bank i; k wi,k = 1
xi denotes the total value of liabilities of bank i held by other banks
xi,j is the value of bank i’s liabilities held by bank j
πi,j is the share of bank i’s liabilities held by bank j.
ei indicates the market value of bank i’s equity
di is the total value of liabilities of bank i held by non-banks
George Michailidis Network Connectivity and Systemic Risk 16 / 36
23. Network Connectivity and Systemic Risk
Accounting Framework - II
and bank’s i balance sheet identity satisfies
k
wi,k yi,k +
j
xj πi,j = ei + xi + di
George Michailidis Network Connectivity and Systemic Risk 17 / 36
24. Network Connectivity and Systemic Risk
Accounting Framework - III
So, the vector of interbank debt can be rewritten as
X = ΠX + WY − E − D ⇐⇒ (I − Π)X = WY − E − D
The left hand side represents the interbank market that depends on the market
value of the portfolio of assets held by banks, the market value of bank equities,
and the value of bank liabilities held by non-banks.
The interbank market is dynamic with a high volume of daily trading
On the other hand, D (debt claims on the banking sector by households, mutual
and pension funds, and other non-bank institutions) changes at much slower time
scales (Shin, 2008)
So, changes to D are less likely to drive interbank lending
George Michailidis Network Connectivity and Systemic Risk 18 / 36
25. Network Connectivity and Systemic Risk
Accounting Framework - IV
Aggregating across all banks, the balance sheet becomes
and hence
E = WY − D
George Michailidis Network Connectivity and Systemic Risk 19 / 36
26. Network Connectivity and Systemic Risk
Accounting Framework - V
Physical Network (I − Π)X = WY − E − D →
directly obtained from transaction data and closely captures liquidity in the
banking system
Correlation Network E = WY − D →
needs to be inferred from market prices, and its behavior is driven by
investors, whereas physical networks are driven by the actions of banks
George Michailidis Network Connectivity and Systemic Risk 20 / 36
27. Network Connectivity and Systemic Risk
Constructing Correlation Networks
In such networks, edges correspond to statistical associations between bank equity
returns
Let ri,t = log(
ei,t
ei,t−1
)
Following, Billio et al. (2012) it is customary to filter the log-returns through a
GARCH(1,1) model
Then, one can construct Pearson correlation, partial correlation (Brownlees et al.,
2018), or partial auto-correlation networks (Billio et al., 2012; Diebold and
Yilmaz, 2014; Basu et al., 2018)
George Michailidis Network Connectivity and Systemic Risk 21 / 36
28. Network Connectivity and Systemic Risk
Focus on Partial Auto-Correlation Networks 1
They can be constructed in a pairwise fashion by regression the log-returns of
bank i on its past history and on those of bank j
A better approach is to use a vector autoregression (VAR) model
However, since there are usually more parameters than time points (data), one
needs to resort to regularization
1
Also referred to in the literature as Granger causal networks (see Basu and Michailidis, 2015;
Basu, Shojaie and Michailidis, 2015
George Michailidis Network Connectivity and Systemic Risk 22 / 36
29. Network Connectivity and Systemic Risk
Detour: VAR in High Dimensions
The VAR model:
p-dimensional, discrete time, stationary process Xt
= {Xt
1 , . . . , Xt
p }
Xt
= A1Xt−1
+ . . . + Ad Xt−d
+ t
, t i.i.d
∼ N(0, Σ ). (1)
A1, . . . , Ad : p × p transition matrices (solid, directed edges).
Σ−1
: contemporaneous dependence (dotted, undirected edges).
stability: Eigenvalues of A(z) := Ip − d
t=1 At zt
outside {z ∈ C, |z| ≤ 1}.
Key challenge: parameter space grows as O(dp2
).
George Michailidis Network Connectivity and Systemic Risk 23 / 36
30. Network Connectivity and Systemic Risk
Estimating VARs through regression
data: {X0
, X1
, . . . , XT
} - one replicate, observed at T + 1 time points
construct autoregression
(XT )
(XT−1)
...
(Xd )
Y
=
(XT−1
) (XT−2
) · · · (XT−d
)
(XT−2
) (XT−3
) · · · (XT−1−d
)
...
...
...
...
(Xd−1
) (Xd−2
) · · · (X0
)
X
A1
...
Ad
B∗
+
( T
)
( T−1
)
...
( d
)
E
vec(Y) = vec(X B∗
) + vec(E)
= (I ⊗ X) vec(B∗
) + vec(E)
Y
Np×1
= Z
Np×q
β∗
q×1
+ vec(E)
Np×1
vec(E) ∼ N (0, Σ ⊗ I)
N = (T − d + 1), q = dp2
Assumption : At are sparse, d
t=1 At 0 ≤ k
George Michailidis Network Connectivity and Systemic Risk 24 / 36
31. Network Connectivity and Systemic Risk
Estimates
1-penalized least squares ( 1-LS)
argmin
β∈Rq
1
N
Y − Zβ 2
+ λN β 1
1-penalized log-likelihood ( 1-LL) (Lin and Michailidis, 2017)
argmin
β∈Rq
1
N
(Y − Zβ) Σ−1
⊗ I (Y − Zβ) + λN β 1
George Michailidis Network Connectivity and Systemic Risk 25 / 36
32. Network Connectivity and Systemic Risk
VAR in High Dimensions
Under the following regularity conditions
VAR process stable;
restricted eigenvalue (strong convexity) condition that regulates the behavior
of the minimum eigenvalue of X X/T over an appropriately defined cone for
the elements of Aj ’s along the directions of their sparse support;
deviation condition that regulates the behavior of X E ∞;
it is established (see Basu and Michailidis, 2015) that
d
h=1
ˆAh − Ah ≤ φ(At , Σ ) k (log dp2)/T .
Further, for Gaussian stable VAR models, the restricted eigenvalue and deviation
conditions are satisfied with high probability
George Michailidis Network Connectivity and Systemic Risk 26 / 36
33. Network Connectivity and Systemic Risk
Comments on the Consistency Results
Estimation error has two components:
1. φ(At , Σ ) large ⇔ the max eigenvalue M(fX ) of the spectral density of Xt is
large, the min eigenvalue m(fX ) of the spectral density of Xt is small
2. Recall that k log dp2/T: Estimation error for independent data
Estimation error same as i.i.d. data, modulo a price for temporal dependence
George Michailidis Network Connectivity and Systemic Risk 27 / 36
34. Network Connectivity and Systemic Risk
Extensions to the basic sparse VAR framework
Other penalties, such as group, sparse group, low rank plus sparse, etc. (Basu,
Shojaie, Michailidis, 2015; Melnyk, Banerjee, 2016; Basu, Li, Michailidis, 2018)
Lag selection through hierarchical VAR models (Nicholson, Matteson, Bien, 2017)
VAR models with local dependence constraints (Schweinberger, Babkin, Ensor,
2017)
VAR-X models with exogenous high-dimensional Z variables -
Xt = AXt−1 + BZt + Et (Lin, Michailidis, 2017)
Change point problems for VAR models (Safikhani, Shojaie, 2017)
Joint estimation of related VAR models (Skripnikov, Michailidis, 2018)
VAR models for count data (Hall, Raskutti, Willett, 2016)
Finite sample bounds for non-stable VAR models with “heavy”-tailed errors
(low-dim regime though, see Faradonbeh, Tewari, Michailidis, 2018)
George Michailidis Network Connectivity and Systemic Risk 28 / 36
35. Network Connectivity and Systemic Risk
European Interbank Market and the eMID data set
Data cover the period 2006-2012
For the physical network, use all 212 banks in the data
For the correlation (Granger causal) network, use data for only the 54
publicly traded banks
In the analysis, the 54-bank physical subnetwork is then examined
The eMID interbank market covers about 20% of all transactions in the Eurozone
Analysis broken into the following three subperiods:
1. a pre-crisis period from January 2, 2006 until August 7, 2007 (when the ECB
noted worldwide liquidity shortages)
2. the first crisis period (pre-Lehman) from August 8, 2007 until September 12,
2008
3. the second crisis period (post-Lehman) from September 16, 2008 through
April 1, 2009 (when the ECB announced the end of the recession)
4. the third (post-recession) crisis period, from April 2, 2009 through December
31, 2012.
George Michailidis Network Connectivity and Systemic Risk 29 / 36
36. Network Connectivity and Systemic Risk
Network Interconnectedness Measures
Both the physical and correlation networks were summarized through a number of
network statistics
1. degree
2. closeness (# of hops between nodes)
3. clustering coefficient (proportion of triangular between banks)
4. eigenvalue centrality (captures hub character of nodes)
5. largest connected component (proportion of banks in the network reachable
by other banks)
George Michailidis Network Connectivity and Systemic Risk 30 / 36
37. Network Connectivity and Systemic Risk
Interconnectedness in the Physical Network
George Michailidis Network Connectivity and Systemic Risk 31 / 36
38. Network Connectivity and Systemic Risk
Inetrconnectedness in the Correlation Network
George Michailidis Network Connectivity and Systemic Risk 32 / 36
39. Network Connectivity and Systemic Risk
Economic Shocks and Network Connectivity
Premise: Markets react to announcements (Faust et al., 2007)
Goal: Aim to compare and contrast, we aim to compare and contrast how shocks
are reflected in the stock market and interbank market
Shocks of interest:
ECB interventions (refinancing operations, and other non-conventional
monetary measures)
Announcements by ECB and other market regulators (used data from Rogers
et al., 2014)
Macroeconomic shocks (used data from Scotti, 2014)
Metholodogy: (follows Kilian and Vega, 2011)
Run regressions with the network connectivity measure as the outcome variable
and the shocks variables as the predictors
George Michailidis Network Connectivity and Systemic Risk 33 / 36
40. Network Connectivity and Systemic Risk
Summary of findings
Correlation and physical networks respond differently to monetary and
macroeconomic shocks
Early in the crisis central banks intervened heavily to promote funding and
market liquidity. Interconnectedness in physical networks adjusts strongly and
quickly to these central bank operations and announcements, revealing
important market characteristics related to interbank trading at short (daily)
horizons.
Conversely, interconnectedness in correlation networks changes little in
response to these events, presumably since these announcements and
interventions have little impact on the factors driving stock returns
In this light, monitoring the response of the interbank market to
announcements and interventions is more valuable to policy makers
interested in monitoring and enhancing interconnectedness among banks
George Michailidis Network Connectivity and Systemic Risk 34 / 36
41. Network Connectivity and Systemic Risk
Can Network Topology Characteristics Forecast Economic Activity Measures?
Test through regression models whether interconnectedness measures may serve
to forecast short-term (daily) economic conditions
Correlation and physical networks can identify (and forecast), at the daily
horizon, hard information like industrial production and retail sales
Complementarily, physical interbank trading networks serve to identify
weakening interconnectedness in the interbank system that may lead to
liquidity problems in the wholesale funding market
George Michailidis Network Connectivity and Systemic Risk 35 / 36
42. Network Connectivity and Systemic Risk
Concluding Remarks
Monitoring connectivity in financial networks can be insightful to policy
makers in understanding systemic risk
However, a modeling framework is needed that delineates information
channels and transmission mechanisms of exogenous/endogenous shocks
Availability of data (with the exception of regulators) is a big challenge to
researchers
Reference: Brunetti, Harris, Mankad and Michailidis (2019), Interconnectedness in
the Interbank Market, Journal of Financial Economics, 133(2), 520-538
George Michailidis Network Connectivity and Systemic Risk 36 / 36