Share these talks and lectures with your colleagues
Invite colleaguesWe noted you are experiencing viewing problems
-
Check with your IT department that JWPlatform, JWPlayer and Amazon AWS & CloudFront are not being blocked by your network. The relevant domains are *.jwplatform.com, *.jwpsrv.com, *.jwpcdn.com, jwpltx.com, jwpsrv.a.ssl.fastly.net, *.amazonaws.com and *.cloudfront.net. The relevant ports are 80 and 443.
-
Check the following talk links to see which ones work correctly:
Auto Mode
HTTP Progressive Download Send us your results from the above test links at access@hstalks.com and we will contact you with further advice on troubleshooting your viewing problems. -
No luck yet? More tips for troubleshooting viewing issues
-
Contact HST Support access@hstalks.com
-
Please review our troubleshooting guide for tips and advice on resolving your viewing problems.
-
For additional help, please don't hesitate to contact HST support access@hstalks.com
We hope you have enjoyed this limited-length demo
This is a limited length demo talk; you may
login or
review methods of
obtaining more access.
- Part A: Traditional forms of corporate financing
-
1. Traditional theories of capital structure: trade-off versus pecking order
- Prof. Vidhan K. Goyal
-
2. Venture capital 1
- Prof. Thomas J. Chemmanur
-
3. Venture capital 2
- Prof. Thomas J. Chemmanur
-
4. Venture capital 3
- Prof. Thomas J. Chemmanur
-
5. Security Design 1
- Prof. Tom Noe
-
6. Security Design 2
- Prof. Tom Noe
-
7. Security Design 3
- Prof. Tom Noe
-
8. Initial public offerings 1
- Prof. John Cooney
-
9. Initial public offerings 2
- Prof. John Cooney
- Part B: Innovations in corporate financing policy
-
11. Peer-to-Peer (P2P) lending
- Prof. Laura Gonzalez
-
12. Equity crowdfunding and prosperity
- Prof. Douglas Cumming
-
13. Islamic banking and finance
- Prof. Philip Molyneux
Printable Handouts
Navigable Slide Index
- Introduction
- Ex ante information asymmetry
- Example model Nachman and Noe (1994)
- Securities
- Actions and beliefs
- Valuation
- Ent. payoffs
- Strategies
- Investors
- Perfect Bayesian Equilibrium (PBE)
- Problem: to many PBES
- Use a refinement of PBE, D1 (Cho & Kreps)
- Consequences of the D1 refinement
- Mathematics of security design
- The dual problem
- Solution
- Conditional stochastic dominance (CSD)
- Stochastic dominance vs. CSD
- Debt and stochastic dominance
- Example where debt is not optimal design
This material is restricted to subscribers.
Topics Covered
- Ex ante information asymmetry
- Example model (Nachman & Noe 1994)
- Securities
- Actions and beliefs
- Valuation
- Entrepreneur payoffs and strategies
- Investor beliefs and price assignment
- Perfect Bayesian Equilibrium (PBE)
- D1 refinement of PBE (Cho & Kreps)
- Mathematics of security design
- The dual problem and solution
- Stochastic dominance and debt
- Conditional stochastic dominance
Talk Citation
Noe, T. (2014, October 7). Security Design 2 [Video file]. In The Business & Management Collection, Henry Stewart Talks. Retrieved December 26, 2024, from https://doi.org/10.69645/WMVE6303.Export Citation (RIS)
Publication History
Security Design 2
Published on October 7, 2014
32 min