Share these talks and lectures with your colleagues
Invite colleaguesWe noted you are experiencing viewing problems
-
Check with your IT department that JWPlatform, JWPlayer and Amazon AWS & CloudFront are not being blocked by your network. The relevant domains are *.jwplatform.com, *.jwpsrv.com, *.jwpcdn.com, jwpltx.com, jwpsrv.a.ssl.fastly.net, *.amazonaws.com and *.cloudfront.net. The relevant ports are 80 and 443.
-
Check the following talk links to see which ones work correctly:
Auto Mode
HTTP Progressive Download Send us your results from the above test links at access@hstalks.com and we will contact you with further advice on troubleshooting your viewing problems. -
No luck yet? More tips for troubleshooting viewing issues
-
Contact HST Support access@hstalks.com
-
Please review our troubleshooting guide for tips and advice on resolving your viewing problems.
-
For additional help, please don't hesitate to contact HST support access@hstalks.com
We hope you have enjoyed this limited-length demo
This is a limited length demo talk; you may
login or
review methods of
obtaining more access.
Printable Handouts
Navigable Slide Index
- Introduction
- Ex post information asymmetry
- Types of ex post security design models
- Verifiable revenue
- Example models
- Effort and ex post information
- Optimal security when Ent. does not know ω
- Optimal security when Ent. knows ω: concave
- Verifiable revenue: general design considerations
- Nonverifiable revenue
- Example of nonverifiable revenue model
- Security contracts when revenue is not verifiable
- Optimal security
- Unverifiable revenue: general design considerations
- Conclusions
- The bottom line
- Implications
This material is restricted to subscribers.
Topics Covered
- Ex post information asymmetry
- Types of ex post security design models
- Verifiable revenue
- Example models
- Effort and ex post information including optimal securities
- Nonverifiable revenue
- Security contracts when revenue is not verifiable including optimal security
- Summary of ex ante and ex post security design & implications for the real world
Talk Citation
Noe, T. (2014, October 7). Security Design 3 [Video file]. In The Business & Management Collection, Henry Stewart Talks. Retrieved October 12, 2024, from https://doi.org/10.69645/IIFL8006.Export Citation (RIS)
Publication History
Security Design 3
Published on October 7, 2014
27 min