Share these talks and lectures with your colleagues
Invite colleaguesWe noted you are experiencing viewing problems
-
Check with your IT department that JWPlatform, JWPlayer and Amazon AWS & CloudFront are not being blocked by your network. The relevant domains are *.jwplatform.com, *.jwpsrv.com, *.jwpcdn.com, jwpltx.com, jwpsrv.a.ssl.fastly.net, *.amazonaws.com and *.cloudfront.net. The relevant ports are 80 and 443.
-
Check the following talk links to see which ones work correctly:
Auto Mode
HTTP Progressive Download Send us your results from the above test links at access@hstalks.com and we will contact you with further advice on troubleshooting your viewing problems. -
No luck yet? More tips for troubleshooting viewing issues
-
Contact HST Support access@hstalks.com
-
Please review our troubleshooting guide for tips and advice on resolving your viewing problems.
-
For additional help, please don't hesitate to contact HST support access@hstalks.com
We hope you have enjoyed this limited-length demo
This is a limited length demo talk; you may
login or
review methods of
obtaining more access.
- Part A: Traditional forms of corporate financing
-
1. Traditional theories of capital structure: trade-off versus pecking order
- Prof. Vidhan K. Goyal
-
2. Venture capital 1
- Prof. Thomas J. Chemmanur
-
3. Venture capital 2
- Prof. Thomas J. Chemmanur
-
4. Venture capital 3
- Prof. Thomas J. Chemmanur
-
5. Security Design 1
- Prof. Tom Noe
-
6. Security Design 2
- Prof. Tom Noe
-
7. Security Design 3
- Prof. Tom Noe
-
8. Initial public offerings 1
- Prof. John Cooney
-
9. Initial public offerings 2
- Prof. John Cooney
- Part B: Innovations in corporate financing policy
-
11. Peer-to-Peer (P2P) lending
- Prof. Laura Gonzalez
-
12. Equity crowdfunding and prosperity
- Prof. Douglas Cumming
-
13. Islamic banking and finance
- Prof. Philip Molyneux
Printable Handouts
Navigable Slide Index
- Introduction
- Ex post information asymmetry
- Types of ex post security design models
- Verifiable revenue
- Example models
- Effort and ex post information
- Optimal security when Ent. does not know ω
- Optimal security when Ent. knows ω: concave
- Verifiable revenue: general design considerations
- Nonverifiable revenue
- Example of nonverifiable revenue model
- Security contracts when revenue is not verifiable
- Optimal security
- Unverifiable revenue: general design considerations
- Conclusions
- The bottom line
- Implications
This material is restricted to subscribers.
Topics Covered
- Ex post information asymmetry
- Types of ex post security design models
- Verifiable revenue
- Example models
- Effort and ex post information including optimal securities
- Nonverifiable revenue
- Security contracts when revenue is not verifiable including optimal security
- Summary of ex ante and ex post security design & implications for the real world
Talk Citation
Noe, T. (2014, October 7). Security Design 3 [Video file]. In The Business & Management Collection, Henry Stewart Talks. Retrieved November 8, 2024, from https://doi.org/10.69645/IIFL8006.Export Citation (RIS)
Publication History
Security Design 3
Published on October 7, 2014
27 min