With the rapid development of information technology and the increasing complexity of the financial market,the teaching methods and means of the Securities Investment course in universities are facing new challenges a...With the rapid development of information technology and the increasing complexity of the financial market,the teaching methods and means of the Securities Investment course in universities are facing new challenges and opportunities.The purpose of this paper is to discuss the application and construction path of virtual simulation experimental teaching in the Securities Investment course.Firstly,it analyses the problems existing in the teaching of traditional securities investment courses,such as the disconnection between theory and practice and the single teaching mode.In order to solve these problems,this paper puts forward the necessity of introducing virtual simulation experimental teaching and details the specific application path of virtual simulation experimental teaching in the Securities Investment course.展开更多
The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,su...The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,such as low participation of residents,and low efficiency of fund use.Taking the exploration of standardization of community security fund management in Wuhou district,Chengdu city,as an example,this paper suggests further strengthening the use and management of community security funds by means of standardization,ensuring the democratic,open,and transparent use of funds,and effectively enhancing the supporting role of community security funds in community governance.展开更多
China should prioritize the establishment and enhancement of a third-party funding system.It should actively refine the existing arbitration rules,addressing any loopholes in the current regulatory framework.Comprehen...China should prioritize the establishment and enhancement of a third-party funding system.It should actively refine the existing arbitration rules,addressing any loopholes in the current regulatory framework.Comprehensive measures should be implemented to regulate third-party funding,aligning with international trends.This is crucial not only to safeguard the foreign investment of the Chinese government and enterprises but also to position China as a globally influential arbitration center.展开更多
The key to sustainability of social security fund is increasing its value, while the key to increasing the value of the social security fund is income of agency entrusted investment. Agency relationship of social secu...The key to sustainability of social security fund is increasing its value, while the key to increasing the value of the social security fund is income of agency entrusted investment. Agency relationship of social security Fund involves four agents, among which the entrustment between National Council for Social Security Fund (SSF) and social security fund management company is a key element. Due to information asymmetry phenomenon in the entrustment management process, the fund needed to establish the appropriate entry and exit criteria, and relying on a third party to avoid agency risks.展开更多
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a...Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.展开更多
Cyber security breaches inflict costs to consumers and businesses. The possibility also exists that a cyber security breach may shut down an entire critical infrastructure industry, putting a nation’s whole economy a...Cyber security breaches inflict costs to consumers and businesses. The possibility also exists that a cyber security breach may shut down an entire critical infrastructure industry, putting a nation’s whole economy and national defense at risk. Hence, the issue of cyber security investment has risen to the top of the agenda of business and government executives. This paper examines how the existence of well-recognized externalities changes the maximum a firm should, from a social welfare perspective, invest in cyber security activities. By extending the cyber security investment model of Gordon and Loeb [1] to incorporate externalities, we show that the firm’s social optimal investment in cyber security increases by no more than 37% of the expected externality loss.展开更多
In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security se...In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security service provider( MSSP) and cooperating with the MSSP, the firm 's optimal investment strategies are discussed by modeling and analyzing the maximum expected utility in the above cases under the condition that the firm plays games with an attacker.The results showthat the best choice for a firm is determined by the reasonable range of the cooperative development coefficient and applicable conditions. When the cooperative development coefficient is large, it is more rational for the firm to cooperate with the MSSP to develop the information system. When the cooperative development coefficient is small, it is more rational for the firm to develop the information system by its own efforts. It also shows that the attacker's maximum expected utility increases with the increase in the attacker 's breach probability and cost coefficient when the cooperative development coefficient is small. On the contrary, it decreases when the cooperative development coefficient is large.展开更多
This paper examines the present situation of China's investment fund industry and some main problems in its development. The authors conclude that the rapid growth of the nation's financial assets and the esta...This paper examines the present situation of China's investment fund industry and some main problems in its development. The authors conclude that the rapid growth of the nation's financial assets and the establishment of a social insurance system provide a good prospect for the development of investment funds in China. Especially, “Government Bond Fund” and “Joint Fund” are expected to be established in the near future.展开更多
In this paper, an analysis of the possibilities of development of milk processing activity was made, using as financing source the public funds provided by the Common Agricultural Policy and the distribution of the in...In this paper, an analysis of the possibilities of development of milk processing activity was made, using as financing source the public funds provided by the Common Agricultural Policy and the distribution of the investments in Romania. All the EU member states gain 99.6 billion through the European Agricultural Fund for Rural Development, the period 2014-2020, of which Romania has received the total of 8.128 billion euros. Through the 2014-2020 National Rural Development Program (NRDP 2014-2020), sub-measure 4.2 "Support for investment in processing/marketing of agricultural products" (2014), Romania is falling Regulation (EC) 1305/2013 in measure 4 "Investments in physical assets" (2013) and contributes to increasing the value added of products on local markets and inter-professional organizations, the establishment and development of small businesses and job creation. Until now, in the milk processing sector, investments of 93,918,043 euros were made, about 50% (47,667.41 euros) of which from public funds.展开更多
A company's fire security investment is part of its fixed costs for production, which means the necessary spending to bring corporate and social benefits. The analysis on the links between the company's fire securit...A company's fire security investment is part of its fixed costs for production, which means the necessary spending to bring corporate and social benefits. The analysis on the links between the company's fire security investments and the economic benefits is a very important and urgent issue. "l-his paper will provide deep analysis of the definitions, meanings and contents of the corporate fire security investments and also make a summary of the direct and indirect economic benefits brought by such investments.展开更多
It is important to determine the most appropriate levels of risk and return for small investors. For that purpose, the investment funds are very important tools to create a portfolio for small investors, to deploy the...It is important to determine the most appropriate levels of risk and return for small investors. For that purpose, the investment funds are very important tools to create a portfolio for small investors, to deploy the potential risks in optimal proportions, and to direct investors. In this study, the performance of 83 pieces of investment funds will be evaluated which are treated in Turkey dates from January 1, 2010 to December 31, 2012 with performance evaluation methods such as Sharpe, Modigliani (M2) that is based on the standard deviation, and Treynor, T2, Jensen that is based on systematic risk (beta), and the highest and lowest performance investment funds will be presented. The aim of the study is to examine the success of the investment fund managers whether they could estimate the course of the market well or not regarding time period. The empirical results show that the investors who invest on the funds that have negative risk premium by investing in the investment funds getting under the risk cannot get more excess return than getting the return from the risk-free interest rate as treasury bills. The result implies that it could be said that the systematic and total risks of all investment funds are low and they are not sensitive to the developments in the market, and thus, regarding funds could be called as conservative funds.展开更多
Investor education is not only one of the most important and fundamental institutional constructions at capital market, but also an important part of the cultural construction of capital market. At the present stage, ...Investor education is not only one of the most important and fundamental institutional constructions at capital market, but also an important part of the cultural construction of capital market. At the present stage, the long-effect mechanism for investor education is not only a demand of China's securities market on its healthy development, but also an objective reality that China's investor education is necessary to confront with. For these reasons, it is necessary for China to deepen investor education, expand investor education platform, strengthen risk prevention, and take initiative to build up a multi-level investor education system, and ultimately establish and improve a long-effect mechanism for investor education, so as to ensure the stable, harmonious and order development of China's Securities market in futures.展开更多
Loyalty program (LP) is a popular marketing activity of enterprises. As a result of firms’ effort to increase customers’ loyalty, point exchange or redemption services are now available worldwide. These services att...Loyalty program (LP) is a popular marketing activity of enterprises. As a result of firms’ effort to increase customers’ loyalty, point exchange or redemption services are now available worldwide. These services attract not only customers but also attackers. In pioneering research, which first focused on this LP security problem, an empirical analysis based on Japanese data is shown to see the effects of LP-point liquidity on damages caused by security incidents. We revisit the empirical models in which the choice of variables is inspired by the Gordon-Loeb formulation of security investment: damage, investment, vulnerability, and threat. The liquidity of LP points corresponds to the threat in the formulation and plays an important role in the empirical study because it particularly captures the feature of LP networks. However, the actual proxy used in the former study is artificial. In this paper, we reconsider the liquidity definition based on a further observation of LP security incidents. By using newly defined proxies corresponding to the threat as well as other refined proxies, we test hypotheses to derive more implications that help LP operators to manage partnerships;the implications are consistent with recent changes in the LP network. Thus we can see the impacts of security investment models include a wider range of empirical studies.展开更多
This paper provides for the presentation, in an integrated manner, of a sequence of results addressing the consequences of the presence of an information steward in an ecosystem under attack and establishes the approp...This paper provides for the presentation, in an integrated manner, of a sequence of results addressing the consequences of the presence of an information steward in an ecosystem under attack and establishes the appropriate defensive investment responses, thus allowing for a cohesive understanding of the nature of the information steward in a variety of attack contexts. We determine the level of investment in information security and attacking intensity when agents react in a non-coordinated manner and compare them to the case of the system’s coordinated response undertaken under the guidance of a steward. We show that only in the most well-designed institutional set-up the presence of the well-informed steward provides for an increase of the system’s resilience to attacks. In the case in which both the information available to the steward and its policy instruments are curtailed, coordinated policy responses yield no additional benefits to individual agents and in some case they actually compared unfavourably to atomistic responses. The system’s sustainability does improve in the presence of a steward, which deters attackers and reduces the numbers and intensity of attacks. In most cases, the resulting investment expenditure undertaken by the agents in the ecosystem exceeds its Pareto efficient magnitude.展开更多
We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakest link. Using the model, we derive and compare o...We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakest link. Using the model, we derive and compare optimal security investment over multiple periods, exploring the delicate balance between proactive and reactive security investment. We show how the best strategy depends on the defender’s knowledge about prospective attacks and the recoverability of costs when upgrading defenses reactively. Our model explains why security under-investment is sometimes rational even when effective defenses are available and can be deployed independently of other parties’ choices. Finally, we connect the model to real-world security problems by examining two case studies where empirical data are available: computers compromised for use in online crime and payment card security.展开更多
Establishing a China-Africa Development Fund(CADFund) to encourage and support Chinese enterprises to invest in Africa was one of the eight measures implemented to strengthen China-Africa cooperation pledged by China ...Establishing a China-Africa Development Fund(CADFund) to encourage and support Chinese enterprises to invest in Africa was one of the eight measures implemented to strengthen China-Africa cooperation pledged by China at the Beijing Summit of the Forum on China-Africa Cooperation(FOCAC) in 2006. The Fund became operational in June 2007 with a first-phase funding of $1 billion provided by China Development Bank(CDB).The funding is expected展开更多
基金The 2024 Hankou University School-Level Teaching Reform Research Project“Research on the Application of Virtual Simulation Experimental Teaching in the Course of Securities Investment”(Project number:2024JY43)。
文摘With the rapid development of information technology and the increasing complexity of the financial market,the teaching methods and means of the Securities Investment course in universities are facing new challenges and opportunities.The purpose of this paper is to discuss the application and construction path of virtual simulation experimental teaching in the Securities Investment course.Firstly,it analyses the problems existing in the teaching of traditional securities investment courses,such as the disconnection between theory and practice and the single teaching mode.In order to solve these problems,this paper puts forward the necessity of introducing virtual simulation experimental teaching and details the specific application path of virtual simulation experimental teaching in the Securities Investment course.
文摘The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,such as low participation of residents,and low efficiency of fund use.Taking the exploration of standardization of community security fund management in Wuhou district,Chengdu city,as an example,this paper suggests further strengthening the use and management of community security funds by means of standardization,ensuring the democratic,open,and transparent use of funds,and effectively enhancing the supporting role of community security funds in community governance.
基金National Social Science Fund project(23BGL052)Shandong Key R&D Program(Soft Science Project)(2023RKY03009)Qingdao Social Science Fund Project(QDSKL2301121)。
文摘China should prioritize the establishment and enhancement of a third-party funding system.It should actively refine the existing arbitration rules,addressing any loopholes in the current regulatory framework.Comprehensive measures should be implemented to regulate third-party funding,aligning with international trends.This is crucial not only to safeguard the foreign investment of the Chinese government and enterprises but also to position China as a globally influential arbitration center.
文摘The key to sustainability of social security fund is increasing its value, while the key to increasing the value of the social security fund is income of agency entrusted investment. Agency relationship of social security Fund involves four agents, among which the entrustment between National Council for Social Security Fund (SSF) and social security fund management company is a key element. Due to information asymmetry phenomenon in the entrustment management process, the fund needed to establish the appropriate entry and exit criteria, and relying on a third party to avoid agency risks.
基金The National Natural Science Foundation of China(No.71371050)
文摘Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.
文摘Cyber security breaches inflict costs to consumers and businesses. The possibility also exists that a cyber security breach may shut down an entire critical infrastructure industry, putting a nation’s whole economy and national defense at risk. Hence, the issue of cyber security investment has risen to the top of the agenda of business and government executives. This paper examines how the existence of well-recognized externalities changes the maximum a firm should, from a social welfare perspective, invest in cyber security activities. By extending the cyber security investment model of Gordon and Loeb [1] to incorporate externalities, we show that the firm’s social optimal investment in cyber security increases by no more than 37% of the expected externality loss.
基金The National Natural Science Foundation of China(No.71371050)
文摘In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security service provider( MSSP) and cooperating with the MSSP, the firm 's optimal investment strategies are discussed by modeling and analyzing the maximum expected utility in the above cases under the condition that the firm plays games with an attacker.The results showthat the best choice for a firm is determined by the reasonable range of the cooperative development coefficient and applicable conditions. When the cooperative development coefficient is large, it is more rational for the firm to cooperate with the MSSP to develop the information system. When the cooperative development coefficient is small, it is more rational for the firm to develop the information system by its own efforts. It also shows that the attacker's maximum expected utility increases with the increase in the attacker 's breach probability and cost coefficient when the cooperative development coefficient is small. On the contrary, it decreases when the cooperative development coefficient is large.
文摘This paper examines the present situation of China's investment fund industry and some main problems in its development. The authors conclude that the rapid growth of the nation's financial assets and the establishment of a social insurance system provide a good prospect for the development of investment funds in China. Especially, “Government Bond Fund” and “Joint Fund” are expected to be established in the near future.
文摘In this paper, an analysis of the possibilities of development of milk processing activity was made, using as financing source the public funds provided by the Common Agricultural Policy and the distribution of the investments in Romania. All the EU member states gain 99.6 billion through the European Agricultural Fund for Rural Development, the period 2014-2020, of which Romania has received the total of 8.128 billion euros. Through the 2014-2020 National Rural Development Program (NRDP 2014-2020), sub-measure 4.2 "Support for investment in processing/marketing of agricultural products" (2014), Romania is falling Regulation (EC) 1305/2013 in measure 4 "Investments in physical assets" (2013) and contributes to increasing the value added of products on local markets and inter-professional organizations, the establishment and development of small businesses and job creation. Until now, in the milk processing sector, investments of 93,918,043 euros were made, about 50% (47,667.41 euros) of which from public funds.
文摘A company's fire security investment is part of its fixed costs for production, which means the necessary spending to bring corporate and social benefits. The analysis on the links between the company's fire security investments and the economic benefits is a very important and urgent issue. "l-his paper will provide deep analysis of the definitions, meanings and contents of the corporate fire security investments and also make a summary of the direct and indirect economic benefits brought by such investments.
文摘It is important to determine the most appropriate levels of risk and return for small investors. For that purpose, the investment funds are very important tools to create a portfolio for small investors, to deploy the potential risks in optimal proportions, and to direct investors. In this study, the performance of 83 pieces of investment funds will be evaluated which are treated in Turkey dates from January 1, 2010 to December 31, 2012 with performance evaluation methods such as Sharpe, Modigliani (M2) that is based on the standard deviation, and Treynor, T2, Jensen that is based on systematic risk (beta), and the highest and lowest performance investment funds will be presented. The aim of the study is to examine the success of the investment fund managers whether they could estimate the course of the market well or not regarding time period. The empirical results show that the investors who invest on the funds that have negative risk premium by investing in the investment funds getting under the risk cannot get more excess return than getting the return from the risk-free interest rate as treasury bills. The result implies that it could be said that the systematic and total risks of all investment funds are low and they are not sensitive to the developments in the market, and thus, regarding funds could be called as conservative funds.
文摘Investor education is not only one of the most important and fundamental institutional constructions at capital market, but also an important part of the cultural construction of capital market. At the present stage, the long-effect mechanism for investor education is not only a demand of China's securities market on its healthy development, but also an objective reality that China's investor education is necessary to confront with. For these reasons, it is necessary for China to deepen investor education, expand investor education platform, strengthen risk prevention, and take initiative to build up a multi-level investor education system, and ultimately establish and improve a long-effect mechanism for investor education, so as to ensure the stable, harmonious and order development of China's Securities market in futures.
文摘Loyalty program (LP) is a popular marketing activity of enterprises. As a result of firms’ effort to increase customers’ loyalty, point exchange or redemption services are now available worldwide. These services attract not only customers but also attackers. In pioneering research, which first focused on this LP security problem, an empirical analysis based on Japanese data is shown to see the effects of LP-point liquidity on damages caused by security incidents. We revisit the empirical models in which the choice of variables is inspired by the Gordon-Loeb formulation of security investment: damage, investment, vulnerability, and threat. The liquidity of LP points corresponds to the threat in the formulation and plays an important role in the empirical study because it particularly captures the feature of LP networks. However, the actual proxy used in the former study is artificial. In this paper, we reconsider the liquidity definition based on a further observation of LP security incidents. By using newly defined proxies corresponding to the threat as well as other refined proxies, we test hypotheses to derive more implications that help LP operators to manage partnerships;the implications are consistent with recent changes in the LP network. Thus we can see the impacts of security investment models include a wider range of empirical studies.
文摘This paper provides for the presentation, in an integrated manner, of a sequence of results addressing the consequences of the presence of an information steward in an ecosystem under attack and establishes the appropriate defensive investment responses, thus allowing for a cohesive understanding of the nature of the information steward in a variety of attack contexts. We determine the level of investment in information security and attacking intensity when agents react in a non-coordinated manner and compare them to the case of the system’s coordinated response undertaken under the guidance of a steward. We show that only in the most well-designed institutional set-up the presence of the well-informed steward provides for an increase of the system’s resilience to attacks. In the case in which both the information available to the steward and its policy instruments are curtailed, coordinated policy responses yield no additional benefits to individual agents and in some case they actually compared unfavourably to atomistic responses. The system’s sustainability does improve in the presence of a steward, which deters attackers and reduces the numbers and intensity of attacks. In most cases, the resulting investment expenditure undertaken by the agents in the ecosystem exceeds its Pareto efficient magnitude.
文摘We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakest link. Using the model, we derive and compare optimal security investment over multiple periods, exploring the delicate balance between proactive and reactive security investment. We show how the best strategy depends on the defender’s knowledge about prospective attacks and the recoverability of costs when upgrading defenses reactively. Our model explains why security under-investment is sometimes rational even when effective defenses are available and can be deployed independently of other parties’ choices. Finally, we connect the model to real-world security problems by examining two case studies where empirical data are available: computers compromised for use in online crime and payment card security.
文摘Establishing a China-Africa Development Fund(CADFund) to encourage and support Chinese enterprises to invest in Africa was one of the eight measures implemented to strengthen China-Africa cooperation pledged by China at the Beijing Summit of the Forum on China-Africa Cooperation(FOCAC) in 2006. The Fund became operational in June 2007 with a first-phase funding of $1 billion provided by China Development Bank(CDB).The funding is expected