Showing 1 - 10 of 233
We construct novel text-based measures of firm-level cyber risk exposure based on quarterly earnings calls of 12,000+ firms from 85 countries over 20+ years. We categorize each cyber-related discussion into topics that capture sentiment, monetary loss, country names, etc. We document new facts...
Persistent link: https://www.econbiz.de/10012585390
We develop a novel firm-level measure of cybersecurity risk using textual analysis of cybersecurity-risk disclosures in corporate filings. The measure successfully identifies firms extensively discussing cybersecurity risk in their 10-K, displays intuitive relations with quantitative measures of...
Persistent link: https://www.econbiz.de/10012482415
In this article I first describe the basic principles that parents employ in disciplining their children. The description is based on a survey of parents, the major results of which are that parental sanctions are premised on wrongdoing--not on the mere causation of harm; that parental sanctions...
Persistent link: https://www.econbiz.de/10014248008
While the advent of cryptocurrencies and digital assets holds promise for improving and disrupting financial systems by offering cheap, quick, and secure transfer of value, it also opens up new payment channels for cybercrimes. A prerequisite to solving a problem is understanding the nature of...
Persistent link: https://www.econbiz.de/10013537728
Central banking in an age of digital currencies is a fast-developing topic in monetary economics. Algorithmic digital currencies such as bitcoin appear to be viable competitors to central bank fiat currency, and their presence in the marketplace may pressure central banks to pursue tighter...
Persistent link: https://www.econbiz.de/10012456437
Can competition among privately issued fiat currencies such as Bitcoin or Ethereum work? Only sometimes. To show this, we build a model of competition among privately issued fiat currencies. We modify the current workhorse of monetary economics, the Lagos-Wright environment, by including...
Persistent link: https://www.econbiz.de/10012456518
We develop a theoretical model of security investments in a network of interconnected agents. Network connections introduce the possibility of cascading failures due to an exogenous or endogenous attack depending on the profile of security investments by the agents. The general presumption in...
Persistent link: https://www.econbiz.de/10012459488
In this paper we study how the existence of a functioning market for technology differentially conditions the entry strategy and survival of different types of entrants, and the role of scale, marketing ability and technical assets. Markets for technology facilitate entry of firms that lack...
Persistent link: https://www.econbiz.de/10012465005
Security baskets and index-lined securities are securities whose values are functions of the cash flows or values of other assets. Creation of these "composite" securities would seem to be redundant since investors can cost1ess1y replicate them. In this paper we study the existence and optimal...
Persistent link: https://www.econbiz.de/10012475296
Data is nonrival: a person's location history, medical records, and driving data can be used by any number of firms simultaneously. Nonrivalry leads to increasing returns and implies an important role for market structure and property rights. Who should own data? What restrictions should apply...
Persistent link: https://www.econbiz.de/10012480204