markets to hedge
play

Markets to Hedge Information Security Risks Pankaj Pandey and - PowerPoint PPT Presentation

Using Prediction Markets to Hedge Information Security Risks Pankaj Pandey and Einar Arthur Snekkenes Email: pankaj.pandey2@hig.no einar.snekkenes@hig.no Norwegian Information Security Lab (NISLab) Gjvik University College, Norway


  1. Using Prediction Markets to Hedge Information Security Risks Pankaj Pandey and Einar Arthur Snekkenes Email: pankaj.pandey2@hig.no einar.snekkenes@hig.no Norwegian Information Security Lab (NISLab) Gjøvik University College, Norway www.nislab.no www.hig.no Wednesday, 15 October 2014

  2. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 2 What Wh at is is a a Pr Prediction ediction Ma Market? rket?  Decision Markets, Information Markets, Virtual Stock Markets, Speculative Markets  Markets that are designed and operated with the primary purpose of mining and aggregation of information which is scattered among traders. Subsequently this information is used in the form of market values to predict the specific future events[1]

  3. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 3 Pu Public lic Pr Predicti ediction on Ma Markets rkets

  4. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 4 Pr Private ivate Pred Predict iction ion Ma Markets rkets

  5. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 5 Related elated Exa xamples mples Saddam FutureMAP Security

  6. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 6 Fut utureMAP ureMAP Pr Project oject  Future Markets Applied to Prediction (FutureMAP) project started in 2001 by Defense Advanced Research Project Agency (DARPA), USA [2]  To be used as a ‘Electronic Market based Decision Support’  To improve the existing approaches of collecting intelligence information

  7. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 7 Sad addam dam Sec ecurity urity Stu tudy dy  To study if decision makers can be informed in real time by means of existing financial, energy and prediction markets [3]  ‘Saddam Security Contract ’ @ Tradesports.com paid if and only if Saddam Hussein was out of office by 30/Jun/2003  Relationship between Equity, Spot and Future Prices of Oil and ‘Saddam Security’

  8. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 8 Sad addam dam Sec ecurity urity Stu tudy dy  High Price for Saddam Security => High Chance of War  High Price of Oil => Medium Impact on Supply  Negative correlation between S&P 500 future price for one year ahead => Negative Impact on global economy

  9. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 9 Case Ca se fo for r IS ISPM PM Low Coverage Cyber Insurance High Premiums Risk Mitigation Instrument Exclusions Systematic Risk

  10. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 10 Exp xpected ected benefits enefits of of IS ISPM PM  Capital Makets have less or no moral hazard  Participants do not need to prove their claim  No risk of � adverse selection �  Transparent and fair prices  Lower transaction cost due to economics of volume  Greater coverage and easily accessible 

  11. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 11 Des esign ign Is Issue sues Participants Market Contracts & Mechanism Incentives

  12. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 12 Des esign ign Is Issue sues Derivatives Contracts Insurance Linked Derivatives

  13. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 13 Des esign ign Is Issue sues Continuous Double Auction Model Continuous Double Auction with Market Maker Market Pari-Mutuel Market Model Mechanism Market Scoring Rule Dynamic Pari-Mutuel Market Model

  14. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 14 Des esign ign Is Issue sues Hedgers Participants Speculators

  15. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 15 Des esign ign Is Issue sues Real Money Incentives Digital Currency Reputation Play Money Score

  16. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 16 Risk Ri sk As Asse sessm ssment ent of of IS ISPM PM Standards on Issue of Risk of Decision Acceptance Failure Criteria Market Market Bubbles Manipulation

  17. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 17 Risk Ri sk As Asse sessm ssment ent of of IS ISPM PM  People may have reservations regarding idea, financial instruments and trading  Foreign currency swaps were not developed until 1980s  Futures market on stock price indices did not exist until 1982 Issue of  Weather derivative traded for the first time in Acceptance 1997, now accounts for billions of dollars  Carbon emissions trading market had a slow start  Macro markets were never developed to allow actual trading

  18. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 18 Risk Ri sk As Asse sessm ssment ent of of IS ISPM PM  Long time to acceptance  Prone to high risk of failure Fear of  Consumer Price Index (CPI) Futures Market estd. In 1985 in USA and failed in 1986 Failure  CPI Market succeed in Brazil  Point is not that such markets cannot succeed but they take time to get accepted by others

  19. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 19 Risk Ri sk As Asse sessm ssment ent of of IS ISPM PM  Lack of standards on what constitutes an information security attack Decision  Index linked triggers can be developed but we do not have an index linked to Criteria information security  Homogeneity in decision criteria on settlement of contracts

  20. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 20 Risk Ri sk As Asse sessm ssment ent of of IS ISPM PM  Bubbles in Information security market cannot be ruled out  Eventual burst of the bubble will lead to sudden market crash Market Bubbles  Market prices will not reflect the ‘true’ prices  Difficult to differentiate between a bubble price and a true price  Bubbles will inhibit the whole purpose of risk hedging

  21. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 21 Risk Ri sk As Asse sessm ssment ent of of IS ISPM PM Market Manipulation Market Fair Market Price Manipulation Speculative Bubbles

  22. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 22 Co Conclusi nclusion on  Outlined the use of prediction market to hedge information security risks  Benefits of prediction market for trading of financial and insurance-linked instruments are larger than the challenges  Substantial proportion (if not, all) of the information security risk can be hedged

  23. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 23 Fu Futu ture re Work Work  Architecture (Design issues) of information security prediction market  Designing different types of trading contracts  Implementation of information security prediction market

  24. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 24

  25. 15-Oct-14 Using Prediction Markets to Hedge Information Security Risks 25 Referen Re ferences ces J. E. Berg and T. A. Rietz, �Prediction markets as decision support systems,� 1) Information Systems Frontiers, vol. 5, no. 1, pp. 79 – 93, Jan. 2003. R. Hanson, �Designing real terrorism futures,� Public Choice, vol. 128, no. 1, pp. 257 – 2) 274, 2006. 3) J. Wolfers and E. Zitzewitz, �Using markets to inform policy: The case of the iraq war,� NBER Working Paper, 2006. http://www.bloomberg.com/news/2014-08-29/next-u-s-bank-bailout-could-come- 4) after-a-cyber-terror-attack.html

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend