"An employee may be attacked by a potentially sophisticated adversary whose goal is to steal all their data. Therefore, the firm trades off the efficiency benefit of the more permissive data access architecture with the adversarial risk it incurs. We characterize the firm's optimal data access architecture and investigate how it depends both on the adversarial environment and the firm's technology."
top of page
Rechercher
Posts récents
Voir tout“As analysts are primary recipients of these reports, we investigate whether and how analyst forecast properties have changed following...
00
This study proposes a new method for detecting insider trading. The method combines principal component analysis (PCA) with random forest...
00
Cyber risk classifications often fail in out-of-sample forecasting despite their in-sample fit. Dynamic, impact-based classifiers...
30
bottom of page
コメント