Regulation of IT Risk
In order to regulate the IT risk, governments work to address threat to computer crime. For example, representatives of 29 countries - including Canada, Japan and the U.S. – signed the Council of Europe Cybercrime convention in 2001. The convention deals with substantive and procedural cybercrime law. The substantive defines the following activities as crimina
Recent Situation
“ internal information security attacks are outgrowing external
attacks at the world’s largest financial institutions”
(The Global Security Survey): Only 20% of the respondents in security survey strongly
believed that Information security should be a CEO-level priority
Ernst and Young(2004)
2) IT liability risk management
: The corporations should install f
(Investment Performance Measuring Model)
Cash Flow Model
II. Portfolio 管理 戰略
Portfolio Management 戰略
投資商品別 수익 vs 리스크 분석 (미국 사례)
Portfolio Management - Risk Management
III. Portfolio 成果 Simulation
Portfolio 구성 및 배당 수익률 추정
Portfolio Mix
투자 성과 예측
Case Study - Potential Target Property Simulation
A country of High CR
▪ A country of High CR: China
▪ RISK ASSESSMENT
Good resilience in 2009 thanks to the economic stimulus programme with a rebound expected in 2010
The economy began to slow in 2008 due mainly to domestic imbalances (overcapacity in several sectors) and policies that remained restrictive too long. And these domestic factors were compounded by the cont
II. What Are Credit Derivatives?
Derivatives are defined as the exchange or contract which has economic values deriving from the reference assets or index. According to their types, there are overall forward, future, option, and swap. Derivatives are the financial derivatives, which are enabled to trade in the market while consisting of separating the credit risk only to the holder of basic p