World Leading Hi-Tech Research Defining World Leading Risk Management & Risk Analytics Practices
*Projects *Goldman Sachs *JP Morgan *Wall Street Hedge Funds *Princeton Quant Presentations *Model Risk Management *SR11-7 & OCC2011-12
*Research *Future of Finance *Bayesian vs. VaR *Markov Chain Monte Carlo Models *Cyber Finance *Future of Risk *Cyber Risk *Bitcoin Protocol

Current Research Projects at www.FinRM.org. Below: Historical Archive of Prior Research, Intelligence, and, Analysis Tools.
IT Security and Information Assurance Glossary of 4,000 Terms: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z
*
@brint.com
IT Security, Information Assurance, Controls, and Compliance: Portals-Glossary on 4,000 Topics: D
"Best site for information technology and business information" - Computerworld
*

Research Analyst Wizard: Click on a term to create most-updated research microsite on that topic.


D
DAC: Discretionary Access Control · DACL: Discretionary access control list · Daemon · daisy chain · Damage Evaluation · Dashboard · DAT USB drive · DAT USB tape drive · Data / Information · Data Aggregation · Data Analysis · data availability · Data Capture · Data Classification · Data Classification Scheme · Data Communications · Data Custodian · data decryption · data decryption IC · Data Decryption Integrated Circuits · Data Dictionary · Data Diddling · data encryption · data encryption IC · Data Encryption Standard (DES) · Data Flow · Data Flow Control · data integrity · data key · Data Leakage · Data Mart · data masking · Data Mining · Data Normalization · Data Origin Authentication · Data Owner · Data Privacy · Data Protection Act 1984/1998 · Data Retention · Data Safe · Data Security · data splitting · Data Structure · Data Transfer Device · Data Warehouse · Data Warehousing · Data Oriented Systems Development · Database · Database Administrator (DBA) · Database Management System (DBMS) · Database Replication · Database Specifications · Datagram · Datascope · DCS 1000 · DDoS · DDoS attack · DDoS: Distributed Denial of Service Attack · de perimeterisation · de perimeterization · DEA: Data Encryption Algorithm · Dead Tree Edition · Debug · Decapsulation · Decentralization · Decertification · decipher · Deciplegic · Decision Support Systems (DSS) · decode · decoding · decrypt · decryption · Decryption Key · DED · Dedicated Mode · Deep Packet Inspection · Defacement · Defamation Act 1997 (UK) · Default · Default Classification · Default Deny Policy · Default ID or Default Password · Default Password · Defcon · Defense Acquisition Regulatory Council (DARC) · defense in depth · Defense In Depth · Defense Message System · Defense In Depth · Degauss · Degaussing · Degaussing Media · DEK: Data Encryption Key · Delegated Development Program · demilitarized zone · Demodulation · Demographic · deniable encryption · Denial of Service · Denial of Service (DoS) attack · Denial of Service Attack (DOS) · Deny · deperimeterisation · deperimeterization · depository · Depreciation · DERA: Defence Evaluation and Research Agency · DES · DES / AES · DES: Data Encryption Standard · Descriptive Top Level Specification · Designated Approval Authority · Desktop · desktop administration · desktop management · desktop security · DESX or DES X · Detailed IS Controls · Detective Controls · Development Library · Development Machine · Device · DH: Diffie Hellman · DHA · DHA (Directory Harvest Attack) · DHA: Directory Harvest Attack · DHCP spoofing · DHCP Starvation · DHTML · Dial Back · Dial back · Dial in Access Controls · Dial up · Dial up connection · dictionary attack · Differential Cryptanalysis · Diffie Hellman · Diffie Hellman Key Agreement Standard · Diffie Hellman key exchange · Diffing · digest authentication · DigiCrime · Digital · Digital Certificate · Digital Certification · Digital Code Signing · Digital Discovery · Digital Envelope · Digital Evidence · Digital Evidence Discovery · Digital Fingerprint · Digital forensics · Digital Signature · Digital Signature Algorithm · Digital Signature Standard · Digital Silhouettes · Digital Versatile Disk DVD · digital watermark · Digital watermarking · Direct Reporting Engagement · Direct Shipment · Directive 95/46/EC · directory climbing · Directory Harvest Attack (DHA) · directory traversal · DISA: Defense Information Systems Agency · Disassembler · Disassembly · Disaster · Disaster Declaration · Disaster Notification Fee · disaster recovery · disaster recovery plan · Disaster Recovery Plan Desk Checking · Disaster Recovery Plan DRP · Disaster Recovery Plan Walk through · disaster recovery planning · Disaster Tolerance · Disclosure Controls and Procedures · Discount Rate · Discovery Sampling · Discretionary Access Control · Discretionary Access Control (DAC) · Disk Mirroring · Disk sector · Diskless Workstations · disposable email · Disruption · Distinguished Name · Distributed Data Processing Network · distributed denial of service attack · Distributed Denial of Service Attack (DDoS) · distributed DoS attack · Distributed Processing · Distributed Scans · DITSCAP: Department of Defense Information Technology Security · Diverse Routing · DLL: Dynamic Link Library · DMCA: Digital Millennium Copyright Act · DMS · DMS: Defense Message System · DMZ · DMZ: DeMilitarized Zone · DNS · DNS (Domain Name System) server · DNS Attack · DNS cache poisoning · DNS cache poisoning Pharming · DNS poisoning · DNS Poisoning or DNS Cache Poisoning · DNS Spoofing · DNS: Domain Name System · DOI: Domain of Interpretation · Domain · Domain Hijacking · Domain name · Domain Name Server (DNS) · Domain Name System (DNS) · Domain Name System (DNS) Poisoning · Domain Name System Block Lists (DNSBL) · domain name system poisoning · DomainKeys · dongle · DoS (Denial of Service) attack · DoS Attack: Denial of Service Attack · DOS prompt · DoS: Denial of Service · Dot bug vulnerability · Double loop Step · Down · Download · download · Downloading · Downtime · Downtime Report · DPAPI: Data Protection API · DPI · Drill Down · Drive by Hacking · drive by pharming · drive by spamming · Driver · Driver (Value and Risk) · DRM: Digital Rights Management · Drop Accountability · DRP · DRP: Disaster Recovery Plan · Dry pipe Fire Extinguisher System · DSA: Digital Signature Algorithm · DSL · dsl modem · DSniff · DSO exploit · DSO Exploit: Data Source Object Exploit · DSS · DSS: Digital Signature Standard · Dual Control · Dual International Mobile Subscriber Identity · Dual Homed Gateway · Due Care · due diligence · Due Professional Care · dumb · dumb network · Dumb Terminal · Dumb Terminal · dump site · DumpSec · Dumpster Diving · Duplex Routing · Duress Feature · Dynamic Analysis · Dynamic Host Configuration Protocol (DHCP) · Dynamic Key Derivation · dynamic packet filter · Dynamic proxy · Dynamic Routing Protocol

Research Portals and Glossary of 4,000 IT Security and Information Assurance Terms
A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z

SAMPLE OF FinTech PROJECTS LEADING GLOBAL FIRMS & NATIONAL ECONOMIES

FinTech Enterprise Risk-Model Risk Management meet Penetration Testing-Ethical Hacking

2015 National CSO-CxO Cybersecurity Conference

Cybersecurity & Cyber-Finance Risk Management: Strategies, Tactics, Operations, &, Intelligence: Enterprise Risk Management to Model Risk Management: Understanding Vulnerabilities, Threats, & Risk Mitigation

CSO-CxO Plenary Keynote, National Cybersecurity Summit, Altria Group Inc. Headquarters, VA, 2015

New York Cyber Security and Engineering Technology Association (NYSETA) Conference
A Framework for Pen Testing Network Protocols for Global Banking & Finance Call Centers: Bridging Networks, Systems, and, Controls Frameworks for Cybersecurity Curricula & Standards Development
(Innovative Design and Development Practices)

New York Cyber Security and Engineering Technology Association (NYSETA) Conference, 2015.




29 SSRN Top-10 Paper Rankings in FinTech Quant Risk Analytics-Model Risk Management
  1. SSRN's Top-10 Paper: CGN: Risk Management Practice: January 2016.
  2. SSRN's Top-10 Paper: CGN: Risk Management, Including Hedging & Derivatives: January 2016.
  3. SSRN's Top-10 Paper: Corporate Governance Practice Series eJournal: January 2016.
  4. SSRN's Top-10 Paper: IRPN: Innovation & Cyberlaw & Policy: January 2016.
  5. SSRN's Top-10 Paper: Econometrics: Mathematical Methods & Programming eJournal: May 2015.
  6. SSRN's Top-10 Paper: Computational Techniques: May 2015.
  7. SSRN's Top-10 Paper: Information Systems & Economics eJournal: May 2015.
  8. SSRN's Top-10 Paper: Econometrics: Mathematical Methods & Programming eJournal: April 2015.
  9. SSRN's Top-10 Paper: ERN: Computational Techniques (Topic): April 2015.
  10. SSRN's Top-10 Paper: Econometric Modeling: Risk Management eJournal: March 2015.
  11. SSRN's Top-10 Paper: Econometric Modeling: Capital Markets - Risk eJournal: March 2015.
  12. SSRN's Top-10 Paperr: Econometric Modeling: Capital Markets - Risk eJournal: March 2015.
  13. SSRN's Top-10 Paper: MRN Operations Research Network eJournal: March 2015.
  14. SSRN's Top-10 Paper: OPER Subject Matter eJournal: March 2015.
  15. SSRN's Top-10 Paper: Systemic Risk (Topic): March 2015.
  16. SSRN's Top-10 Paper: Econometrics: Mathematical Methods & Programming eJournal: March 2015.
  17. SSRN's Top-10 Paper: Econometric & Statistical Methods - Special Topics eJournal: February 2015.
  18. SSRN's Top-10 Paper: Microeconomics: Decision-Making under Risk & Uncertainty eJournal: February 2015.
  19. SSRN's Top-10 Paper: VaR Value-at-Risk (Topic): February 2015.
  20. SSRN's Top-10 Paper: ERN: Uncertainty & Risk Modeling (Topic): February 2015.
  21. SSRN's Top-10 Paper: ERN: Econometric & Statistical Methods (Topic): February 2015.
  22. SSRN's Top-10 Paper: Computational Techniques (Topic): February 2015.
  23. SSRN's Top-10 Paper: OPER: Analytical (Topic): February 2015.
  24. SSRN's Top-10 Paper: ERN: Mathematical Methods & Programming (Topic): February 2015.
  25. SSRN's Top-10 Paper: Stochastic Models eJournal: February 2015
  26. SSRN's Top-10 Paper: Econometric Modeling: Capital Markets - Risk eJournal: January 2015.
  27. SSRN's Top-10 Paper: Microeconomics: Decision-Making under Risk & Uncertainty eJournal: January 2015.
  28. SSRN's Top-10 Paper: Uncertainty & Risk Modeling (Topic): January 2015.
  29. SSRN's Top-10 Paper: VaR Value-at-Risk (Topic): January 2015.



Princeton University Invited FinTech Research Presentation on Model Risk Management
Pioneering the FinTech Future of Global Cyber Finance and Cyber Risk Insurance

'"It is this "true" uncertainty, and not risk, as has been argued, which forms the basis of a valid theory of profit and accounts for the divergence between actual and theoretical competition... It is a world of change in which we live, and a world of uncertainty...If we are to understand the workings of the economic system we must examine the meaning and significance of uncertainty; and to this end some inquiry into the nature and function of knowledge itself is necessary."
-- Frank H. Knight
in
Risk, Uncertainty, and Profit

(Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co), 1921.

Risk, Uncertainty, and Profit: Frank Knight
(Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co), 1921.

2015 Princeton Quant Trading Conference
'Knight Reconsidered':
Risk, Uncertainty, and, Profit for the Cyber Era: Model Risk Management of Cyber Insurance Models using Quantitative Finance and Advanced Analytics

(Global Risk Management Network, LLC, 2015).




Top Wall Street Banks' Model Risk Management Beyond VaR for Extreme Risks
FinTech Technical Expert to Top MDs Team for World's Largest Investment Bank


Cryptanalytic Algorithms and Quantum ComputingBeyond 'Bayesian vs. VaR' Dilemma to Empirical Model Risk Management: How to Manage Risk (After Risk Management Has Failed).
(Global Risk Management Network, LLC, 2012, 2014)

Cryptanalytic Algorithms and Quantum Computing

Measuring & Managing Financial Risks with Improved Alternatives Beyond Value-At-Risk (VaR)
(Global Risk Management Network, LLC, 2012).


FinTech Markov Chain Monte Carlo Models and Bitcoin Block Chain Encryption Protocols

Markov Chain Monte Carlo Models, Gibbs Sampling, and, Metropolis-Hastings Algorithms

Markov Chain Monte Carlo Models,
Gibbs Sampling, and, Metropolis-Hastings Algorithms

(Global Risk Management Network, LLC, 2013).
Complex Stochastics Hi-Dimensional Statistical Analysis

Bitcoin Protocol: Model of ‘Cryptographic Proof’ Based Global Crypto-Currency & Electronic Payments System
Bitcoin Protocol: Model of 'Cryptographic Proof' Based Global Crypto-Currency & Electronic Payments System
(Global Risk Management Network, LLC, 2013).
First Report on the Bitcoin Cryptographic-Proof-of-Work



FinTech Computational Quantitative Cryptanalytic Algorithms for Cyber-Quantum Era


Cryptanalytic Algorithms and Quantum ComputingFuture of Bitcoin & Statistical Probabilistic Quantitative Methods: Interview by Hong Kong Institute of Certified Public Accountants
(Global Risk Management Network, LLC, January 20, 2014.)

Cryptanalytic Algorithms and Quantum Computing
Cryptology beyond Shannon’s Information Theory: Preparing for when the ‘Enemy Knows the System’: Beyond NSF Cryptanalytic Algorithms
(Global Risk Management Network, LLC, 2013.)


AACSB Recognizes Real Impact among Nobel Laureates such as Black-Scholes
Pioneered Anticipatory Risk Analytics Frameworks Applied by Top Investment Banks 

“There are many examples illustrating that advances in basic research have had a substantial impact on practice. Exemplars of this phenomenon can be seen in finance through academic publications on the theories of portfolio selection (Markowitz, 1952), irrelevance of capital structure (Modigliani and Miller, 1958), capital asset pricing (Sharpe, 1964), efficient markets (Fama, 1965 and 1970), option pricing (Black and Scholes, 1973), and agency theory (Jensen and Meckling, 1976). All are well-known for their substantial impact on both theory and practice. In information systems, the research of Malhotra (Malhotra, 2004) has helped companies to understand why knowledge management systems fail...

AACSB logoAACSB

MORE...

Cryptanalytic Algorithms and Quantum Computing

“The new business model of the Information Age, however, is marked by fundamental, not incremental, change. Businesses can't plan long-term; instead, they must shift to a more flexible "anticipation-of-surprise" model.”
-- Yogesh Malhotra in CIO Magazine interview, Sep. 15, 1999.


 

Leading Global Enterprise Risk Management and Model Risk Management Practices

"The future is moving so quickly that you can’t anticipate it… We have put a tremendous emphasis on quick response instead of planning. We will continue to be surprised, but we won't be surprised that we are surprised. We will anticipate the surprise."
*
20-Years of the Model Risk Management Program
  “The new business model of the Information Age, however, is marked by fundamental, not incremental, change. Businesses can't plan long-term; instead, they must shift to a more flexible "anticipation-of-surprise" model.”
-- Yogesh Malhotra in CIO Magazine interview, Sep. 15, 1999.
[A Decade Later... Wall Street CEO, CFOs, & CROs know so... ]
Model Risk Management Program

 

Global-National Expert Panels of Computer Scientists & Quantitative Economists
Global-National Thought Leader for UN, NSF, US & World Governments & Parliaments

National Science Foundation  IBM

  USA Federal Government
US Dept. of Veteran Affairs

Government and Cabinet Of Mexico

United Nations

Government and Cabinet Of Netherlands

Nation of South Korea
Maeil Business TV

ACM  IEEE HP
TiE Silicon Valley  Accenture
Intel  Philips
British Telecom  Institute for Supply Management
The Conference Board

MORE...

Digital Transformation Research in Global Business & Technology Press

CIO Magazine
CIO Insight
Inc.
Fortune
Wall Street Journal
MORE...


Digital Transformation Ventures in Global Business & Technology Press

Media Coverage Media Coverage
MORE...


Digital Transformation Venture Clients, Patrons, & Subscribers

A sample of our corporate and organizational clients, patrons, and users is listed below:

FinTech Firms: Goldman Sachs, Google, HP, IBM, Intel, Microsoft, Ogilvy, Wells Fargo

Consulting Firms: Accenture, Ernst & Young, McKinsey, PricewaterhouseCoopers

World Governments: Australia, Canada, European Union, United Kingdom, United States

U.S. Defense: AFRL, Air Force, Army, CCRP, Comptroller, DISA, DoD, NASA, Navy, RAND

World Defense: Australia (Air Force), Canada (Defence R&D), UK (Ministry of Defence)

Business Schools: Harvard, MIT, Princeton, Stanford, UC Berkeley, Wharton

Associations
: AACSB, ABA, ACM, AICPA, AOM, APICS, ASTD, ISACA, IEEE, INFORMS

"Founder Yogesh Malhotra says his vision is to fill the gaps between business and technology, data and knowledge, and, theory and practice..."
-
Dr. Yogesh Malhotra in Fortune
Interview

MORE...


Cyber Transformation Practices Guiding US DoD Commanders & CxOs
("Obsolete what you know before others obsolete it..."
- Dr. Yogesh Malhotra in Inc. Interview)

United States Army United States Navy United States Air Force United States Marine Corps AFRL
"If you spend some time at [the digital research lab] founded by Dr. Malhotra youwill be blessed by some of the world's most astute thinking on the nature of knowledge and its value." 
- U.S. Army Knowledge Symposium, Theme: "Knowledge Dominance: Transforming the Army...from Tooth to Tail", US Department of Defense, United States Army.

"There are many definitions of knowledge management. It has been described as "a systematic process for capturing and communicating knowledge people can use." Others have said it is "understanding what your knowledge assets are and how to profit from them." Or the flip side of that: "to obsolete what you know before others obsolete it." (Malhotra) "
- U.S. Department of Defense, Office of the Under Secretary of Defense (Comptroller)

"KM is obsoleting what you know before others obsolete it and profit by creating the challenges and opportunities others haven't even thought about -- Dr. Yogesh Malhotra, in Inc. Technology Interview"
- U.S. Defense Information Systems Agency Interoperability Directorate

MORE...

Top-3 Most Influential Scholars-Practitioners
in Knowledge Management
(Ranked in Drexel University Global Survey of IS Practice)

Vision Korea Campaign Keynotes
Dr. Yogesh Malhotra among other 'Vision Korea' National Campaign Keynote Speakers in Vision Korea National Campaign (2000): Dr.Charles Lucier of Booz Allen Hamilton, Dr.David Snowden of IBM, Dr.Robert H. Buckman of Buckman Labs, Dr.Hubert Saint-Onge of Canadian Imperial Bank of Commerce, Professor Dr.Ikujiro Nonaka of Hitotsubashi University

MORE...

Pioneered Knowledge Management Digital Transformation Practices
Led Global Virtual Team of 200-PhD Experts & CxOs to Publish Pioneering Research

CyberspaceOrganizations
Published in 2000
CyberspaceBusinessModels
Published in 2001

CyberspaceBusinessModels
Journal Articles & Reports 1993-Present

Published independent Study paper on computer graphics image compression standards for hypermedia computing technologies, the precursor of WWW, on MBA graduate research fellowship with B2B pioneer and full tuition scholarship in 1993.

MORE...



Developed Top Digital Research Site, Search Engine, & Social Network

Top-Ranked Digital Research Site: Computerworld Best Web Site Award


Top-3 Search Engine: Carnegie Mellon University Industry.Net National Awards


Top-10 Social Network: Popular Rankings after LinkedIn

Led Global Virtual Community of Practice of 130,000+ to Pioneer Digital Transformation Practices
Millions of worldwide users included Global-2000 Corporations and G-20 World Governments.

Top3SearchEngineBRINT

Top-3 Search Engines Ranked in the Carnegie Mellon University: National Industry.Net Awards


Top of Page

Global Risk Management Network: 'Your Survival Network for The Brave New World Of Business'tm

Global RISK Management Network | Help & FAQs

Terms of Use | Privacy | © Copyrights 2012
Global Risk Management Network, LLC, Cornell Business and Technology Park, Ithaca, NY 14852-4892, U.S.A.