39,957 research outputs found

    Neurobiological studies of risk assessment: A comparison of expected utility and mean-variance approaches

    Get PDF
    When modeling valuation under uncertainty, economists generally prefer expected utility because it has an axiomatic foundation, meaning that the resulting choices will satisfy a number of rationality requirements. In expected utility theory, values are computed by multiplying probabilities of each possible state of nature by the payoff in that state and summing the results. The drawback of this approach is that all state probabilities need to be dealt with separately, which becomes extremely cumbersome when it comes to learning. Finance academics and professionals, however, prefer to value risky prospects in terms of a trade-off between expected reward and risk, where the latter is usually measured in terms of reward variance. This mean-variance approach is fast and simple and greatly facilitates learning, but it impedes assigning values to new gambles on the basis of those of known ones. To date, it is unclear whether the human brain computes values in accordance with expected utility theory or with mean-variance analysis. In this article, we discuss the theoretical and empirical arguments that favor one or the other theory. We also propose a new experimental paradigm that could determine whether the human brain follows the expected utility or the mean-variance approach. Behavioral results of implementation of the paradigm are discussed

    Looking for a psychology for the inner rational agent

    Get PDF
    Research in psychology and behavioural economics shows that individuals’ choices often depend on ‘irrelevant’ contextual factors. This presents problems for normative economics, which has traditionally used preference-satisfaction as its criterion. A common response is to claim that individuals have context-independent latent preferences which are ‘distorted’ by psychological factors, and that latent preferences should be respected. This response implicitly uses a model of human action in which each human being has an ‘inner rational agent’. I argue that this model is psychologically ungrounded. Although references to latent preferences appear in psychologically-based explanations of context-dependent choice, latent preferences serve no explanatory purpose

    Political Institutions and Greenhouse Gas Controls

    Get PDF
    Research and insights taken from the field of political economy suggest that institutions limit the extent to which efficient policies to reduce greenhouse gas emissions are likely to be adopted. High transaction costs among nations, as well as domestic constraints like voter xenophobia and distrust of markets in the U.S. and ineffective legal and economic institutions in China, discourage international agreement. The U.S. must focus upon limiting economic harm from adopting poorly designed policies and developing strategies for adaptation or technology-driven geoengineering. Most importantly, the lessons of political economy must become central to the study of climate policy, including a healthy exchange of views between political economists and climate modelers.

    Is inflation targeting best-practice monetary policy?

    Get PDF
    Monetary policy ; Inflation (Finance) ; Federal Open Market Committee

    The Emergent Logic of Health Law

    Get PDF
    The American health care system is on a glide path toward ruin. Health spending has become the fiscal equivalent of global warming, and the number of uninsured Americans is approaching fifty million. Can law help to divert our country from this path? There are reasons for deep skepticism. Law governs the provision and financing of medical care in fragmented and incoherent fashion. Commentators from diverse perspectives bemoan this chaos, casting it as an obstacle to change. I contend in this Article that pessimism about health law’s prospects is unjustified, but that a new understanding of health law’s disarray is urgently needed to guide reform. My core proposition is that the law of health care provision is best understood as an emergent system. Its contradictions and dysfunctions cannot be repaired by some master design. No one actor has a grand overview—or the power to impose a unifying vision. Countless market players, public planners, and legal and regulatory decisionmakers interact in oft-chaotic ways, clashing with, reinforcing, and adjusting to each other. Out of these interactions, a larger scheme emerges—one that incorporates the health sphere’s competing interests and values. Change in this system, for worse and for better, arises from the interplay between its myriad actors. By quitting the quest for a single, master design, we can better focus our efforts on possibilities for legal and policy change. We can and should continuously survey the landscape of stakeholders and expectations with an eye toward potential launching points for evolutionary processes—processes that leverage current institutions and incentives. What we cannot do is plan or predict these evolutionary pathways in precise detail; the complexity of interactions among market and government actors precludes fine-grained foresight of this sort. But we can determine the general direction of needed change, identify seemingly intractable obstacles, and envision ways to diminish or finesse them over time. Dysfunctional legal doctrines, interest group expectations, consumers’ anxieties, and embedded institutional and cultural barriers can all be dealt with in this way, in iterative fashion. This Article sets out a strategy for doing so. To illustrate this strategy, I suggest emergent approaches to the most urgent challenges in health care policy and law—the crises of access, value, and cost

    A Model of Intervention in Childhood

    Get PDF
    This paper describes a model and resulting simulations to assess the appropriate age structure of intervention in childhood on the theme: should we intervene early or late? We use asset theory approaches to construct a general model of state investment whose aim is to reduce inequality in human capital. We set out the key parameters of such a model, clarifying the assumptions that must be made by state planners or economists in assessing the relative value of targeted investment at different ages in the presence of a range of elements of uncertainty. We simulate the model showing how the age-investment schedule will vary under different assumptions. Early investment is highly valued because of the likely decline with age in effectiveness but the trade-offs are strongly moderated by other important assumptions around which there is uncertainty or are choice variables of the state planner.

    Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand

    Get PDF
    One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application design. The tool facilitates risk assessment by managers and helps developers to model security requirements using an interactive tree diagram. The tool calculates residual risk for each component of a web application and for the application overall so developers are provided with better information for making decisions about which countermeasures to implement given limited resources tor doing so. The tool supports taking a proactive approach to building in web application security at the requirements stage as opposed to the more common reactive approach of putting countermeasures in place after an attack and loss have been incurred. The primary contribution of the proposed tool is its ability to make known security-related information (e.g. known vulnerabilities, attacks and countermeasures) more accessible to developers who are not security experts and to translate lack of security measures into an understandable measure of relative residual risk. The latter is useful for managers who need to prioritize security spending. Keywords: web application security, security requirements modelling, attack trees, threat trees, risk assessment

    The imperfect hiding : some introductory concepts and preliminary issues on modularity

    Get PDF
    In this work we present a critical assessment of some problems and open questions on the debated notion of modularity. Modularity is greatly in fashion nowadays, being often proposed as the new approach to complex artefact production that enables to combine fast innovation pace, enhanced product variety and reduced need for co-ordination. In line with recent critical assessments of the managerial literature on modularity, we sustain that modularity is only one among several arrangements to cope with the complexity inherent in most high-technology artefact production, and by no means the best one. We first discuss relations between modularity and the broader (and much older within economics) notion of division of labour. Then we sustain that a modular approach to labour division aimed at eliminating technological interdependencies between components or phases of a complex production process may have, as a by-product, the creation of other types of interdependencies which may subsequently result in inefficiencies of various types. Hence, the choice of a modular design strategy implies the resolution of various tradeoffs. Depending on how such tradeoffs are solved, different organisational arrangements may be created to cope with ‘residual’ interdependencies. Hence, there is no need to postulate a perfect isomorphism, as some recent literature has proposed, between modularity at the product level and modularity at the organisational level
    corecore