2,537 research outputs found

    Purchasing Power Parity Revisited: A Time-Varying Parameter Approach

    Get PDF
    We re-examine the validity of Purchasing Power Parity (PPP) proposition using Taylor's (2002) data set. Applying the Kalman filter process, our findings not only demonstrate the strong instability in the relationship between the dollar denominated foreign price levels and the US price level, but also rule out the empirical validity of the PPP hypothesis. Thus, we argue that the inference based on the Fisher-Seater methodology cannot account for the Lucas critique in the PPP testing procedure.Purchasing power parity, Fisher-Seater, time-varying parameter, Kalman filter

    Assessing the Value of Network Security Technologies

    Get PDF
    Proper configuration of security technologies is critical to balance the access and protection requirements of information. The common practice of using a layered security architecture that has multiple technologies amplifies the need for proper configuration because the configuration decision about one security technology has ramifications for the configuration decisions about others. We study the impact of configuration on the value obtained from a firewall and an Intrusion Detection System (IDS). We also study how a firewall and an IDS interact with each other in terms of value contribution. We show that the firm may be worse off when it deploys a technology if the technology (either the firewall or the IDS) is improperly configured. A more serious consequence for the firm is that even if each of these (improperly configured) technologies offers a positive value when deployed alone, deploying both may be detrimental to the firm. Configuring the IDS and the firewall optimally eliminates the conflict between them, resulting in a non-negative value to the firm. When optimally configured, we find that these technologies may complement or substitute each other. Further, we find that while the optimal configuration of an IDS is the same whether it is deployed alone or together with a firewall, the optimal configuration of a firewall has a lower detection rate (i.e., allow more access) when it is deployed with an IDS than when deployed alone. Our results highlight the complex interactions between firewall and IDS technologies when they are used together in a security architecture, and, hence, the need for proper configuration in order to benefit from these technologies

    An Economic Study of the Effect of Android Platform Fragmentation on Security Updates

    Full text link
    Vendors in the Android ecosystem typically customize their devices by modifying Android Open Source Project (AOSP) code, adding in-house developed proprietary software, and pre-installing third-party applications. However, research has documented how various security problems are associated with this customization process. We develop a model of the Android ecosystem utilizing the concepts of game theory and product differentiation to capture the competition involving two vendors customizing the AOSP platform. We show how the vendors are incentivized to differentiate their products from AOSP and from each other, and how prices are shaped through this differentiation process. We also consider two types of consumers: security-conscious consumers who understand and care about security, and na\"ive consumers who lack the ability to correctly evaluate security properties of vendor-supplied Android products or simply ignore security. It is evident that vendors shirk on security investments in the latter case. Regulators such as the U.S. Federal Trade Commission have sanctioned Android vendors for underinvestment in security, but the exact effects of these sanctions are difficult to disentangle with empirical data. Here, we model the impact of a regulator-imposed fine that incentivizes vendors to match a minimum security standard. Interestingly, we show how product prices will decrease for the same cost of customization in the presence of a fine, or a higher level of regulator-imposed minimum security.Comment: 22nd International Conference on Financial Cryptography and Data Security (FC 2018

    Backbench

    Get PDF
    Backbench (2010) is a large-scale multi-channel video and architectural installation, which reflects on the conditions of art production and consumption that are established within the globalised system of art biennials. Moreover the work focuses on the production of cultural discourses and the consequent impact generated by these prevalent modes of exchange, on social, political, professional and likewise on individual levels. Backbench was commissioned and produced by Manifesta 8, the Region of Murcia, Spain in 2010

    The newborn lamb as a new model for studying gastroesophageal reflux

    Get PDF
    We aimed to determine whether the newborn lamb at term is a valid model for studying gastroesophageal reflux. Seven bottle-fed lambs, ages 2 to 3 days, underwent esophageal multichannel intraluminal impedance-pH monitoring (MII-pH). A total of 196 reflux episodes were recorded, including 73% alkaline and 27% weakly acidic. No acid refluxes were observed. Median bolus clearance time was 4  seconds (3; 5.5), and proximal reflux extent was 35% (26). This first report of MII-pH in the newborn mammal sets the foundations for future studies with physiological and clinical relevance to human neonates

    Milk temperature influences esophageal motility in the newborn lamb

    Get PDF
    Esophageal dysmotility is common in infants. We aimed to evaluate the influence of milk temperature on esophageal motility using multichannel intraluminal impedance-pH monitoring (MII-pH). Five healthy lambs, ages 2 to 3 days, underwent a MII-pH whereas bottle-fed randomly with 50 mL of ewe milk at 26 °C, 38.5 °C, and 41.5 °C. Impedance motility parameters were studied on 5 swallows at each temperature. At 38.5 °C we noted a higher total propagation velocity and a shorter total bolus transit time (TBTT) (P < 0.05). These unique results suggest a potential role of milk temperature alterations in improving oral feeding in infants with esophageal dysmotility

    Agro-mophological characterization, adaptational behaviour and flower abnormalities of Lilium L. cultivars in addition to a flower with stochastic flower formula

    Get PDF
    This experiment was undertaken to determine the adaptation of Lilium L. cultivars to North-Western part of Türkiye and to define morphologic plant growth characteristics at aboveground part, including flower life and flower abnormalities. The bulbs of the three Lilium L. cultivars, ‘Profundo’, ‘Valverde’, and ‘Vonq’, were sown to perlite in pots in June, 2021, and evaluated for emergence and flowering rates, stem and plant height, stem and flower diameter, leaf and flower number, flower abnormality rates, flower fragrance degree and flower life in 2022, after one year adaptation without removing the previous sown bulbs. As the results of the cultivars differences these were determined that, at the adaptive year; the emergence rates varied between 60.42-89.58%, flowering rates changed between 43.75-87.50%, stem heights changed between 40.63-48.25 cm, plant heights changed between 52.50-59.75 cm and these data showed statistically importance. In addition to the data in the adaptive year; stem diameters, leaf numbers, flower numbers flower fragrance degree and flower longevities also showed statistical importance between cultivars. The flower abnormality rates were found between 8.3-25% in cultivars although no statistical results. Interestingly a striking, stochastic case also was observed from a flower with 8 tepals, 8 stamen and 4 lobed stigma at ‘Valverde’ contrary to well-known flower formula. It has been concluded that ‘Profundo’ has more remarkable result in terms of longevity of flower compared to the other two varieties while ‘Valverde’ and ‘Vonq’ shared the same group with some precedence in most of the agro-morphologic characteristics e.g. plant height, stem height and stem diameter. Lilium L. ‘Vonq’ showed that the highest adaptive capacity among the cultivars with the highest emergence rate (89.58) in all sowed bulbs and flowering rate (87.50) in all emerged bulbs under the study conditions in the open-air

    Privacy Controls and Disclosure Behavior

    Get PDF
    We examine the relationship among privacy controls, dynamic content-sharing activities, and disclosure patterns of Facebook users based on the exogenous policy change in December 2009 that introduced granular privacy controls. Using a unique large panel dataset, we empirically assess the short-run and long-run effects of the change on wall posting and private messaging and the resulting disclosure patterns based on these sharing activities. Results show that Facebook users, on average, increase use of wall posts and decrease use of private messages after the introduction of granular privacy controls. Also, users’ disclosure patterns change to reflect the increased openness in content sharing. These effects are realized immediately and over time. To the best of our knowledge, this is the first study that relies on observational data to assess the impact of a major privacy change on dynamic content-sharing activities and the resulting disclosure patterns of Facebook users
    corecore