23,324 research outputs found

    Choices under Risk in Rural Peru

    Get PDF
    This paper estimates the risk preferences of cotton farmers in Southern Peru, using the results from a multiple-price-list lottery game. Assuming that preferences conform to two of the leading models of decision under risk--Expected Utility Theory (EUT) and Cumulative Prospect Theory (CPT)--we find strong evidence of moderate risk aversion. Once we include individual characteristics in the estimation of risk parameters, we observe that farmers use subjective nonlinear probability weighting, a behavior consistent with CPT. Interestingly, when we allow for preference heterogeneity via the estimation of mixture models--where the proportion of subjects who behave according to EUT or to CPT is endogenously determined--we find that the majority of farmers' choices are best explained by CPT. We further hypothesize that the multiple switching behavior observed in our sample can be explained by nonlinear probability weighting made in a context of large random calculation mistakes; the evidence found on this regard is mixed. Finally, we find that attaining higher education is the single most important individual characteristic correlated with risk preferences, a result that suggests a connection between cognitive abilities and behavior towards risk.

    Foreign Direct Investment in a Late Industrialising Country: The Portuguese IDP Revisited

    Get PDF
    This article uses the investment development path to analyse the evolution of Portugal’s competitiveness in recent years. This is interpreted as the country’s capacity to both attract and engage in foreign direct investment. The estimation of the Portuguese IDP confirms previous claims that Portugal has joined other late industrialising countries as a 'stage 4' country, but that this position may not be consolidated. Outward FDI, albeit limited in terms of the number of firms and destinations, seems to show most characteristics expected at this stage of development. However, the fading of export-oriented inward FDI during the 1990s represents a danger in a country where FDI has been critical for market access and industrial diversification despite a much smaller weight in the economy than in other OECD countries.Investment Development Path, Inward FDI, Outward FDI, Portugal

    Some results on rational surfaces and Fano varieties

    Get PDF
    The goal of this article is to study the equations and syzygies of embeddings of rational surfaces and certain Fano varieties. Given a rational surface X and an ample and base-point-free line bundle L on X, we give an optimal numerical criterion for L to satisfy property Np. This criterion turns out to be a characterization of property Np if X is anticanonical. We also prove syzygy results for adjunction bundles and a Reider type theorem for higher syzygies. For certain Fano varieties we also prove results on very ampleness and higher syzygies.Comment: 26 pages, AMSTe

    Formal security analysis of registration protocols for interactive systems: a methodology and a case of study

    Full text link
    In this work we present and formally analyze CHAT-SRP (CHAos based Tickets-Secure Registration Protocol), a protocol to provide interactive and collaborative platforms with a cryptographically robust solution to classical security issues. Namely, we focus on the secrecy and authenticity properties while keeping a high usability. In this sense, users are forced to blindly trust the system administrators and developers. Moreover, as far as we know, the use of formal methodologies for the verification of security properties of communication protocols isn't yet a common practice. We propose here a methodology to fill this gap, i.e., to analyse both the security of the proposed protocol and the pertinence of the underlying premises. In this concern, we propose the definition and formal evaluation of a protocol for the distribution of digital identities. Once distributed, these identities can be used to verify integrity and source of information. We base our security analysis on tools for automatic verification of security protocols widely accepted by the scientific community, and on the principles they are based upon. In addition, it is assumed perfect cryptographic primitives in order to focus the analysis on the exchange of protocol messages. The main property of our protocol is the incorporation of tickets, created using digests of chaos based nonces (numbers used only once) and users' personal data. Combined with a multichannel authentication scheme with some previous knowledge, these tickets provide security during the whole protocol by univocally linking each registering user with a single request. [..]Comment: 32 pages, 7 figures, 8 listings, 1 tabl
    • …
    corecore