3,966 research outputs found

    A Middle Ground on Insider Trading

    Get PDF
    For more than four decades, corporate law scholars have debated whether government should prohibit insider trading, commonly defined as stock trading on the basis of material, nonpublic information. Participants in this long-running debate have generally assumed that trading that decreases a stock\u27s price should be treated the same as trading that causes the price to rise: either both forms of trading should be regulated or neither should. I argue for a middle-ground position in which price-decreasing insider trading (sales, short sales, and purchases of put options on the basis of negative information) is deregulated, while price-increasing insider trading (purchases of stock and call options on the basis of positive information) remains restricted

    Evaluating Bundled Discounts

    Get PDF
    This article identifies and critiques five attempts courts and commentators have made at articulating such an evaluative approach and, finding each approach lacking, proposes an alternative evaluative approach. The proposed approach would presume the legality of above-cost bundled discounts but would permit that presumption to be rebutted by a plaintiff that proved certain facts demonstrating that it had fully exhausted its competitive options and was, or was likely to become, as efficient as the discounter. The recommended approach would be easily administrable and would include clear safe harbors to ensure that procompetitive bundled discounting is not discouraged

    Mere Common Ownership and the Antitrust Laws

    Get PDF
    “Common ownership,” also called “horizontal shareholding,” refers to a stock investor’s ownership of minority stakes in multiple competing firms. Recent empirical studies have purported to show that institutional investors’ common ownership reduces competition among commonly owned competitors. “Mere common ownership” is horizontal shareholding that is not accompanied by any sort of illicit agreement, such as a hub-and-spoke conspiracy, or the holding of a control-conferring stake. This Article considers the legality of mere common owner-ship under the U.S. antitrust laws. Prominent antitrust scholars and the leading treatise have concluded that mere common ownership that has the incidental effect of lessening market competition may violate both Section 7 of the Clayton Act and Section 1 of the Sherman Act. This Article, however, demonstrates otherwise. Competition-lessening instances of mere common ownership do not violate Section 7 of the Clayton Act because they fall within its “solely-for-investment” provision, which the scholars calling for condemnation have misinterpreted. Mere common ownership does not run afoul of Section 1 of the Sherman Act because it lacks the sort of agreement (contract, combination, or conspiracy) required for liability under that provision. From a social welfare standpoint, these legal outcomes are desirable. Condemning mere common ownership under the antitrust laws would likely entail significant costs, and the benefits such condemnation would secure are speculative. Accordingly, this Article argues courts and enforcers should not stretch the antitrust laws to condemn mere common ownership

    The Case Against Smoking Bans

    Get PDF
    In recent months, numerous localities and states have banned smoking in public places (i.e., privately owned places to which members of the public are invited). Such sweeping bans are typically justified on grounds that they alleviate externalities, shape individuals\u27 preferences in a desirable manner, and reduce risks. This essay rebuts the externality, preference-shaping, and risk-reduction arguments for smoking bans and contends that such bans are unnecessary and, on the whole, utility-reducing

    Addressing Big Tech’s Market Power: A Comparative Institutional Approach

    Get PDF
    This Article provides a comparative institutional analysis of the three leading approaches to addressing the market power of large digital platforms: (1) traditional antitrust law, the approach thus far taken in the United States; (2) ex ante conduct rules, the approach embraced by the European Union’s Digital Markets Act and several bills under consideration in the U.S. Congress; and (3) ongoing agency oversight, the approach embraced by the United Kingdom with its newly established “Digital Markets Unit.” After identifying the general advantages and disadvantages of each approach, the Article examines how they are likely to play out in the context of digital platforms. It first examines whether antitrust is indeed too slow and indeterminate to tackle market power concerns arising from digital platforms, as proponents of ex ante conduct rules and agency oversight have suggested. It next considers possible error costs resulting from the most prominent proposed conduct rules: (1) structural separations and line of business restrictions; (2) bans on self-preferencing by platforms; (3) requirements to allow platform users to remove pre-installed software, “side-load” apps, and use alternative payment systems to make purchases on the platform; and (4) data-portability, data-sharing, and platform interoperability mandates. It then shows how three features of the agency oversight model—its broad focus, political susceptibility, and perpetual control—render it particularly vulnerable to rent-seeking efforts and agency capture. The Article ultimately concludes that antitrust’s downsides (relative indeterminacy and slowness) are likely to be less significant than those of ex ante conduct rules (large error costs resulting from high informational requirements) and ongoing agency oversight (rent-seeking and agency capture)

    Two Mistakes Behavioralists Make: A Response to Professors Feigenson et al. and Professor Slovic

    Get PDF
    This article provides a critique of Professors Feigenson and Slovic\u27s submissions to the Interdisciplinary Perspectives on Fear and Risk Perception in Times of Democratic Crisis Symposium. Examined are two common mistakes that behaviorists make; 1) discounting the rational account too quickly and 2) reflexively advocating a governmental fix

    Addressing Big Tech\u27s Market Power: A Comparative Institutional Analysis

    Get PDF
    This Article provides a comparative institutional analysis of the three leading approaches to addressing the market power of large digital platforms: (1) traditional antitrust law, the approach thus far taken in the United States; (2) ex ante conduct rules, the approach embraced by the European Union\u27s Digital Markets Act and several bills under consideration in the U.S. Congress; and (3) ongoing agency oversight, the approach embraced by the United Kingdom with its newly established Digital Markets Unit. After identifying the general advantages and disadvantages of each approach, the Article examines how they are likely to play out in the context of digital platforms. It first examines whether antitrust is indeed too slow and indeterminate to tackle market power concerns arising from digital platforms, as proponents of ex ante conduct rules and agency oversight have suggested. It next considers possible error costs resulting from the most prominent proposed conduct rules: (1) structural separations and line of business restrictions; (2) bans on self-preferencing by platforms; (3) requirements to allow platform users to remove pre-installed software, sideload apps, and use alternative payment systems to make purchases on the platform; and (4) data-portability, data-sharing, and platform interoperability mandates. It then shows how three features of the agency oversight model - its broad focus, political susceptibility, and perpetual control - render it particularly vulnerable to rent-seeking efforts and agency capture. The Article ultimately concludes that antitrust\u27s downsides (relative indeterminacy and slowness) are likely to be less significant than those of ex ante conduct rules (large error costs resulting from high informational requirements) and ongoing agency oversight (rent-seeking and agency capture)

    Searching for Dust around Hyper Metal-Poor Stars

    Get PDF
    We examine the mid-infrared fluxes and spectral energy distributions for metal-poor stars with iron abundances [Fe/H] â‰Č−5\lesssim-5, as well as two CEMP-no stars, to eliminate the possibility that their low metallicities are related to the depletion of elements onto dust grains in the formation of a debris disk. Six out of seven stars examined here show no mid-IR excess. These non-detections rule out many types of circumstellar disks, e.g. a warm debris disk (T ⁣≀ ⁣290T\!\le\!290 K), or debris disks with inner radii ≀1\le1 AU, such as those associated with the chemically peculiar post-AGB spectroscopic binaries and RV Tau variables. However, we cannot rule out cooler debris disks, nor those with lower flux ratios to their host stars due to, e.g. a smaller disk mass, a larger inner disk radius, an absence of small grains, or even a multicomponent structure, as often found with the chemically peculiar Lambda Bootis stars. The only exception is HE0107-5240, for which a small mid-IR excess near 10 microns is detected at the 2-σ\sigma level; if the excess is real and associated with this star, it may indicate the presence of (recent) dust-gas winnowing or a binary system.Comment: Accepted for publication in Ap

    Risk Management Decision Making for Security and Trust in Hardware Supply Chains

    Get PDF
    Modern cyber-physical systems are enabled by electronic hardware and embedded systems. The security of these sub-components is a concern during the design and operational phases of cyber-physical system life cycles. Compromised electronics can result in mission-critical failures, unauthorized access, and other severe consequences. As systems become more complex and feature greater connectivity, system owners must make decisions regarding how to mitigate risks and ensure resilience and trust. This paper provides an overview of research efforts related to assessing and managing risks, resilience, and trust with an emphasis on electronic hardware and embedded systems. The research takes a decision-oriented perspective, drawing from the perspectives of scenario planning and portfolio analysis, and describes examples related to the risk-based prioritization of cyber assets in large-scale systems
    • 

    corecore