377 research outputs found
Does timing of decisions in a mixed duopoly matter?
We determine the endogenous order of moves in a mixed pricesetting duopoly. In contrast to the existing literature on mixed oligopolies we establish the payo equivalence of the games with an exogenously given order of moves if the most plausible equilibrium is realized in the market. Hence, in this case it does not matter whether one becomes a leader or a follower. We also establish that replacing a private firm by a public firm in the standard Bertrand-Edgeworth game with capacity constraints increases social welfare and that a pure-strategy equilibrium always exists
Quantum Theory and Time Asymmetry
The relation between quantum measurement and thermodynamically irreversible
processes is investigated. The reduction of the state vector is fundamentally
asymmetric in time and shows an observer-relatedness which may explain the
double interpretation of the state vector as a representation of physical
states as well as of information about them. The concept of relevance being
used in all statistical theories of irreversible thermodynamics is shown to be
based on the same observer-relatedness. Quantum theories of irreversible
processes implicitly use an objectivized process of state vector reduction. The
conditions for the reduction are discussed, and I speculate that the final
(subjective) observer system might even be carried by a spacetime point.Comment: Latex version of a paper published in 1979 (with minor revisions), 18
page
SMEs' Confidentiality Concerns for Security Information Sharing
Small and medium-sized enterprises are considered an essential part of the EU
economy, however, highly vulnerable to cyberattacks. SMEs have specific
characteristics which separate them from large companies and influence their
adoption of good cybersecurity practices. To mitigate the SMEs' cybersecurity
adoption issues and raise their awareness of cyber threats, we have designed a
self-paced security assessment and capability improvement method, CYSEC. CYSEC
is a security awareness and training method that utilises self-reporting
questionnaires to collect companies' information about cybersecurity awareness,
practices, and vulnerabilities to generate automated recommendations for
counselling. However, confidentiality concerns about cybersecurity information
have an impact on companies' willingness to share their information. Security
information sharing decreases the risk of incidents and increases users'
self-efficacy in security awareness programs. This paper presents the results
of semi-structured interviews with seven chief information security officers of
SMEs to evaluate the impact of online consent communication on motivation for
information sharing. The results were analysed in respect of the Self
Determination Theory. The findings demonstrate that online consent with
multiple options for indicating a suitable level of agreement improved
motivation for information sharing. This allows many SMEs to participate in
security information sharing activities and supports security experts to have a
better overview of common vulnerabilities. The final publication is available
at Springer via https://doi.org/10.1007/978-3-030-57404-8_22Comment: 10 pages, 2 figures, 14th International Symposium on Human Aspects of
Information Security & Assurance (HAISA 2020
Unilateral versus coordinated effects:comparing the impact on consumer welfare of alternative merger outcomes
The nature of tacitly collusive behaviour often makes coordination unstable, and this may result in periods of breakdown, during which consumers benet from reduced prices. This is allowed for by adding demand uncertainty to the Compte et al. (2002) model of tacit collusion amongst asymmetric rms. Breakdowns occur when a rm cannot exclude the possibility of a deviation by a rival. It is then possible that an outcome with collusive behaviour, subject to long/frequent break downs, can improve consumer welfare compared to an alternative with sustained unilateral conduct. This is illustrated by re-examining the Nestle/Perrier merger analyzed by Compte et al., but now also taking into account the potential for welfare losses arising from unilateral behaviour
Recommended from our members
BioTIME: A database of biodiversity time series for the Anthropocene.
MotivationThe BioTIME database contains raw data on species identities and abundances in ecological assemblages through time. These data enable users to calculate temporal trends in biodiversity within and amongst assemblages using a broad range of metrics. BioTIME is being developed as a community-led open-source database of biodiversity time series. Our goal is to accelerate and facilitate quantitative analysis of temporal patterns of biodiversity in the Anthropocene.Main types of variables includedThe database contains 8,777,413 species abundance records, from assemblages consistently sampled for a minimum of 2 years, which need not necessarily be consecutive. In addition, the database contains metadata relating to sampling methodology and contextual information about each record.Spatial location and grainBioTIME is a global database of 547,161 unique sampling locations spanning the marine, freshwater and terrestrial realms. Grain size varies across datasets from 0.0000000158 km2 (158 cm2) to 100 km2 (1,000,000,000,000 cm2).Time period and grainBioTIME records span from 1874 to 2016. The minimal temporal grain across all datasets in BioTIME is a year.Major taxa and level of measurementBioTIME includes data from 44,440 species across the plant and animal kingdoms, ranging from plants, plankton and terrestrial invertebrates to small and large vertebrates.Software format.csv and .SQL
- …