Showing 1 - 10 of 103
A growing literature identifies associations between subjective and biometric indicators of wellbeing. These associations, together with the ability of subjective wellbeing (SWB) metrics to predict health and behavioral outcomes, have spawned increasing interest in SWB as an important concept in...
Persistent link: https://www.econbiz.de/10012794615
Anti-poverty programs in developing countries are often difficult to implement; in particular, many governments lack the capacity to deliver payments securely to targeted beneficiaries. We evaluate the impact of biometrically-authenticated payments infrastructure ("Smartcards") on beneficiaries...
Persistent link: https://www.econbiz.de/10012458665
Cloud computing--computing done on an off-site network of resources accessed through the Internet--is revolutionizing …
Persistent link: https://www.econbiz.de/10012480840
Patenting in software, cloud computing, and artificial intelligence has grown rapidly in recent years. Such patents are acquired primarily by large US technology firms such as IBM, Microsoft, Google, and HP, as well as by Japanese multinationals such as Sony, Canon, and Fujitsu. Chinese...
Persistent link: https://www.econbiz.de/10012452928
Our analysis seeks to understand the impact of changing allocations of property rights on investment in new firms. We focus on the Cartoon Network, et al. v. Cablevision decision in the U.S., which narrowed the protection enjoyed by content creators (e.g., movie studios) and gave greater rights...
Persistent link: https://www.econbiz.de/10012457526
This paper describes the adoption of automation technologies by US firms across all economic sectors by leveraging a new module introduced in the 2019 Annual Business Survey, conducted by the US Census Bureau in partnership with the National Center for Science and Engineering Statistics (NCSES)....
Persistent link: https://www.econbiz.de/10013462707
Persistent link: https://www.econbiz.de/10013465373
We develop a theoretical model of security investments in a network of interconnected agents. Network connections … introduce the possibility of cascading failures due to an exogenous or endogenous attack depending on the profile of security … networks, is that because security investments create positive externalities on other agents, there will be underinvestment in …
Persistent link: https://www.econbiz.de/10012459488
From 2000 to 2010, more than 20 states passed laws that make it easier to use lethal force in self-defense. Elements of these laws include removing the duty to retreat in places outside of one's home, adding a presumption of reasonable belief of imminent harm, and removing civil liability for...
Persistent link: https://www.econbiz.de/10012460525
that could protect surplus ("security"). But the joint achievement of security and prosperity had to escape a paradox … conflict when defense capability is fixed, but may allow for security and prosperity when defense capability is endogenous …. Some economic shocks and military innovations deliver security and prosperity while others force societies back into a trap …
Persistent link: https://www.econbiz.de/10012456842