Showing 1 - 10 of 91
This paper develops a model of farmer decision-making to examine the extent to which uncertainties about the performance of site-specific technologies (SSTs) and about the weather impact the value of these technologies. The model uses the jointly estimated risk and technology parameters to...
Persistent link: https://www.econbiz.de/10009442857
This paper deals with the effects of uncertain output prices upon fishers' location choices. It employs ARIMA models to construct the price forecasts used by fishers in a model which generates expected profits for three fishing locations in the British Columbia salmon fishery. A random utility...
Persistent link: https://www.econbiz.de/10009444662
' vulnerability to energy supply disruptions. Crude oil is stored in geologic formations, or salt domes, located under these …
Persistent link: https://www.econbiz.de/10009435453
For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass...
Persistent link: https://www.econbiz.de/10009435516
important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil … countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus … proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations …
Persistent link: https://www.econbiz.de/10009435670
The CFE Treaty will provide for limits on NATO and WTO forces, particularly tanks, armored personnel carriers, artillery, and helicopters. In addition to the overall limits on TLEs in the ATTU zone, there are expected to be secondary limits on single country forces, limits on forces based in...
Persistent link: https://www.econbiz.de/10009435974
systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research …
Persistent link: https://www.econbiz.de/10009436080
The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While...
Persistent link: https://www.econbiz.de/10009436221
pressure and other variables related to damage by pyroclastic flow into underground structures, and vulnerability criteria for …
Persistent link: https://www.econbiz.de/10009436263
assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the … protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities …
Persistent link: https://www.econbiz.de/10009436387