981 resultados para D04 - Microeconomic Policy: Formulation
Resumo:
With the globalization of economic activity, the relative weight of foreign trade in national economic activities has increased, and the question of how to measure trends in the value and quantity of international trade has become an important issue for policy-makers and economists. This paper compares the chain-linked indices formulated by Masato Kuroko, based on HS this fiscal year for individual industry categories and countries with chain-linked indices based on SITC-R1 codes, in order to study how changes in the quality composition of the same products, which cannot be considered using unit value indices based on SITC-R1 codes, can be considered using unit value indices based on the more detailed HS product classifications.
Resumo:
European-wide data concerning both companies and households indicate that the credit rationing phenomenon, which has been predicted by theory, does in fact occur to a significant degree in the European credit market. Among SMEs, micro companies are most vulnerable and the current economic crisis has only made these concerns more pressing. Top-down use of the monetary transmission mechanism alone is insufficient to counter the problem. The other solution consists of a bottom-up, microeconomic stimulation of lending transactions, by focusing on collateral and guarantees. The data confirm the high importance that lenders – especially individual households and micro companies – attach to collateral and guarantees when making their lending decisions. As a consequence, we would argue that those parts of the law governing security interests and guarantees should be one of the primary targets for government policy aimed at improving credit flows, especially in avoiding a conflict between consumer protection measures and laws on surety and guarantees. This policy brief firstly aims to give an overview of the problem of credit rationing and to show that low-income households and SMEs are most concerned by the phenomenon. Focusing solely on loans as a way of financing and on the issues related to access to finance by micro and small companies as well households, it then sketches possible solutions focused on guarantees. This paper brings together data from the Eurosystem Household Finance and Consumption survey (HFCS), Eurostat, and both the latest wave of the extended biennial EC/ECB Survey on the access to finance of SMEs (EC/ECB SAFE 2013) and the latest wave of the smaller semi-annual ECB SAFE Survey, covering the period between October 2012 and March 2013.
Resumo:
CFSP's performance is widely regarded as weak. Why did Europe's stance in world politics not improve with the Treaty of Maastricht? The article analyses the present policy approach and the institutionalist and militarystrategic reform proposals. It is argued that policy and proposals suffer from drawbacks leading to an uncomprehensive formulation of a Common Foreign and Security Policy. Both do not provide CFSP with a necessary strategy but instead largely duplicate existing organizations. Furthermore, they propose concepts that are not viable because member states do not agree on a common defense policy. In addition, they fail to offer answers adequate to today's challenges, which are not primarily military in nature. Instead, a socioeconomic security policy appears to be a more realistic option. It is necessary because no other organization provides it sufficiently; it is viable because member states could agree on iti and it is adequate because the stabilization of countries in Eastern Europe is best achieved by social and economic policy-and not by military deterrence.
Resumo:
A purely microeconomic perspective shows that all major industries and states would benefit from a transatlantic trade and investment partnership (TTIP). The greatest manufacturing and employment effects would be seen in the electronics industry as well as metal processing. Baden-Württemberg, Bavaria and North Rhine-Westphalia would benefit most from this. Furthermore, it becomes apparent that new jobs would be created for all education groups – even for relatively unskilled workers. Their real income could increase even more than that of highly qualified workers.
Resumo:
Periodic public concern about heroin use has been a major driver of Australian drug policy in the four decades since heroin use was first reported. The number of heroin-dependent people in Australia has increased from several hundreds in the late 1960s to around 100000 by the end of the 1990s. In this paper I do the following: (1) describe collaborative research on heroin dependence that was undertaken between 1991 and 2001 by researchers at the National Drug and Alcohol Research Centre: (2) discuss the contribution that this research may have made to the formulation of policies towards the treatment of heroin dependence during a period when the policy debate crystallized around the issue of whether or not Australia should conduct a controlled trial of heroin prescription; and (3) reflect on the relationships between research and policy-making in the addictions field, specifically on the roles of investigator-initiated and commissioned research, the interface between researchers, funders and policymakers: and the need to be realistic about the likely impact of research on policy and practice.
Resumo:
Some believe that provision of private property rights in wildlife on private land provides a powerful economic incentive for nature conservation because it enables property owners to market such wildlife or its attributes. If such marketing is profitable, private landholders will conserve the wildlife concerned and its required habitat. But land is not always most profitably used for exploitation of wildlife, and many economic values of wildlife (such as non-use economic values) cannot be marketed. The mobility of some wildlife adds to the limitations of the private-property approach. While some species may be conserved by this approach, it is suboptimal as a single policy approach to nature conservation. Nevertheless, it is being experimented with, in the Northern Territory of Australia where landholders had a possibility of harvesting on their properties a quota of eggs and chicks of red-tailed black cockatoos for commercial sale. This scheme was expected to provide an incentive to private landholders to retain hollow trees essential for the nesting of these birds but failed. This case and others are analysed. Despite private-property failures, the long-term survival of some wildlife species depends on their ability to use private lands without severe harassment, either for their migration or to supplement their available resources, for example, the Asian elephant. Nature conservation on private land is often a useful, if not essential, supplement to conservation on public lands. Community and public incentives for such conservation are outlined.
Resumo:
There are no controlled experiments in macroeconomic policy, nor in systematic programs of microeconomic reform, but a comparison between New Zealand and Australia over the period since 1984 provides as close an approach to such an experiment as is ever likely to be possible. From quite similar starting points the two countries pursued liberal reform programs that differed sharply, mainly as a result of exogenous differences in constitutional structures and the personal styles of the central actors. Australia followed a more cautious, piecemeal, consensus-based approach, whereas New Zealand, in contrast, adopted a radical, rapid, 'purist' platform. The NZ reform package was generally seen by contemporary commentators as representing a 'textbook' model for best practice reform. However, Australia since 1984 has performed much better than New Zealand, whose per capita GDP growth indeed ranked at or near the bottom of the OECD. In this paper, we assess a variety of explanations for the divergences in policies and outcomes.
Resumo:
Analysis of the equity premium puzzle has focused on private sector capital markets. The object of this paper is to consider the welfare and policy implications of each of the broad classes of explanations of the equity premium puzzle. As would be expected, the greater the deviation from the first-best outcome implied by a given explanation of the equity premium puzzle, the more interventionist are the implied policy conclusions. Nevertheless, even explanations of the equity premium puzzle consistent with a general consumption-based asset pricing model have important welfare and policy implications.
Resumo:
Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.
Resumo:
Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.
Resumo:
The chapter examines possibilities for industrial policy in African countries through the lens of lessons that can be learned from the industrial policy approaches pursued in Ireland as well as in East Asia. As latecomers to industrialization, the small African economies are well positioned to undertake such an exercise, we suggest. This chapter provides some novel insights by providing a comparison between Ireland and the small African economies. To our knowledge such a comparison offers a unique contribution. Cognizant of the fact that a “one size fits all” approach to industrial policy is not appropriate in the African context, we argue in favor of the adoption of a more “holistic” approach to industrial policy in these economies. Such an approach we argue should focus simultaneously on demand and supply factors of industrial development, and on microeconomic as well as macroeconomic factors.
Resumo:
Policy and decision makers dealing with environmental conservation and land use planning often require identifying potential sites for contributing to minimize sediment flow reaching riverbeds. This is the case of reforestation initiatives, which can have sediment flow minimization among their objectives. This paper proposes an Integer Programming (IP) formulation and a Heuristic solution method for selecting a predefined number of locations to be reforested in order to minimize sediment load at a given outlet in a watershed. Although the core structure of both methods can be applied for different sorts of flow, the formulations are targeted to minimization of sediment delivery. The proposed approaches make use of a Single Flow Direction (SFD) raster map covering the watershed in order to construct a tree structure so that the outlet cell corresponds to the root node in the tree. The results obtained with both approaches are in agreement with expert assessments of erosion levels, slopes and distances to the riverbeds, which in turn allows concluding that this approach is suitable for minimizing sediment flow. Since the results obtained with the IP formulation are the same as the ones obtained with the Heuristic approach, an optimality proof is included in the present work. Taking into consideration that the heuristic requires much less computation time, this solution method is more suitable to be applied in large sized problems.