892 resultados para D82 - Asymmetric and Private Information
Resumo:
We consider exchange economies with a continuum of agents and differential information about finitely many states of nature. It was proved in Einy, Moreno and Shitovitz (2001) that if we allow for free disposal in the market clearing (feasibility) constraints then an irreducible economy has a competitive (or Walrasian expectations) equilibrium, and moreover, the set of competitive equilibrium allocations coincides with the private core. However when feasibility is defined with free disposal, competitive equilibrium allocations may not be incentive compatible and contracts may not be enforceable (see e.g. Glycopantis, Muir and Yannelis (2002)). This is the main motivation for considering equilibrium solutions with exact feasibility. We first prove that the results in Einy et al. (2001) are still valid without free-disposal. Then we define an incentive compatibility property motivated by the issue of contracts’ execution and we prove that every Pareto optimal exact feasible allocation is incentive compatible, implying that contracts of a competitive or core allocations are enforceable.
Resumo:
Includes bibliography
Resumo:
The Fourth Amendment prohibits unreasonable searches and seizures in criminal investigations. The Supreme Court has interpreted this to require that police obtain a warrant prior to search and that illegally seized evidence be excluded from trial. A consensus has developed in the law and economics literature that tort liability for police officers is a superior means of deterring unreasonable searches. We argue that this conclusion depends on the assumption of truth-seeking police, and develop a game-theoretic model to compare the two remedies when some police officers (the bad type) are willing to plant evidence in order to obtain convictions, even though other police (the good type) are not (where this type is private information). We characterize the perfect Bayesian equilibria of the asymmetric-information game between the police and a court that seeks to minimize error costs in deciding whether to convict or acquit suspects. In this framework, we show that the exclusionary rule with a warrant requirement leads to superior outcomes (relative to tort liability) in terms of truth-finding function of courts, because the warrant requirement can reduce the scope for bad types of police to plant evidence
Resumo:
Professional computing employment in Australia, as in most advanced economies, is highly sex segregated, reflecting well-rehearsed ideas about the masculinity of technology and computing culture. In this paper we are concerned with the processes of work organisation that sustain and reproduce this gendered occupational distribution, focusing in particular on differences and similarities in working-time arrangements between public and private sectors in the Australian context. While information technology companies are often highly competitive workplaces with individualised working arrangements, computing professionals work in a wide range of organisations with different regulatory histories and practices. Our goal is to investigate the implications of these variations for gender equity outcomes, using the public/private divide as indicative of different regulatory frameworks. We draw on Australian census data and a series of organisational case studies to compare working-time arrangements in professional computing employment across sectors, and to examine the various ways employees adapt and respond. Our analysis identifies a stronger ‘long hours culture’ in the private sector, but also underlines the rarity of part-time work in both sectors, and suggests that men and women tend to respond in different ways to these constraints. Although the findings highlight the importance of regulatory frameworks, the organisation of working time across sectors appears to be sustaining rather than challenging gender inequalities in computing employment.
Resumo:
My thesis consists of three essays that investigate strategic interactions between individuals engaging in risky collective action in uncertain environments. The first essay analyzes a broad class of incomplete information coordination games with a wide range of applications in economics and politics. The second essay draws from the general model developed in the first essay to study decisions by individuals of whether to engage in protest/revolution/coup/strike. The final essay explicitly integrates state response to the analysis. The first essay, Coordination Games with Strategic Delegation of Pivotality, exhaustively analyzes a class of binary action, two-player coordination games in which players receive stochastic payoffs only if both players take a ``stochastic-coordination action''. Players receive conditionally-independent noisy private signals about the normally distributed stochastic payoffs. With this structure, each player can exploit the information contained in the other player's action only when he takes the “pivotalizing action”. This feature has two consequences: (1) When the fear of miscoordination is not too large, in order to utilize the other player's information, each player takes the “pivotalizing action” more often than he would based solely on his private information, and (2) best responses feature both strategic complementarities and strategic substitutes, implying that the game is not supermodular nor a typical global game. This class of games has applications in a wide range of economic and political phenomena, including war and peace, protest/revolution/coup/ strike, interest groups lobbying, international trade, and adoption of a new technology. My second essay, Collective Action with Uncertain Payoffs, studies the decision problem of citizens who must decide whether to submit to the status quo or mount a revolution. If they coordinate, they can overthrow the status quo. Otherwise, the status quo is preserved and participants in a failed revolution are punished. Citizens face two types of uncertainty. (a) non-strategic: they are uncertain about the relative payoffs of the status quo and revolution, (b) strategic: they are uncertain about each other's assessments of the relative payoff. I draw on the existing literature and historical evidence to argue that the uncertainty in the payoffs of status quo and revolution is intrinsic in politics. Several counter-intuitive findings emerge: (1) Better communication between citizens can lower the likelihood of revolution. In fact, when the punishment for failed protest is not too harsh and citizens' private knowledge is accurate, then further communication reduces incentives to revolt. (2) Increasing strategic uncertainty can increase the likelihood of revolution attempts, and even the likelihood of successful revolution. In particular, revolt may be more likely when citizens privately obtain information than when they receive information from a common media source. (3) Two dilemmas arise concerning the intensity and frequency of punishment (repression), and the frequency of protest. Punishment Dilemma 1: harsher punishments may increase the probability that punishment is materialized. That is, as the state increases the punishment for dissent, it might also have to punish more dissidents. It is only when the punishment is sufficiently harsh, that harsher punishment reduces the frequency of its application. Punishment Dilemma 1 leads to Punishment Dilemma 2: the frequencies of repression and protest can be positively or negatively correlated depending on the intensity of repression. My third essay, The Repression Puzzle, investigates the relationship between the intensity of grievances and the likelihood of repression. First, I make the observation that the occurrence of state repression is a puzzle. If repression is to succeed, dissidents should not rebel. If it is to fail, the state should concede in order to save the costs of unsuccessful repression. I then propose an explanation for the “repression puzzle” that hinges on information asymmetries between the state and dissidents about the costs of repression to the state, and hence the likelihood of its application by the state. I present a formal model that combines the insights of grievance-based and political process theories to investigate the consequences of this information asymmetry for the dissidents' contentious actions and for the relationship between the magnitude of grievances (formulated here as the extent of inequality) and the likelihood of repression. The main contribution of the paper is to show that this relationship is non-monotone. That is, as the magnitude of grievances increases, the likelihood of repression might decrease. I investigate the relationship between inequality and the likelihood of repression in all country-years from 1981 to 1999. To mitigate specification problem, I estimate the probability of repression using a generalized additive model with thin-plate splines (GAM-TPS). This technique allows for flexible relationship between inequality, the proxy for the costs of repression and revolutions (income per capita), and the likelihood of repression. The empirical evidence support my prediction that the relationship between the magnitude of grievances and the likelihood of repression is non-monotone.
Resumo:
Developing nations in Africa are not shielded from the pressures of a globalized competitive agricultural marketplace. With an appreciable bulk of her people deriving livelihoods from diverse agricultural enterprises, these nations must respond to important contemporary issues shaping global agriculture. Farmers from such nations, including Ghana, will be able to improve their participation in the competitive local, regional and global agricultural marketplace if the appropriate agricultural technologies and extension information support are available. To achieve this, a new breed of agricultural extension graduates who can respond to current and emerging challenges in agriculture and interface effectively with farmers must be produced through responsive extension education and training. While extension education can produce effective extensionists to hasten agricultural development, budgetary constraints make it difficult for most African governments to successfully and sustainably implement such educational programs. However, public-private partnership (PPP) initiatives offer a way out of this financial dilemma. Beginning in 1993, the Sasakawa Africa Fund for Extension Education (SAFE) worked with the University of Cape Coast (UCC) in Ghana to develop an innovative extension education program through a public private partnership. The program, comprising a BSc. and Diploma components, was designed to respond to the myriad of challenges facing higher agricultural extension education in Ghana. A key practical feature of the curricula is the “Supervised Enterprise Projects” (SEPS), which enable students to work with relevant stakeholders to identify and tackle agricultural problems in farming communities through experiential extension approaches and action research. The SAFE-UCC initiative fulfils important education goals such as: expanding and improving access; ensuring quality and relevance; ensuring funding and mobilizing resources for sustainability; building partnerships and linkages; and promoting international co-operation. The paper discusses the underlying conditions for a successful public private partnership in agricultural and extension education and sheds light on the impacts, lessons learned and challenges.
Resumo:
A new solution to the millionaire problem is designed on the base of two new techniques: zero test and batch equation. Zero test is a technique used to test whether one or more ciphertext contains a zero without revealing other information. Batch equation is a technique used to test equality of multiple integers. Combination of these two techniques produces the only known solution to the millionaire problem that is correct, private, publicly verifiable and efficient at the same time.
Resumo:
Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web-based applications, such as Google Maps, is ensuring that mapping based applications are becoming commonplace amongst Internet users which has facilitated the rapid growth of geo-mashups. These user generated creations enable Internet users to aggregate and publish information over specific geographical points. This article identifies privacy invasive geo-mashups that involve the unauthorized use of personal information, the inadvertent disclosure of personal information and invasion of privacy issues. Building on Zittrain’s Privacy 2.0, the author contends that first generation information privacy laws, founded on the notions of fair information practices or information privacy principles, may have a limited impact regarding the resolution of privacy problems arising from privacy invasive geo-mashups. Principally because geo-mashups have different patterns of personal information provision, collection, storage and use that reflect fundamental changes in the Web 2.0 environment. The author concludes by recommending embedded technical and social solutions to minimize the risks arising from privacy invasive geo-mashups that could lead to the establishment of guidelines for the general protection of privacy in geo-mashups.
Resumo:
Many governments world wide are attempting to increase accountability, transparency, and the quality of services by adopting information and communications technologies (ICTs) to modernize and change the way their administrations work. Meanwhile e-government is becoming a significant decision-making and service tool at local, regional and national government levels. The vast majority of users of these government online services see significant benefits from being able to access services online. The rapid pace of technological development has created increasingly more powerful ICTs that are capable of radically transforming public institutions and private organizations alike. These technologies have proven to be extraordinarily useful instruments in enabling governments to enhance the quality, speed of delivery and reliability of services to citizens and to business (VanderMeer & VanWinden, 2003). However, just because the technology is available does not mean it is accessible to all. The term digital divide has been used since the 1990s to describe patterns of unequal access to ICTs—primarily computers and the Internet—based on income, ethnicity, geography, age, and other factors. Over time it has evolved to more broadly define disparities in technology usage, resulting from a lack of access, skills, or interest in using technology. This article provides an overview of recent literature on e-government and the digital divide, and includes a discussion on the potential of e-government in addressing the digital divide.
Resumo:
The rate of water reform in Australia is gathering pace with Federal and State initiatives promoting a more integrated approach to water management. This approach encompasses a more competitive environment and a greater role for the private sector. There is a growing recognition of the importance of water recycling in these initiatives and the need to provide opportunities for its development. In March 2008 the Productivity Commission published its discussion paper on urban water reform (Productivity Commission, 2008). The paper cited inadequate institutional arrangements for the management of Australian urban water resources and noted the benefits to be gained from a comprehensive public review of urban water management. This development can be supported through the promotion of a sewer mining industry. This industry, offers flexible and innovative solutions to water recycling demands in a variety of situations and structures. In addition it has the capability of satisfying government competition and private sector policy initiatives.
Resumo:
This paper provides an overview of the Australian Government’s Facilities Management (FM) Action Agenda as announced in 2004 as a key policy plank designed to facilitate growth of the FM industry. The resulting consultation with industry leaders has seen the criterion and release in April 2005 of the FM Action Agenda’s strategic plan entitled ‘Managing the Built Environment’. This framework, representing a collaboration between the Australian Government, public and private sector stakeholders and Facility Management Association of Australia (FMA Australia) and other allied bodies, sets out to achieve the vision of a more “…productive and sustainable built environment…” through improved innovation, education and standards. The 36 month implementation phase is now underway and will take a multi-pronged approach to enhancing the recognition of the FM industry and removing impediments to its growth with a 20 point action plan across the following platforms: • Innovation – Improved appreciation of facility life cycles, and greater understanding of the key drivers of workplace productivity, and the improved application of information technology. • Education and Training – Improved access to dedicated FM education and training opportunities and creation clear career pathways into the profession. • Regulatory Reform – Explore opportunities to harmonise cross jurisdictional regulatory compliance requirements that have an efficiency impact on FM. • Sustainability – Improved utilization of existing knowledge and the development of tools and opportunities to improve the environmental performance of facilities. Additional information is available at www.fma.com.au
Resumo:
Forensic analysis requires the acquisition and management of many different types of evidence, including individual disk drives, RAID sets, network packets, memory images, and extracted files. Often the same evidence is reviewed by several different tools or examiners in different locations. We propose a backwards-compatible redesign of the Advanced Forensic Formatdan open, extensible file format for storing and sharing of evidence, arbitrary case related information and analysis results among different tools. The new specification, termed AFF4, is designed to be simple to implement, built upon the well supported ZIP file format specification. Furthermore, the AFF4 implementation has downward comparability with existing AFF files.
Resumo:
In May 2005, a research team began to investigate whether designing and implementing a whole-of-government information licensing framework was possible. This framework was needed to administer copyright in relation to information produced by the government and to deal properly with privately-owned copyright on which government works often rely. The outcome so far is the design of the Government Information Licensing Framework (GILF) and its gradual uptake within a number of Commonwealth and State government agencies. However, licensing is part of a larger issue in managing public sector information (PSI); and it has important parallels with the management of libraries and public archives. Among other things, managing the retention and supply of PSI requires an ability to search and locate information, ability to give public access to the information legally, and an ability to administer charges for supplying information wherever it is required by law. The aim here is to provide a summary overview of pricing principles as they relate to the supply of PSI.
Resumo:
The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.