Long Tails and Localized Increasing Returns

2008 ◽  
Author(s):  
P. J. Lamberson
2014 ◽  
pp. 147-153
Author(s):  
P. Orekhovsky

The review outlines the connection between E. Reinert’s book and the tradition of structural analysis. The latter allows for the heterogeneity of industries and sectors of the economy, as well as for the effects of increasing and decreasing returns. Unlike the static theory of international trade inherited from the Ricardian analysis of comparative advantage, this approach helps identify the relationship between trade, production, income and population growth. Reinert rehabilitates the “other canon” of economic theory associated with the mercantilist tradition, F. Liszt and the German historical school, as well as a reconside ration of A. Marshall’s analysis of increasing returns. Empirical illustrations given in the book reveal clear parallels with the path of Russian socio-economic development in the last twenty years.


2016 ◽  
pp. 112-128
Author(s):  
A. Gnidchenko

The article surveys the literature that emphasizes the importance of comparative and absolute advantages for intra- and inter-industry trade. Two conclusions follow form the survey. First, unlike the traditional view, intra-industry trade is determined rather by technology than by increasing returns. Second, absolute advantages that have been ignored in international trade models for a long time play a vital role through their linkages with product quality and export diversification. We also discuss a new strand of literature that models international trade with the assumption of non-homothetic preferences.


Author(s):  
John Sterman ◽  
Rebecca M. Henderson ◽  
Eric D. Beinhocker ◽  
Lee I. Newman

SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402199065
Author(s):  
Matthew Canham ◽  
Clay Posey ◽  
Delainey Strickland ◽  
Michael Constantino

Organizational cybersecurity efforts depend largely on the employees who reside within organizational walls. These individuals are central to the effectiveness of organizational actions to protect sensitive assets, and research has shown that they can be detrimental (e.g., sabotage and computer abuse) as well as beneficial (e.g., protective motivated behaviors) to their organizations. One major context where employees affect their organizations is phishing via email systems, which is a common attack vector used by external actors to penetrate organizational networks, steal employee credentials, and create other forms of harm. In analyzing the behavior of more than 6,000 employees at a large university in the Southeast United States during 20 mock phishing campaigns over a 19-month period, this research effort makes several contributions. First, employees’ negative behaviors like clicking links and then entering data are evaluated alongside the positive behaviors of reporting the suspected phishing attempts to the proper organizational representatives. The analysis displays evidence of both repeat clicker and repeat reporter phenomena and their frequency and Pareto distributions across the study time frame. Second, we find that employees can be categorized according to one of the four unique clusters with respect to their behavioral responses to phishing attacks—“Gaffes,” “Beacons,” “Spectators,” and “Gushers.” While each of the clusters exhibits some level of phishing failures and reports, significant variation exists among the employee classifications. Our findings are helpful in driving a new and more holistic stream of research in the realm of all forms of employee responses to phishing attacks, and we provide avenues for such future research.


1996 ◽  
Vol 20 (4) ◽  
pp. 627-656 ◽  
Author(s):  
Michael B. Devereux ◽  
Allen C. Head ◽  
Beverly J. Lapham

Sign in / Sign up

Export Citation Format

Share Document