scholarly journals The Welfare Consequences of ATM Surcharges: Evidence from a Structural Entry Model

Author(s):  
Gautam Gowrisankaran ◽  
John Krainer
2005 ◽  
pp. 1.000-51.000
Author(s):  
Gautam Gowrisankaran ◽  
◽  
John Krainer ◽  
◽  

2018 ◽  
Vol 18 (3) ◽  
pp. 86-103

The effect of cultural distance (CD) on the entry mode choice (EMC) has been intensively studied but the empirical results are mixed. This study adopts the strategic fit perspective to examine how firms’ strategic motives and technological ownerships may influence the EMC in face of different cultural distances. Analyzing Taiwanese outward FDI cases from 2004 to 2007, this study found that firms entering the culture-distant countries would choose the wholly-owned subsidiary (WOS) mode when emphasizing more about the protection of technological competence than market expansion, or else would choose the joint-venture (JV) mode when the market expansion is prioritized.


1989 ◽  
Vol 16 (2) ◽  
pp. 1-41 ◽  
Author(s):  
Barry E. Cushing

Distinct parallels exist between the historical evolution of scientific disciplines, as explained in Thomas Kuhn's The Structure of Scientific Revolutions, and the historical evolution of the accounting discipline. These parallels become apparent when accounting's dominant paradigm is interpreted to be the double-entry bookkeeping model. Following this interpretation, the extensive articulation of the double-entry model over the past four centuries may be seen to closely resemble the “normal science” of Kuhn's theory. Further parallels become apparent when Kuhn's concept of the disciplinary crises that precede scientific revolutions is compared to developments in the accounting discipline over the past 25 years. This portrayal of accounting's evolution suggests an uncertain future for the accounting discipline.


2020 ◽  
Vol 7 (3) ◽  
pp. 190023
Author(s):  
J. Hernandez-Castro ◽  
A. Cartwright ◽  
E. Cartwright

We present in this work an economic analysis of ransomware, a relatively new form of cyber-enabled extortion. We look at how the illegal gains of the criminals will depend on the strategies they use, examining uniform pricing and price discrimination. We also explore the welfare costs to society of such strategies. In addition, we present the results of a pilot survey which demonstrate proof of concept in evaluating the costs of ransomware attacks. We discuss at each stage whether the different strategies we analyse have been encountered already in existing malware, and the likelihood of them being implemented in the future. We hope this work will provide some useful insights for predicting how ransomware may evolve in the future.


Sign in / Sign up

Export Citation Format

Share Document