منابع مشابه
Loopholes and the Evolution of Contract Form∗
We explore a simple overlapping-generations model of the evolution via “loopholes” of incentive systems such as contracts, organizations, or regulatory regimes. Young principals, who are uncertain about what actions will be feasible for their agents, get limited observations of earlier agents’ behavior, and rationally update their beliefs about feasible actions. When old, they offer contracts t...
متن کاملFinding the loopholes: a cross-sectional qualitative study of systemic barriers to treatment access for women drug court participants
BACKGROUND Therapeutic diversion courts seek to address justice-involved participants' underlying problems leading to their legal system involvement, including substance use disorder, psychiatric illness, and intimate partner violence. The courts have not addressed systemic hurdles, which can contribute to a cycle of substance use disorder and recidivism, which in turn hinder health and wellnes...
متن کاملLoopholes: Social Learning and the Evolution of Contract Form∗
We explore a simple model of the evolution via “loopholes” of incentive systems such as contracts, organizations, or regulatory regimes. Young principals, who are uncertain about what actions will be feasible for their agents, get limited observations of earlier agents’ behavior, and rationally update their beliefs about feasible actions. When old, they offer contracts that deter only the harmf...
متن کاملThe Spanish tobacco tax loopholes and their consequences.
OBJECTIVES The Spanish government has strengthened tobacco control policies since 2005, including changes in tobacco taxes. Because these changes have targeted cigarettes mainly, the tobacco industry has marketed cheaper alternative tobacco products, offering smokers the possibility to downtrade. This paper traces the evolution of patterns of demand for cigarettes and other tobacco products in ...
متن کاملLoopholes in Two Public Key Cryptosystems Using the Modular Group
We demonstrate that the public key cryptosystems using the modular group suggested in [4,5] are vulnerable to very simple ciphertextonly attacks. Consequently, in the present form both of these systems cannot be considered as sufficiently secure for cryptographic purposes.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Index on Censorship
سال: 1987
ISSN: 0306-4220,1746-6067
DOI: 10.1177/030642208701600409