منابع مشابه
Transaction Costs and Institutions: Investments in Exchange∗
This paper proposes a simple model for understanding transaction costs – their composition, size and policy implications. We distinguish between investments in institutions that facilitate exchange and the cost of conducting exchange itself. Institutional quality and market size are determined by the decisions of risk averse agents and conditions are discussed under which the efficient allocati...
متن کاملLabor Costs and Investments in Human Capital
This study examines the disclosure of labor-related costs by US firms, and estimates the proportion of these costs that are valued as an asset (human capital) by the market. Separate identification of labor-related costs in US financial reports is voluntary, and is made consistently only by about 10% of all US Compustat firms. The probability of disclosure is found to be positively related to f...
متن کاملAssessing IT-investments: costs, benefits, risks
Many methods aimed at cost-benefit analysis for IT-projects can be found in literature. These all have one thing in common: actual usage is limited. In our view this is due to two factors: the criteria to take into account in the analysis are fixed and the process to support the analysis is lacking or at least flawed. In this paper an approach towards costbenefit analysis will be described that...
متن کاملFixed and Sunk Costs Revisited
The authors attempt to clarify the concepts of, and the link between, fixed costs and sunk costs. They argue that the root for possible confusion between fixed costs and sunk costs is the inconsistency in defining the term fixed costs. They define fixed costs uniformly as the costs that are independent of the level of output and suggest that instructors refer to the part of fixed costs that are...
متن کاملLong-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually held in a “tamperresistant,” replaceable, smartcard. A coalition of users may attack such a system by breaking their smartcards open, extracting the keys, and building “pirate decoders” based on the decryption keys they...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Monetary Economics
سال: 2014
ISSN: 0304-3932
DOI: 10.1016/j.jmoneco.2014.07.011