منابع مشابه
Why Hire Loan Officers? Examining Delegated Expertise∗
I develop and estimate a model of expertise that weighs the tradeoffs of delegating loan decisions to loan officers. While loan officers can screen soft information, their preferences may distort decisions away from the lender’s objective. The model features rich heterogeneity (e.g. risk aversion, willingness to exert effort, and overconfidence) and addresses possible endogeneity with a natural...
متن کاملWhy firms refuse to hire underbidders
A prominent theory of wage rigidity claims that a social norm against underbidding may prevent wages from falling to market clearing levels. This social norm may therefore cause downwardly rigid wages and involuntary unemployment. Recently performed questionnaire studies have thrown doubt on the conjecture that there is a social norm against underbidding. In this paper we experimentally show th...
متن کاملDoes Big 6 Auditor Industry Expertise
SYNOPSIS: Earnings management remains a popular topic of debate and discussion among investors, regulators, analysts, and the public. One mechanism that might mitigate earnings management is auditors industry expertise. Using a large sample of clients of Big 6 auditors, this research examines the association between auditor industry expertise, measured in terms of both auditor market share in ...
متن کاملWhy Big Data Needs Big Buffer Switches
Today’s cloud data applications, including Hadoop, Big Data, Search or Storage, are distributed applications running on server clusters with many-to-many communication patterns. The key to achieving predictable performance for these distributed applications is to provide consistent network bandwidth and latency to the various traffic flows since in most cases it is the slowest flow or query com...
متن کاملSecret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It
This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties that may facilitate cryptanalysis. We show how this might be done and how such sneaky use of optimisation may be detected.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2013
ISSN: 1556-5068
DOI: 10.2139/ssrn.2784648