Opening the Black Box
نویسندگان
چکیده
Controversy over the aggregate impact of foreign aid has focused on reduced form estimates of the aid-growth link. The causal chain, through which aid affects developmental outcomes including growth, has received much less attention. We address this gap by: (i) specifying a structural model of the main relationships; (ii) estimating the impact of aid on a range of final and intermediate outcomes; and (iii) quantifying a simplied representation of the full structural form, where aid impacts on growth through key intermediate outcomes. A coherent picture emerges: aid stimulates growth and reduces poverty through physical capital investment and improvements in health.
منابع مشابه
Opening the Black Box : How Data
Opening the Black Box: How Data Mining Works with examples for Social Scientists in Higher Education Research Terrence Willett © 200
متن کاملOn the round complexity of black-box constructions of commitments secure against selective opening attacks
Selective opening attacks against commitment schemes occur when the commitment scheme is repeated in parallel and an adversary can choose depending on the commit-phase transcript to see the values and openings to some subset of the committed bits. Commitments are secure under such attacks if one can prove that the remaining, unopened commitments stay secret. We prove the following black-box con...
متن کاملErrata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks
Selective opening attacks against commitment schemes occur when the commitment scheme is repeated in parallel (or concurrently) and an adversary can choose depending on the commit-phase transcript to see the values and openings to some subset of the committed bits. Commitments are secure under such attacks if one can prove that the remaining, unopened commitments stay secret. We prove the follo...
متن کامل(Nearly) round-optimal black-box constructions of commitments secure against selective opening attacks
Selective opening attacks against commitment schemes occur when the commitment scheme is repeated in parallel (or concurrently) and an adversary can choose depending on the commit-phase transcript to see the values and openings to some subset of the committed bits. Commitments are secure under such attacks if one can prove that the remaining, unopened commitments stay secret. We prove the follo...
متن کامل