Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Social and Behavioral Sciences

Product Innovation, Signaling, And Endogenous Regulatory Delay, James Prieger Jun 2007

Product Innovation, Signaling, And Endogenous Regulatory Delay, James Prieger

School of Public Policy Working Papers

This paper examines the determinants of the timing of a monopolistic firm’s product innovation and regulatory approval, and proposes a signaling model with endogenous regulatory delay. Regulatory delay exerts a multiplier effect on total time to market, because when the firm expects the regulator to take longer to grant approval, the firm delays its product introduction. The firm can time its innovation to communicate its private information about the marginal cost of delay to the regulator. Successful signaling in the separating equilibrium leads the regulator to reduce regulatory delay. The implications of the model are consistent with data on innovation …


Are Drivers Who Use Cell Phones Inherently Less Safe?, James Prieger, Robert W. Hahn May 2007

Are Drivers Who Use Cell Phones Inherently Less Safe?, James Prieger, Robert W. Hahn

School of Public Policy Working Papers

Mobile phone usage while driving is increasing throughout the world. In this paper, we use survey data from 7,268 U.S. drivers to estimate the relationship between mobile phone use while driving and accidents. We hypothesize that drivers who use mobile phones while driving may be more likely to get into accidents than drivers who do not, even when they are not using the phone. We find evidence for the endogeneity of mobile phone and hands-free device usage, and our analysis suggests that individuals who are more likely to use hands-free devices are more careful drivers even without them. Once we …


The Assassins' Gate By George Packer, John Deniston Jan 2007

The Assassins' Gate By George Packer, John Deniston

Global Tides

A book review of The Assassins' Gate (2005) by George Packer.


An Innocent Murder? The Laws Of International Armed Conflict And The 2006 Tragedy At Qana, Brendan Groves Jan 2007

An Innocent Murder? The Laws Of International Armed Conflict And The 2006 Tragedy At Qana, Brendan Groves

Global Tides

In the early morning of June 30, 2006, Israeli warplanes struck a civilian apartment complex in Qana, Lebanon, killing some 28 persons, none of whom were thought to have been Hezbollah militants. Footage of the attack was streamed instantly across the world, leading many to decry Israel’s tactics in its conflict against Hezbollah. But did the attack actually violate the Laws of International Armed Conflict? Or, worse, does the attack epitomize the notion of an innocent murder—terrible, perhaps immoral, but lawful? Furthermore, do Hezbollah’s violations of the LOIAC excuse reactionary violations by Israel? This paper offers an analysis of the …


Fiasco: The American Military Adventure In Iraq By Thomas E. Ricks, Kevin Mills Jan 2007

Fiasco: The American Military Adventure In Iraq By Thomas E. Ricks, Kevin Mills

Global Tides

A book review of Fiasco: The American Military Adventure in Iraq (2006) by Thomas E. Ricks.


Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston Jan 2007

Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston

Global Tides

Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …