Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Iraq (2)
- Review (2)
- War (2)
- Cellular telephones and driving (1)
- Counter-influence policy (1)
-
- Cox duration model (1)
- George Packer (1)
- Hezbollah (1)
- Influence (1)
- Innovation delay (1)
- Islamist (1)
- Israel (1)
- Laws of International Armed Conflict (1)
- Lebanon (1)
- Military policy (1)
- Qana (1)
- Regulatory delay (1)
- Safety regulation (1)
- Selection effects (1)
- Telecommunications (1)
- Terrorism (1)
- Thomas E. Ricks (1)
- War on Terror (1)
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Social and Behavioral Sciences
Product Innovation, Signaling, And Endogenous Regulatory Delay, James Prieger
Product Innovation, Signaling, And Endogenous Regulatory Delay, James Prieger
School of Public Policy Working Papers
This paper examines the determinants of the timing of a monopolistic firm’s product innovation and regulatory approval, and proposes a signaling model with endogenous regulatory delay. Regulatory delay exerts a multiplier effect on total time to market, because when the firm expects the regulator to take longer to grant approval, the firm delays its product introduction. The firm can time its innovation to communicate its private information about the marginal cost of delay to the regulator. Successful signaling in the separating equilibrium leads the regulator to reduce regulatory delay. The implications of the model are consistent with data on innovation …
Are Drivers Who Use Cell Phones Inherently Less Safe?, James Prieger, Robert W. Hahn
Are Drivers Who Use Cell Phones Inherently Less Safe?, James Prieger, Robert W. Hahn
School of Public Policy Working Papers
Mobile phone usage while driving is increasing throughout the world. In this paper, we use survey data from 7,268 U.S. drivers to estimate the relationship between mobile phone use while driving and accidents. We hypothesize that drivers who use mobile phones while driving may be more likely to get into accidents than drivers who do not, even when they are not using the phone. We find evidence for the endogeneity of mobile phone and hands-free device usage, and our analysis suggests that individuals who are more likely to use hands-free devices are more careful drivers even without them. Once we …
The Assassins' Gate By George Packer, John Deniston
The Assassins' Gate By George Packer, John Deniston
Global Tides
A book review of The Assassins' Gate (2005) by George Packer.
An Innocent Murder? The Laws Of International Armed Conflict And The 2006 Tragedy At Qana, Brendan Groves
An Innocent Murder? The Laws Of International Armed Conflict And The 2006 Tragedy At Qana, Brendan Groves
Global Tides
In the early morning of June 30, 2006, Israeli warplanes struck a civilian apartment complex in Qana, Lebanon, killing some 28 persons, none of whom were thought to have been Hezbollah militants. Footage of the attack was streamed instantly across the world, leading many to decry Israel’s tactics in its conflict against Hezbollah. But did the attack actually violate the Laws of International Armed Conflict? Or, worse, does the attack epitomize the notion of an innocent murder—terrible, perhaps immoral, but lawful? Furthermore, do Hezbollah’s violations of the LOIAC excuse reactionary violations by Israel? This paper offers an analysis of the …
Fiasco: The American Military Adventure In Iraq By Thomas E. Ricks, Kevin Mills
Fiasco: The American Military Adventure In Iraq By Thomas E. Ricks, Kevin Mills
Global Tides
A book review of Fiasco: The American Military Adventure in Iraq (2006) by Thomas E. Ricks.
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Global Tides
Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …