We introduce the concept of marketing avoidance consumer efforts to conceal themselves and to deflect

Size: px
Start display at page:

Download "We introduce the concept of marketing avoidance consumer efforts to conceal themselves and to deflect"

Transcription

1 MANAGEMENT SCIENCE Vol. 54, No. 6, June 2008, pp issn eissn infors doi /nsc INFORMS Consuer Privacy and Marketing Avoidance: A Static Model Il-Horn Hann Marshall School of Business, University of Southern California, Los Angeles, California 90089, hann@arshall.usc.edu Kai-Lung Hui Departent of Inforation Systes, City University of Hong Kong, Hong Kong and Departent of Inforation Systes, National University of Singapore, Singapore , lung@cop.nus.edu.sg Sang-Yong T. Lee College of Inforation and Counications, Hanyang University, Seoul , Korea, tolee@hanyang.ac.kr Ivan P. L. Png Departent of Inforation Systes and School of Business, National University of Singapore, Singapore , ipng@cop.nus.edu.sg We introduce the concept of arketing avoidance consuer efforts to conceal theselves and to deflect arketing. The setting is one in which sellers arket soe ite through solicitations to potential consuers, who differ in their benefit fro the ite and suffer har fro receiving solicitations. Concealent by one consuer induces sellers to shift solicitations to other consuers, whereas deflection does not. Solicitations cause two externalities: direct har on consuers and the (indirect) cost of consuer concealent and deflection. We find that in arkets where the arginal cost of solicitation is sufficiently low, efforts by low-benefit consuers to conceal theselves will increase the cost-effectiveness of solicitations and lead sellers to arket ore. However, concealent by high-benefit consuers leads sellers to arket less. Furtherore, concealent by low-benefit consuers increases direct privacy har, and consuer welfare is higher with deflection than concealent. Finally, it is optial to ipose a charge on solicitations. Key words: arketing avoidance; privacy; advertising; prootion; segentation History: Accepted by Jagohan S. Raju, arketing; received March 14, This paper was with the authors 1 year for 6 revisions. Published online in Articles in Advance April 22, Introduction Privacy is a key concern for consuers (Westin 2001). Consuers use video recorders, TiVo, caller ID, spa filters, pop-up blockers, anonyous browsing, and other devices and techniques to avoid arketing and protect their privacy. In 2005, the U.S. industry spent $17.8 billion on consuer telearketing (Direct Marketing Association 2006). However, over 100 illion nubers were registered with the do not call list (Federal Trade Coission 2005). Just as iproveents in technology create new techniques of arketing, they provide fresh ways to avoid arketing and present new challenges to the arketing profession and for public policy. How should arketers respond to consuer avoidance of arketing? How does their strategic interaction affect consuer privacy? What is the appropriate public policy toward arketing activities that ipose har on consuers? Prior analytical research has assued that consuers passively accept prootions. In contrast, we introduce the concept of arketing avoidance, and analyze the endogenous trade-off between seller arketing and consuer privacy in a static setting. Consuers can get soe ite only through direct arketing, but the arketing directly iposes privacy har on consuers and indirectly leads consuers to avoid arketing in two ways concealent and deflection. Concealent reduces the exposure of consuer addresses to sellers, whereas deflection turns away solicitations addressed to the consuer. Fro the consuer s viewpoint, both concealent and deflection reduce the likelihood of receiving solicitations. However, for sellers, they differ concealent shifts solicitations to other consuers, whereas deflection causes solicitations to be discarded. Our odel includes two consuer segents high- and low-benefit. When sellers decide expenditures on solicitations, they cannot distinguish the two 1094

2 Manageent Science 54(6), pp , 2008 INFORMS 1095 consuer segents and ignore the direct and indirect externalities that they cause. We show that, in arkets where the arginal cost of solicitation is sufficiently low, seller arketing is a strategic copleent with concealent by low-benefit consuers. Efforts by low-benefit consuers to conceal theselves will increase the costeffectiveness of arketing and lead sellers to increase solicitations. However, efforts by high-benefit consuers in concealent and deflection lead sellers to reduce solicitations. Concealent by low-benefit consuers increases direct privacy har it shifts solicitations toward high-benefit consuers, who suffer ore privacy har as they spend less on deflection. Overall, consuer welfare is higher with deflection than concealent. Finally, solicitations are excessive, and so, it is optial to ipose a charge on the. 2. Motivation A substantial literature in econoics and arketing analyzes how sellers copete to acquire custoers via advertising and price (Butters 1977, McAfee 1994, McGahan and Gheawat 1994, Baye and Morgan 2001, Chen and Iyer 2002, Iyer and Pazgal 2003, Chioveanu 2008). Separately, analytical privacy research has considered how arketers use personal inforation to screen consuers and effect price discriination (Chen et al. 2001, Taylor 2004, Acquisti and Varian 2005, Wathieu 2006, Hui and Png 2006). However, previous analytical research has ostly ignored the har that arketing iposes on consuers. Advertising and direct arketing (e.g., direct ail, telephone, and fax, and electronically) ipose inconvenience and other hars on consuers. Marketers do not internalize these hars, and so they over-spend on advertising and direct arketing relative to the socially optial level (Petty 2000, Drèze and Bonfrer 2005). Van Zandt (2004) and Anderson and de Pala (2006) consider heterogeneous sellers, which offer different products through direct arketing at fixed prices. Consuers can buy the ites only through the sellers essages, but ust incur costs to open the essages. In this scenario, an increase in the sellers arketing cost ay raise welfare by screening out low-quality sellers. The average essage quality would rise, and ore consuers would open their essages (Gantan and Spiegel 2004, Loder et al. 2006). In contrast, we ephasize heterogeneity aong consuers and arketing avoidance efforts by consuers to avoid advertising and solicitations. Motivated by the econoics of security (Koo and Png 1994, Ayres and Levitt 1998), we distinguish two fors of arketing avoidance: concealent and deflection. 1 We do not take any a priori position on the erits of arketing or consuer privacy, but rather, address the endogenous trade-off aong consuer surplus, privacy hars, consuers avoidance costs, and sellers arketing costs. 3. Setting Like Van Zandt (2004), Anderson and de Pala (2006), and Loder et al. (2006), we consider copetition aong N sellers to arket soe ite at a fixed price, p. Potential consuers can buy the ite only if solicited, and, in particular, they do not seek out sellers (Butters 1977, Grossan and Shapiro 1984, McAfee 1994, Van Zandt 2004, Anderson and de Pala 2006, Loder et al. 2006). They are of two types: H high types with individual deand q h p for the ite, and L low types with individual deand q l p < q h p. Both types of consuers suffer the sae har w fro each solicitation received and are risk neutral. Consuers can invest effort to conceal their addresses fro solicitations, for instance, by renting a post office box, registering with no-contact lists, and using an unlisted telephone nuber. Specifically, let the relative exposure of consuer j s address be k j = k j (1) where k j 0 represents her effort in concealent, k j satisfies 0 = 1 d dk j k j <0 and d 2 dk 2 j k j >0 (2) and the total exposure of consuer addresses is H L = k j + k i (3) j=1 where we use j to index high-type consuers and i to index low-type consuers. By (2), the total exposure has the reasonable property that, if all k j = 0 and k i = 0, then k j = 1 and k i = 1, and hence = H + L, i.e., all consuer addresses are copletely exposed. The consuer s cost of concealent is C K k j, where C K 0 = 0 d dk j C K k j >0 i=1 d 2 dk 2 j C K k j >0 (4) and dc K /dk j = 0atk j = 0. This cost does not vary with the nuber of solicitations. 1 This generalizes the concept of ad avoidance (Speck and Elliott 1997), which, in our fraework, is a for of deflection.

3 1096 Manageent Science 54(6), pp , 2008 INFORMS Consuers can also invest effort to deflect solicitations, for instance, through call screening, pop-up blockers, and spa filters. Conditional on being addressed, a consuer would receive solicitations at rate e j, where e j 0 represents her effort in deflection and 0 = 1 d de j e j <0 and d 2 de 2 j e j >0 2 (5) The consuer s cost of deflection is C E e j, with the sae properties as C K k j in (4). 3 On the seller side, given the total exposure of consuer addresses,, the cost to seller of soliciting S addresses is CS, where C0= 0 S CS >0 CS 0 2 S 2 CS >0 2 S CS 0 and C/S = 0atS = 0. The cost CS includes the cost of copiling custoer addresses and the cost of sending the solicitations. 4 We assue that both CS and C/S decrease with because it is easier for sellers to get addresses when the total exposure is larger. 5 For siplicity, we assue that the cost 2 In this paper receiving a solicitation eans that the consuer actually receives the essage, e.g., opens the junk ail, reads the e-ail, or listens to the telearketing call. 3 Both concealent and deflection encopass ultiple ethods with differing costs. For instance, ethods of concealent fro telearketing include registering with the do not call list, using an unlisted telephone nuber, and disabling caller nuber display on outgoing calls. These ethods should be ordered by increasing cost to confor with (4). Siilarly, ultiple ethods of deflection can be ordered by increasing cost. We assue that the costs of concealent and deflection are convex. Realistically, once the consuer invests soe effort in concealent or deflection, it becoes ore difficult for her to further raise avoidance (e.g., a spa filter ay screen out 95% of incoing spa, but to accurately filter the reaining 5% would require uch ore effort). 4 A U.S. Federal Trade Coission (2002) experient suggests that the arginal cost of copiling e-ail addresses varies with the source of addresses. Coission investigators seeded 250 e-ail addresses across the Internet and observed the following rates of spa: 86% of addresses posted to newsgroups, half of addresses posted on free personal Web pages, 27% of addresses posted to essage boards, and 9% of addresses listed in e-ail ebership directory. The different sources should be ordered to confor with the convex specification in (6). In a separate field experient, Hann et al. (2006) found that spa was targeted rather than being randoly addressed, which suggests that the arginal cost of sending spa is not zero. We use cost of solicitation to refer to all costs incurred in copiling custoer addresses and sending solicitations. 5 In the context of the U.S. Federal Trade Coission experient reported in Footnote 4, when consuers invest ore effort to conceal their e-ail addresses and hence reduce their total exposure, (6) of producing the ite is zero. To focus the analysis, we apply the following condition in this study: Profitability Condition. The arginal cost of solicitation, CS /S, is sufficiently low relative to the seller s increental argin fro high-type consuers, pq h p. The sequence of events is as follows: (i) sellers set price; (ii) consuers choose efforts in concealent and deflection; while siultaneously, sellers send solicitations (at this tie, they do not know the individual consuers types, but only the distribution in the total exposure (Butters 1977, Grossan and Shapiro 1984, McAfee 1994)); (iii) if a high-benefit consuer receives a solicitation, she purchases q h p units and derives consuer surplus V h p > 0; if she receives ultiple solicitations, she purchases fro one of the sellers at rando. We focus on a separating equilibriu in which sellers price the ite such that low-benefit consuers would not buy the ite even if solicited, that is, their surplus V l p 0. 6 To ensure that the analysis is tractable, we assue that consuers and sellers have rational expectations about the actions of each other and that they act syetrically Market Equilibriu 4.1. Consuer Concealent and Deflection Consider a high-type consuer. She would receive a particular solicitation if it successfully addresses her and gets her attention. Given her efforts in concealent and deflection, k j and e j, this would occur with probability k j e j, where k j is her probability of being drawn as defined in (1). Hence, given all sellers solicitations, S 1 S N, her probability of receiving at least one solicitation is equal to one inus the the seller would have to visit ore newsgroups, essage boards, etc., to find e-ail addresses, and within each newsgroup or essage board, it ay have to spend ore effort to traverse and process e-ail addresses (e.g., converting e-ail addresses that are stored as iage to text, or concatenating the doain naes that users deliberately break up). 6 All we need is that the low-type consuer s individual deand curve be sufficiently low relative to that of the high-type consuer. Realistically, any people have low willingness to pay for directly arketed products, such as counterfeit software and discounted Viagra. Hence, it ay not be profitable for sellers to slash prices to attract such low-type consuers. We discuss how purchases by low-type consuers affect our findings in 7. Fro this point onward, where it is not essential, we suppress the price arguent in the quantities q h p and q l p, and consuer surpluses, V h p and V l p. 7 The focus on syetric equilibria is coon to uch research in advertising and direct arketing (see, e.g., Grossan and Shapiro 1984, McGahan and Gheawat 1994, Meurer and Stahl 1994, Baye and Morgan 2001, Iyer and Pazgal 2003).

4 Manageent Science 54(6), pp , 2008 INFORMS 1097 probability of not receiving any solicitation. Accordingly, her expected surplus fro the ite is { 1 1 k j e j S =1 V h = 1 1 k j e j S 1+ +S N V h 8 (7) Figure 1 S Consuer Concealent and Seller Solicitation k h (S e h ) k l (S e l ) S(k l k h, e h ) She incurs har, w, fro every solicitation received, and so, her expected har is S(k h k l, e h ) S 1 + +S N k j e j w 9 (8) Recall that C K k j and C E e j represent the costs of concealent and deflection. Hence, by (7) and (8), the expected utility of the high-type consuer j is U h k j e j = 1 1 k j e j S 1+ +S N V h S 1 + +S N k j e j w C K k j C E e j (9) If U h k j e j is axiized at k j = 0 or e j = 0, then the high-type consuer would choose zero effort in concealent or deflection. Otherwise, she would choose positive efforts in concealent and deflection according to the first-order conditions, U h k j U h e j =S 1 + +S N e j d dk j 1 k j e j S 1+ +S N 1 V h w d dk j C K k j = 0 (10) =S 1 + +S N k j d de j 1 k j e j S 1+ +S N 1 V h w d de j C E e j = 0 (11) For low-type consuers, V l p < 0, and so they would not buy the ite. Hence, the expected utility of a low-type consuer i is siply U l k i e i = S 1 + +S N k i e i w C K k i C E e i (12) 8 We assue that it is possible for a consuer to receive ultiple solicitations fro the sae seller because the seller ay have copiled addresses fro different sources that contain duplicate entries, and also, the consuer ay have ultiple addresses (e-ail accounts, telephone nubers, etc.) and hence ay get the sae solicitations in each of these addresses. 9 The privacy har, w, can be interpreted as annoyance or the resources needed to dispose of solicitations, and hence we assue it applies to every solicitation. We are grateful to a reviewer for observing that each high-type consuer benefits only fro the first solicitation received, but suffers har fro all solicitations. Fro the deand for state-level do not call registries, Png (2007) estiated the har fro telearketing to range between $13.19 and $98.33 per household. S 0 0 k h The low-type consuer would choose positive levels of efforts in concealent and deflection according to the first-order conditions, U l = S k 1 + +S N e i w d d C i dk i dk K k i =0 (13) i U l = S e 1 + +S N k i w d d C i de i de E e i =0 (14) i Our first result shows that consuers efforts in concealent and deflection are strategic copleents (Bulow et al. 1985) with sellers solicitations. Intuitively, an increase in seller solicitation increases har to consuers, and so consuers will raise concealent and deflection. Proposition 1. Consuers efforts in concealent and deflection are strategic copleents with sellers solicitations. 10 Figure 1 shows the consuers efforts in concealent as functions of seller solicitations. By Proposition 1, the consuer effort in concealent is increasing in seller solicitation. Furtherore, by coparing (10) with (13), the high-type consuer derives ore surplus, and so she invests less effort in concealent. Hence, the high-type consuers concealent function lies to the left of the low-type consuers. The consuers deflection strategies are siilar For brevity, the proofs of all results are presented in the online appendix, which is provided in the e-copanion that can be found at For other suppleentary aterials, please refer to sg/ ipng/research/. 11 The shapes of the consuer concealent functions depend on the functional fors of C K k j and k j, but, for our purpose, they are not iportant. We introduce the broken curves later: they are sellers solicitations as a function of low-type (high-type) consuers concealent, holding deflection and high-type (low-type) consuers concealent constant. In principle, Figure 1 should have H + L + N diensions, but, for ease of presentation and without loss of generality, we draw the reaction functions of only one high-type consuer, k h, one low-type consuer, k l, and one seller, S. k l k

5 1098 Manageent Science 54(6), pp , 2008 INFORMS 4.2. Seller Solicitation Consider a high-type consuer j who has received a solicitation fro seller. If she also receives z other solicitations (whether fro seller or other sellers), she will buy with probability 1/z + 1 fro each of the received solicitations. Hence, she will buy fro that solicitation by seller with probability ( ) 1 S +S 1 k z+1 z j e j z 1 k j e j S +S 1 z (15) where S S 1 + +S 1 + S S N denotes solicitations by all other sellers. 12 To calculate seller s expected revenue fro arketing to that high-type consuer, we ust su over all the various possibilities, z = 0 1S + S 1, and take account of the probability that one of the solicitations fro seller is that solicitation, which equals the product of the probability that the hightype consuer s address is drawn, k j, her effort in deflection, e j, and seller s nuber of solicitations, S. Accordingly, taking into account the increental argin fro each high-type consuer, pq h, seller s expected revenue fro that high-type consuer alone is S +S 1 z=0 { ( ) 1 S + S 1 k z + 1 z j e j z 1 k j e j S +S 1 z k j e j S pq h = 1 1 k j e j S +S pq S + S h (16) by Lea 1 (presented in the online appendix). In syetric equilibriu, all k j = k h and e j = e h. Seller s expected profit is its expected revenue fro all consuers less the cost of solicitations. Seller s expected revenue fro all consuers is siply H ties (16). 13 Hence, substituting fro (6), seller s expected profit is S S = H1 1 k h e h S +S S S + S pq h CS (17) 12 The bases for (15) are that (i) sellers collectively sent S + S solicitations; (ii) the high-type consuer has received one solicitation fro seller ; and (iii) the high-type consuer receives z other solicitations, which are drawn binoially fro the reaining S + S 1 solicitations. 13 Note that low-type consuers do not buy the ite, and hence the expected revenue fro all consuers equals the expected revenue fro all high-type consuers. Accordingly, the first-order condition is { = H 1 k S h e h S +S ln1 k h e h S k S + S h e h S +S S pq S +S 2 h CS S =0 (18) Proposition 2. Sellers solicitation is a strategic substitute with high-type consuers efforts in deflection and concealent. Sellers solicitation is independent of lowtype consuers effort in deflection, and, if and only if the arginal cost of solicitation does not increase too fast with consuer concealent, then sellers solicitation is a strategic copleent with low-type consuers effort in concealent. A consuer s effort in concealent has two effects. First, it changes the ix of consuers in the total exposure,. Iplicitly, by changing the ix, concealent perfors a screening function for sellers. If low-type consuers increase effort in concealent, they reduce their exposure and hence enrich the proportion of high types. By contrast, if high-type consuers increase effort in concealent, they reduce their proportion in the total exposure. The other effect of concealent is to reduce the total exposure of all consuers,, which raises the seller s arginal cost of solicitation. If the arginal cost of solicitation is not too sensitive to consuer concealent, the screening effect outweighs the arginal cost effect, and so, concealent by low-type consuers is good for sellers. The iplication for direct arketers is obvious: deflection is bad, although concealent can be good. Indeed, the UK Direct Marketing Association supports consuer efforts to opt out of direct ail, telearketing, and fax arketing; the U.S. Direct Marketing Association also supports opt out of direct ail, telearketing, and e-ail arketing. Note that the converse of Proposition 2 also holds sellers solicitation is a strategic substitute with all consuers concealent effort if the arginal cost of solicitation increases too fast with consuer concealent. Hence, arketers should pay close attention to changes in technology and cost differences. For any ediu whose arginal cost of solicitation is sufficiently sensitive, consuer concealent is bad for sellers. Referring to Figure 1, the upward-sloping (downward-sloping) broken curve depicts seller solicitation as a function of low-type (high-type) consuer concealent effort, holding deflection efforts and

6 Manageent Science 54(6), pp , 2008 INFORMS 1099 high-type (low-type) consuer concealent effort constant Consuer-Seller Equilibriu Our setting is not trivial. Specifically, as proved in Lea 2 (presented in the online appendix), there exists an equilibriu in which sellers do send solicitations, and consuers do invest efforts in concealent and deflection. If high-type consuers axiize utility by choosing k j = 0 and e j = 0, then the equilibriu is defined only by sellers and low-type consuers, i.e., (18), (13), and (14). Otherwise, the equilibriu is defined by sellers and both types of consuers, i.e., (18), (10), (11), (13), and (14). Generally, we cannot rule out ultiple equilibria it is possible that the reaction functions of sellers and low-type consuers intersect ore than once. To ensure a unique equilibriu, we need to specify the third derivatives of the cost functions, C K k j, C E e j, and CS, the concealent function, k j, and the deflection function, e j. 5. Welfare and Policy Iplications We now analyze the endogenous trade-off between direct arketing and consuer privacy. Suing (9), (12), and (17) over the H high-type consuers, L lowtype consuers, and N sellers, in syetric equilibriu, social welfare siplifies to W = H1 1 k h e h S 1+ +S N V h + pq h N CS S 1 + +S N Hk h e h w =1 HC K k h HC E e h S 1 + +S N Lk l e l w LC K k l LC E e l (19) In Proposition 3, we characterize the ipact of concealent and deflection on the direct privacy har caused by solicitations. Surprisingly, concealent efforts by low-type consuers increase direct privacy har. They reduce their own har, but shift solicitations toward high-type consuers, who invest less effort in deflection, and so suffer relatively ore privacy har. 15 Overall, the total direct privacy har 14 The broken curves correspond to cross-sections of the seller solicitation function (which is a surface) with respect to consuer concealent and deflection. As with the consuer concealent functions, the shape of the seller solicitation function is not essential. The figure with seller solicitation and consuer deflection functions has only one (downward-sloping) solicitation curve because, by Proposition 2, seller solicitations are independent of low-type consuers effort in deflection. 15 It is worth noting that as high-type consuers receive ore solicitations, they also have a higher probability of getting the ite and enjoying a positive surplus, and so, the net benefit of low-type consuers concealent effort on the welfare of high-type consuers is abiguous. would increase. In contrast, deflection efforts and high-type consuers concealent effort unequivocally reduce the direct privacy har. Proposition 3. The direct privacy har caused by seller solicitations is decreasing in both consuer types deflection efforts and high-type consuers concealent effort, but increasing in low-type consuers concealent effort. Besides directly iposing privacy har, seller solicitations also indirectly induce consuers to incur costs of concealent and deflection. Coparing (17) with (19), there are three differences between a seller s profit and social welfare: Because we assued elastic deand, high-type consuers enjoy soe surplus, which is ignored by sellers. This causes sellers to send too few solicitations. Sellers ignore the direct privacy har caused by solicitations and concealent and deflection costs, and hence tend to send too any solicitations. Sellers ignore the deand that they take away fro other sellers, and hence tend to send too any solicitations. How then should sellers be induced to internalize the externalities that they ipose on consuers and other sellers? Microsoft s cofounder, Bill Gates, faously advocated a postage charge on e-ail to control spa (CNN.co 2004). 16 Our next result addresses how the charge should be set, and whether telearketing and direct ail should also be taxed. Proposition 4. The optial charge per unit of seller solicitation is positive. Furtherore, it is decreasing in the expected surplus of high-type consuers, and increasing in the direct privacy har caused by solicitations and the deand that sellers take fro each other. By contrast with a siple Pigouvian solution, the optial charge depends on the actions of the victis of the externality (i.e., consuers). Proposition 3 shows that the direct privacy har fro solicitations is decreasing in both consuer types deflection efforts. By Proposition 2, deflection by high-type consuers reduces sellers solicitations too. Hence, deflection reduces the optial charge. The ipact of concealent is not obvious by Proposition 3, concealent efforts by high- and lowtype consuers have different effects on the direct privacy har, and by Proposition 2, they also shift sellers solicitations in opposite directions. Hence, the net effect of consuer efforts in concealent on the optial charge depends on the balance between highand low-type consuers. 16 This suggestion is in line with Van Zandt (2004) and Anderson and de Pala (2006), who advocated raising counication costs to curb unsolicited prootions by low-quality sellers.

7 1100 Manageent Science 54(6), pp , 2008 INFORMS It is surprising that the optial charge is positive even when high-type consuers benefit fro solicitations. The essential reason is that the arginal cost of solicitation is so low relative to the seller s increental argin (the profitability condition) that solicitations are excessive. Spa very likely satisfies this condition, and hence Proposition 4 iplies that it should be subject to a tax. Whether telearketing and direct ail should also be taxed depends on whether these ethods of direct arketing satisfy the profitability condition. The optial charge also increases with the deand that sellers take fro copetitors. A seller s solicitations ay reach new custoers, and so expand the priary deand. However, they ight also reach custoers who have already received solicitations fro other sellers and so steal the other sellers custoers, which does not raise welfare. Finally, governents proote both concealent, such as no contact registries, and deflection, such as spa filters (see, e.g., the U.S. Senate Judiciary Coittee 2002). Which should they ephasize? Proposition 5 shows that, for consuer welfare, concealent is worse than deflection. Proposition 5. Effort in deflection raises consuer welfare ore than effort in concealent. Proposition 5 is intuitive. Both concealent and deflection reduce the likelihood of solicitations reaching a consuer. The key distinction is that concealent causes solicitations to be diverted to other consuers, whereas deflection causes solicitations to be discarded. When the arginal cost of solicitation is sufficiently low, sellers send excessive solicitations; hence, the arginal benefit of solicitations to high-type consuers is low. Accordingly, consuers are better off with solicitations being discarded than diverted. Note that Proposition 5 considers only consuer welfare. Any effort in concealent by low-type consuers raises seller profit as well, because it increases the effectiveness of solicitation. Essentially, the social choice between concealent vis-à-vis deflection resolves to a trade-off between the change in the expected utility of all consuers and gain in sellers profit. With the profitability condition, the sellers additional profit is outweighed by the direct and indirect externalities on consuers (even accounting for any increase in surplus), and so, deflection is preferable. Supposing that spa satisfies the profitability condition, Proposition 5 iplies that policy-akers should ephasize deflection (installing spa filters and arking coercial e-ails with the ADV tag) over concealent (using unlisted addresses and do not contact registries). Even in arkets that do not satisfy the profitability condition, consuers still prefer deflection to concealent if the direct privacy har is so large that high-type consuers choose positive effort in concealent. 6. Epirical Iplications Generally, paraeter changes have coplex equilibriu effects directly affecting one side of the arket and indirectly affecting the other side. Owing to the difficulty of equilibriu analysis in the general odel, we focus on the reciprocal-quadratic paraeterization, k j = 1 and e 1 + k j = 1 and (20) j 1 + e j { [ CS = ] cs 2 H + L C K k j = c K k 2 j and C Ee j = c E e 2 j (21) Table 1 presents epirical iplications in the case where only low-type consuers invest in concealent and deflection. We present the other case where all consuers invest in concealent and deflection in the online appendix. In 2003, the U.S. Federal Trade Coission established a national do not call list. This reduced consuers cost of concealent fro telearketing. According to Table 1, sellers would respond by increasing solicitations, as the total exposure of addresses becae richer in high-type consuers. Indeed, the Direct Marketing Association (2004, p. 29) reported: For those direct arketers whose priary objective was to solicit direct order sales, telephone arketing again produced the highest response rate (5.78%) Perhaps this was due to the institution of Do-Not-Call laws, leaving a saller, but ore productive base to proote to. [italics added] Varian et al. (2005) found that households with higher incoe were ore likely to sign up with the U.S. Do Not Call Registry. To the extent that the benefit fro direct sales and direct privacy har increase with household size and incoe, these findings are consistent with the predictions in Table 1. Table 1 Epirical Iplications Effect of an increase in On variable pq h H L c K c E w c N S +? + +? k l +? + +? e l +??? +?

8 Manageent Science 54(6), pp , 2008 INFORMS Extensions Our odel can be extended in several eaningful ways: (i) Multiple ites. We assued that sellers arket only one ite. It is straightforward to extend our analysis to arketing of ultiple ites, with each being arketed by a distinct group of sellers. The key is that consuers (endogenously) divide into ultiple segents that can be ordered by the aggregate surpluses fro consuing the ites. Then, the analysis of consuer net utility and seller profit extend in an obvious way. 17 (ii) Heterogeneous privacy hars. Our analysis assued that solicitations cause the sae direct privacy har to both consuer segents. Realistically, the direct privacy har caused by solicitations ight differ, because for instance, people differ in their opportunity cost of tie. Let the direct privacy hars to high- and low-type consuers be w h and w l. Then, by the sae analysis as leading to (9) and (12), as long as 1 1 k j e j S 1+ +S N V h S 1 + +S N k j e j w h S 1 + +S N k i e i w l (22) high-type consuers would derive ore benefit fro solicitations than low-type consuers. By constructing reaction functions siilar to (10), (11), (13), (14), and (18), the analysis is identical to that presented above. If, however, (22) does not hold, then high-type consuers would choose ore arketing avoidance than low-type consuers. Nevertheless, the results and conclusions are siilar. 18 (iii) Low-type consuers deand. We assued that the deand of low-type consuers was sufficiently low that sellers would price the ite such that V l p 0. What happens if this does not hold, and low-type consuers would buy the ite if they receive solicitations? In this case, as with (17), seller s 17 Specifically, suppose that there are Q products, with each product being offered by a distinct group of sellers. Each consuer is interested in a subset of the Q products. Then, we can construct consuers expected utilities in a siilar way as leading to (9), and, for each product, the seller s profit in a siilar way as leading to (17). Following the approach in 4, we can derive the strategic responses of sellers and consuers, and after ranking consuers by their expected utilities, we can derive the equilibriu. 18 In this case, high-type consuers would choose positive efforts in concealent and deflection in equilibriu, and hence Propositions 4 and 5 would hold even without the profitability condition. The other changes in findings are (i) in Figure 1, the high-type consuer s concealent curve would lie to the right of that for low-type consuers, and start fro the origin; (ii) in Proposition 3, the direct har would increase in high-type consuers effort in concealent, and decrease in low-type consuers effort in concealent. profit fro H high-type and L low-type consuers would be S = H1 1 k h e h S +S pq S + S h S S + L1 1 k l e l S +S pq S + S l CS (23) There are two changes in the findings. Regarding Proposition 2, sellers solicitation is a strategic substitute with all consuers efforts in deflection. If low-type consuers deand for the ite, q l p, is sufficiently low relative to high-type consuers, then sellers solicitation is a strategic substitute with hightype consuers effort in concealent and a strategic copleent with low-type consuers effort in concealent. If, however, q l p is large, then low-type consuers effort in concealent would reduce seller profit, which would induce sellers to decrease solicitation. That is, sellers solicitation would becoe a strategic substitute with low-type consuers effort in concealent. 19 Finally, regarding Proposition 4, the optial charge is also decreasing in the expected surplus of low-type consuers. (iv) Pricing. Our analysis can be extended to endogenize sellers pricing in either of two ways. One way supposes that each seller is subject to onopolistic copetition and sets price p before sending solicitations. Referring to (10), (11), (13), (14), and (18), let the equilibriu solicitations and avoidance be S k h e h k l e l. Then, in the prior stage, each seller axiizes expected profit by setting price according to: d dp S = d { H1 1 k dp h e h N 1S+S S pq N 1S +S h p CS (24) The other way to endogenize pricing supposes that sellers set prices and send solicitations at the sae tie under conditions of oligopoly. Then, sellers will randoize prices according to a set of distributions F y p over an interval, say p p (Varian 1980, Narasihan 1988, Raju et al. 1990, McAfee 1994). Each high-type consuer would buy fro the seller offering the lowest price aong the solicitations that she receives. The distribution of the lowest price aong a set of N price distributions is 1 y N 1 F y p. 19 Note, however, that this case is less epirically relevant, as it iplies that all consuers would buy the ite upon receiving solicitations fro sellers, which does not see realistic. The proofs of the changes in findings are presented in the online appendix.

9 1102 Manageent Science 54(6), pp , 2008 INFORMS Then, adapting (9), the expected utility of a hightype consuer becoes U h k j e j = 1 1 k j e j S 1 1 k j e j S y p p + + y=2 V h p d dp 1 1 F 1p dp 1 1 k j e j S y p V h p d { 1 1 F p dp y p dp S 1 + +S N k j e j w C K k j C E e j (25) Siilarly, by enuerating the various cobinations of solicitations that reach a high-type consuer and taking account of the sellers price distributions, and then siplifying with McAfee s (1994) Equation (5), an individual seller s profit at any price p is { p=h 1 1 k h e h S 1 k h e h S y + + y 1 1 k h e h S 1 1 F y p pq h p CS y { = H 1 1 k h e h S y k h e h S y F y p pq h p CS (26) In a syetric randoized-strategy equilibriu, S y = S and F y = F for all y, and the seller ust earn equal profit, p = p, for all p p p. Applying these conditions to (26) yields the price distribution 1 Fp= 1 1 k h e h S { 1 1 k h e h S [ pqh p pq h p ] 1/N 1 (27) Substituting (27) in (26), the seller s profit siplifies to p = H1 k h e h N 1S 1 1 k h e h S pq h p CS (28) Differentiating (28) with respect to S, and setting S = S, yields the equilibriu solicitations, S. With randoized pricing, we can prove results corresponding to Propositions 2 and 3. However, whether Propositions 1, 4, and 5 generalize to the setting of randoized pricing is an open question for future research. The key challenge is that, by (25), the expected utility of high-type consuers, U h k j e j, is an intractable function of sellers solicitations and price distributions Concluding Rearks Consuers widely avoid arketing to protect their privacy. Our contribution is to introduce the consideration of arketing avoidance into analytical research. Solicitations by sellers directly ipose privacy har on consuers, and indirectly induce consuer costs of concealent and deflection. We show that consuer concealent and deflection have distinct strategic and welfare iplications depending on the trade-off between the externalities caused by solicitations and the benefit provided by the arketed ite. Our results are subject to several liitations. First, the analysis with randoized pricing left open questions on the strategic copleentarity between consuer efforts in concealent and deflection with seller solicitations, and the welfare differences between concealent and deflection. These are key issues for future research. Second, our analysis above was static. It did not allow sellers to collect consuer inforation in one period and use it for subsequent pricing (see, e.g., Chen et al. 2001, Taylor 2004, Acquisti and Varian 2005). It also did not consider repeat purchases. Such dynaic interactions, in the context of negative externalities iposed by seller solicitations, are an iportant direction for future work. Third, we assued that consuers do not proactively contact sellers. It would be interesting to analyze a setting in which both sellers and consuers seek out each other (Robert and Stahl 1993). If interested consuers seek out sellers, sellers can reduce arketing, both saving resources and reducing consuers privacy costs. Such a setting, however, ay not fit arkets in which consuers are not aware of the ite being advertised. Finally, for analytical tractability, we restricted our analysis to syetric equilibria, hoogeneous 20 In previous analyses of randoized pricing in oligopoly (Varian 1980, Narasihan 1988, Raju et al. 1990, McAfee 1994), consuers were passive, and hence coputing this surplus was not an issue. One setting which possibly avoids this proble is where consuers coit to efforts in concealent and deflection before sellers set prices.

10 Manageent Science 54(6), pp , 2008 INFORMS 1103 sellers, and only two consuer types. Although soe of these issues have been separately considered in the literature (e.g., McAfee 1994, Van Zandt 2004, Anderson and de Pala 2006), integrating the into a single analysis reains a challenging issue for future research. 9. Electronic Copanion An electronic copanion to this paper is available as part of the online version that can be found at Acknowledgents An earlier version of this paper was circulated under the title Direct Marketing: Privacy and Copetition. The authors thank seinar participants at the University of Southern California Marshall School, INSEAD, Hong Kong University of Science and Technology, the Federal Trade Coission, Singapore Manageent University, the New York University Stern School, the University of Connecticut, the University of Auckland, the City University of Hong Kong, the University of Hong Kong, the University of Texas at Dallas, and Renin University of China. The authors especially thank Gerard Butters, the departent editor, the associate editor, and referees for very helpful advice and suggestions. This research was supported in part by funding fro the Singapore Ministry of Education, Grants R and R , and Hong Kong SAR Central Policy Unit and Research Grants Council, Project No. CityU 1001-PPR-3. References Acquisti, A., H. R. Varian Conditioning prices on purchase history. Marketing Sci Anderson, S. P., A. de Pala Inforation congestion. Working paper, Departent of Econoics, University of Virginia, Charlottesville. Ayres, I., S. D. Levitt Measuring the positive externalities fro unobservable victi precaution: An epirical analysis of lojack. Quart. J. Econo Baye, M. R., J. Morgan Inforation gatekeepers on the internet and the copetitiveness of hoogeneous product arkets. Aer. Econo. Rev Bulow, J., J. Geanakoplos, P. Kleperer Multiarket oligopoly: Strategic substitutes and copleents. J. Political Econo Butters, G. R Equilibriu distributions of sales and advertising prices. Rev. Econo. Stud Chen, Y., G. Iyer Consuer addressability and custoized pricing. Marketing Sci Chen, Y., C. Narasihan, Z. J. Zhang Individual arketing with iperfect targetability. Marketing Sci Chioveanu, I Advertising, brand loyalty and pricing. Gaes Econo. Behav., epub ahead of print February 9, org, doi: /j.geb CNN.co Gates: Buy staps to send e-ail. Retrieved March 5, /05/spa.charge.ap/index.htl. Direct Marketing Association The DMA 2004 Response Rate Report. DMA, New York. Direct Marketing Association The Power of Direct Marketing. DMA, New York. Drèze, X., A. Bonfrer Moving fro custoer lifetie value to custoer equity. Working paper, Singapore Manageent University, Singapore. Federal Trade Coission Eail address harvesting: How spaers reap what you sow. FTC Consuer Alert. (Noveber). Federal Trade Coission Do not call registrations. (August 15), Report, FTC, Washington, D.C. gov/opa/2005/08/050816dncregistrations.pdf. Gantan, N., Y. Spiegel Adware, shareware, and consuer privacy. NET Institute Working Paper abstract= Grossan, G. M., C. Shapiro Inforative advertising with differentiated products. Rev. Econo. Stud Hann, I. H., K. L. Hui, Y. L. Lai, S. Y. T. Lee, I. P. L. Png Who gets spaed? Co. ACM Hui, K. L., I. P. L. Png The econoics of privacy. T. Hendershott, ed. Handbook of Econoics and Inforation Systes. Elsevier, Asterda, Iyer, G., A. Pazgal Internet shopping agents: Virtual colocation and copetition. Marketing Sci Koo, H. W., I. P. L. Png Private security: Deterrent or diversion? Internat. Rev. Law Econo Loder, T., M. Van Alstyne, R. Wash An econoic response to unsolicited counication. Adv. Econo. Anal. Policy 6(Article 2). McAfee, R. P Endogenous availability, cartels, and erger in an equilibriu price dispersion. J. Econo. Theory McGahan, A. M., P. Gheawat Copetition to retain custoers. Marketing Sci Meurer, M., D. O. Stahl II Inforative advertising and product atch. Internat. J. Indust. Organ Narasihan, C Copetitive prootional strategies. J. Bus Petty, R. D Marketing without consent: Consuer choice and costs, privacy, and public policy. J. Public Policy Marketing Png, I. P. L On the Value of Privacy fro Telearketing: Evidence fro the Do Not Call Registry. Working paper, Departent of Inforation Systes, National University of Singapore. Raju, J. S., V. Srinivasan, R. Lal The effects of brand loyalty on copetitive price prootional strategies. Manageent Sci Robert, J., D. O. Stahl II Inforative price advertising in a sequential search odel. Econoetrica Speck, P. S., M. T. Elliott Predictors of advertising avoidance in print and broadcast edia. J. Advertising Taylor, C. R Consuer privacy and the arket for custoer inforation. RAND J. Econo U.S. Senate Judiciary Coittee Know the rules, use the tools. Van Zandt, T Inforation overload in a network of targeted counication. RAND J. Econo Varian, H. R A odel of sales. Aer. Econo. Rev Varian, H. R., F. Wallenberg, G. Woroch The deographics of the do-not-call list. IEEE Security & Privacy Wathieu, L Marketing and privacy concerns. Working paper, Harvard Business School, Boston. Westin, A. F Opinion surveys: What consuers have to say about inforation privacy. Testiony before U.S. House of Representatives, Coittee on Energy and Coerce, Subcoittee on Coerce, Trade, and Consuer Protection, (May 8).

Endogenous Market Structure and the Cooperative Firm

Endogenous Market Structure and the Cooperative Firm Endogenous Market Structure and the Cooperative Fir Brent Hueth and GianCarlo Moschini Working Paper 14-WP 547 May 2014 Center for Agricultural and Rural Developent Iowa State University Aes, Iowa 50011-1070

More information

Privacy, Exposure and Price Discrimination

Privacy, Exposure and Price Discrimination Privacy, Exposure and Price Discriination Luc Wathieu 1 Harvard usiness School, Soldiers Field, oston, M 02163 (eail) lwathieu@hbs.edu (Tel) 617-495-1016 Subitted for presentation at the first QME conference

More information

Endogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money

Endogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money Endogenous Credit-Card Acceptance in a Model of Precautionary Deand for Money Adrian Masters University of Essex and SUNY Albany Luis Raúl Rodríguez-Reyes University of Essex March 24 Abstract A credit-card

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Products vs. Advertising: Media Competition and the. Relative Source of Firm Profits

Products vs. Advertising: Media Competition and the. Relative Source of Firm Profits Products vs. Advertising: Media Copetition and the Relative Source of Fir Profits David Godes, Elie Ofek and Miklos Sarvary February 2003 The authors would like to thank Dina Mayzlin, and participants

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

Note on a generalized wage rigidity result. Abstract

Note on a generalized wage rigidity result. Abstract Note on a generalized age rigidity result Ariit Mukheree University of Nottingha Abstract Considering Cournot copetition, this note shos that, if the firs differ in labor productivities, the equilibriu

More information

Study on the development of statistical data on the European security technological and industrial base

Study on the development of statistical data on the European security technological and industrial base Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: France Client: European Coission DG Migration and Hoe Affairs Brussels,

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

NBER WORKING PAPER SERIES THE WELFARE EFFECTS OF PUBLIC DRUG INSURANCE. Darius Lakdawalla Neeraj Sood

NBER WORKING PAPER SERIES THE WELFARE EFFECTS OF PUBLIC DRUG INSURANCE. Darius Lakdawalla Neeraj Sood NBER WORKING PAPER SERIES THE WELFARE EFFECTS OF PUBLIC DRUG INSURANCE Darius Lakdawalla Neeraj Sood Working Paper 1351 http://www.nber.org/papers/w1351 NATIONAL BUREAU OF ECONOMIC RESEARCH 15 Massachusetts

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Position Auctions and Non-uniform Conversion Rates

Position Auctions and Non-uniform Conversion Rates Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter

More information

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that Online Appendix I: A Model of Household Bargaining ith Violence In this appendix I develop a siple odel of household bargaining that incorporates violence and shos under hat assuptions an increase in oen

More information

DISCUSSION PAPER. Is Pay-As-You-Drive Insurance a Better Way to Reduce Gasoline than Gasoline Taxes? Ian W.H. Parry. April 2005 RFF DP 05-15

DISCUSSION PAPER. Is Pay-As-You-Drive Insurance a Better Way to Reduce Gasoline than Gasoline Taxes? Ian W.H. Parry. April 2005 RFF DP 05-15 DISCUSSION PAPER April 25 R DP 5-15 Is Pay-As-You-Drive Insurance a Better Way to Reduce Gasoline than Gasoline Taxes? Ian W.H. 1616 P St. NW Washington, DC 236 22-328-5 www.rff.org Is Pay-As-You-Drive

More information

Danske Bank acquires Sampo Bank

Danske Bank acquires Sampo Bank Danske Bank acquires Sapo Bank Overview of Sapo Bank Noveber 9, 2006 Disclaier This presentation is not for release, publication or distribution in Australia, Canada, the Hong Kong Special Adinistrative

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

The Effects of Child Care Provision in Mexico

The Effects of Child Care Provision in Mexico The Effects of Child Care Provision in Mexico Gabriela Calderon Stanford University February, 2012 Abstract In 2007, seeking to increase feale labor force participation and ore generally ease burdens on

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

Is Pay-as-You-Drive Insurance a Better Way to Reduce Gasoline than Gasoline Taxes?

Is Pay-as-You-Drive Insurance a Better Way to Reduce Gasoline than Gasoline Taxes? Is Pay-as-You-Drive Insurance a Better Way to Reduce Gasoline than Gasoline Taxes? By Ian W.H. Parry Despite concerns about US dependence on a volatile world oil arket, greenhouse gases fro fuel cobustion,

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

Problem Set 2: Solutions ECON 301: Intermediate Microeconomics Prof. Marek Weretka. Problem 1 (Marginal Rate of Substitution)

Problem Set 2: Solutions ECON 301: Intermediate Microeconomics Prof. Marek Weretka. Problem 1 (Marginal Rate of Substitution) Proble Set 2: Solutions ECON 30: Interediate Microeconoics Prof. Marek Weretka Proble (Marginal Rate of Substitution) (a) For the third colun, recall that by definition MRS(x, x 2 ) = ( ) U x ( U ). x

More information

Earnings and Community College Field of Study Choice in Canada

Earnings and Community College Field of Study Choice in Canada DISCUSSION PAPER SERIES IZA DP No. 1156 Earnings and Counity College Field of Study Choice in Canada Brahi Boudarbat May 2004 Forschungsinstitut zur Zukunft der Arbeit Institute for the Study of Labor

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

A Strategic Approach to Software Protection U

A Strategic Approach to Software Protection U Â Â Strategic pproach to Software Protection U OZ SHY University of Haifa, Israel and Stockhol School of Econoics, Sweden ozshy@econ.haifa.ac.il JCQUES-FRNCË OIS THISSE CORE, Universite Catholique de Louvain,

More information

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Small Business ebook. 5 Steps to a killer social media strategy

Small Business ebook. 5 Steps to a killer social media strategy Sall Business ebook 5 Steps to a killer social edia strategy About the authors John Keepax and Frank Irias offer ore than 32 years of cobined experience in the areas of John Keepax Creative Director /

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Journal of International Economics

Journal of International Economics Journal of International Econoics 84 (2011) 26 36 Contents lists available at ScienceDirect Journal of International Econoics journal hoepage: www.elsevier.co/locate/jie Good jobs, bad jobs, and trade

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Self-enforcing environmental agreements and trade in fossil energy deposits

Self-enforcing environmental agreements and trade in fossil energy deposits Fakultät III Wirtschaftswissenschaften, Wirtschaftsinforatik und Wirtschaftsrecht Volkswirtschaftliche Diskussionsbeiträge Discussion Papers in Econoics No. 176-15 Deceber 2015 Thoas Eichner Rüdiger Pethig

More information

Econ 100A: Intermediate Microeconomics Notes on Consumer Theory

Econ 100A: Intermediate Microeconomics Notes on Consumer Theory Econ 100A: Interediate Microeconoics Notes on Consuer Theory Linh Bun Winter 2012 (UCSC 1. Consuer Theory Utility Functions 1.1. Types of Utility Functions The following are soe of the type of the utility

More information

Construction Economics & Finance. Module 3 Lecture-1

Construction Economics & Finance. Module 3 Lecture-1 Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Study on the development of statistical data on the European security technological and industrial base

Study on the development of statistical data on the European security technological and industrial base Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: Poland Client: European Coission DG Migration and Hoe Affairs Brussels,

More information

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism The enefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelis Stijn Eyeran Lieven Eeckhout Ghent University, elgiu Stijn.Eyeran@elis.UGent.be, Lieven.Eeckhout@elis.UGent.be

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,

More information

Project Evaluation Roadmap. Capital Budgeting Process. Capital Expenditure. Major Cash Flow Components. Cash Flows... COMM2501 Financial Management

Project Evaluation Roadmap. Capital Budgeting Process. Capital Expenditure. Major Cash Flow Components. Cash Flows... COMM2501 Financial Management COMM501 Financial Manageent Project Evaluation 1 (Capital Budgeting) Project Evaluation Roadap COMM501 Financial Manageent Week 7 Week 7 Project dependencies Net present value ethod Relevant cash flows

More information

Work Travel and Decision Probling in the Network Marketing World

Work Travel and Decision Probling in the Network Marketing World TRB Paper No. 03-4348 WORK TRAVEL MODE CHOICE MODELING USING DATA MINING: DECISION TREES AND NEURAL NETWORKS Chi Xie Research Assistant Departent of Civil and Environental Engineering University of Massachusetts,

More information

( C) CLASS 10. TEMPERATURE AND ATOMS

( C) CLASS 10. TEMPERATURE AND ATOMS CLASS 10. EMPERAURE AND AOMS 10.1. INRODUCION Boyle s understanding of the pressure-volue relationship for gases occurred in the late 1600 s. he relationships between volue and teperature, and between

More information

A quantum secret ballot. Abstract

A quantum secret ballot. Abstract A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

Halloween Costume Ideas for the Wii Game

Halloween Costume Ideas for the Wii Game Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET Francisco Alonso, Roberto Blanco, Ana del Río and Alicia Sanchis Banco de España Banco de España Servicio de Estudios Docuento de

More information

Incorporating Complex Substitution Patterns and Variance Scaling in Long Distance Travel Choice Behavior

Incorporating Complex Substitution Patterns and Variance Scaling in Long Distance Travel Choice Behavior Incorporating Coplex Substitution Patterns and Variance Scaling in Long Distance Travel Choice Behavior Frank S. Koppelan Professor of Civil Engineering and Transportation Northwestern University Evanston,

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

Int. J. Production Economics

Int. J. Production Economics Int. J. Production Econoics 18 (1) 175 187 Contents lists available at ScienceDirect Int. J. Production Econoics journal hoepage www.elsevier.co/locate/ijpe Outsourcing structures and inforation flow in

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

Roland Berger Strategy Consultants. content. Fresh thinking for decision makers

Roland Berger Strategy Consultants. content. Fresh thinking for decision makers Roland Berger Strategy Consultants content Fresh thinking for decision akers Opportunities for obile telephone operators in rural areas Custoers in the countryside are different They need unique offerings

More information

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument Ross [1],[]) presents the aritrage pricing theory. The idea is that the structure of asset returns leads naturally to a odel of risk preia, for otherwise there would exist an opportunity for aritrage profit.

More information

Demand estimation and market definition. for broadband internet services 1

Demand estimation and market definition. for broadband internet services 1 Deand estiation and arket definition for broadband internet services 1 Mélisande Cardona, 2 Anton Schwarz, 3,4 B. Burcin Yurtoglu, 5 Christine Zulehner 5 July 2007 Abstract This paper analyses residential

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Modeling Strategic Investment Decisions in Spatial Markets

Modeling Strategic Investment Decisions in Spatial Markets Modeling Strategic Investent Decisions in Spatial Markets AUTHORS Stefan Lorenczik (EWI) Raiund Malischek (EWI) Johannes Trüby (IEA) EWI Working Paper, No 14/9 April 214 Institute of Energy Econoics at

More information

New for 2016! Get Licensed

New for 2016! Get Licensed Financial Manageent 2016 HS There s only one place you need to go for all your professional developent needs. The Power to Know. NEW Experience a different school of learning! New for 2016! Online courses

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

- 265 - Part C. Property and Casualty Insurance Companies

- 265 - Part C. Property and Casualty Insurance Companies Part C. Property and Casualty Insurance Copanies This Part discusses proposals to curtail favorable tax rules for property and casualty ("P&C") insurance copanies. The syste of reserves for unpaid losses

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

How To Find Out What Happens When A Company Is Integrated

How To Find Out What Happens When A Company Is Integrated HORIZONTAL AND VERTICAL TAKEOVER AND SELL-OFF ANNOUNCEMENTS: ABNORMAL RETURNS DIFFER BY INDUSTRY Stephan K.H. Gross*, Hagen Lindstädt** Abstract We begin with the hypothesis that shareholder-wealth effects

More information

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.

More information

OpenGamma Documentation Bond Pricing

OpenGamma Documentation Bond Pricing OpenGaa Docuentation Bond Pricing Marc Henrard arc@opengaa.co OpenGaa Docuentation n. 5 Version 2.0 - May 2013 Abstract The details of the ipleentation of pricing for fixed coupon bonds and floating rate

More information

Government Control of the Media

Government Control of the Media Governent Control of the Media Scott Gehlbach and Konstantin Sonin Septeber 2008 Abstract We present a foral odel of governent control of the edia to illuinate variation in edia freedo across countries

More information

Optimal Times to Decrease Extraction Rates During Two-Stage Remediation Affected by Rate-Limited Transport Jose A. Saez, Loyola Marymount University

Optimal Times to Decrease Extraction Rates During Two-Stage Remediation Affected by Rate-Limited Transport Jose A. Saez, Loyola Marymount University Optial Ties to Decrease Extraction ates During Two-Stage eediation Affected by ate-liited Transport Jose A. Saez, Loyola Maryount University Abstract Saez and Haron presented a two-stage pup and treat

More information

Models and Algorithms for Stochastic Online Scheduling 1

Models and Algorithms for Stochastic Online Scheduling 1 Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: negow@ath.tu-berlin.de

More information

Insurance Spirals and the Lloyd s Market

Insurance Spirals and the Lloyd s Market Insurance Spirals and the Lloyd s Market Andrew Bain University of Glasgow Abstract This paper presents a odel of reinsurance arket spirals, and applies it to the situation that existed in the Lloyd s

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

Health Insurance: Aetna and Local Arket Concentration

Health Insurance: Aetna and Local Arket Concentration Paying a Preiu on your Preiu? Consolidation in the U.S. Health Insurance Industry By Leeore Dafny, Mark Duggan and Subraania Raanarayanan* We exaine whether and to what extent consolidation in the U.S.

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

IT SOURCING PORTFOLIO MANAGEMENT FOR IT SERVICES PROVIDERS - A RISK/COST PERSPECTIVE

IT SOURCING PORTFOLIO MANAGEMENT FOR IT SERVICES PROVIDERS - A RISK/COST PERSPECTIVE IT SOURCING PORTFOLIO MANAGEMENT FOR IT SERVICES PROVIDERS - A RISK/COST PERSPECTIVE Copleted Research Paper Steffen Zierann Arne Katzarzik Dennis Kundisch Abstract Utilizing a global IT sourcing strategy

More information

Non-Price Equilibria in Markets of Discrete Goods

Non-Price Equilibria in Markets of Discrete Goods Non-Price Equilibria in Markets of Discrete Goods (working paper) Avinatan Hassidi Hai Kaplan Yishay Mansour Noa Nisan ABSTRACT We study arkets of indivisible ites in which price-based (Walrasian) equilibria

More information