Direct Models

Author(s):  
Vojtěch Janoušek ◽  
Jean-François Moyen ◽  
Hervé Martin ◽  
Vojtěch Erban ◽  
Colin Farrow
Keyword(s):  
2012 ◽  
Vol 10 (2) ◽  
pp. 138-154 ◽  
Author(s):  
Mariusz Doszyń

Econometric Analysis of the Impact of Propensities on Economic Occurrences: A Macroeconomic PerspectiveThe main aim of this article was the specification of problems connected with analysis of impact of human propensities on economic occurrences and also a proposition of econometric tools enabling the identification of this impact. According to the meaning of propensities in economics the current state of knowledge is mostly an effect of considerations presented by J.M. Keynes in his famous book "The General Theory of Employment, Interest and Money" where J.M. Keynes proposed such economic categories as the average and marginal propensities. One of the goals of the presented deliberations was to specify problems related with economic theory of propensities. Such propensities as a propensity to consume, to save, to invest and thesaurisation were particularly carefully analysed. The impact of these propensities on basic macroeconomic variables was considered with respect to the classical model, the neoclassical Solow-Swan model and theIS-LMscheme. In case of spatial data the effects of the impact of propensities could be analysed by means of models with dummy variables showing presence of given propensities. A procedure enabling the construction of such variables was proposed. In case of time series, conceptions delivered by the integration and cointegration theory could be applied. Especially such models as VAR and VECM could be useful. Models for panel data enable direct (models with fixed effects) or indirect (models with random effects) consideration of the impact of propensities on the analysed processes.


1995 ◽  
Vol 24 (7) ◽  
pp. 1843-1862 ◽  
Author(s):  
Graham J.G. Upton ◽  
Montsenat Guillen

2000 ◽  
Vol 44 (21) ◽  
pp. 3-439-3-442 ◽  
Author(s):  
Douglas J. Gillan

Research and models of graph reading suggest that the reader's task is an important determinant of the perceptual and cognitive processing components that the reader uses. When people read a pie graph to determine the proportional size of a segment, they apply three processing components: selecting the appropriate mental anchor to which to compare the segment (25%, 50%, or 75%), mentally aligning the anchor to the angular position of the segment around the pie, and mentally adjusting the anchor to match the pie segment size. When a pie graph reader faces a different task, e.g., estimating the ratio of two segments or the difference between two segments, does she use the same processing components to estimate the proportions of A and of B (and then divide one estimate into the other) or does she use a more direct method of mentally aligning the two segments to be compared, then mentally overlaying one on the other (for a ratio) or estimating the spatial difference between the pie segments (for a difference). Two experiments supported the Direct models over the Proportion-based models. The component processes of the Direct models suggest that pie graph designs that eliminated the angular difference between segments being compared should improve performance.


Author(s):  
Robert Layton ◽  
Paul A. Watters

We are now in an era of cyberconflict, where nation states, in addition to private entities and individual actors, are attacking each other through Internet-based mechanisms. This incorporates cyberespionage, cybercrime, and malware attacks, with the end goal being intellectual property, state secrets, identity information, and monetary gain. Methods of deterring cybercrime ultimately require effective attribution; otherwise, the threat of consequences for malicious online behaviour will be diminished. This chapter reviews the state of the art in attribution in cyberspace, arguing that due to increases in the technical capability of the most recent advances in cyberconflict, models of attribution using network traceback and explicit identifiers (i.e. direct models) are insufficient build trustworthy models. The main cause of this is the ability of adversaries to obfuscate information and anonymise their attacks from direct attribution. Indirect models, in which models of attacks are built based on feature types and not explicit features, are more difficult to obfuscate and can lead to more reliable methods. There are some issues to overcome with indirect models, such as the complexity of models and the variations in effectiveness, which present an interesting and active field of research.


Author(s):  
Kathleen Iacocca ◽  
Yao Zhao ◽  
Adam Fein

Sign in / Sign up

Export Citation Format

Share Document