Narrow your search
Listing 1 - 8 of 8
Sort by

Book
Decrypting New Age International Capital Flows
Authors: --- ---
Year: 2021 Publisher: Washington, D.C. : The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This paper employs high frequency transactions data on the world's oldest and most extensive centralized peer-to-peer Bitcoin market, which enables trade in the currencies of more than 135 countries. It presents an algorithm that allows, with high probability, the detection of "crypto vehicle transactions" in which crypto currency is used to move capital across borders or facilitate domestic transactions. In contrast to previous work which has used "on-chain" data, this paper's approach enables one to investigate parts of the vastly larger pool of "off-chain" transactions. Finding that, as a conservative lower bound, over 7 percent of the 45 million trades on the exchange we explore represent crypto vehicle transactions in which Bitcoin is used to make payments in fiat currency. Roughly 20 percent of these represent international capital flight/flows/remittances. Although this work cannot be used to put a price on cryptocurrencies, it provides the first systematic quantitative evidence that the transactional use of cryptocurrencies constitutes a fundamental component of their value, at least under the current regulatory regime.


Book
The Power of Information : the Impact of Mobile Phones On Farmers' Welfare in the Philippines
Authors: ---
Year: 2009 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The authors explore the impact of access to information on poor farmers' consumption. The analysis combines spatially coded data on mobile phone coverage with household panel data on farmers from some of the poorest areas of the Philippines. Both the ordinary least squares and instrumental variable estimates indicate that purchasing a mobile phone has a large, positive impact on the household-level growth rate of per capita consumption. Estimates range from 11 to 17 percent, depending on the sample and the specification chosen. The authors perform a range of reliability tests, the results of which all suggest that the instruments are valid. They also present evidence consistent with the argument that easier access to information allows farmers to strike better price deals within their existing trading relationships and to make better choices in terms of where they choose to sell their goods.


Book
Toward A Theory of Optimal Financial Structure
Authors: --- ---
Year: 2009 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Each institutional arrangement in a financial system has both advantages and disadvantages in mobilizing savings, allocating capital, diversifying risks, and processing information when facilitating financial transactions. Meanwhile, the factor endowment in an economy at each stage of its development determines the optimal industrial structure in the real sector, which in turn constitutes the main determinant of the size distribution and risk features of viable enterprises with implications for the appropriate institutional arrangement of financial services at that stage. Therefore, there is an endogenously determined optimal financial structure for the economy at each stage of development.


Book
Toward A Theory of Optimal Financial Structure
Authors: --- ---
Year: 2009 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Each institutional arrangement in a financial system has both advantages and disadvantages in mobilizing savings, allocating capital, diversifying risks, and processing information when facilitating financial transactions. Meanwhile, the factor endowment in an economy at each stage of its development determines the optimal industrial structure in the real sector, which in turn constitutes the main determinant of the size distribution and risk features of viable enterprises with implications for the appropriate institutional arrangement of financial services at that stage. Therefore, there is an endogenously determined optimal financial structure for the economy at each stage of development.


Book
International Trade, Security, and Transnational Terrorism : Theory and Empirics
Authors: ---
Year: 2006 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The authors offer a general analytical framework illustrating the complex two-way interactions between trade and transnational terrorism. Then they survey the recent economic literature in light of this framework by pointing to the importance in empirical studies of (1) controlling appropriately for theses interactions, (2) distinguishing between "source" countries and "target" countries of terrorism, and (3) taking into account the intertemporal persistence of terrorism between specific pairs of countries.


Book
International Trade, Security, and Transnational Terrorism : Theory and Empirics
Authors: ---
Year: 2006 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The authors offer a general analytical framework illustrating the complex two-way interactions between trade and transnational terrorism. Then they survey the recent economic literature in light of this framework by pointing to the importance in empirical studies of (1) controlling appropriately for theses interactions, (2) distinguishing between "source" countries and "target" countries of terrorism, and (3) taking into account the intertemporal persistence of terrorism between specific pairs of countries.


Book
Security of Cyber-Physical Systems
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.

Keywords

Technology: general issues --- History of engineering & technology --- smart grids --- device authentication --- situational awareness --- home area networks --- time-delay switch attack --- networked control systems --- secure control design --- Lyapunov theory --- attack estimation --- hardware-in-the-loop testing --- machine learning --- industrial control systems --- anomaly detection --- fault detection --- intrusion detection system --- blockchain --- security --- privacy --- financial transactions --- transportation systems --- autonomous vehicles --- power system resilience --- disaster --- Federated Learning --- edge intelligence --- resilience management systems --- resource-limitations --- demand response --- remedial testing --- greybox fuzzing --- vulnerability detection --- enhanced security --- traffic microsimulation tool --- cooperative automated driving systems --- vehicle powertrain --- safety --- road capacity --- contested environments --- anomaly isolation --- artificial neural networks --- Cyber Physical System --- out-of-bounds --- vulnerable detection --- patch --- inverter-based energy resources --- islanded microgrids --- resilient control design --- secondary control --- false data injection --- smart grids --- device authentication --- situational awareness --- home area networks --- time-delay switch attack --- networked control systems --- secure control design --- Lyapunov theory --- attack estimation --- hardware-in-the-loop testing --- machine learning --- industrial control systems --- anomaly detection --- fault detection --- intrusion detection system --- blockchain --- security --- privacy --- financial transactions --- transportation systems --- autonomous vehicles --- power system resilience --- disaster --- Federated Learning --- edge intelligence --- resilience management systems --- resource-limitations --- demand response --- remedial testing --- greybox fuzzing --- vulnerability detection --- enhanced security --- traffic microsimulation tool --- cooperative automated driving systems --- vehicle powertrain --- safety --- road capacity --- contested environments --- anomaly isolation --- artificial neural networks --- Cyber Physical System --- out-of-bounds --- vulnerable detection --- patch --- inverter-based energy resources --- islanded microgrids --- resilient control design --- secondary control --- false data injection


Book
Security of Cyber-Physical Systems
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.

Listing 1 - 8 of 8
Sort by