Refine
Year of publication
- 2020 (158) (remove)
Document Type
- Working Paper (82)
- Part of Periodical (45)
- Article (27)
- Book (2)
- Doctoral Thesis (1)
- Preprint (1)
Language
- English (158) (remove)
Has Fulltext
- yes (158) (remove)
Is part of the Bibliography
- no (158)
Keywords
- ECB (15)
- Capital Markets Union (14)
- Financial Markets (14)
- Banking Regulation (7)
- Banking Union (7)
- Financial Institutions (7)
- coronavirus (7)
- Comments disabled (6)
- Coronavirus (6)
- ESMA (6)
Institute
- Wirtschaftswissenschaften (158) (remove)
This article provides a proposal to use IMF Article VIII, Section 2 (b) to establish a binding mechanism on private creditors for a sovereign debt standstill. The proposal builds on the original idea by Whitney Deveboise (1984). Using arguments brought forward by confidential IMF staff papers (1988, 1996) and the IMF General Counsel (1988), this paper shows how an authoritative interpretation of Article VIII, Section 2 (b) can provide protection from litigation to countries at risk of debt distress.
The envisaged mechanism presents several advantages over recent proposals for a binding standstill mechanism, such as the International Developing Country Debt Authority (IDCDA) by UNCTAD and a Central Credit Facility (CFF) by the Bolton Committee. First, this approach would not require the creation of new intergovernmental mechanisms or facilities. Second, the activation of the standstill mechanism can be set in motion by any IMF member country and does not require a modification of its Articles of Agreement. Third, debtor countries acting in good faith under an IMF program would be protected from aggressive litigation strategies from holdout creditors in numerous jurisdictions, including the US and the UK. Fourth, courts in key jurisdictions would avoid becoming overburdened by a cascade of sovereign debt litigation covering creditors and debtors across the globe. Fifth, private creditors would receive uniform treatment and ensure intercreditor equality. Sixth and last, the mechanism would provide additional safeguards to protect emergency multilateral financing provided to tackle Covid-19.
We study whether and how time preferences change over the life cycle, exploiting representative long-term panel data. We estimate the age patterns of discount rates from age 25 to 80. In order to identify age effects, we have to disentangle them from cohort and period factors. We address this identification problem by estimating individual fixed effects models, where we substitute period effects with determinants of time preferences that depend on calendar years. We find that discount rates decrease with age and the decline is remarkably linear over the life cycle.
We survey a representative sample of US households to study how exposure to the COVID-19 stock market crash a↵ects expectations and planned behavior. Wealth shocks are associated with upward adjustments of expectations about retirement age, desired working hours, and household debt, but have only small e↵ects on expected spending. We provide correlational and experimental evidence that beliefs about the duration of the stock market recovery shape households’ expectations about their own wealth and their planned investment decisions and labor market activity. Our findings shed light on the implications of household exposure to stock market crashes for expectation formation.
This paper shows that judicial enforcement has substantial effects on firms’ decisions with regard to their employment policies. To establish causality, I exploit a reorganization of the court districts in Italy involving judicial district mergers as a shock to court productivity. I find that an improvement in enforcement, as measured by a reduction in average trial length, has a large, positive effect on firm employment. These effects are stronger in firms with high leverage, or that belong to industries more dependent on external finance and characterized by higher complementarity between labor and capital, consistent with a financing channel driving the results. Moreover, in presence of stronger enforcement, firms can raise more debt to dampen the impact of negative shocks and, in this way, reduce employment fluctuations.
This paper presents causal evidence of the effects of boardroom networks on firm value. We exploit exogenous variation in network centrality arising from a ban on interlocking directorates of Italian financial and insurance companies. We leverage this shock to show that firms that become more central in the network as a result of the shock experience positive abnormal returns around the announcement date. We find that information dissemination plays a central role: results are driven by firms that have higher idiosyncratic volatility, low analyst coverage, and more uncertainty surrounding their earnings forecasts. We also find that firms benefit more from boardroom centrality when they are more central in the input-output network, as this reinforces information complementarities, or when they are less central in the cross-ownership network, as well as when they suffer from low profitability and low growth opportunities. Network centrality also results in higher compensation for board directors.
For private investors it is imperative to a) understand and define their own, individual risk preferences, b) assess their financial and demographic circumstances to determine the individual risk-taking potential, and c) form and maintain a well-diversified risky portfolio. The three chapters of my thesis each match one of these three tasks. \\ \noindent The first chapter of my thesis presents novel experimental evidence to test the existence of a potential projection bias in loss aversion, a significant determinant of investor preferences, thus matching task a). The second chapter is devoted to the determination of private investors' risk-taking potential based on their financial and socio-demographic circumstances, matching task b): In a large portfolio experiment, we examine the ability and heterogeneity of lay and professional advisors in matching investor demographics, such as age and income, with risky asset portfolio shares. The third and final chapter addresses the question on how to reach and maintain an efficient risky portfolio, therefore matching task c): It analyzes a decision support system for private investors that allows its users to simulate any arbitrary set of securities, and by reporting aggregated expected return and risk, to optimize their current portfolio.
Pokémon Go is one of the most successful mobile games of all time. Millions played and still play this mobile augmented reality (AR) application, although severe privacy issues are pervasive in the app due to its use of several sensors such as location data and camera. In general, individuals regularly use online services and mobile apps although they might know that the use is associated with high privacy risks. This seemingly contradictory behavior of users is analyzed from a variety of different perspectives in the information systems domain. One of these perspectives evaluates privacy-related decision making processes based on concepts from behavioral economics. We follow this line of work by empirically testing one exemplary extraneous factor within the “enhanced APCO model” (antecedents–privacy concerns–outcome). Specific empirical tests on such biases are rare in the literature which is why we propose and empirically analyze the extraneous influence of a positivity bias. In our case, we hypothesize that the bias is induced by childhood brand nostalgia towards the Pokémon franchise. We analyze our proposition in the context of an online survey with 418 active players of the game. Our results indicate that childhood brand nostalgia influences the privacy calculus by exerting a large effect on the benefits within the trade-off and, therefore, causing a higher use frequency. Our work shows two important implications. First, the behavioral economics perspective on privacy provides additional insights relative to previous research. However, the effects of several other biases and heuristics have to be tested in future work. Second, relying on nostalgia represents an important, but also double-edged, instrument for practitioners to market new services and applications.
Security has become one of the primary factors that cloud customers consider when they select a cloud provider for migrating their data and applications into the Cloud. To this end, the Cloud Security Alliance (CSA) has provided the Consensus Assessment Questionnaire (CAIQ), which consists of a set of questions that providers should answer to document which security controls their cloud offerings support. In this paper, we adopted an empirical approach to investigate whether the CAIQ facilitates the comparison and ranking of the security offered by competitive cloud providers. We conducted an empirical study to investigate if comparing and ranking the security posture of a cloud provider based on CAIQ’s answers is feasible in practice. Since the study revealed that manually comparing and ranking cloud providers based on the CAIQ is too time-consuming, we designed an approach that semi-automates the selection of cloud providers based on CAIQ. The approach uses the providers’ answers to the CAIQ to assign a value to the different security capabilities of cloud providers. Tenants have to prioritize their security requirements. With that input, our approach uses an Analytical Hierarchy Process (AHP) to rank the providers’ security based on their capabilities and the tenants’ requirements. Our implementation shows that this approach is computationally feasible and once the providers’ answers to the CAIQ are assessed, they can be used for multiple CSP selections. To the best of our knowledge this is the first approach for cloud provider selection that provides a way to assess the security posture of a cloud provider in practice.