- Award ID(s):
- Publication Date:
- NSF-PAR ID:
- Journal Name:
- Annual Review of Economics
- Page Range or eLocation-ID:
- 171 to 202
- Sponsoring Org:
- National Science Foundation
More Like this
The objective is to provide an interpretive reading of the literature in resource scarcity and sustainability theory from the nineteenth century to the present time, focusing on shifts that have occurred in problem definition, conceptual framing, research tools applied, findings, and their implications. My reading shows, as one would expect, that the discourse has become more technical and the analysis more sophisticated; special cases have been incorporated into the mainstream of theory; and, where relevant, dynamic formulations have largely supplanted static analysis. However, that is barely scratching the surface. Here, I focus on more fundamental shifts. Exhaustible and renewable resource analyses were incorporated into the mainstream theory of financial and capital markets. Parallels between the resources and environmental spheres were discovered: market failure concepts, fundamental to environmental policy, found applications in the resources sector (e.g., fisheries), and renewable resource management concepts and approaches (e.g., waste assimilation capacity) were adopted in environmental policy. To motivate sustainability theory and assessment, there has been a foundational problem shift from restraining human greed to dealing with risk viewed as chance of harm, and a newfound willingness to look beyond stochastic risk to uncertainty, ambiguity, and gross ignorance. Newtonian dynamics, which seeks a stable equilibriummore »
The problem of analyzing interconnectedness is one of today’s premier challenges in understanding systemic risk. Connections can both stabilize networks and provide pathways for contagion. The central problem in such networks is establishing global behavior from local interactions. Jiang-Lim-Yao-Ye (Jiang
et al2011 Mathematical Programming 127 1203–244) recently introduced the use of the Hodge decomposition(see Lim 2020 SIAM Review 62685–715 for a review), a fundamental tool from algebraic geometry, to construct global rankings from local interactions (see Barbarossa et al2018 (2018 IEEE Data Science Workshop (DSW), IEEE)pp 51–5; Haruna and Fujiki 2016 Frontiers in Neural Circuits 1077; Jia et al2019 (Proc. of the XXV ACM SIGKDD International Conf. on Knowledge Discovery & Data Mining, pp 761–71 for other applications). We apply this to a study of financial networks, starting from the Eisenberg-Noe (Eisenberg and Noe 2001 Management Science 47236–249) setup of liabilities and endowments, and construct a network of defaults. We then use Jiang-Lim-Yao-Ye to construct a global ranking from the defaults, which yields one way of quantifying ‘systemic importance’.
Johnson, Kristin N. ; Reyes, Carla L. (Ed.)Privacy regulation has traditionally been the remit of consumer protection, and privacy harm is cast as a contractual harm arising from the interpersonal exchanges between data subjects and data collectors. This frames surveillance of people by companies as primarily a consumer harm. In this article, we argue that the modern economy of personal data is better understood as an extension of the financial system. The data economy intersects with capital markets in ways that may increase systemic and systematic financial risks. We contribute a new regulatory approach to privacy harms: as a source of risk correlated across households, firms and the economy as a whole. We consider adapting tools from macroprudential regulations designed to mitigate financial crises to the market for personal data. We identify both promises and pitfalls to viewing individual privacy through the lens of the financial system.
Clinicians, cooks, and cashiers: Examining health equity and the COVID-19 risks to essential workersIn Spring/Summer 2020, most individuals living in the United States experienced several months of social distancing and stay-at-home orders because of the coronavirus (COVID-19) pandemic. Clinicians, restaurant cooks, cashiers, transit operators, and other essential workers (EWs), however, continued to work outside the home during this time in order to keep others alive and maintain a functioning society. In the United States, EWs are often low-income persons of color who are more likely to face socioeconomic vulnerabilities, systemic racism, and health inequities. To assess the various impacts of COVID-19 on EWs, an online survey was distributed to a representative sample of individuals residing in six states during May/June 2020. The sample included 990 individuals who identified as EWs and 736 nonessential workers (NWs). We assessed differences between EW and NW respondents according to three categories related to health equity and social determinants of health: (1) demographics (e.g. race/ethnicity); (2) COVID-19 exposure risk pathways (e.g. ability to social distance); and (3) COVID-19 risk perceptions (e.g. perceived risk of contracting COVID-19). EWs were more likely to be Black or Hispanic than NWs and also had lower incomes and education levels on average. Unsurprisingly, EWs were substantially more likely to report working outside themore »
Cloud computing services have enjoyed explosive growth over the last decade. Users are typically businesses and government agencies who are able to scale their storage and processing requirements, and choose from pre-defined services (e.g. specific software-as-a-service applications). But with this outsourcing has also come the potential for data breaches targeted at the end-user, typically consumers (e.g. who purchase goods at an online retail store), and citizens (e.g. who transact information for their social security needs). This paper briefly introduces U.S.-based cloud computing regulation, including the U.S. Health Insurance Portability and Accountability Act (HIPPA), the Gramm Leach Bliley Act (GLBA), and the U.S. Stored Communications Act (SCA). We present how data breach notification (DBN) works in the U.S. by examining three mini-case examples: the 2011 Sony PlayStation Network data breach, the 2015 Anthem Healthcare data breach, and the 2017 Equifax data breach. The findings of the paper show that there is a systemic failure to learn from past data breaches, and that data breaches not only affect business and government clients of cloud computing services but their respective end-user customer base. Finally, the level of sensitivity of data breaches is increasing, from cloud computing hacks on video game platforms, to themore »