In this paper we analyze the effects if two countries, with different settings on the labor market, open their capital markets. To do this we follow the ideas of New Institutional Economics in combination with a new model of economic growth. We will use a Leontief production function, where we derive the distribution of income by using an approach stemming from conflict theory, to highlight some new insights into the question whether an open world capital market enhances the overall welfare. First of all, using conflict theory, we will pay some attention to the micro-economic foundation of a Harrod-Domar model. At least we want to analyze what will happen if for e.g.: China opens the capital market to the EU zone, where the institutions in both regions are very different. We will show that this will always lead a race to the bottom from the view of workers in the former developed region.
MULTIFILE
Landside operations in air cargo terminals consist of many freight forwarders (FFWs) delivering and picking up cargo at the capacity-constrained loading docks at the airport's ground handlers' (GHs) facilities. To improve the operations of the terminal and take advantage of their geographical proximity a small set of FFWs can build a coalition to consolidate stochastically-arriving shipments and share truck fleet capacity while other FFWs continue bringing cargo to the terminal in a non-cooperative manner. Results from a detailed discrete-event simulation model of the cargo landside operations in Amsterdam Aiport showed that all operational policies had trade-offs in terms of the average shipment cycle time of coalition FFWs, the average shipment cycle time of non-coalition FFWs, and the total distance traveled by the coalition fleet, suggesting that horizontal cooperation in this context was not always beneficial, contrary to what previous studies on horizontal cooperation have found. Since dock capacity constitutes a significant constraint on operations in air cargo hubs, this paper also investigates the effect of dock capacity utilization and horizontal cooperation on the performance of consolidation policies implemented by the coalition. Thus, we built a general model of the air cargo terminal to analyze the effects caused by dock capacity utilization without the added complexity of landside operations at Amsterdam Airport to investigate whether the results hold for more general scenarios. Results from the general simulation model suggest that, in scenarios where dock and truck capacity become serious constraints, the average shipment cycle times of non-coalition FFWs are reduced at the expense of an increase in the cycle times of FFWs who constitute the coalition. A good balance among all the performance measures considered in this study is reached by following a policy that takes advantage of consolidating shipments based on individual visits to GH.
Repeat victimization has been widely studied from the perspective of environmental criminology for several decades. During this period, criminologists have identified a set of repeat victimization premises that are observed for many crimes; however, it is unknown whether these premises are also valid for cybercrime. In this study we rely on more than 9 million Zone-H data records from 2010 to 2017 to test whether these premises apply for the cybercrime of website defacement. We show that the phenomenon of repeat victimization is also observed in defaced cyber places (i.e. websites). In particular, we found that repeats contributed little to crime rates, that repeats occurred even several years after the original incident, that they were committed disproportionately by prolific offenders, and that few offenders returned to victimize previous targets. The results suggest that some traditional premises of repeat victimization may also be valid for understanding cybercrime events such as website defacement, implying that environmental criminology theories also constitute a useful framework for cybercrime analysis. The implications of these results in terms of criminological theory, cybercrime prevention, and the limitations derived from the use of Zone-H data are discussed