Skip to main content
    • by 
    •   9  
      BusinessEconomicsIndustrial OrganizationProcurement
    • by 
    •   6  
      EconomicsMicroeconomicsBiddingApplied Economics Letters
    • by 
    •   11  
      Applied MathematicsComputer ScienceEconomicsGame Theory
    • by 
    •   16  
      EconomicsGame TheoryIndustrial OrganizationMicroeconomics
    • by 
    •   8  
      EconomicsMicroeconomicsRegulationExperiment
A popular way of obtaining essential inputs is based on the establishment of an input production joint venture (IPJV) in the upstream (U) section of the vertical chain of production by firms competing and selling final goods downstream... more
    • by 
    •   9  
      EconomicsIndustrial OrganizationMicroeconomicsCorporate Governance
    • by 
    •   7  
      BusinessHealth CareSocial Science Research NetworkCollusion
    • by 
    •   9  
      MarketingEconomicsExperimental EconomicsMicroeconomics
    • by 
    •   6  
      EconomicsApplied EconomicsCollusionRetaliation
The literature presents mixed findings regarding the economic conditions under which cartels form and collapse, and regarding how stable they are across firm-specific and industry-wide business cycles. The relationship between cartel life... more
    • by 
    •   8  
      LawEconomicsApplied EconomicsEnforcement
On the basis of information collected from all the published European Commission's decisions in cartel cases between 1962 and 2014, this paper identifies different stages in the supra‐nationalization of cartel policy at the European... more
    • by 
    •   14  
      LawCompetition LawInternational TradePolitical Science
The Master of Business Administration (MBA) plays a significant role in developing managers in a plethora of global organizations. In most circles, it is considered a degree to develop corporate managers. With the leadership failures of... more
    • by 
    •   15  
      ManagementSociologyComputer ScienceHigher Education
    • by 
    •   7  
      Computational SociologyComputer SciencePhysicsLanguage Change
Support de Cours optimisation nonlinéaire par Ramdani Zoubir
    • by 
Competition law, which governs the economic activities of entities operating in commercial and economic markets, is now facing a new challenge with the emergence of cryptocurrencies. While adhering to the philosophy of competition rules... more
    • by 
    •   5  
      Competition LawMiningCollusionBitcoin
    • by 
    •   12  
      BusinessFinanceEconomicsCorporate Governance
    • by 
    •   4  
      LawTax LawChapterCollusion
    • by 
    •   11  
      BusinessApplied MathematicsComputer ScienceEconomics
    • by 
    •   18  
      EconomicsIndustrial OrganizationMicroeconomicsVoting Behavior
When fixed, sunk investment costs are high, firms may not have sufficient incentive to enter the market unless future entry is constrained. In this case, the government faces a dilemma between a full commitment and noncommitment of... more
    • by 
    •   11  
      EconomicsMicroeconomicsApplied EconomicsSocial Welfare
We describe a principal–supervisor–agent relationship in which agent and supervisor may collude. To prevent collusion, the principal may contract on a noisy signal which is correlated with the occurrence of collusion. When the signal is... more
    • by 
    •   5  
      EconomicsMicroeconomicsCommon SenseCollusion
In the textbook model of dynamic Bertrand competition, competing firms meet the same demand function every period. This is not a satisfactory model of the demand side if consumers can make intertemporal substitution between periods. Each... more
    • by 
    •   8  
      EconomicsMicroeconomicsStochastic GamesCollusion
* This is a substantially revised version of WP 493, Stockholm School of Economics. We thank two anonymous referees and the editor in charge for helpful comments and suggestions. We are also grateful for comments from
    • by 
    •   5  
      EconomicsMicroeconomicsCollusionStandard Model
We compare experimentally two contest designs. In the between-group design (BGD), cohorts compete with one another in stage 1 and a single cohort is then advance to stage 2. In stage 2, members of this cohort compete for a single prize.... more
    • by 
    •   7  
      Public FinancePolitical SciencePublic ChoiceApplied Economics
    • by 
    •   5  
      BusinessPoliticsBureaucracyEconomic System
With a view to reducing the consequences of corruption in public procurement, many governments have introduced debarment of suppliers found guilty of corruption and some other forms of crime. This paper explores the market effects of... more
    • by 
    •   9  
      BusinessIndustrial OrganizationProcurementLanguage Change
In jurisprudential terms, setting the price of goods by the government and ordering traders to sell goods at the same price is called pricing. According to iman Abu Hanifa, imam shafi, and imam Ahmad bin Hanbal, under normal... more
    • by 
    •   2  
      CollusionHarm
We propose, in this paper, a countermeasure against the producer-consumer collusion attack in Named Data Networking (NDN). In this attack, malicious nodes act in collusion by generating content requests at high rate and thus changing... more
    • by 
    •   5  
      Computer ScienceComputer SecurityCollusionCache
Remplace une version précédente du même numéro / Replaces a previous version of the same DR LEO number Cette version remplace celle du / This replaces the previous version dated : XX/XX/XXXX Titre précédent / A previous version was titled... more
    • by 
    •   10  
      BusinessLawEconomicsIndustrial Organization
On the Difficulty of Collusion bitte auf den kommenden ungeraden Seiten und Guillaume Cheikbossian and Philippe Mahenc auf den geraden Seiten als Seitentitel setzen. We study the ability of several identical firms to collude in the... more
    • by 
    •   7  
      EconomicsMicroeconomicsEconomic TheoryCartel
In the coming decades, new technologies will change our lives and the way in which we perceive them in hitherto unimaginable ways.Future Design is acreative collusion of science, technology and art– an experimental laboratory for new art... more
    • by 
    •   6  
      EngineeringArtEmerging TechnologiesFuture
Based on 2019 procurement data composed of almost 1.5 million observations, this study employs Latent Class Analysis (LCA) to investigate how latent profiles are defined to represent behavior in the Price Registration minutes based on a... more
    • by 
    •   6  
      EconometricsMachine LearningAnti-CorruptionSynthetic Control Methods
Tradable development rights (TDR) are discussed as a means of containing urban sprawl in numerous countries. Despite its theoretical superiority in ensuring an efficient redistribution of planning rights, its applicability is concerned... more
    • by 
    •   5  
      EconomicsMultidisciplinaryUrban SprawlCollusion
Digital traces left by a user of an on-line social networking service can be abused by a malicious party to compromise the person's privacy. This is exacerbated by the increasing overlap in user-bases among various services. To... more
    • by 
    •   7  
      Computer ScienceComputer SecuritySocial GraphData Protection
Digital traces left by a user of an on-line social networking service can be abused by a malicious party to compromise the person's privacy. This is exacerbated by the increasing overlap in user-bases among various services. To... more
    • by 
    •   7  
      Computer ScienceComputer SecuritySocial GraphData Protection
We review microeconomic research on corruption from the last thirty years. We start by analyzing the seminal models of corruption built on three-tier, delegation models. Then, go into more details of the context of corrupt deals, and... more
    • by 
    •   14  
      EconomicsGame TheoryPolitical ScienceDeterrence
Digital watermarking is known as the most suitable solution to protect 3D videos. Hence, proposing a watermarking technique robust against malicious attacks and especially against collusion becomes a crucial challenge for many... more
    • by 
    •   8  
      Computer ScienceArtificial IntelligenceComputer VisionDigital Watermarking
3D video watermarking is far from the maturity of watermarking algorithms dedicated to audio, image or 2D video. In fact, little work has been proposed for anaglyph 3D videos. Such methods have not been robust against malicious attacks... more
    • by 
    •   8  
      Computer ScienceArtificial IntelligenceComputer VisionDigital Watermarking
Video watermarking technique aims at resolving insecurity problems. Recently, many approaches have been proposed in order to satisfy the new constraints of video applications such as robustness to collusion attacks, high level of security... more
    • by 
    •   10  
      Information SystemsComputer ScienceArtificial IntelligenceCrowdsourcing
Dans ce papier, nous proposons deux nouvelles approches de tatouage vidéo robustes et invisibles basées sur les régions d'intérêt. La première insère la signature dans la mosaïque alors que la deuxième l'insère au niveau des objets en... more
    • by 
    •   7  
      MathematicsComputer ScienceArtificial IntelligenceDigital Watermarking
The Brazilian Antitrust Law established the Administrative Council for Economic Defence (CADE) as the body responsible for investigating and imposing sanctions for acts that violate the economic order, as well as for supervising acts of... more
    • by 
    •   3  
      Game TheoryAntitrust (Law)Leniency
This article centres on some of the dilemmas contained within victim positioning. Such dilemmas are often overlooked by the authorities involved with people subjected to relational aggression. 2 For example, when teachers rule out cases... more
    • by 
    •   6  
      SociologyPsychologySocial PsychologyAggression
The detection of transmitted data collusion among sensing nodes needs to be resolved at data link layer. It takes a lot algorithm calculation effort and time constraint. A new method to sense the performance of cognitive radio (CR) by... more
    • by 
    •   9  
      EngineeringComputer ScienceCognitive Radio NetworksCognitive radio
Thème-Communication et codage : Cryptage et tatouage (Traçage de documents marqués) Problème traité-Identifier les utilisateurs malhonnêtes ayant participéà la création d'une copie pirate d'un document numérique. Originalité-Utilisation... more
    • by 
    •   16  
      MathematicsComputer ScienceWatermarkingComputer Security
My main claim is then that, by shaping and enforcing the social conditions that foreseeably and avoidably cause the monumental suffering of global poverty, we are harming the global poor-or, to put it more descriptively,we are active... more
    • by 
    •   12  
      Political PhilosophyEthicsHuman RightsPolitical Science
Success in law enforcement of cartel cases hinges on solid investigation procedures and effective punishment. However, the existing legal framework provides guidance on computing fines based on sales revenue, even though it mentions such... more
    • by 
    •   5  
      PhilosophyRevenueCartelCollusion
We present a public procurement model in which contractual flexibility and political tolerance for contractual deviations determine renegotiations. In the model, contractual flexibility allows for adaptation without formal renegotiation,... more
    • by 
    •   10  
      BusinessLawProcurementPolitics
Roughly a decade ago, the Chinese government implemented a green credit policy aimed at lowering emissions from highly polluting corporations through improving information disclosure quality during the loan process. According to policy... more
    • by 
    •   6  
      BusinessChinaPanel DataCollusion
Purpose - This paper aims to explore the problems in developing the halal food industry in the tourismm area, and then find solutions to overcome these issues. One of the popular tourismm areas in Indonesia is Bangka Belitung.... more
    • by 
    • Islamic Economics
    • by 
    •   8  
      EconomicsMicroeconomicsSocial Science Research NetworkCartel