Duke University

Latest Content From Duke University

Whitepaper: Analyst Reputation Building Via Sales Forecasting

by Duke UniversityJan 01, 2008

Financial analyst?s reputations facilitate the selling of research reports and generation of trading commissions and impact their career outcomes. This paper from Duke University investigates how and when the market uses an analyst?s past history of earnings accuracy to inform about reputation. This paper examines the potential role of sales forecasts as such a signaling mechanism for financial analysts.

Whitepaper: Globalization, Employment, And Economic Development: The Pro Arguments

by Duke UniversityJan 01, 2008

Globalization presents mixed benefits, for different groups and different specific activities. Given its importance it is tempting to concentrate on the ""anti-globalization"" research agenda, namely the many ways in which it may cause harm. This research paper from Dukes University has three parts. First, if offshoring did not take place, what would have happened instead? Second, offshoring benefits many parties, and not just shareholders. What are these benefits? Third the argument of others that job loss as such is not necessarily a problem.

Whitepaper: Globalization And Offshore Outsourcing: A Tale Of Two Realities

by Duke UniversityJan 01, 2008

In the context of the U.S. economy, outsourcing has always existed, but what is new is that more and more sectors are being opened up for grabs. This research paper from Duke University discusses about the concepts called Globalization and Offshore Outsourcing. It also discusses various issues related to Offshore Outsourcing. The author argues while examining the emotional, social and the very real pocket-book consequences unleashed by outsourcing, that outsourcing has always been part of the American economic engine and after coping with the current wave of political backlash, outsourcing will continue to happen and not only in IT .

Whitepaper: Coddling Spies: Why the Law Doesn’t Adequately Address Computer Spyware

by Duke UniversityJan 01, 2008

Spyware, which consists of software applications inserted into another’s computer to report a user’s activity to an outsider, is as innocuous as tracking purchases or as sinister as stealing trade secrets or an individual’s identity. Existing law does not address spyware adequately because authorization language, buried in ""Click-through"" boilerplate, renders much of current law useless. Congress must act to make spyware companies disclose their intentions with conspicuous and clearly-stated warnings.

Whitepaper: Broker Architectures for Service-Oriented Systems

by Duke UniversityJan 01, 2008

Service-oriented architectures are complex systems with multiple clients and providers each competing to acquire as much benefit as possible out of the system. Each actor, or system participant, has limited knowledge about the system and only has control over its local decision making policies. From this fragmented and actor isolated structure, a global architecture must emerge. Within this chaotic, competitive environment, it is important for system services and resources to be managed and used effectively and efficiently. For this to occur, a difficult matching of clients and providers must take place.

Whitepaper: Endowment And Entrepreneurial Holding Of Private Equity

by Duke UniversityJan 01, 2008

The research paper studies the cross-sectional variation of private equity holdings across entrepreneurs. In particular, it explores how an entrepreneur’s endowment portfolio affects the proportion of the personal wealth held in the equity of firm. It also contributes to the understanding of the prevalence and persistence of under diversification, and the household decision to participate in certain asset classes.

Whitepaper: The Impact of ISPs on the Architecture of the Internet

by Duke UniversityJan 01, 2008

It appears that the rise of ISPs to provide access to the rapidly growing Internet was essential after the US government stepped aside. However, the rise of ISPs has led to the deterioration of the original end-to-end architecture of the Internet. This compromise in the original design of the Internet has led to a more complex network that has more elements of control and regulation. This development has hurt the individual user of the Internet and holds the potential to completely transform the Internet from an open communication network into a controlled network with little user freedom.