advanced search

James K. Hammitt

vol. 34, n. 100639, 2026

Weighted benefit-cost analysis is receiving increased attention as a method to incorporate concerns about the distribution of policy effects across individuals. Weights are intended to reflect interpersonal differences in the effect of income on wellbeing (the marginal utility of income) and the...

Article

Michel Le Breton, Paul Castañeda Dower, Gunes Gokmen, and Shlomo Weber

20262026, forthcoming

This paper examines the lasting impact of Cold War alignment on African economic development. To determine alignment and reduce the number of potential outcomes under consideration, we introduce a non-cooperative game of social interactions where each country chooses its bloc based on its...

Article

Matteo Bobba, Veronica Frisancho, and Marco Pariguana

2026, forthcoming

This paper explores an information intervention designed and implemented within a school assignment mechanism in Mexico City. Through a randomized experiment, we show that providing a subset of applicants with feedback about their academic performance can enhance sorting by skill across high school...

Article

Ashot Aleksian, and Stéphane Villeneuve

2026, forthcoming

This paper investigates the exit-time problem for time-inhomogeneous diffusion processes. The focus is on the small-noise behavior of the exit time from a bounded positively invariant domain. We demonstrate that, when the drift and diffusion terms are uniformly close to some time-independent...

Article

Philippe De Donder, Bertrand Achou, Franca Glenzer, Minjoon Lee, and Marie-Louise Leroux

2026

Article

Juan Esteban Carranza, Maria Marta Ferreyra, and Ana Gazmuri

vol. 20, n. 2, 2026, forthcoming

Article

Christian Hellwig, and Nicolas Werquin

2026, forthcoming

Article

Alexandre de Cornière, and Greg Taylor

2026, forthcoming

Cyberattacks are a pervasive threat in the digital economy, with the potential to harm firms and their customers. Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. These can be mitigated by investments in security, which play both a deterrent and a...

Article

Céline Giner, Céline Nauges, and Katherine Hassett

2026, forthcoming

Article

Matti Liski, and François Salanié

2026, forthcoming

Article