Fabienne Kiener, Christian Eggenberger, Uschi Backes-Gellner, The role of occupational skill sets in the digital transformation: how it progress shapes returns to specialization and social skills, Journal of Business Economics / Zeitschrift für Betriebswirtschaft, Vol. 94 (1), 2024. (Journal Article)
Workers’ occupational skill sets play a crucial role in successfully handling digital transformation. We investigate whether and how different types of occupational skill sets benefit from digital transformation. We theoretically and empirically analyze wage returns of workers in occupations with more or less specialized skill sets and with more or less social skills when IT increases in their industry. Applying natural language processing methods to the texts of occupational training curricula, we develop measures for occupational specialization and social skills. We use vocational education and training curricula from Switzerland because they cover approx. two-thirds of the working population. Using curricula, industry-level IT data and individual-level administrative wage data, our individual fixed-effects analyses show that IT progress leads to higher wage returns for workers in highly specialized occupations but not for workers in more general occupations. In addition, we find that high levels of social skills cannot make up for this difference when IT advances. However, our results indicate that for workers with high specialization, a combination with high social skills generates additional benefits when IT advances. Overall, our results suggest that, contrary to typical assumptions in educational policy debates, workers with specialized occupational skill sets - possibly in combination with high social skills - appear to be the ones who are particularly well prepared to cope with digital transformation. |
|
Dina Pomeranz, Felipe Kast, Savings accounts to borrow less: experimental evidence from Chile, Journal of Human Resources, Vol. 59 (1), 2024. (Journal Article)
Poverty is often characterized not only by low and unstable income, but also by heavy debt burdens. In a randomized field experiment with over 3,500 low-income micro-entrepreneurs in Chile, we find that providing access to free savings accounts decreases participants’ shortterm debt. In addition, participants who experience an economic shock have less need to reduce consumption, and subjective well-being improves significantly. Precautionary savings and credit therefore act as substitutes in providing self-insurance, and participants prefer borrowing less when a free formal savings account is available. Take-up patterns suggest that requests by others for participants to share their resources may be a key obstacle to saving. |
|
Raphael Flepp, Oliver Merz, Egon Franck, When the league table lies: Does outcome bias lead to informationally inefficient markets?, Economic Inquiry, Vol. 62 (1), 2024. (Journal Article)
We study whether outcome bias persists in markets with actors who are financially incentivized to make optimal decisions. We test whether inherently noisy match outcomes from European football are correctly incorporated into prices from a betting exchange market. We find that market prices overestimate (underestimate) the winning probability of teams that previously overperformed (underperformed) in terms of match outcomes compared to their performance based on “expected goals”. This pattern is mirrored in negative (positive) betting returns on overperforming (underperforming) teams. These results suggest that even competitive market mechanisms fail to completely erase outcome bias. |
|
Carlos Gomez Gonzalez, Helmut Max Dietl, David Berri, Cornel Nesseler, Gender information and perceived quality: An experiment with professional soccer performance, Sport management review, Vol. 27 (1), 2024. (Journal Article)
Whether one looks at revenue, investment or coverage, men’s sports do better than women’s. Many assume that absolute differences in quality of athletic performance are the driving force. However, the existence of stereotypes should alert us to another possibility: gender information might influence perceived quality. We perform an experiment in which 613 participants viewed clips of elite female and male soccer players. In the control group, participants evaluated unmodified videos where the gender of the players is clear to see. In the treatment group, participants evaluated the same videos but with gender obscured by blurring. Using a regression analysis, we find that participants rate men’s videos higher – but only when they know they are watching men. When blurring obscures the gender, ratings for female and male athletes do not differ. We discuss implications for research and the sports industry. |
|
Ugo Albertazzi, Fulvia Fringuellotti, Steven Ongena, Fixed rate versus adjustable rate mortgages: Evidence from euro area banks, European Economic Review, Vol. 161, 2024. (Journal Article)
Why do residential mortgages carry a fixed or an adjustable interest rate? To answer this question we study unique data from 103 banks belonging to 73 different banking groups across twelve countries in the euro area. To explain the large cross-country and time variations observed, we distinguish between household conditions that determine the local demand for credit and the characteristics of banks that supply credit. As bank funding mostly occurs at the group level, we disentangle these two sets of factors by comparing the outcome observed for the same banking group across the different countries. Local household conditions dominate. In particular we find that the share of new loans with a fixed rate is larger when: (1) the historical volatility of inflation is lower, (2) the correlation between unemployment and the short-term interest rate is higher, (3) households’ financial literacy is lower, and (4) the use of local mortgages to back covered bonds and of mortgage-backed securities is more widespread. |
|
Mateusz Dolata, Kevin Crowston, Making sense of AI systems development, IEEE Transactions on Software Engineering, Vol. 50 (1), 2024. (Journal Article)
We identify and describe episodes of sensemaking around challenges in modern Artificial-Intelligence (AI)-based systems development that emerged in projects carried out by IBM and client companies. All projects used IBM Watson as the development platform for building tailored AI-based solutions to support workers or customers of the client companies. Yet, many of the projects turned out to be significantly more challenging than IBM and its clients had expected. The analysis reveals that project members struggled to establish reliable meanings about the technology, the project, context, and data to act upon. The project members report multiple aspects of the projects that they were not expecting to need to make sense of yet were problematic. Many issues bear upon the current-generation AI’s inherent characteristics, such as dependency on large data sets and continuous improvement as more data becomes available. Those characteristics increase the complexity of the projects and call for balanced mindfulness to avoid unexpected problems. |
|
Jan Keil, Steven Ongena, The demise of branch banking - Technology, consolidation, bank fragility, Journal of Banking and Finance, Vol. 158, 2024. (Journal Article)
We study bank branching dynamics across 3,143 US counties and 26 years. During the last decade, banks closed their branches at an unprecedented rate. At its peak in 2009, there were 90,783 branches. By 2020, this number has fallen by 12 percent. While technological factors correlate with these branching dynamics, bank fragility and consolidation are also strongly associated with changes in the number of branches (and their openings and closures). Interestingly, technological capabilities to service customers, such as online banking, seem less tightly linked to de-branching than technological capabilities to process internal information. Our analysis shows that large banks rely on internal technology to shed branches, while small banks close branches when they are vulnerable or consolidate. |
|
Erich Walter Farkas, Francesco Ferrari, Urban Ulrych, Pricing autocallables under local-stochastic volatility, In: Peter Carr Gedenkschrift: Research Advances in Mathematical Finance, World Scientific Pulishing, Singapore, p. 329 - 378, 2024. (Book Chapter)
This chapter investigates the pricing of single-asset autocallable barrier reverse convertibles in the Heston local-stochastic volatility (LSV) model. Despite their complexity, autocallable structured notes are the most traded equity-linked exotic derivatives. The autocallable payoff embeds an early redemption feature generating strong path and model dependency. Consequently, the commonly used local volatility (LV) model is overly simplified for pricing and risk management. Given its ability to match the implied volatility smile and reproduce its realistic dynamics, the LSV model is, in contrast, better suited for exotic derivatives, such as autocallables. We use quasi-Monte Carlo methods to study the pricing given the Heston LSV model and compare it with the LV model. In particular, we establish the sensitivity of the valuation differences of autocallables between the two models with respect to pay-off features, model. |
|
Christian Ewerhart, Guang-Zhen Sun, The n-player Hirshleifer contest, Games and Economic Behavior, Vol. 143, 2024. (Journal Article)
While the game-theoretic analysis of conflict is often based on the assumption of multiplicative noise, additive noise such as considered by Hirshleifer (1989) may be equally plausible depending on the application. In this paper, we examine the equilibrium set of the n-player difference-form contest with heterogeneous valuations. For high and intermediate levels of noise, the equilibrium is in pure strategies, with at most one player being active. For small levels of noise, however, we find a variety of equilibria in which some but not necessarily all players randomize. In the case of homogeneous valuations, we obtain a partial uniqueness result for symmetric equilibria. As the contest becomes increasingly decisive, at least two contestants bid up to the valuation of the second-ranked contestant, while any others ultimately drop out. Thus, in the limit, equilibria of the Hirshleifer contest share important properties of equilibria of the corresponding all-pay auction. |
|
Liudmila Zavolokina, Andreas Hein, Arthur Carvalho, Gerhard Schwabe, Helmut Krcmar, Preface to the special issue on “Enterprise and organizational applications of distributed ledger technologies, Electronic Markets, Vol. 34 (1), 2024. (Journal Article)
|
|
Alberto Huertas Celdran, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller, CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors, IEEE Transactions on Dependable and Secure Computing, Vol. 21 (1), 2024. (Journal Article)
Integrated sensing and communication is a novel paradigm using crowdsensing spectrum sensors to help with the management of spectrum scarcity. However, well-known vulnerabilities of resource-constrained spectrum sensors and the possibility of being manipulated by users with physical access complicate their protection against spectrum sensing data falsification (SSDF) attacks. Most recent literature suggests using behavioral fingerprinting and Machine/Deep Learning (ML/DL) for improving similar cybersecurity issues. Nevertheless, the applicability of these techniques in resource-constrained devices, the impact of attacks affecting spectrum data integrity, and the performance and scalability of models suitable for heterogeneous sensors types are still open challenges. To improve limitations, this work presents seven SSDF attacks affecting spectrum sensors and introduces CyberSpec, an ML/DL-oriented framework using device behavioral fingerprinting to detect anomalies produced by SSDF attacks. CyberSpec has been implemented and validated in ElectroSense, a real crowdsensing RF monitoring platform where several configurations of the proposed SSDF attacks have been executed in different sensors. A pool of experiments with different unsupervised ML/DL-based models has demonstrated the suitability of CyberSpec detecting the previous attacks within an acceptable timeframe. |
|
Rafael Henrique Vareto, Yu Linghu, Terrance Edward Boult, William Robson Schwartz, Manuel Günther, Open-set face recognition with maximal entropy and Objectosphere loss, Image and Vision Computing, Vol. 141, 2024. (Journal Article)
Open-set face recognition characterizes a scenario where unknown individuals, unseen during the training and enrollment stages, appear on operation time. This work concentrates on watchlists, an open-set task that is expected to operate at a low false-positive identification rate and generally includes only a few enrollment samples per identity. We introduce a compact adapter network that benefits from additional negative face images when combined with distinct cost functions, such as Objectosphere Loss (OS) and the proposed Maximal Entropy Loss (MEL). MEL modifies the traditional Cross-Entropy loss in favor of increasing the entropy for negative samples and attaches a penalty to known target classes in pursuance of gallery specialization. The proposed approach adopts pre-trained deep neural networks (DNNs) for face recognition as feature extractors. Then, the adapter network takes deep feature representations and acts as a substitute for the output layer of the pre-trained DNN in exchange for an agile domain adaptation. Promising results have been achieved following open-set protocols for three different datasets: LFW, IJB-C, and UCCS as well as state-of-the-art performance when supplementary negative data is properly selected to fine-tune the adapter network. |
|
Mathias Gehrig, Manasi Muglikar, Davide Scaramuzza, Dense Continuous-Time Optical Flow from Event Cameras, IEEE Transactions on Pattern Analysis and Machine Intelligence, 2024. (Journal Article)
We present a method for estimating dense continuous-time optical flow from event data. Traditional dense optical flow methods compute the pixel displacement between two images. Due to missing information, these approaches cannot recover the pixel trajectories in the blind time between two images. In this work, we show that it is possible to compute per-pixel, continuous-time optical flow using events from an event camera. Events provide temporally fine-grained information about movement in pixel space due to their asynchronous nature and microsecond response time. We leverage these benefits to predict pixel trajectories densely in continuous time via parameterized Bézier curves. To achieve this, we build a neural network with strong inductive biases for this task: First, we build multiple sequential correlation volumes in time using event data. Second, we use Bézier curves to index these correlation volumes at multiple timestamps along the trajectory. Third, we use the retrieved correlation to update the Bézier curve representations iteratively. Our method can optionally include image pairs to boost performance further. To the best of our knowledge, our model is the first method that can regress dense pixel trajectories from event data. To train and evaluate our model, we introduce a synthetic dataset (MultiFlow) that features moving objects and ground truth trajectories for every pixel. Our quantitative experiments not only suggest that our method successfully predicts pixel trajectories in continuous time but also that it is competitive in the traditional two-view pixel displacement metric on MultiFlow and DSEC-Flow. Open source code and datasets are released to the public. |
|
Arthur Carvalho, Chad Anderson, Liudmila Zavolokina, Designing Incentives for Attracting Peer Reviewers to Information System Conferences, Communications of the Association for Information Systems, Vol. 54, 2024. (Journal Article)
Information systems (IS) conferences, as venues for the introduction of new knowledge to the IS community, require effective peer review systems to evaluate submitted research for quality, validity, and originality. We argue in this paper that questionable practices and degrading review quality may arise without direct incentives beyond reviewer altruism to engage in the peer review process. In particular, we highlight potential issues with arguably common practices in some IS conferences, such as peer review invitations sent to researchers who have also submitted papers for publication consideration and the increasing number of reviews performed by graduate students. To address these issues, we suggest three solutions: 1) quid pro quo rules; 2) the use of incentive-compatible methods whose scores are linked to relevant rewards; and 3) the use of blockchain-based tokens in tandem with smart contracts and zero-knowledge proofs. We conclude by offering directions the IS community can take to further study the highlighted issues and implement the proposed solutions. |
|
Anne Beck, Essays on inequality, trade, finance and climate change, University of Zurich, Faculty of Business, Economics and Informatics, 2024. (Dissertation)
|
|
Luca Gaegauf, Essays in finance, University of Zurich, Faculty of Business, Economics and Informatics, 2024. (Dissertation)
|
|
Jasmin Maag, How do we think about the future? Three essays in computational economics, University of Zurich, Faculty of Business, Economics and Informatics, 2024. (Dissertation)
|
|
Andreas Engelmann, Gerhard Schwabe, Certified data chats for future used car markets, Electronic Markets, Vol. 34, 2024. (Journal Article)
Used car market platforms are interested in extending their offering from information provision to the whole customer journey. Providing certified data on the car’s state and history enables this extension by eliminating the need to physically inspect the car before buying it. Hence, communication and negotiations can move entirely to a used car platform to cover the entire value chain. How can such a market communication be designed when certified data come into play? This study designs and develops a certified data chat for the selective and controlled exchange of blockchain-based certified data in used car negotiations. An experimental market game is played with students to evaluate the usefulness of the chat. The study contributes to the augmentation of market communication with valuable and sensitive data exchange and demonstrates what a key component of a future used car market can look like. It offers three design principles and insight into why certified data chats are useful. |
|
Felix Maximilian Schmitt-Koopmann, Elaine M Huang, Hans-Peter Hutter, Thilo Stadelmann, Alireza Darvishy, Mathnet: a data-centric approach for printed mathematical expression recognition, IEEE Access, Vol. 12, 2024. (Journal Article)
Printed mathematical expression recognition (MER) models are usually trained and tested using LaTeX-generated mathematical expressions (MEs) as input and the LaTeX source code as ground truth. As the same ME can be generated by various different LaTeX source codes, this leads to unwanted variations in the ground truth data that bias test performance results and hinder efficient learning. In addition, the use of only one font to generate the MEs heavily limits the generalization of the reported results to realistic scenarios. We propose a data-centric approach to overcome this problem, and present convincing experimental results: Our main contribution is an enhanced LaTeX normalization to map any LaTeX ME to a canonical form. Based on this process, we developed an improved version of the benchmark dataset im2latex-100k, featuring 30 fonts instead of one. Second, we introduce the real-world dataset realFormula, with MEs extracted from papers. Third, we developed a MER model, MathNet, based on a convolutional vision transformer, with superior results on all four test sets (im2latex-100k, im2latexv2, realFormula, and InftyMDB-1), outperforming the previous state of the art by up to 88.3%. |
|
Christian Killer, Bruno Rodrigues, Eder John Scheid, Muriel Figueredo Franco, Burkhard Stiller, From Centralized to Decentralized Remote Electronic Voting, In: Blockchains, Springer, Cham, p. 493 - 529, 2024-01-01. (Book Chapter)
Elections generally involve the simple tasks of counting votes and publishing the final tally to voters. Depending on the election’s scope, these processes require sophisticated methods embedded in the electorate’s various technological and societal factors (e.g., the voting culture). An election’s integrity is the pinnacle of the trust placed in the voting process and its final results. Previous research on cryptographic voting schemes continuously refined voting protocols to achieve private and verifiable elections. These cryptographic schemes enable novel ways to allow remote voting systems to (i) provide a remote voting alternative to on-site voting with a ballot box and (ii) offer a technical path to building an end-to-end verifiable Electronic Voting system by applying cryptographic primitives.
This chapter explicitly addresses Remote Electronic Voting (REV), which enables vote casting in an uncontrolled environment and vote transmission over communication channels (e.g., over the Internet). Further, this chapter clarifies how the Distributed Ledger (DL) technology can enhance the decentralization of the electoral process, ensuring transparency and the ability to verify results while guaranteeing the confidentiality of voters. Thus, necessary cryptographic fundamentals and examples of voting schemes, their properties, and trade-offs will be investigated. The different approaches toward REV systems are detailed, followed by an overview of related work. Further, a centralized REV voting system architecture, all stakeholders involved, and critical trust assumptions are outlined. This leads to the proposal of a fully decentralized architecture, which is being evaluated in qualified discussions with respect to long-term privacy, verifiability, and voter authentication. Finally, open research aspects are complemented by overall considerations on decentralized REV. |
|