Matching Items (2)
Filtering by

Clear all filters

152550-Thumbnail Image.png
Description
Since its inception in 1973, the Endangered Species Act has been met with both praise and criticism. More than 40 years later, the Act is still polarizing, with proponents applauding its power to protect species and critics arguing against its perceived ineffectiveness and potential mismanagement. Recovery plans, which were required

Since its inception in 1973, the Endangered Species Act has been met with both praise and criticism. More than 40 years later, the Act is still polarizing, with proponents applauding its power to protect species and critics arguing against its perceived ineffectiveness and potential mismanagement. Recovery plans, which were required by the 1988 amendments to the Act, play an important role in organizing efforts to protect and recover species under the Act. In 1999, in an effort to evaluate the process, the Society for Conservation Biology commissioned an independent review of endangered species recovery planning. From these findings, the SCB made key recommendations for how management agencies could improve the recovery planning process, after which the Fish and Wildlife Service and the National Marine Fisheries Service redrafted their recovery planning guidelines. One important recommendation called for recovery plans to make threats a primary focus, including organizing and prioritizing recovery tasks for threat abatement. Here, I seek to determine the extent to which SCB recommendations were incorporated into these new guidelines, and if, in turn, the recommendations regarding threats manifested in recovery plans written under the new guidelines. I found that the guidelines successfully incorporated most SCB recommendations, except those that addressed monitoring. As a result, recent recovery plans have improved in their treatment of threats, but still fail to adequately incorporate threat monitoring. This failure suggests that developing clear guidelines for monitoring should be an important priority in future ESA recovery planning.
ContributorsTroyer, Caitlin (Author) / Gerber, Leah (Thesis advisor) / Minteer, Ben (Committee member) / Guston, David (Committee member) / Arizona State University (Publisher)
Created2014
157596-Thumbnail Image.png
Description
Two-sided online platforms are typically plagued by hidden information (adverse selection) and hidden actions (moral hazard), limiting market efficiency. Under the context of the increasingly popular online labor contracting platforms, this dissertation investigates whether and how IT-enabled monitoring systems can mitigate moral hazard and reshape the labor demand and supply

Two-sided online platforms are typically plagued by hidden information (adverse selection) and hidden actions (moral hazard), limiting market efficiency. Under the context of the increasingly popular online labor contracting platforms, this dissertation investigates whether and how IT-enabled monitoring systems can mitigate moral hazard and reshape the labor demand and supply by providing detailed information about workers’ effort. In the first chapter, I propose and demonstrate that monitoring records can substitute for reputation signals such that they attract more qualified inexperienced workers to enter the marketplace. Specifically, only the effort-related reputation information is substituted by monitoring but the capability-related reputation information. In line with this, monitoring can lower the entry barrier for inexperienced workers on platforms. In the second chapter, I investigate if there is home bias for local workers when employers make the hiring decisions. I further show the existence of home bias from employers and it is primarily driven by statistical inference instead of personal “taste”. In the last chapter, I examine if females tend to have a stronger avoidance of monitoring than males. With the combination of the observational data and experimental data, I find that there is a gender difference in avoidance of monitoring and the introduction of the monitoring system increases the gender wage gap due to genders differences in such willingness-to-pay for the avoidance of monitoring. These three studies jointly contribute to the literature on the online platforms, gig economy and agency theory by elucidating the critical role of IT-enabled monitoring.
ContributorsLiang, Chen, Ph.D (Author) / Gu, Bin (Thesis advisor) / Hong, Yili (Thesis advisor) / Chen, Peiyu (Committee member) / Arizona State University (Publisher)
Created2019