Imitation as a Stepping Stone to Innovation

نویسنده

  • Amy Jocelyn Glass
چکیده

By creating a knowledge base that reduces innovation costs, imitation can serve as a stepping stone enabling …rms from lagging countries to undertake innovation. This paper constructs a product cycle model with this feature to determine what forces could cause a lagging country to shift R&D from imitation toward innovation. Increasing resources or subsidizing R&D in the lagging South increases Southern innovation, while increasing resources or subsidizing R&D in the North decreases Southern innovation. E¤ects are compared with the case where no innovation occurs in the South and to the case where able to innovate without needing to …rst imitate. Keywords: Innovation, Imitation, Appropriate technology JEL classi…cation: F1; F4; O3

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Learning From and About Others: Imitation in Humans, Robots, and Animated Characters

We have implemented mimicry of facial expressions in an animated character as a first step towards adding a variety of imitative and social learning abilities to our existing character architecture. Our implementation draws inspiration from, and is heavily grounded in, the child development and comparative psychology literatures on social learning and imitation. Among the key ideas that we draw...

متن کامل

Stepping-stone Detection Technique Forrecognizing Legitimate and Attack Connections

A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious. This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections. Stepping-stone connections are identifi...

متن کامل

Dropped Packet Problems in Stepping Stone Detection Method

This paper discusses one of the issues that are not covered by current stepping stone detection based researches. Although dropped packet problems are well-known problem in real network environment, all of the stepping stone detection researches just assume that dropped packet problems do not occur. Stepping stone detection research already in complex condition where each enhancement of the res...

متن کامل

Automatic imitation in budgerigars.

A fully automated procedure, involving computer-controlled stimulus presentation and computer-recorded response measurement, was used for the first time to study imitation in non-human animals. After preliminary training to peck and step on a manipulandum, budgerigars were given a discrimination task in which they were rewarded with food for pecking during observation of pecking and for steppin...

متن کامل

Modeling and Detecting Stepping-Stone Intrusion

Most network intruders launch their attacks through steppingstones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical way is to compare an incoming connection with an outgoing connection to determine if a computer is used as stepping-stone. In this paper, we present four models to describe stepping-stone intrusion. We also propose the i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000