Emulation or Policy Convergence ? Potential Ambiguities in the Dyadic Event History Approach to State Policy Emulation

نویسنده

  • Frederick J. Boehmke
چکیده

I demonstrate a source of bias in the common implementation of the dyadic event history model as applied to policy diffusion. This bias tends to severely overstate the extent to which policy changes depend on explicit emulation of other states rather than on a state’s internal characteristics. This happens because the standard implementation conflates policy emulation and policy adoption: since early adopters are policy leaders, later adopters will appear to emulate them, even if they are acting independently. I demonstrate this ambiguity analytically and through Monte Carlo simulation. I then propose a simple modification of the dyadic emulation model that conditions on the opportunity to emulate and show that it produces much more accurate findings. An examination of state pain management policy illustrates the inferential differences that arise from the appropriately modified dyadic event history model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Networks of Intergovernmental Organizations and Convergence in Domestic Economic Policies

We studied three potential causal mechanisms through which network dynamics of intergovernmental organizations (IGO) might cause convergence in domestic economic policies. First, IGO networks facilitate policy learning by providing relevant information. Second, they encourage policy emulation by creating a sense of affinity among countries that are closely connected by IGO networks. Finally, so...

متن کامل

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

A New Approach to Public Policy Studies Relying on the Theory of Critical Discourse Analysis Studies the State as a Discourse

Understanding the policy cycle, as well as scrutinizing the text of hidden and obvious policies and rules, requires a model of discourse analysis based on which discursive ap-proaches of policy makers are understood and estimated. However, when it comes to presenting a policy model, we have to use the views of policy theorists to see how a problem as a "public goods" can be found in the policy ...

متن کامل

An Experimental Investigation

What causes a government to adopt a new program or policy? Despite a large number of empirical studies available to date, the relative importance of various determinants remains obscure because of difficulties of statistical identification. We present an experimental setting to study the diffusion of policy innovations in the laboratory. Our approach discriminates between experimentation, exper...

متن کامل

A Kind of Low-cost Non-intrusive Autonomous Fault Emulation System

SRAM-Filed Programmable Gate Arrays (FPGA) have become one of the most important carriers of digital electronic system because of its many inborn advantages. However, as manufacture of Integrated Circuit evolves towards Very Deep Sub-Micron technology, FPGA designers must be careful of circuit’s Single Event Upset (SEU) susceptibility when used in hostile environment, such as avionics and space...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009