scispace - formally typeset
Search or ask a question

Showing papers on "Shadow (psychology) published in 2017"


Journal ArticleDOI
TL;DR: In this article, the authors investigated the relationship between corruption, the shadow economy, and public debt and found that increased corruption and a larger shadow economy lead to an increase in public debt.

127 citations




MonographDOI
07 Aug 2017
TL;DR: In this article, the shadow banks assure l'intermédiation du crédit à travers une vaste gamme de techniques de financement and de titrisation telles que les asset-backed commercial papers (ABCP), les assetbacked securities (ABS), les collateralized debt obligations (CDO) and les repos (pensions livrées).
Abstract: L es shadow banks assurent l’intermédiation du crédit à travers une vaste gamme de techniques de financement et de titrisation telles que les asset-backed commercial papers (ABCP), les assetbacked securities (ABS), les collateralized debt obligations (CDO) et les repos (pensions livrées). Ces titres sont utilisés par des intermédiaires, les shadow banks spécialisées, qui sont reliés entre eux le long d’une chaîne d’intermédiation. Nous appellerons shadow banking system le réseau des shadow banks de cette chaîne d’intermédiation. Bien que nous pensons que l’appellation « shadow banking » est un peu péjorative pour une partie aussi vaste et importante du système financier, nous l’utiliserons néanmoins dans cet article. Au cours de la dernière décennie, le système des shadow banks a généré des sources de financement de crédit en convertissant des actifs à long terme, opaques et risqués en engagements à court terme, en quasi-monnaie. On peut avancer que la transformation des maturités et du crédit dans le système des shadow banks a contribué à l’appréciation des prix des actifs de l’immobilier privé et commercial avant la crise financière de 2007-2009. Pendant cette crise financière, le système des shadow banks a été gravement éprouvé et de nombreux éléments du système se sont effondrés. La création de crédit par la transformation

76 citations


Book
30 Jun 2017
TL;DR: The European Defence Community - Shadow of the CFSP? The Rebirth of European Security From Political Community to Uncommon Security? Expanding Europe, Decreasing Security? Transatlantic Relations and European Security?Transatlantic and 'Euro' Options - case study Yugoslavia Progress Towards Defining the Common Defence Policy: Illusion or Practice? Conclusions Appendices Index
Abstract: List of Tables List of Figures Acknowledgements List of Abbreviations Glossary Introduction The European Defence Community - Shadow of the CFSP? The Rebirth of European Security From Political Community to Uncommon Security? Expanding Europe, Decreasing Security? Transatlantic Relations and European Security? Transatlantic and 'Euro' Options - case study Yugoslavia Progress Towards Defining the Common Defence Policy: Illusion or Practice? Conclusions Appendices Index

72 citations


Posted Content
TL;DR: Using the MIMIC method, this article estimated the shadow economy of 158 countries over the period 1991 up to 2015 using light intensity as an indicator variable as proxy for the size of the economy.
Abstract: Using the MIMIC method, this paper is a first attempt to estimate the size of the shadow economy of 158 countries over the period 1991 up to 2015. In addition to performing a variety of robustness tests, this paper explicitly addresses endogeneity concerns to the use of GDP as cause and indicator, by using the light intensity approach as an indicator variable as proxy for the size of the economy. Results suggest that the average size of the shadow economy of these 158 countries over 1991-2015 is 32.5% of official GDP, which was 34.82% in 1991 and decreased to 30.66% in 2015.

70 citations


Journal ArticleDOI
TL;DR: In this article, a Foucauldian approach to power/knowledge and truth is drawn upon in the analysis of a single case study to empirically investigate the act of shadow reporting by a social movement organisation as a form of shadow accounting within a sustained campaign against a target corporation.
Abstract: Purpose The purpose of this paper is to empirically investigate the act of shadow reporting by a social movement organisation as a form of shadow accounting within a sustained campaign against a target corporation. Situated within a consideration of power relations, the rationales underlying the production of the shadow report, and the shadow reports perceived value and limits as a shadow accounting mechanism, are investigated. Design/methodology/approach A Foucauldian approach to power/knowledge and truth is drawn upon in the analysis of a single case study. Alongside a consideration of the shadow report itself, interviews with both the preparers of the report and senior management of the corporation targeted comprise the main data. Findings The paper provides an empirical investigation into shadow reporting as a form of shadow accounting. While a range of insights are garnered into the preparation, dissemination and impact of the shadow report, key findings relate to a consideration of power relations. The perceived “truth” status of corporate accounts compared to accounts prepared by shadow accountants is problematised through a consideration of technologies of power and power/knowledge formations. Power relations are subsequently recognised as fundamental to the emancipatory potential of shadow reporting. Research limitations/implications Results from a single case study are presented. Furthermore, given the production of the shadow report occurred several years prior to the collection of data, participants were asked to reflect on past events. Findings are therefore based on those reflections. Originality/value While previous studies have considered the preparation of shadow reports and their transformative potential, this study is, the author believes, the first to empirically analyse the preparation, dissemination and perceived impacts of shadow reporting from the perspectives of both the shadow report producers and the target corporation.

64 citations


Book
31 Mar 2017
TL;DR: In this article, the Foundations of Finance-Led Capitalism is revisited - A Meso-economic Approach 5. Shadow Banking as Network Finance 6. The International Monetary System in Flux 7. Re-Regulation Challenges 8. The New Face of Finance
Abstract: 1. From Sub-Primes to Global Meltdown 2. Long Waves, Structural Crises, and Credit-Money 3. The Foundations of Finance-Led Capitalism 4. Financialization Revisited - A Meso-Economic Approach 5. Shadow Banking as Network Finance 6. The International Monetary System in Flux 7. Re-Regulation Challenges 8. The New Face of Finance

55 citations


Journal ArticleDOI
TL;DR: In this article, a particular form of shadow banking business embedded in the operation of non-financial firms in China and transition economies in Central and Eastern Europe (CEE), in which firms borrow in order to lend is examined.

50 citations


Journal ArticleDOI
TL;DR: In this article, the effects of a risk-averse Western society on healthy childhood development are discussed. And the authors identify forest and nature schools for their inclusion of outdoor risky play.
Abstract: This article addresses the effects of a risk-averse Western society on healthy childhood development. Forest and nature schools are specifically identified for their inclusion of outdoor risky play...

50 citations


Journal ArticleDOI
TL;DR: In this paper, the authors investigated the relationship between corruption and shadow economy among the European Union countries, over the period 2005-2014, and found that a high level of corruption involves a higher level of shadow economy.
Abstract: This study was carried out to empirically investigate the relationships between corruption and shadow economy among the European Union countries, over the period 2005-2014. Moreover, since one would expect corruption and shadow economy to be more common in poorer countries, this study was therefore carried out to determine how corruption and shadow economy affect economic development. The empirical findings of this study confirm a high and positive relationship between corruption and shadow economy, therefore a higher level of corruption involves a higher level of shadow economy. Regarding the influence of corruption and shadow economy on economic growth, a high and negative relationship was found. This means that increasing corruption and shadow economy negatively affects economic growth.

Journal ArticleDOI
TL;DR: In this article, the authors examined the impact of the shadow economy on financial market inclusion simultaneously examining the short run and the long run using annual data from 1980 to 2013 for 18 selected merging economies.

Journal ArticleDOI
TL;DR: The currency demand approach can lead to highly implausible results; the size of the shadow economy might be largely overestimated as mentioned in this paper, therefore, a second method is necessary to calibrate the model.
Abstract: As long as it is employed cautiously enough, the model approach is a useful tool to estimate simultaneously the size and the development of the shadow economy in several countries. However, a second method is necessary to calibrate the model. The currency demand approach can lead to highly implausible results; the size of the shadow economy might be largely overestimated. An alternative is the survey method. For real tests of whether a variable has an impact, procedures are necessary that do not use the same variables as those used to construct the indicator. Thus, to make progress in analysing the shadow economy, the model approach has a role to play, but it has to be complemented by other methods employing different data. The currency demand approach cannot be used as long as it employs the same variables for its constructions.

Journal ArticleDOI
TL;DR: This article developed a macroeconomic model in which commercial banks can o oad risky loans to a highly levered "shadow" banking sector, and financial intermediaries trade in securitized assets.
Abstract: We develop a macroeconomic model in which in which commercial banks can o oad risky loans to a highly levered ‘shadow’ banking sector, and financial intermediaries trade in securitized assets. We highlight the liquidity creation role played by securitization. We show how an endogenous tightening of credit constraints can exacerbate the e ect of shocks by limiting the ability of shadow banks to supply collateral, and of banks to securitize. The model is able to reproduce the cyclical behavior of bank and non-bank credit and leverage. Macroeconomic shocks that directly impact the worth of financial sector are particularly harmful to economic activity, but purely redistributive intra-financial shocks can also generate recessions. We discuss how government policy can stabilize the securitization market when the shadow banking system becomes impaired.

Journal ArticleDOI
TL;DR: The authors analyzed conversational and material data collected during 12 months of fieldwork at a secondary school in southeast Spain, focusing on the cultivation of stance positions, particularly around gender equality, involving "shadow subjects" that both prompt and constrain empathy for others whose rights have been violated.
Abstract: This article analyzes conversational and material data collected during 12 months of fieldwork at a secondary school in southeast Spain. I focus on the cultivation of stance positions—particularly around gender equality—involving “shadow subjects”: imagined discursive figures that both prompt and constrain empathy for others whose rights have been violated. Within this multicultural context, Moroccan immigrant youth get positioned as defenders of outdated patriarchal mores. I argue that the semiotic burdening and elaboration of stance on behalf of shadow subjects makes this possible and points to inherent biases in operationalizing “universal” egalitarian values among ideologically and experientially diverse communities.

Posted Content
TL;DR: In this article, the authors put "special depositors and borrowers" at the core of the analysis, provided a rationale for the covariation yielding the quadrilogy, and analyzes how prudential regulation must adjust to the possibility of migration toward less regulated spheres.
Abstract: Traditional banking is built on four pillars: SME lending, access to public liquidity, deposit insurance, and prudential supervision. This vision has been shattered by repeated bailouts of shadow financial institutions. This paper puts "special depositors and borrowers'" at the core of the analysis, provides a rationale for the covariation yielding the quadrilogy, and analyzes how prudential regulation must adjust to the possibility of migration toward less regulated spheres. Ring fencing between regulated and shadow banking and the sharing of liquidity in centralized platforms are motivated by the supervision of syphoning and financial contagion.

Journal ArticleDOI
TL;DR: The authors argue that there is a need to dust off older elite theories and adapt them to post-democratic conditions where there are no widely shared "political formulas" to secure mass support for elite projects.
Abstract: This paper presents the case of the post-crisis discursive defence of shadow banking in the Netherlands to argue, first, that there is a need to dust off older elite theories and adapt them to post-democratic conditions where there are no widely shared ‘political formulas’ to secure mass support for elite projects. Second, that temporality should be taken more seriously; it is when stories fail that elite storytelling can be observed in practice. As new ‘political formulas’ are minted and become established, elites can again hope to withdraw from the political scene and leave policy-making to the self-evidence of output legitimacy and/or the perpetuum mobile of There-Is-No-Alternative (TINA). This suggests that elite theory should replace an epochal reading of post-democracy with a more conjunctural one.

Journal ArticleDOI
TL;DR: In this article, the extent and status of sacred forests in northern Ethiopia are studied, which are threatened because of their small size and isolation, increasing their exposure to edge effects and human pressures.
Abstract: Land-use change threatens biodiversity and ecosystem function worldwide. These changes have impacts on weather patterns, carbon storage, biodiversity, and other ecosystem services from regional to local scales. Only 8 percent of tropical forests are formally recognized as conservation areas, however globally, there is a network of sites that are protected because they are sacred and as a result act as ‘shadow’ conservation for biodiversity. Unlike other types of protected sites (e.g., national parks), these sites are seats of religious ritual that anchor a community’s cultural identity, while also conserving biological diversity and other ecosystem services. We studied the extent and status of sacred forests in northern Ethiopia, which are threatened because of their small size (~5 ha) and isolation, increasing their exposure to edge effects and human pressures. Using historical and modern imagery, we found that over the last 50 yr, sacred forests have increased in area, but decreased in crown closure. We also found that forest ecological status, via ground-level investigation, had high mean human disturbance (e.g., trails, plantations, exotic planting; 37%); and that forests close to markets (e.g., cities) increased in area due to planting of Eucalyptus (exotic), indicating a potential threat to their persistence and value as shelters of the church.

Journal ArticleDOI
TL;DR: In this paper, the authors examined how the use of shadow IT in product costing impacts managers' perceptions of information credibility and managerial decision making, and they found that participants view information from shadow IT systems as less credible and they are less impacted by and less willing to rely on costing reports produced by shadow IT versus non-shadow IT systems.
Abstract: SYNOPSIS Business trends show that more and more employees are creating shadow IT systems—IT systems that are not sanctioned or monitored by the IT department. This paper examines how the use of shadow IT in product costing impacts managers' perceptions of information credibility and managerial decision making. Using two experiments, we find that participants view information from shadow IT systems as less credible and they are less impacted by and less willing to rely on costing reports produced from shadow IT systems versus non-shadow IT systems. We also find that although participants are concerned about the credibility of shadow IT systems, they are not more likely to find simple mathematical errors embedded in shadow IT costing reports relative to non-shadow IT reports. This suggests that although concerned about shadow IT systems, managers still do not exercise sufficient care in evaluating reports created using these systems. The results of our study should prove informative as shadow systems becom...


Journal ArticleDOI
TL;DR: The authors reviewed the state of the art in the field, presenting comprehensive accounts of features and trends in the world of work but also displaying the limitations of prevailing scholarship, including unreliable statistics, access restrictions to privatised companies as well as historical limitations in qualitative research design.
Abstract: Twenty five years of intense market reforms have not contributed to Russia developing a coherent and effective set of institutions regulating employment relations. The world of work instead has grown into a wilderness of highly differentiated, shadowy arrangements ruled by employers’ arbitrariness (Bizyukov 2011, 2013). By contrast, scholarship contributing to the sociology of work and employment remains underdeveloped, theoretically timid and highly fragmentary. Several reasons have been put forward to explain Russian scholars’ lack of interest in this field. The rejection of the pseudo-scientific Marxism of the Soviet era still casts a long shadow on labour-related research. Post-Socialist transformations have generated such wide-ranging and chaotic change that scholars struggle to collect reliable data and make sense of it. Researchers face new constraints such as unreliable statistics, access restrictions to privatised companies as well as historical limitations in qualitative research design. Furthermore, the post-Soviet scholar is facing challenging questions regarding the status of wage labour. Questions surrounding acceptable levels of unemployment or the fairness of now privately arranged wages or working time have proved controversial for a generation of scholars moving from a perspective where institutions regulating the employment relationship are assumed as centrally planned and universally provided by the state. The monographs selected for this review are the most representative of the state of the art in the field, presenting comprehensive accounts of features and trends in the world of work but also displaying the limitations of prevailing scholarship.

Journal ArticleDOI
TL;DR: In 62 percent of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department, which turns shadow IT into controlled business-managed IT activities and enhances EUC management.
Abstract: In several organizations, business workgroups autonomously implement information technology (IT) outside the purview of the IT department. Shadow IT, evolving as a type of workaround from nontransparent and unapproved end-user computing (EUC), is a term used to refer to this phenomenon, which challenges norms relative to IT controllability. This report describes shadow IT based on case studies of three companies and investigates its management. In 62 percent of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department. Considerations of risks and transaction cost economics with regard to specificity, uncertainty, and scope explain these actions and the resulting coordination of IT responsibilities between the business workgroups and IT departments. This turns shadow IT into controlled business-managed IT activities and enhances EUC management. The results contribute to the governance of IT task responsibilities and provide a way to formalize t...

Journal ArticleDOI
TL;DR: New theory is built to understand the persistence of shadow systems in organizations from a single case study in a mid-sized savings bank and derives two feedback cycles that concern shifting power relations between business units and central IT associated with shadow systems.
Abstract: Drawing on notions of power and the social construction of risk, we build new theory to understand the persistence of shadow systems in organizations. From a single case study in a mid-sized savings bank, we derive two feedback cycles that concern shifting power relations between business units and central IT associated with shadow systems. A distant business-IT relationship and changing business needs can create repeated cost and time pressures that make business units draw on shadow systems. The perception of risk can trigger an opposing power shift back through the decommissioning and recentralization of shadow systems. However, empirical findings suggest that the weakening tendency of formal risk-management programs may not be sufficient to stop the shadow systems cycle spinning if they fail to address the underlying causes for the emergence of shadow systems. These findings highlight long-term dynamics associated with shadow systems and pose “risk” as a power-shifting construct.

Journal ArticleDOI
TL;DR: The number of workplace sex discrimination charges filed with the Equal Employment Opportunity Commission approaches 25,000 annually as discussed by the authors, and the subsequent judicial proceedings suffer from a discriminative bias, which is a serious concern.
Abstract: The number of workplace sex discrimination charges filed with the Equal Employment Opportunity Commission approaches 25,000 annually. Do the subsequent judicial proceedings suffer from a discrimina...

Journal ArticleDOI
TL;DR: The aim of this contribution is to identify the reasons for the use of cloud computing services and the resulting shadow IT from an employee’s perspective, to demonstrate the counteractions a company may take against the unauthorized use ofCloud computing services, and to elaborate on the inherent opportunities and risks.
Abstract: On account of its easy and intuitive usage as well as obvious advantages (eg access to work data from anywhere, at any time and through any means) the evolutionary cloud computing paradigm favors the use of shadow IT Since many employees are not aware of the associated risks and possible legal violations, unauthorized use of cloud computing services could result in substantial risk exposure for any company The purpose of this paper is to explore and to extend the body of knowledge concerning the topic of cloud computing with regard to shadow IT,The aim of this contribution is to identify the reasons for the use of cloud computing services and the resulting shadow IT from an employee’s perspective, to demonstrate the counteractions a company may take against the unauthorized use of cloud computing services and to elaborate on the inherent opportunities and risks We follow a mixed-methods approach consisting of a systematic literature review, a cloud computing awareness study, a vignette study and expert interviews,Based on a triangulation of the data sets, the paper at hand proposes a morphological box as well as a two-piece belief-action-outcome model, both from an employee’s and employer’s point of view Our findings ultimately lead to recommendations for action for employers to counteract the risk exposure Furthermore, also employees are sensitized by means of insights into the topic of unauthorized usage of cloud computing services in everyday working life,The limitations of the triangulation reflect the limitations of each applied research method These limitations justify why a mixed-methods approach is favored – rather than relying on a single source of data – because data from various sources can be triangulated,The paper includes recommendations for action for the handling of the unauthorized usage of cloud computing services within a company, eg, the set up of a company-wide cloud security strategy and the conduction of an anonymous employee survey to identify the status quo,This paper fulfills an identified need to explore the usage of cloud computing services within the context of shadow IT

Journal ArticleDOI
TL;DR: In this article, the authors set up the definition of digital shadow economy and identified its distinctive features and channels, and the newly formulated definition has served as a corner-stone for identification of the distinctive features of this phenomenon.
Abstract: Considering the lack of the scientific studies on the selected topic, the authors of this article raise the aim to set up the definition of digital shadow economy and identify its distinctive features and channels. Thus far, the studies on illegal digital activities have covered ambiguous inter­pretations of digital shadow economy that incorporated both criminal and economic aspects of the activities performed. The results of the empirical research have enabled to formulate the definition of digital shadow economy that refers to illegal activities, such as digital service provision and sales of goods/services online, when operating exceptionally in digital space, the entities violate the existent legal norms and regulations with a pursuit of illegal mutual interest and material benefits. The newly formulated definition of digital shadow economy has served as a corner-stone for identification of the distinctive features and channels of this phenomenon. Hence, the results of the research may make a significant and weighty contribution to the development of the theory of economics and may raise the awareness of what the phenomenon of digital shadow economy implies. First published online: 09 Jan 2017

Journal ArticleDOI
Roland Kostic1
TL;DR: In this article, the role of informal networks in producing strategic knowledge and influencing policy responses to the 2011 post-election crisis in Bosnia-Herzegovina is explored, and the analytical focus is on networks of shadow peacebuilders, defined as actors who are often not visible to the public and who promote a mix of altruistic and personal interests of their broader network.
Abstract: This article explores the role of informal networks in producing strategic knowledge and influencing policy responses to the 2011 post-election crisis in Bosnia-Herzegovina. The analytical focus is on networks of shadow peacebuilders, defined as actors who are often not visible to the public and who promote a mix of altruistic and personal interests of their broader network by generating strategic narratives and influencing peacebuilding policy. As this article shows, shadow peacebuilders engage in diplomatic counterinsurgencies waged by means of diplomacy, politics, public relations and legal means. Strategic narratives are instrumental in legitimizing diplomatic counterinsurgency, inducing internal cohesion within the network and delegitimizing alternative narratives and policy solutions. Yet the production of strategic knowledge by shadow peacebuilders has its limitations. When the gap between strategic narrative and actions becomes too big, the network risks fragmentation and defeat by other n...

Journal ArticleDOI
TL;DR: The authors argue that performativity exploits the employee's desire to achieve the ideal, yoking this to target setting and performance monitoring, and that feelings of shame become pervasive, replacing guilt as an internal control mechanism, and conclude that the new educated social classes have maintained their distinction from and dumped their shame upon the left-behind white working class, thereby reproducing the class divisions which currently fuel reactionary forms of populism.
Abstract: Organisational theorists use the term ‘performativity’ when examining how management maximises the efficiency of educated labour under neoliberalism. This essay will argue that performativity exploits the employee’s desire to achieve the ideal, yoking this to target setting and performance monitoring. Everything becomes quantified, including the self. Insecurity and failure lurk in the shadow of performativity and feelings of shame become pervasive, replacing guilt as an internal control mechanism. The paper will describe how the abject position of the self in the world of production finds some relief and compensation in the world of consumption where the self feels entitled to have what it wants and to have it now. The paper concludes by wondering whether, in countries like the US and the UK, neoliberalism’s new educated social classes have maintained their distinction from and dumped their shame upon the left-behind white working class, thereby reproducing the class divisions which currently fuel reactionary forms of populism.

Journal ArticleDOI
TL;DR: In this paper, the authors examined the determinants and the factors that led to the formation and expansion of tax evasion and subsequently of black economy in the Greek economy and suggested specific measures.
Abstract: Purpose This paper aims to bring into surface two major socioeconomic problems of Greece, tax evasion and shadow economy. Design/methodology/approach It examines the determinants and the factors that led to the formation and expansion of tax evasion and subsequently of black economy. Empirical data and related research are used to provide a clearer view of the existing situation. Findings Tax evasion and shadow economy are proved to remain two of the most severe problems that torture Greek economy. The factors that contribute the most to the formation of these phenomena are the lack of tax awareness, the tax burden, the structure of the tax system, the role of the state, the level of approvement of public authority, self-employment, unemployment and the level of organization of the economy. Except from the negative characteristics, positive ones are also identified, and certain policies are suggested so as to combat tax evasion and black economy. Originality/value The paper highlights two major issues that constitute the deadly weakness of the Greek economy, providing a holistic view of the current situation, identifying the roots of the problem and suggesting specific measures.

Journal ArticleDOI
TL;DR: The paper emphasizes how novel challenges in the Anthropocene demand increased attention to ethical practices, particularly those that establish center-periphery relationships between social learning communities and shadow networks.