Advanced Search
MyIDEAS: Login to save this article or follow this journal

Extracting the information: espionage with double crossing

Contents:

Author Info

  • S. Ho

    ()

Registered author(s):

    Abstract

    No abstract is available for this item.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://hdl.handle.net/10.1007/s00712-007-0290-2
    Download Restriction: Access to full text is restricted to subscribers.

    As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.

    Bibliographic Info

    Article provided by Springer in its journal Journal of Economics.

    Volume (Year): 93 (2008)
    Issue (Month): 1 (February)
    Pages: 31-58

    as in new window
    Handle: RePEc:kap:jeczfn:v:93:y:2008:i:1:p:31-58

    Contact details of provider:
    Web page: http://www.springerlink.com/link.asp?id=108909

    Related research

    Keywords: espionage; private investigator; double crossing; renegotiation; D82; Z;

    Find related papers by JEL classification:

    References

    References listed on IDEAS
    Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
    as in new window
    1. Mathias Dewatripont, 1989. "Renegotiation and information revelation over time: the case of optimal labor contacts," ULB Institutional Repository 2013/9573, ULB -- Universite Libre de Bruxelles.
    2. Kreps, David M & Wilson, Robert, 1982. "Sequential Equilibria," Econometrica, Econometric Society, vol. 50(4), pages 863-94, July.
    3. Eilon Solan & Leeat Yariv, 1998. "Games with Espionage," Discussion Papers 1257, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
    4. Myerson, Roger B, 1979. "Incentive Compatibility and the Bargaining Problem," Econometrica, Econometric Society, vol. 47(1), pages 61-73, January.
    5. Akihiko Matsui, 1988. "Information Leakage Forces Cooperation," Discussion Papers 786, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
    6. Cho, In-Koo & Kreps, David M, 1987. "Signaling Games and Stable Equilibria," The Quarterly Journal of Economics, MIT Press, vol. 102(2), pages 179-221, May.
    7. Fudenberg, Drew & Tirole, Jean, 1990. "Moral Hazard and Renegotiation in Agency Contracts," Econometrica, Econometric Society, vol. 58(6), pages 1279-1319, November.
    8. Andrew F. Daughety & Jennifer F. Reinganum, 2005. "Secrecy and Safety," American Economic Review, American Economic Association, vol. 95(4), pages 1074-1091, September.
    9. Manishi Prasad & Peter Wahlqvist & Rich Shikiar & Ya-Chen Tina Shih, 2004. "A," PharmacoEconomics, Springer Healthcare | Adis, vol. 22(4), pages 225-244.
    10. Oliver D. Hart & Jean Tirole, 1987. "Contract Renegotiation and Coasian Dynamics," Working papers 442, Massachusetts Institute of Technology (MIT), Department of Economics.
    11. Eichberger, Jurgen & Grant, Simon & King, Stephen P., 1999. "On relative performance contracts and fund manager's incentives," European Economic Review, Elsevier, vol. 43(1), pages 135-161, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as in new window

    Cited by:
    1. D. Thorleuchter & D. Van Den Poel, 2012. "Protecting Research and Technology from Espionage," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/824, Ghent University, Faculty of Economics and Business Administration.
    2. Alex Barrachina & Yair Tauman & Amparo Urbano Salvador, 2013. "Entry and espionage with noisy signals," Discussion Papers in Economic Behaviour 0113, University of Valencia, ERI-CES.

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:kap:jeczfn:v:93:y:2008:i:1:p:31-58. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Guenther Eichhorn) or (Christopher F. Baum).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.