IDEAS home Printed from https://ideas.repec.org/e/c/pol171.html
   My authors  Follow this author

Santiago Oliveros

Citations

Many of the citations below have been collected in an experimental project, CitEc, where a more detailed citation analysis can be found. These are citations from works listed in RePEc that could be analyzed mechanically. So far, only a minority of all works could be analyzed. See under "Corrections" how you can help improve the citation analysis.

Working papers

  1. Matias Iaryczower & Santiago Oliveros, 2022. "Collective Hold-Up," NBER Working Papers 29984, National Bureau of Economic Research, Inc.

    Cited by:

    1. Chen, Ying & Zápal, Jan, 2022. "Sequential vote buying," Journal of Economic Theory, Elsevier, vol. 205(C).

  2. Iaryczower, M & Oliveros, S, 2015. "Competing For Loyalty: The Dynamics of Rallying Support," Economics Discussion Papers 14459, University of Essex, Department of Economics.

    Cited by:

    1. Johannes Münster & Markus Reisinger, 2021. "Sequencing Bilateral Negotiations with Externalities," ECONtribute Discussion Papers Series 096, University of Bonn and University of Cologne, Germany.
    2. Meirowitz, Adam & Pi, Shaoting, 2022. "Voting and trading: The shareholder’s dilemma," Journal of Financial Economics, Elsevier, vol. 146(3), pages 1073-1096.
    3. Iaryczower, Matias & Oliveros, Santiago, 2016. "Power brokers: Middlemen in legislative bargaining," Journal of Economic Theory, Elsevier, vol. 162(C), pages 209-236.
    4. Chen, Ying & Zápal, Jan, 2022. "Sequential vote buying," Journal of Economic Theory, Elsevier, vol. 205(C).
    5. Louis-Sidois, Charles & Musolff, Leon Andreas, 0. "Buying voters with uncertain instrumental preferences," Theoretical Economics, Econometric Society.
    6. Suchan Chae & Seho Kim, 2019. "The effects of third-party transfers in sequential anchored bargaining," International Journal of Game Theory, Springer;Game Theory Society, vol. 48(1), pages 143-155, March.

  3. Ahn, DS & Oliveros, S, 2013. "Approval Voting and Scoring Rules with Common Values," Economics Discussion Papers 8983, University of Essex, Department of Economics.

    Cited by:

    1. Sebastien Courtin & Matias Nunez, 2013. "A Map of Approval Voting Equilibria Outcomes," Working Papers hal-00914887, HAL.
    2. Dirk Helbing & Farzam Fanitabasi & Fosca Giannotti & Regula Hänggli & Carina I. Hausladen & Jeroen van den Hoven & Sachit Mahajan & Dino Pedreschi & Evangelos Pournaras, 2021. "Ethics of Smart Cities: Towards Value-Sensitive Design and Co-Evolving City Life," Sustainability, MDPI, vol. 13(20), pages 1-25, October.
    3. Castanheira, Micael & Bouton, Laurent & Llorente-Saguer, Aniol, 2012. "Divided Majority and Information Aggregation: Theory and Experiment," CEPR Discussion Papers 9234, C.E.P.R. Discussion Papers.
    4. Matias Nunez & Jean-François Laslier, 2015. "Bargaining through Approval," PSE-Ecole d'économie de Paris (Postprint) halshs-01310223, HAL.
    5. Herrera, Helios & Llorente-Saguer, Aniol & McMurray, Joseph C., 2019. "Information aggregation and turnout in proportional representation: A laboratory experiment," Journal of Public Economics, Elsevier, vol. 179(C).
    6. Laurent Bouton & Aniol Llorente-Saguer & Antonin Macé & Dimitrios Xefteris, 2024. "Voting Rights, Agenda Control and Information Aggregation," Working Papers halshs-03519689, HAL.
    7. Tsakas, Nikolas & Xefteris, Dimitrios, 2021. "Information aggregation with runoff voting," Journal of Economic Theory, Elsevier, vol. 191(C).
    8. François Durand & Antonin Macé & Matias Nunez, 2019. "Analysis of Approval Voting in Poisson Games," PSE Working Papers halshs-02049865, HAL.
    9. Sébastien Courtin & Matias Nunez, 2013. "Dominance Solvable Approval Voting Games," THEMA Working Papers 2013-27, THEMA (THéorie Economique, Modélisation et Applications), Université de Cergy-Pontoise.
    10. Baharad, Eyal & Danziger, Leif, 2018. "Voting in Hiring Committees: Which "Almost" Rule Is Optimal?," GLO Discussion Paper Series 185, Global Labor Organization (GLO).
    11. Chernomaz, K. & Goertz, J.M.M., 2023. "(A)symmetric equilibria and adaptive learning dynamics in small-committee voting," Journal of Economic Dynamics and Control, Elsevier, vol. 147(C).
    12. Laurent Bouton & Micael Castanheira De Moura, 2012. "One Person, Many Votes: Divided Majority and Information Aggregation," ULB Institutional Repository 2013/108675, ULB -- Universite Libre de Bruxelles.
    13. Nikolas Tsakas & Dimitrios Xefteris, 2019. "Stress-Testing the Runoff Rule in the Laboratory," University of Cyprus Working Papers in Economics 10-2019, University of Cyprus Department of Economics.
    14. Dhillon, Amrita & Kotsialou, Grammateia & Ravindran, Dilip & Xefteris, Dimitrios, 2023. "Information Aggregation with Delegation of Votes," CAGE Online Working Paper Series 665, Competitive Advantage in the Global Economy (CAGE).
    15. Francesco Sinopoli & Giovanna Iannantuoni & Carlos Pimienta, 2014. "Counterexamples on the Superiority of Approval versus Plurality," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 16(5), pages 824-834, October.
    16. Eyal Baharad & Leif Danziger, 2018. "Voting in Hiring Committees: Which “Almost” Rule is Optimal?," Group Decision and Negotiation, Springer, vol. 27(1), pages 129-151, February.
    17. Haradhan Kumar Mohajan, 2011. "Approval Voting: A Multi-outcome Election," KASBIT Business Journals (KBJ), Khadim Ali Shah Bukhari Institute of Technology (KASBIT), vol. 4, pages 77-88, December.
    18. GOERTZ, Johanna & MANIQUET, François, 2013. "Large elections with multiple alternatives: a Condorcet Jury Theorem and inefficient equilibria," LIDAM Discussion Papers CORE 2013023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
    19. Paulo Barelli & Sourav Bhattacharya & Lucas Siga, 2022. "Full Information Equivalence in Large Elections," Econometrica, Econometric Society, vol. 90(5), pages 2161-2185, September.
    20. Matías Núñez, 2014. "The strategic sincerity of Approval voting," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 56(1), pages 157-189, May.
    21. Svetlana Kosterina, 2023. "Information structures and information aggregation in threshold equilibria in elections," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 75(2), pages 493-522, February.
    22. Giles, Adam & Postl, Peter, 2014. "Equilibrium and effectiveness of two-parameter scoring rules," Mathematical Social Sciences, Elsevier, vol. 68(C), pages 31-52.
    23. Eyal Baharad & Leif Danziger, 2018. "Voting in Hiring Committees: Which "Almost" Rule is Optimal?," CESifo Working Paper Series 6851, CESifo.
    24. Baharad, Eyal & Danziger, Leif, 2018. "Voting in Hiring Committees: Which "Almost" Rule Is Optimal?," IZA Discussion Papers 11287, Institute of Labor Economics (IZA).
    25. François Durand & Antonin Macé & Matias Nunez, 2023. "Voter coordination in elections : a case for approval voting," PSE Working Papers halshs-03162184, HAL.
    26. Postl, Peter, 2017. "Évaluation et comparaison des règles de vote derrière le voile de l’ignorance : Tour d'horizon sélectif et analyse des règles de scores à deux paramètres," L'Actualité Economique, Société Canadienne de Science Economique, vol. 93(1-2), pages 249-290, Mars-Juin.

  4. Iaryczower, M & Oliveros, S, 2013. "Power Brokers: Middlemen in Legislative Bargaining," Economics Discussion Papers 8980, University of Essex, Department of Economics.

    Cited by:

    1. Casella, Alessandra & Turban, Sébastien, 2014. "Democracy undone. Systematic minority advantage in competitive vote markets," Games and Economic Behavior, Elsevier, vol. 88(C), pages 47-70.
    2. Casella, Alessandra & Macé, Antonin, 2020. "Does Vote Trading Improve Welfare?," CEPR Discussion Papers 15201, C.E.P.R. Discussion Papers.
    3. Dimitrios Xefteris & Nicholas Ziros, 2016. "Strategic vote trading in power-sharing systems," University of Cyprus Working Papers in Economics 01-2016, University of Cyprus Department of Economics.
    4. Iaryczower, M & Oliveros, S, 2015. "Competing For Loyalty: The Dynamics of Rallying Support," Economics Discussion Papers 14459, University of Essex, Department of Economics.

  5. Oliveros, S, 2013. "Aggregation of endogenous information in large elections," Economics Discussion Papers 8984, University of Essex, Department of Economics.

    Cited by:

    1. Castanheira, Micael & Bouton, Laurent & Llorente-Saguer, Aniol, 2012. "Divided Majority and Information Aggregation: Theory and Experiment," CEPR Discussion Papers 9234, C.E.P.R. Discussion Papers.
    2. Triossi, Matteo, 2013. "Costly information acquisition. Is it better to toss a coin?," Games and Economic Behavior, Elsevier, vol. 82(C), pages 169-191.
    3. Cesar Martinelli, 2011. "Ignorance and Naivete in Large Elections," Working Papers 1107, Centro de Investigacion Economica, ITAM.
    4. Bruns, Christian, 2013. "Elections and Market Provision of Information," VfS Annual Conference 2013 (Duesseldorf): Competition Policy and Regulation in a Global Economic Order 79857, Verein für Socialpolitik / German Economic Association.
    5. Matteo Triossiv, 2010. "Costly information acquisition. Better to toss a coin?," Documentos de Trabajo 267, Centro de Economía Aplicada, Universidad de Chile.

  6. Oliveros, S & Vardy, F, 2013. "Demand for Slant: How Abstention Shapes Voters? Choice of News Media," Economics Discussion Papers 8986, University of Essex, Department of Economics.

    Cited by:

    1. Ozerturk, Saltuk, 2022. "Media access, bias and public opinion," European Economic Review, Elsevier, vol. 147(C).
    2. Piolatto, Amedeo & Schuett, Florian, 2015. "Media competition and electoral politics," Journal of Public Economics, Elsevier, vol. 130(C), pages 80-93.
    3. Gratton, Gabriele, 2014. "Pandering and electoral competition," Games and Economic Behavior, Elsevier, vol. 84(C), pages 163-179.
    4. Denter, Philipp & Dumav, Martin & Ginzburg, Boris, 2019. "Social Connectivity, Media Bias, and Correlation Neglect," MPRA Paper 97626, University Library of Munich, Germany.
    5. Mayank Aggarwal & Anindya S. Chakrabarti & Chirantan Chatterjee, 2023. "Movies, stigma and choice: Evidence from the pharmaceutical industry," Health Economics, John Wiley & Sons, Ltd., vol. 32(5), pages 1019-1039, May.
    6. Saptarshi Ghosh & Nidhi Jain & Cesar Martinelli & Jaideep Roy, 2019. "Swings, News, and Elections," Working Papers 1076, George Mason University, Interdisciplinary Center for Economic Science.
    7. Vladimír Novák & Andrei Matveenko & Silvio Ravaioli, 2023. "The Status Quo and Belief Polarization of Inattentive Agents: Theory and Experiment," Working and Discussion Papers WP 5/2023, Research Department, National Bank of Slovakia.
    8. Federico Vaccari, 2023. "Influential news and policy-making," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 76(4), pages 1363-1418, November.
    9. Hulya Eraslan & Saltuk Ozerturk, 2018. "Information Gatekeeping and Media Bias," Koç University-TUSIAD Economic Research Forum Working Papers 1808, Koc University-TUSIAD Economic Research Forum.
    10. Joan Calzada & Nestor Duch-Brown & Ricard Gil, 2023. "Do Search Engines Increase Concentration in Media Markets?," CESifo Working Paper Series 10671, CESifo.
    11. Guo, Wen-Chung & Lai, Fu-Chuan & Suen, Wing, 2018. "Downs meets d’Aspremont and company: Convergence versus differentiation in politics and the media," International Journal of Industrial Organization, Elsevier, vol. 60(C), pages 96-125.
    12. Marcel Garz & Jil Sörensen & Daniel F. Stone, 2019. "Partisan Selective Engagement: Evidence from Facebook," CESifo Working Paper Series 7975, CESifo.
    13. Sun, Junze & Schram, Arthur & Sloof, Randolph, 2021. "Elections under biased candidate endorsements — an experimental study," Games and Economic Behavior, Elsevier, vol. 125(C), pages 141-158.
    14. Sendhil Mullainathan & Andrei Shleifer, 2005. "The Market for News," American Economic Review, American Economic Association, vol. 95(4), pages 1031-1053, September.
    15. Garz, Marcel & Sood, Gaurav & Stone, Daniel F. & Wallace, Justin, 2020. "The supply of media slant across outlets and demand for slant within outlets: Evidence from US presidential campaign news," European Journal of Political Economy, Elsevier, vol. 63(C).
    16. Li, Anqi & Hu, Lin, 2023. "Electoral accountability and selection with personalized information aggregation," Games and Economic Behavior, Elsevier, vol. 140(C), pages 296-315.
    17. Eraslan, Hulya & Ozerturk, Saltuk, 2017. "Information Gatekeeping and Media Bias," Working Papers 17-001, Rice University, Department of Economics.
    18. Helios Herrera & Aniol Llorente-Saguer & Joseph C. McMurray, 2016. "The Marginal Voter's Curse," Working Papers 798, Queen Mary University of London, School of Economics and Finance.

  7. David S Ahn & Santiago Oliveros, 2010. "The Condorcet Jur(ies) Theorem," Levine's Working Paper Archive 661465000000000268, David K. Levine.

    Cited by:

    1. Eliaz, Kfir & de Clippel, Geoffroy, 2012. "Premise-Based versus Outcome-Based Information Aggregation," CEPR Discussion Papers 8733, C.E.P.R. Discussion Papers.
    2. Ben-Yashar, Ruth & Danziger, Leif, 2014. "On the Optimal Composition of Committees," IZA Discussion Papers 7963, Institute of Labor Economics (IZA).
    3. Dietrich, Franz, 2016. "Judgment aggregation and agenda manipulation," Games and Economic Behavior, Elsevier, vol. 95(C), pages 113-136.
    4. Emanuele Bracco & Federico Revelli, 2017. "Concurrent Elections and Political Accountability: Evidence from Italian Local Elections," Working papers 56, Società Italiana di Economia Pubblica.
    5. Irem Bozbay & Franz Dietrich & Hans Peters, 2014. "Judgment aggregation in search for the truth," Post-Print halshs-00978030, HAL.
    6. Saori CHIBA, 2018. "Hidden Profiles and Persuasion Cascades in Group Decision-Making," Discussion papers e-18-001, Graduate School of Economics , Kyoto University.
    7. Svetlana Kosterina, 2023. "Information structures and information aggregation in threshold equilibria in elections," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 75(2), pages 493-522, February.
    8. Aureli Alabert & Mercè Farré, 2022. "The doctrinal paradox: comparison of decision rules in a probabilistic framework," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 58(4), pages 863-895, May.
    9. Xie, Yinxi & Xie, Yang, 2017. "Machiavellian experimentation," Journal of Comparative Economics, Elsevier, vol. 45(4), pages 685-711.
    10. Alexander Lundberg, 2020. "The importance of expertise in group decisions," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 55(3), pages 495-521, October.

  8. David S. Ahn & Santiago Oliveros, 2010. "Combinatorial Voting," Levine's Working Paper Archive 661465000000000263, David K. Levine.

    Cited by:

    1. Azar, José, 2017. "Portfolio Diversification, Market Power, and the Theory of the Firm," IESE Research Papers D/1170, IESE Business School.
    2. Eliaz, Kfir & de Clippel, Geoffroy, 2012. "Premise-Based versus Outcome-Based Information Aggregation," CEPR Discussion Papers 8733, C.E.P.R. Discussion Papers.
    3. Emanuele Bracco & Federico Revelli, 2017. "Concurrent Elections and Political Accountability: Evidence from Italian Local Elections," Working papers 56, Società Italiana di Economia Pubblica.
    4. Irem Bozbay & Franz Dietrich & Hans Peters, 2014. "Judgment aggregation in search for the truth," Post-Print halshs-00978030, HAL.
    5. Meirowitz, Adam & Pi, Shaoting, 2022. "Voting and trading: The shareholder’s dilemma," Journal of Financial Economics, Elsevier, vol. 146(3), pages 1073-1096.
    6. David S Ahn & Santiago Oliveros, 2010. "The Condorcet Jur(ies) Theorem," Levine's Working Paper Archive 661465000000000268, David K. Levine.
    7. Denter, Philipp, 2021. "Valence, complementarities, and political polarization," Games and Economic Behavior, Elsevier, vol. 128(C), pages 39-57.
    8. Krasa, Stefan & Polborn, Mattias K., 2012. "Political competition between differentiated candidates," Games and Economic Behavior, Elsevier, vol. 76(1), pages 249-271.
    9. Katherine Baldiga & Jerry Green, 2013. "Assent-maximizing social choice," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 40(2), pages 439-460, February.
    10. Irem Bozbay, 2019. "Truth-tracking judgment aggregation over interconnected issues," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 53(2), pages 337-370, August.
    11. Francesco De Sinopoli & Claudia Meroni, 2017. "A concept of sincerity for combinatorial voting," Working Papers 01/2017, University of Verona, Department of Economics.
    12. Halberstam, Yosh & Montagnes, B. Pablo, 2015. "Presidential coattails versus the median voter: Senator selection in US elections," Journal of Public Economics, Elsevier, vol. 121(C), pages 40-51.

  9. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.

    Cited by:

    1. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    2. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    3. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    4. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What Have We Learned? Assessing the Effectiveness of Counterterrorism Strategies in Pakistan," MPRA Paper 77015, University Library of Munich, Germany, revised 20 Feb 2017.
    5. Chenghan Zhou & Andrew Spivey & Haifeng Xu & Thanh H. Nguyen, 2023. "Information Design for Multiple Interdependent Defenders: Work Less, Pay Off More," Games, MDPI, vol. 14(1), pages 1-18, January.
    6. Catherine C. Langlois & Jean-Pierre P. Langlois, 2017. "Rational deterrence by proxy: designing cooperative security agreements," Defence and Peace Economics, Taylor & Francis Journals, vol. 28(1), pages 1-33, January.
    7. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    8. Christopher Cotton & Cheng Li, 2015. "Profiling, Screening, and Criminal Recruitment," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 17(6), pages 964-985, December.
    9. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    10. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    11. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    12. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    13. Ralph L. Keeney, 2007. "Modeling Values for Anti‐Terrorism Analysis," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 585-596, June.
    14. Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
    15. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    16. Marco Pelliccia, 2020. "Decentralized Defence of a (Directed) Network Structure," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
    17. Wang, Jian & Cui, Lei, 2023. "Patrolling games with coordination between monitoring devices and patrols," Reliability Engineering and System Safety, Elsevier, vol. 233(C).
    18. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    19. Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
    20. Daron Acemoglu & Azarakhsh Malekian & Asuman Ozdaglar, 2013. "Network Security and Contagion," NBER Working Papers 19174, National Bureau of Economic Research, Inc.
    21. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    22. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    23. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
    24. Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
    25. Bhan, Aditya & Kabiraj, Tarun, 2018. "Countering Terror Cells: Offence versus Defence," MPRA Paper 88873, University Library of Munich, Germany.
    26. Gian Maria Campedelli & Mihovil Bartulovic & Kathleen M. Carley, 2019. "Pairwise similarity of jihadist groups in target and weapon transitions," Journal of Computational Social Science, Springer, vol. 2(2), pages 245-270, July.
    27. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    28. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2013. "Evaluating the damage associated with intentional supply deprivation in multi-commodity network," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 11-17.
    29. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    30. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    31. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    32. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    33. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    34. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 81(4), pages 1518-1542.
    35. Yacov Y. Haimes, 2011. "On the Complex Quantification of Risk: Systems‐Based Perspective on Terrorism," Risk Analysis, John Wiley & Sons, vol. 31(8), pages 1175-1186, August.
    36. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    37. Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
    38. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    39. Michael Ben-Gad & Yakov Ben-Haim & Dan Peled, 2020. "Allocating Security Expenditures under Knightian Uncertainty: An Info-Gap Approach," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(7), pages 830-850, October.
    40. Toni Ahnert & Michael Brolley & David Cimon & Ryan Riordan, 2022. "Cyber Risk and Security Investment," Staff Working Papers 22-32, Bank of Canada.
    41. Dan J. Kovenock & Brian Roberson, 2015. "The Optimal Defense of Network Connectivity," CESifo Working Paper Series 5653, CESifo.
    42. Ruiz Estrada, Mario Arturo & Koutronas, Evangelos, 2016. "Terrorist attack assessment: Paris November 2015 and Brussels March 2016," Journal of Policy Modeling, Elsevier, vol. 38(3), pages 553-571.
    43. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    44. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    45. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    46. Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
    47. NORA, Vladyslav & UNO, Hiroshi, 2012. "Saddle functions and robust sets of equilibria," LIDAM Discussion Papers CORE 2012050, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
    48. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    49. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    50. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    51. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    52. Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
    53. Todd Sandler, 2013. "Introduction: Advances in the Study of the Economics of Terrorism," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 768-773, April.
    54. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    55. Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
    56. Arrah-Marie Jo, 2019. "Software vulnerability disclosure and security investment [L'impact de la divulgation d’une faille de sécurité : au-delà des motivations de l’éditeur de logiciel]," Post-Print hal-03033198, HAL.
    57. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    58. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    59. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.
    60. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    61. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    62. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2011. "Evaluating the damage associated with intentional network disintegration," Reliability Engineering and System Safety, Elsevier, vol. 96(4), pages 433-439.
    63. Nakao, Keisuke, 2017. "Denial vs. Punishment: Strategies Shape War, but War Itself Affects Strategies," MPRA Paper 81418, University Library of Munich, Germany.
    64. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    65. Khusrav Gaibulloev & Todd Sandler, 2023. "Common myths of terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 37(2), pages 271-301, April.
    66. Yanling Chang & Alan Erera & Chelsea White, 2015. "Value of information for a leader–follower partially observed Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 129-153, December.
    67. Nicholas T. Boardman & Brian J. Lunday & Matthew J. Robbins, 2017. "Heterogeneous surface-to-air missile defense battery location: a game theoretic approach," Journal of Heuristics, Springer, vol. 23(6), pages 417-447, December.
    68. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    69. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    70. E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
    71. Chen Wang & Vicki M. Bier, 2011. "Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility," Decision Analysis, INFORMS, vol. 8(4), pages 286-302, December.
    72. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    73. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
    74. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    75. Perea, Federico & Puerto, Justo, 2013. "Revisiting a game theoretic framework for the robust railway network design against intentional attacks," European Journal of Operational Research, Elsevier, vol. 226(2), pages 286-292.
    76. Michael Greenberg & Karen Lowrie, 2019. "Vicki Bier: A More Sensible Way to View Risk," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 744-748, April.
    77. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    78. W. Matthew Carlyle & Shane G. Henderson & Roberto Szechtman, 2011. "Allocating capacity in parallel queues to improve their resilience to deliberate attack," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(8), pages 731-742, December.
    79. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    80. Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
    81. Subhayu Bandyopadhyay & Todd Sandler, 2009. "The interplay between preemptive and defensive counterterrorism measures: a two-stage game," Working Papers 2008-034, Federal Reserve Bank of St. Louis.
    82. Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
    83. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    84. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    85. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    86. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    87. Roponen, Juho & Ríos Insua, David & Salo, Ahti, 2020. "Adversarial risk analysis under partial information," European Journal of Operational Research, Elsevier, vol. 287(1), pages 306-316.
    88. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    89. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    90. Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.
    91. Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
    92. Fabrizio Baiardi & Daniele Sgandurra, 2013. "Assessing ICT risk through a Monte Carlo method," Environment Systems and Decisions, Springer, vol. 33(4), pages 486-499, December.
    93. Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
    94. Fabrizio Baiardi & Federico Tonelli & Alessandro Bertolini, 2015. "Iterative selection of countermeasures for intelligent threat agents," International Journal of Network Management, John Wiley & Sons, vol. 25(5), pages 340-354, September.
    95. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    96. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    97. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    98. Cheng Li & Christopher Cotton, 2023. "Profiling restrictions in a model of law enforcement and strategic crime," European Journal of Law and Economics, Springer, vol. 55(3), pages 511-532, June.
    99. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    100. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    101. Subhayu Bandyopadhyay & Todd Sandler, 2020. "Counterterrorism Policy: Spillovers, Regime Stability, and Corner Solutions," Working Papers 2020-015, Federal Reserve Bank of St. Louis.
    102. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    103. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.
    104. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    105. Manxi Wu & Saurabh Amin, 2019. "Securing Infrastructure Facilities: When Does Proactive Defense Help?," Dynamic Games and Applications, Springer, vol. 9(4), pages 984-1025, December.
    106. Subhayu Bandyopadhyay & Todd Sandler, 2023. "The Trade-Offs of Counterterrorism Policies," Review, Federal Reserve Bank of St. Louis, vol. 105(3), pages 177-197, July.
    107. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    108. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    109. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    110. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
    111. Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.
    112. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    113. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    114. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    115. Jasmin Wachter & Stefan Rass & Sandra König, 2018. "Security from the Adversary’s Inertia–Controlling Convergence Speed When Playing Mixed Strategy Equilibria," Games, MDPI, vol. 9(3), pages 1-15, August.
    116. Eiselt, H.A. & Bhadury, Joy & Burkey, Mark L., 2011. "An optimization-based framework for modeling counterterrorism strategies," MPRA Paper 36117, University Library of Munich, Germany.
    117. Deck, Cary & Sheremeta, Roman, 2012. "Fight or Flight?," MPRA Paper 52130, University Library of Munich, Germany.
    118. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    119. Timothy Mathews & Shane Sanders, 2019. "Strategic and experimental analyses of conflict and terrorism," Public Choice, Springer, vol. 179(3), pages 169-174, June.
    120. Ur Rehman Faiz, 2015. "The Spatial Analysis of Terrorism in Pakistan," Asian Journal of Law and Economics, De Gruyter, vol. 6(2), pages 125-165, October.
    121. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    122. Hamid Mohtadi & Bryan S. Weber, 2021. "Catastrophe And Rational Policy: Case Of National Security," Economic Inquiry, Western Economic Association International, vol. 59(1), pages 140-161, January.
    123. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    124. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
    125. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    126. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.

Articles

  1. Iaryczower, Matias & Oliveros, Santiago, 2023. "Collective hold-up," Theoretical Economics, Econometric Society, vol. 18(3), July.
    See citations under working paper version above.
  2. Matias Iaryczower & Santiago Oliveros, 2017. "Competing for Loyalty: The Dynamics of Rallying Support," American Economic Review, American Economic Association, vol. 107(10), pages 2990-3005, October.
    See citations under working paper version above.
  3. Ahn, David S. & Oliveros, Santiago, 2016. "Approval voting and scoring rules with common values," Journal of Economic Theory, Elsevier, vol. 166(C), pages 304-310.
    See citations under working paper version above.
  4. Iaryczower, Matias & Oliveros, Santiago, 2016. "Power brokers: Middlemen in legislative bargaining," Journal of Economic Theory, Elsevier, vol. 162(C), pages 209-236.
    See citations under working paper version above.
  5. Santiago Oliveros & Felix Várdy, 2015. "Demand for Slant: How Abstention Shapes Voters' Choice of News Media," Economic Journal, Royal Economic Society, vol. 125(587), pages 1327-1368, September.
    See citations under working paper version above.
  6. Ahn, David S. & Oliveros, Santiago, 2014. "The Condorcet Jur(ies) Theorem," Journal of Economic Theory, Elsevier, vol. 150(C), pages 841-851.
    See citations under working paper version above.
  7. Oliveros, Santiago, 2013. "Abstention, ideology and information acquisition," Journal of Economic Theory, Elsevier, vol. 148(3), pages 871-902.

    Cited by:

    1. Yaron Azrieli, 2018. "The price of ‘one person, one vote’," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 50(2), pages 353-385, February.
    2. Piolatto, Amedeo & Schuett, Florian, 2015. "Media competition and electoral politics," Journal of Public Economics, Elsevier, vol. 130(C), pages 80-93.
    3. Ennio Bilancini & Leonardo Boncinelli, 2014. "Signaling with Costly Acquisition of Signals," Center for Economic Research (RECent) 100, University of Modena and Reggio E., Dept. of Economics "Marco Biagi".
    4. Sourav Bhattacharya, 2013. "Condorcet Jury Theorem in a Spatial Model of Elections," Working Paper 517, Department of Economics, University of Pittsburgh, revised Nov 2013.
    5. Gianmarco León, 2015. "Turnout, Political Preferences and Information: Experimental Evidence from Peru," Working Papers 691, Barcelona School of Economics.
    6. Bruns, Christian & Himmler, Oliver, 2016. "Mass media, instrumental information, and electoral accountability," Journal of Public Economics, Elsevier, vol. 134(C), pages 75-84.
    7. Prato, Carlo & Wolton, Stephane, 2017. "Rational ignorance, populism, and reform," LSE Research Online Documents on Economics 86371, London School of Economics and Political Science, LSE Library.
    8. Siddhartha Bandyopadhyay & Moumita Deb & Johannes Lohse & Rebecca McDonald, 2024. "The swing voter's curse revisited: Transparency's impact on committee voting," Discussion Papers 24-01, Department of Economics, University of Birmingham.
    9. Emanuele Bracco & Federico Revelli, 2017. "Concurrent Elections and Political Accountability: Evidence from Italian Local Elections," Working papers 56, Società Italiana di Economia Pubblica.
    10. Nguyen, Phuc Lam Thy & Alsakka, Rasha & Mantovan, Noemi, 2023. "The impact of sovereign credit ratings on voters’ preferences," Journal of Banking & Finance, Elsevier, vol. 154(C).
    11. Bruns, Christian & Himmler, Oliver, 2014. "A Theory of Political Accountability and Journalism," MPRA Paper 59286, University Library of Munich, Germany.
    12. Santiago Oliveros & Felix Várdy, 2015. "Demand for Slant: How Abstention Shapes Voters' Choice of News Media," Economic Journal, Royal Economic Society, vol. 125(587), pages 1327-1368, September.
    13. Mengel, Friederike & Rivas, Javier, 2017. "Common value elections with private information and informative priors: Theory and experiments," Games and Economic Behavior, Elsevier, vol. 104(C), pages 190-221.
    14. Arve, Malin & Desrieux, Claudine, 2023. "Committee preferences and information acquisition," Discussion Papers 2023/14, Norwegian School of Economics, Department of Business and Management Science.
    15. Sourav Bhattacharya & John Duffy & Sun-Tak Kim, 2015. "Voting with Endogenous Information Acquisition: Theory and Evidence," Working Papers 151602, University of California-Irvine, Department of Economics.
    16. Andersen, Jørgen Juel & Heggedal, Tom-Reiel, 2019. "Political rents and voter information in search equilibrium," Games and Economic Behavior, Elsevier, vol. 114(C), pages 146-168.
    17. Großer, Jens & Seebauer, Michael, 2016. "The curse of uninformed voting: An experimental study," Games and Economic Behavior, Elsevier, vol. 97(C), pages 205-226.
    18. Cesar Martinelli, 2011. "Ignorance and Naivete in Large Elections," Working Papers 1107, Centro de Investigacion Economica, ITAM.
    19. Bruns, Christian, 2013. "Elections and Market Provision of Information," VfS Annual Conference 2013 (Duesseldorf): Competition Policy and Regulation in a Global Economic Order 79857, Verein für Socialpolitik / German Economic Association.
    20. Poy, Samuele & Schüller, Simone, 2020. "Internet and voting in the social media era: Evidence from a local broadband policy," Munich Reprints in Economics 84757, University of Munich, Department of Economics.
    21. Bandyopadhyay, Siddhartha & Deb, Moumita & Lohse, Johannes & McDonald, Rebecca, 2024. "The Swing Voter’s Curse Revisited: Transparency’s Impact on Committee Voting," Working Papers 0744, University of Heidelberg, Department of Economics.
    22. Ruth Ben-Yashar & Leif Danziger, 2015. "When is voting optimal?," Economic Theory Bulletin, Springer;Society for the Advancement of Economic Theory (SAET), vol. 3(2), pages 341-356, October.
    23. Bhattacharya, Sourav & Duffy, John & Kim, SunTak, 2017. "Voting with endogenous information acquisition: Experimental evidence," Games and Economic Behavior, Elsevier, vol. 102(C), pages 316-338.
    24. Gersbach, Hans & Mamageishvili, Akaki & Tejada, Oriol, 2020. "Appointed Learning for the Common Good: Optimal Committee Size and Efficient Rewards," CEPR Discussion Papers 15311, C.E.P.R. Discussion Papers.
    25. Gersbach, Hans & Mamageishvili, Akaki & Tejada, Oriol, 2022. "Appointed learning for the common good: Optimal committee size and monetary transfers," Games and Economic Behavior, Elsevier, vol. 136(C), pages 153-176.
    26. Jens GroЯer & Michael Seebauer, 2013. "The curse of uninformed voting: An experimental study," Working Paper Series in Economics 64, University of Cologne, Department of Economics.
    27. Prato, Carlo & Wolton, Stephane, 2014. "The Voters' Curses: The Upsides and Downsides of Political Engagement," MPRA Paper 53482, University Library of Munich, Germany.
    28. Keiichi Morimoto, 2021. "Information Use and the Condorcet Jury Theorem," Mathematics, MDPI, vol. 9(10), pages 1-22, May.
    29. Ralph-Christopher Bayer & Marco Faravelli & Carlos Pimienta, 2023. "The Wisdom of the Crowd: Uninformed Voting and the Efficiency of Democracy," Discussion Papers 2023-08, School of Economics, The University of New South Wales.
    30. Joseph McMurray, 2015. "The paradox of information and voter turnout," Public Choice, Springer, vol. 165(1), pages 13-23, October.
    31. Ginzburg, Boris & Guerra, José-Alberto, 2019. "When collective ignorance is bliss: Theory and experiment on voting for learning," Journal of Public Economics, Elsevier, vol. 169(C), pages 52-64.
    32. Guha, Brishti, 2022. "Ambiguity aversion, group size, and deliberation: Costly information and decision accuracy," Journal of Economic Behavior & Organization, Elsevier, vol. 201(C), pages 115-133.
    33. Prato, Carlo & Wolton, Stephane, 2013. "Rational Ignorance, Elections, and Reform," MPRA Paper 68638, University Library of Munich, Germany, revised 10 Dec 2015.
    34. Johan A Elkink & Sarah Parlane & Thomas Sattler, 2020. "When one side stays home: A joint model of turnout and vote choice," Working Papers 202012, Geary Institute, University College Dublin.

  8. David S. Ahn & Santiago Oliveros, 2012. "Combinatorial Voting," Econometrica, Econometric Society, vol. 80(1), pages 89-141, January.
    See citations under working paper version above.
  9. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    See citations under working paper version above.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.