IDEAS home Printed from https://ideas.repec.org/r/kap/jrisku/v26y2003i2-3p231-49.html
   My bibliography  Save this item

Interdependent Security

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Hannah Brenkert‐Smith & Katherine L. Dickinson & Patricia A. Champ & Nicholas Flores, 2013. "Social Amplification of Wildfire Risk: The Role of Social Interactions and Information Sources," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 800-817, May.
  2. Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part I)," Discussion Papers of DIW Berlin 1049, DIW Berlin, German Institute for Economic Research.
  3. Geoffrey Heal & Howard Kunreuther, 2010. "Social Reinforcement: Cascades, Entrapment, and Tipping," American Economic Journal: Microeconomics, American Economic Association, vol. 2(1), pages 86-99, February.
  4. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
  5. Martina de Gramatica & Fabio Massacci & Woohyun Shim & Uğur Turhan & Julian Williams, 2017. "Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 372-395, February.
  6. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
  7. Gregory DeAngelo & Taylor Leland Smith, 2020. "Private security, maritime piracy and the provision of international public safety," Journal of Risk and Uncertainty, Springer, vol. 60(1), pages 77-97, February.
  8. Katherine Daniell & Alec Morton & David Ríos Insua, 2016. "Policy analysis and policy analytics," Annals of Operations Research, Springer, vol. 236(1), pages 1-13, January.
  9. Thomann, Christian & Schulenburg, J.-Matthias, 2006. "Supply and Demand for Terrorism Insurance: Lessons from Germany," Hannover Economic Papers (HEP) dp-340, Leibniz Universität Hannover, Wirtschaftswissenschaftliche Fakultät.
  10. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
  11. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
  12. Timothy C. Salmon & Roberto A. Weber, 2017. "Maintaining Efficiency while Integrating Entrants from Lower Performing Groups: an Experimental Study," Economic Journal, Royal Economic Society, vol. 127(600), pages 417-444, March.
  13. Miao, Meixia & Jiang, Tao & You, Ilsun, 2015. "Payment-based incentive mechanism for secure cloud deduplication," International Journal of Information Management, Elsevier, vol. 35(3), pages 379-386.
  14. Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
  15. Ralph L. Keeney, 2007. "Modeling Values for Anti‐Terrorism Analysis," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 585-596, June.
  16. Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
  17. Farzaneh Farhadi & Hamidreza Tavafoghi & Demosthenis Teneketzis & S. Jamaloddin Golestani, 2019. "An Efficient Dynamic Allocation Mechanism for Security in Networks of Interdependent Strategic Agents," Dynamic Games and Applications, Springer, vol. 9(4), pages 914-941, December.
  18. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
  19. Tilman Bruck, 2005. "An Economic Analysis Of Security Policies," Defence and Peace Economics, Taylor & Francis Journals, vol. 16(5), pages 375-389.
  20. Marco Pelliccia, 2020. "Decentralized Defence of a (Directed) Network Structure," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
  21. Hulisi Öğüt & Srinivasan Raghunathan & Nirup Menon, 2011. "Cyber Security Risk Management: Public Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and Observability of Self‐Protection," Risk Analysis, John Wiley & Sons, vol. 31(3), pages 497-512, March.
  22. Erwann Michel-Kerjan, 2003. "New Challenges in Critical Infrastructures : A US Perspective," Working Papers hal-00242947, HAL.
  23. Patricia A Champ & Hannah Brenkert‐Smith, 2016. "Is Seeing Believing? Perceptions of Wildfire Risk Over Time," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 816-830, April.
  24. Hui, Kai-Lung & Zhou, Jiali, 2020. "The Economics of Hacking," MPRA Paper 102706, University Library of Munich, Germany.
  25. Radoslav Raykov, 2015. "Catastrophe insurance equilibrium with correlated claims," Theory and Decision, Springer, vol. 78(1), pages 89-115, January.
  26. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
  27. repec:cup:judgdm:v:4:y:2009:i:5:p:363-384 is not listed on IDEAS
  28. Kriss, Peter H. & Blume, Andreas & Weber, Roberto A., 2016. "Coordination with decentralized costly communication," Journal of Economic Behavior & Organization, Elsevier, vol. 130(C), pages 225-241.
  29. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
  30. Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.
  31. Hare, Forrest & Goldstein, Jonathan, 2010. "The interdependent security problem in the defense industrial base: An agent-based model on a social network," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 128-139.
  32. Erwann Michel-Kerjan, 2003. "Terrorisme à grande échelle partage de risques et politiques publiques," Revue d'économie politique, Dalloz, vol. 113(5), pages 625-648.
  33. Shafran, Aric P., 2012. "Learning in games with risky payoffs," Games and Economic Behavior, Elsevier, vol. 75(1), pages 354-371.
  34. Tim Lohse & Julio R. Robledo & Ulrich Schmidt, 2012. "Self‐Insurance and Self‐Protection as Public Goods," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 79(1), pages 57-76, March.
  35. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
  36. Lohse, Tim & Robledo, Julio R., 2012. "Public self-insurance and the Samaritan's dilemma in a federation," Discussion Papers, Research Professorship & Project "The Future of Fiscal Federalism" SP II 2012-103, WZB Berlin Social Science Center.
  37. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
  38. Howard Kunreuther & Erwann Michel-Kerjan, 2004. "Policy Watch: Challenges for Terrorism Risk Insurance in the United States," Journal of Economic Perspectives, American Economic Association, vol. 18(4), pages 201-214, Fall.
  39. Cerdeiro, Diego & Dziubinski, Marcin & Goyal, Sanjeev, 2015. "Contagion Risk and Network Design," Climate Change and Sustainable Development 206416, Fondazione Eni Enrico Mattei (FEEM).
  40. Min Gong & Jonathan Baron & Howard Kunreuther, 2009. "Group cooperation under uncertainty," Journal of Risk and Uncertainty, Springer, vol. 39(3), pages 251-270, December.
  41. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
  42. Hoy, Michael & Polborn, Mattias K., 2015. "The value of technology improvements in games with externalities: A fresh look at offsetting behavior," Journal of Public Economics, Elsevier, vol. 131(C), pages 12-20.
  43. Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
  44. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
  45. Howard Kunreuther & Gabriel Silvasi & Eric T. Bradlow & Dylan Small, 2007. "Deterministic and Stochastic Prisoner's Dilemma Games: Experiments in Interdependent Security," NBER Technical Working Papers 0341, National Bureau of Economic Research, Inc.
  46. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
  47. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
  48. Da, Gaofeng & Xu, Maochao & Zhao, Peng, 2021. "Multivariate dependence among cyber risks based on L-hop propagation," Insurance: Mathematics and Economics, Elsevier, vol. 101(PB), pages 525-546.
  49. John K. Stranlund & Barry C. Field, 2006. "On the Production of Homeland Security Under True Uncertainty," Working Papers 2006-5, University of Massachusetts Amherst, Department of Resource Economics.
  50. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
  51. Peter H. Kriss & Roberto Weber, 2013. "Organizational formation and change: lessons from economic laboratory experiments," Chapters, in: Anna Grandori (ed.), Handbook of Economic Organization, chapter 14, Edward Elgar Publishing.
  52. Nitin Bakshi & Stephen E. Flynn & Noah Gans, 2011. "Estimating the Operational Impact of Container Inspections at International Ports," Management Science, INFORMS, vol. 57(1), pages 1-20, January.
  53. Katherine L. Dickinson & Hannah Brenkert-Smith & Greg Madonia & Nicholas E. Flores, 2020. "Risk interdependency, social norms, and wildfire mitigation: a choice experiment," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(1), pages 1327-1354, August.
  54. Scott Farrow, 2007. "The Economics Of Homeland Security Expenditures: Foundational Expected Cost‐Effectiveness Approaches," Contemporary Economic Policy, Western Economic Association International, vol. 25(1), pages 14-26, January.
  55. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
  56. Andrew M. Smith & Andrés D. González & Leonardo Dueñas‐Osorio & Raissa M. D'Souza, 2020. "Interdependent Network Recovery Games," Risk Analysis, John Wiley & Sons, vol. 40(1), pages 134-152, January.
  57. Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
  58. Scott DuHadway & Steven Carnovale & Benjamin Hazen, 2019. "Understanding risk management for intentional supply chain disruptions: risk detection, risk mitigation, and risk recovery," Annals of Operations Research, Springer, vol. 283(1), pages 179-198, December.
  59. Carolyn Kousky & Erzo Luttmer & Richard Zeckhauser, 2006. "Private investment and government protection," Journal of Risk and Uncertainty, Springer, vol. 33(1), pages 73-100, September.
  60. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
  61. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
  62. Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
  63. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
  64. Rachel Hess & Charles Holt & Angela Smith, 2007. "Coordination of strategic responses to security threats: Laboratory evidence," Experimental Economics, Springer;Economic Science Association, vol. 10(3), pages 235-250, September.
  65. Geoffrey Heal & Howard Kunreuther, 2010. "Environment and Energy: Catastrophic Liabilities from Nuclear Power Plants," NBER Chapters, in: Measuring and Managing Federal Financial Risk, pages 235-257, National Bureau of Economic Research, Inc.
  66. Liying Mu & Milind Dawande & Xianjun Geng & Vijay Mookerjee, 2016. "Milking the Quality Test: Improving the Milk Supply Chain Under Competing Collection Intermediaries," Management Science, INFORMS, vol. 62(5), pages 1259-1277, May.
  67. Mohamed Belhaj & Frédéric Deroian, 2010. "Endogenous effort in communication networks under strategic complementarity," International Journal of Game Theory, Springer;Game Theory Society, vol. 39(3), pages 391-408, July.
  68. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
  69. Dulbecco, Philippe & Laporte, Bertrand, 2005. "How can the security of international trade be financed in developing countries? A global public good Approach," World Development, Elsevier, vol. 33(8), pages 1201-1214, August.
  70. Annette Hofmann & Casey Rothschild, 2019. "On the efficiency of self-protection with spillovers in risk," The Geneva Risk and Insurance Review, Palgrave Macmillan;International Association for the Study of Insurance Economics (The Geneva Association), vol. 44(2), pages 207-221, September.
  71. Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
  72. Terrence August & Duy Dao & Marius Florin Niculescu, 2022. "Economics of Ransomware: Risk Interdependence and Large-Scale Attacks," Management Science, INFORMS, vol. 68(12), pages 8979-9002, December.
  73. Tim Lohse & Julio R. Robledo, 2013. "Public Self-Insurance and the Samaritan’s Dilemma in a Federation," Public Finance Review, , vol. 41(1), pages 92-120, January.
  74. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 2021. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 23(3), pages 773-790, June.
  75. Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
  76. Loretta Mastroeni & Alessandro Mazzoccoli & Maurizio Naldi, 2023. "Cyber Insurance Premium Setting for Multi-Site Companies under Risk Correlation," Risks, MDPI, vol. 11(10), pages 1-18, September.
  77. Scott Musman & Andrew Turner, 2018. "A game theoretic approach to cyber security risk management," The Journal of Defense Modeling and Simulation, , vol. 15(2), pages 127-146, April.
  78. Cerdeiro, Diego A. & Dziubiński, Marcin & Goyal, Sanjeev, 2017. "Individual security, contagion, and network design," Journal of Economic Theory, Elsevier, vol. 170(C), pages 182-226.
  79. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
  80. Konrad, Kai A. & Morath, Florian, 2023. "How to preempt attacks in multi-front conflict with limited resources," European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
  81. Lu Li & Richard Peter, 2021. "Should we do more when we know less? The effect of technology risk on optimal effort," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 88(3), pages 695-725, September.
  82. Mario Gilli & Paolo Tedeschi, 2020. "European Union and Transnational Terrorism. A Normative Analysis of Strategic Spillovers," Working Papers 437, University of Milano-Bicocca, Department of Economics, revised Mar 2020.
  83. Shafran, Aric P. & Lepore, Jason J., 2011. "Subsidization to induce tipping," Economics Letters, Elsevier, vol. 110(1), pages 32-35, January.
  84. Md. Hamid Uddin & Md. Hakim Ali & Mohammad Kabir Hassan, 2020. "Cybersecurity hazards and financial system vulnerability: a synthesis of literature," Risk Management, Palgrave Macmillan, vol. 22(4), pages 239-309, December.
  85. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
  86. V'ictor Gallego & Roi Naveiro & David R'ios Insua & Wolfram Rozas, 2021. "Data sharing games," Papers 2101.10721, arXiv.org.
  87. Terrence August & Marius Florin Niculescu & Hyoduk Shin, 2014. "Cloud Implications on Software Network Structure and Security Risks," Information Systems Research, INFORMS, vol. 25(3), pages 489-510, September.
  88. Nell, Martin & Richter, Andreas & Schiller, Jörg, 2009. "When prices hardly matter: Incomplete insurance contracts and markets for repair goods," European Economic Review, Elsevier, vol. 53(3), pages 343-354, April.
  89. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
  90. Anna Nagurney & Ladimer Nagurney, 2015. "A game theory model of cybersecurity investments with information asymmetry," Netnomics, Springer, vol. 16(1), pages 127-148, August.
  91. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
  92. Lam, W., 2015. "Attack-Deterring and Damage-Control Investments in Cybersecurity," LIDAM Discussion Papers CORE 2015023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
  93. Shafi, Kamran & Bender, Axel & Zhong, Weicai & Abbass, Hussein A., 2012. "Spatio-temporal dynamics of security investments in an interdependent risk environment," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 391(20), pages 5004-5017.
  94. Roumani, Yaman & Nwankpa, Joseph K. & Roumani, Yazan F., 2016. "Examining the relationship between firm’s financial records and security vulnerabilities," International Journal of Information Management, Elsevier, vol. 36(6), pages 987-994.
  95. Kay-Yut Chen & Jingguo Wang & Yan Lang, 2022. "Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals," Management Science, INFORMS, vol. 68(7), pages 5269-5286, July.
  96. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
  97. Fraser, Clive D., 2021. "Protection in numbers? Self-protection as a local public good," Journal of Mathematical Economics, Elsevier, vol. 96(C).
  98. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 0. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 0, pages 1-18.
  99. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
  100. Alexander Muermann & Howard Kunreuther, 2007. "Self-Protection and Insurance with Interdependencies," NBER Working Papers 12827, National Bureau of Economic Research, Inc.
  101. Spencer Wheatley & Annette Hofmann & Didier Sornette, 2021. "Addressing insurance of data breach cyber risks in the catastrophe framework," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 46(1), pages 53-78, January.
  102. Howard C. Kunreuther & Erwann O. Michel-Kerjan, 2007. "Evaluating The Effectiveness of Terrorism Risk Financing Solutions," NBER Working Papers 13359, National Bureau of Economic Research, Inc.
  103. Howard Kunreuther & Erwann Michel-Kerjan, 2004. "Dealing with Extreme Events: Challenges for Terrorism Risk Coverage in the United States," Working Papers hal-00242930, HAL.
  104. James R. Meldrum & Hannah Brenkert-Smith & Patricia A. Champ & Jamie Gomez & Hilary Byerly & Lilia Falk & Christopher M. Barth, 2021. "Would you like to know more? The effect of personalized wildfire risk information and social comparisons on information-seeking behavior in the wildland–urban interface," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 106(3), pages 2139-2161, April.
  105. Darius Lakdawalla & Eric Talley, 2006. "Optimal Liability for Terrorism," NBER Working Papers 12578, National Bureau of Economic Research, Inc.
  106. W. Kip Viscusi & Richard J. Zeckhauser, 2005. "Recollection Bias and the Combat of Terrorism," The Journal of Legal Studies, University of Chicago Press, vol. 34(1), pages 27-55, January.
  107. Howard Kunreuther & Gabriel Silvasi & Eric T. Bradlow & Dylan Small, 2009. "Bayesian analysis of deterministic and stochastic prisoner's dilemma games," Judgment and Decision Making, Society for Judgment and Decision Making, vol. 4(5), pages 363-384, August.
  108. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
  109. Wang, Chunhua, 2014. "Regulating land development in a natural disaster-prone area: The roles of building codes," Resource and Energy Economics, Elsevier, vol. 36(1), pages 209-228.
  110. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
  111. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
  112. Detlef Seese & Christof Weinhardt & Frank Schlottmann (ed.), 2008. "Handbook on Information Technology in Finance," International Handbooks on Information Systems, Springer, number 978-3-540-49487-4, November.
  113. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
  114. Stephan Kroll & Aric P. Shafran, 2018. "Spatial externalities and risk in interdependent security games," Journal of Risk and Uncertainty, Springer, vol. 56(3), pages 237-257, June.
  115. Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
  116. Anthony M. Barrett, 2010. "Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention," Decision Analysis, INFORMS, vol. 7(4), pages 366-377, December.
  117. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
  118. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
  119. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
  120. Piotr Więcek, 2017. "Total Reward Semi-Markov Mean-Field Games with Complementarity Properties," Dynamic Games and Applications, Springer, vol. 7(3), pages 507-529, September.
  121. Sachin Adlakha & Ramesh Johari, 2013. "Mean Field Equilibrium in Dynamic Games with Strategic Complementarities," Operations Research, INFORMS, vol. 61(4), pages 971-989, August.
  122. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
  123. Howard Kunreuther & Erwann Michel-Kerjan & Beverly Porter, 2003. "Assessing, Managing, and Financing Extreme Events: Dealing with Terrorism," NBER Working Papers 10179, National Bureau of Economic Research, Inc.
  124. Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
  125. Lakdawalla, Darius & Zanjani, George, 2005. "Insurance, self-protection, and the economics of terrorism," Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
  126. Sang-Hyun Kim & Brian Tomlin, 2013. "Guilt by Association: Strategic Failure Prevention and Recovery Capacity Investments," Management Science, INFORMS, vol. 59(7), pages 1631-1649, July.
  127. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
  128. Geoffrey Heal & Howard Kunreuther, 2006. "Supermodularity and Tipping," NBER Working Papers 12281, National Bureau of Economic Research, Inc.
  129. Amandha Ganegoda & John Evans, 2014. "A framework to manage the measurable, immeasurable and the unidentifiable financial risk," Australian Journal of Management, Australian School of Business, vol. 39(1), pages 5-34, February.
  130. Katherine A. Daniell & Alec Morton & David Ríos Insua, 2016. "Policy analysis and policy analytics," Annals of Operations Research, Springer, vol. 236(1), pages 1-13, January.
  131. Jentzsch, Nicola, 2015. "What Is Special in the Economics of Cybersecurity and Privacy?," EconStor Research Reports 126227, ZBW - Leibniz Information Centre for Economics.
  132. Martin Eling, 2013. "Recent Research Developments Affecting Nonlife Insurance—The CAS Risk Premium Project 2011 Update," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 16(1), pages 35-46, March.
  133. Annette Hofmann, 2007. "Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks," The Geneva Papers on Risk and Insurance Theory, Springer;International Association for the Study of Insurance Economics (The Geneva Association), vol. 32(1), pages 91-111, June.
  134. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
  135. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
  136. Moore, Tyler, 2010. "The economics of cybersecurity: Principles and policy options," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 103-117.
  137. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
  138. Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite, 2014. "Dynamic competition in IT security: A differential games approach," Information Systems Frontiers, Springer, vol. 16(4), pages 643-661, September.
  139. Alexander Muermann & Howard Kunreuther, 2008. "Self-protection and insurance with interdependencies," Journal of Risk and Uncertainty, Springer, vol. 36(2), pages 103-123, April.
  140. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
  141. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
  142. Elsadig Musa Ahmed, 2021. "Modelling Information and Communications Technology Cyber Security Externalities Spillover Effects on Sustainable Economic Growth," Journal of the Knowledge Economy, Springer;Portland International Center for Management of Engineering and Technology (PICMET), vol. 12(1), pages 412-430, March.
  143. Nagurney, Anna & Shukla, Shivani, 2017. "Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability," European Journal of Operational Research, Elsevier, vol. 260(2), pages 588-600.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.