Non-convexities and the gains from concealing defenses from committed terrorists
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Arce M., Daniel G. & Sandler, Todd, 2001. "Transnational public goods: strategies and institutions," European Journal of Political Economy, Elsevier, vol. 17(3), pages 493-516, September.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory,
Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Geoffrey Heal & Howard Kunreuther, 2004. "Interdependent Security: A General Model," NBER Working Papers 10706, National Bureau of Economic Research, Inc.
- Lakdawalla, Darius & Zanjani, George, 2005.
"Insurance, self-protection, and the economics of terrorism,"
Journal of Public Economics,
Elsevier, vol. 89(9-10), pages 1891-1905, September.
- Darius Lakdawalla & George Zanjani, 2002. "Insurance, Self-Protection, and the Economics of Terrorism," NBER Working Papers 9215, National Bureau of Economic Research, Inc.
- Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
CitationsCitations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
- Christopher Cotton & Cheng Li, 2015.
"Profiling, Screening, and Criminal Recruitment,"
Journal of Public Economic Theory,
Association for Public Economic Theory, vol. 17(6), pages 964-985, December.
- Christopher Cotton & Cheng Li, 2012. "Profiling, Screening and Criminal Recruitment," Working Papers 2013-02, University of Miami, Department of Economics.
- Cotton, Christopher & Li, Cheng, 2013. "Profiling, screening and criminal recruitment," MPRA Paper 66127, University Library of Munich, Germany.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Technology, Institute of Organization and Management, vol. 3, pages 23-44.
More about this item
KeywordsHidden defenses Resource allocation Security Randomization Terrorism;
StatisticsAccess and download statistics
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ecolet:v:107:y:2010:i:1:p:52-54. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Dana Niculescu). General contact details of provider: http://www.elsevier.com/locate/ecolet .
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.