IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v243y2015i3p974-984.html
   My bibliography  Save this article

Historical evolution and benefit–cost explanation of periodical fluctuation in coal mine safety supervision: An evolutionary game analysis framework

Author

Listed:
  • Liu, Dehai
  • Xiao, Xingzhi
  • Li, Hongyi
  • Wang, Weiguo

Abstract

The periodical fluctuation phenomenon appears in coal mine and other fields of government safety supervision. The paper provides a theoretical explanation by building an evolutionary game model between coal mine industry and governmental supervision institutions. Moreover, the paper provides a numerical example to demonstrate how the initial state and the costs (or gains) influence the fluctuation amplitude and the equilibrium position. We find that the initial state and the payoffs of different strategies are the two main determinants of periodical fluctuation phenomenon. The successful experience of coal mine safety supervision in China shows the importance of highly efficient government safety governance in developing countries.

Suggested Citation

  • Liu, Dehai & Xiao, Xingzhi & Li, Hongyi & Wang, Weiguo, 2015. "Historical evolution and benefit–cost explanation of periodical fluctuation in coal mine safety supervision: An evolutionary game analysis framework," European Journal of Operational Research, Elsevier, vol. 243(3), pages 974-984.
  • Handle: RePEc:eee:ejores:v:243:y:2015:i:3:p:974-984
    DOI: 10.1016/j.ejor.2014.12.046
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377221714010649
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2014.12.046?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Anastasopoulos, Nikolaos P. & Anastasopoulos, Markos P., 2012. "The evolutionary dynamics of audit," European Journal of Operational Research, Elsevier, vol. 216(2), pages 469-476.
    2. Nie, Huihua & Jiang, Minjie & Wang, Xianghong, 2013. "The impact of political cycle: Evidence from coalmine accidents in China," Journal of Comparative Economics, Elsevier, vol. 41(4), pages 995-1011.
    3. Daniel Friedman, 1998. "On economic applications of evolutionary game theory," Journal of Evolutionary Economics, Springer, vol. 8(1), pages 15-43.
    4. Hamed Mamani & Stephen E. Chick & David Simchi-Levi, 2013. "A Game-Theoretic Model of International Influenza Vaccination Coordination," Management Science, INFORMS, vol. 59(7), pages 1650-1670, July.
    5. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    6. Xiao, Tiaojun & Chen, Guohua, 2009. "Wholesale pricing and evolutionarily stable strategies of retailers with imperfectly observable objective," European Journal of Operational Research, Elsevier, vol. 196(3), pages 1190-1201, August.
    7. Dutta, S. & Sarmah, S.P. & Goyal, S.K., 2010. "Evolutionary stability of auction and supply chain contracting: An analysis based on disintermediation in the Indian tea supply chains," European Journal of Operational Research, Elsevier, vol. 207(1), pages 531-538, November.
    8. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    9. Steve Alpern & Thomas Lidbetter, 2013. "Mining Coal or Finding Terrorists: The Expanding Search Paradigm," Operations Research, INFORMS, vol. 61(2), pages 265-279, April.
    10. Cai, Gangshu & Kock, Ned, 2009. "An evolutionary game theoretic perspective on e-collaboration: The collaboration effort and media relativeness," European Journal of Operational Research, Elsevier, vol. 194(3), pages 821-833, May.
    11. Wang, Qiang & Chen, Xi & Yi-chong, Xu, 2013. "Accident like the Fukushima unlikely in a country with effective nuclear regulation: Literature review and proposed guidelines," Renewable and Sustainable Energy Reviews, Elsevier, vol. 17(C), pages 126-146.
    12. Edward H. Kaplan & Moshe Kress & Roberto Szechtman, 2010. "Confronting Entrenched Insurgents," Operations Research, INFORMS, vol. 58(2), pages 329-341, April.
    13. Nitin Bakshi & Noah Gans, 2010. "Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment," Management Science, INFORMS, vol. 56(2), pages 219-233, February.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Liu, Weihua & Long, Shangsong & Xie, Dong & Liang, Yanjie & Wang, Jinkun, 2021. "How to govern the big data discriminatory pricing behavior in the platform service supply chain?An examination with a three-party evolutionary game model," International Journal of Production Economics, Elsevier, vol. 231(C).
    2. Shandong Mou & Kexin Zhong & Yamin Ma, 2023. "Regulating the Big Data-Based Discriminatory Pricing in Platform Retailing: A Tripartite Evolutionary Game Theory Analysis," Mathematics, MDPI, vol. 11(11), pages 1-21, June.
    3. Huang, Xingjun & Lin, Yun & Lim, Ming K. & Zhou, Fuli & Ding, Rui & Zhang, Zusheng, 2022. "Evolutionary dynamics of promoting electric vehicle-charging infrastructure based on public–private partnership cooperation," Energy, Elsevier, vol. 239(PD).
    4. Andres F. Jola-Sanchez & Juan Camilo Serpa, 2021. "Inventory in Times of War," Management Science, INFORMS, vol. 67(10), pages 6457-6479, October.
    5. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    6. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    7. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    8. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    9. André Barreira Da Silva Rocha, 2017. "Cooperation In The Well-Mixed Two-Population Snowdrift Game With Punishment Enforced Through Different Mechanisms," Advances in Complex Systems (ACS), World Scientific Publishing Co. Pte. Ltd., vol. 20(04n05), pages 1-21, June.
    10. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    11. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    12. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    13. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    14. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    15. Pala, Ali & Zhuang, Jun, 2018. "Security screening queues with impatient applicants: A new model with a case study," European Journal of Operational Research, Elsevier, vol. 265(3), pages 919-930.
    16. Zihan Zhang & Junkang Song & Wanjiang Wang, 2023. "Study on the Behavior Strategy of the Subject of Low-Carbon Retrofit of Residential Buildings Based on Tripartite Evolutionary Game," Sustainability, MDPI, vol. 15(9), pages 1-25, May.
    17. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    18. Bo Yan & Zijie Jin & Lifeng Liu & Si Liu, 2018. "Factors influencing the adoption of the internet of things in supply chains," Journal of Evolutionary Economics, Springer, vol. 28(3), pages 523-545, August.
    19. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    20. Andres F. Jola‐Sanchez, 2022. "How does warfare affect firms' productivity?," Production and Operations Management, Production and Operations Management Society, vol. 31(5), pages 1940-1962, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:243:y:2015:i:3:p:974-984. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.