IDEAS home Printed from https://ideas.repec.org/e/c/pha154.html
   My authors  Follow this author

Kjell Hausken

Citations

Many of the citations below have been collected in an experimental project, CitEc, where a more detailed citation analysis can be found. These are citations from works listed in RePEc that could be analyzed mechanically. So far, only a minority of all works could be analyzed. See under "Corrections" how you can help improve the citation analysis.

Blog mentions

As found by EconAcademics.org, the blog aggregator for Economics research:
  1. Kjell Hausken & Mthuli Ncube, 2013. "Quantitative Easing and Its Impact in the US, Japan, the UK and Europe," SpringerBriefs in Economics, Springer, edition 127, number 978-1-4614-9646-5, October.

    Mentioned in:

    1. Keynes and the dearth of growth
      by Bruno Duarte in EUnomics on 2019-03-25 06:52:50

Working papers

  1. Bhimani, Alnoor & Hausken, Kjell & Arif, Sameen, 2022. "Do national development factors affect cryptocurrency adoption?," LSE Research Online Documents on Economics 115237, London School of Economics and Political Science, LSE Library.

    Cited by:

    1. Arpaci, Ibrahim, 2023. "Predictors of financial sustainability for cryptocurrencies: An empirical study using a hybrid SEM-ANN approach," Technological Forecasting and Social Change, Elsevier, vol. 196(C).
    2. Gambarelli, Luca & Marchi, Gianluca & Muzzioli, Silvia, 2023. "Hedging effectiveness of cryptocurrencies in the European stock market," Journal of International Financial Markets, Institutions and Money, Elsevier, vol. 84(C).
    3. El-Khatib, Youssef & Hatemi-J, Abdulnasser, 2022. "On a Regime Switching Illiquid High Volatile Prediction Model for Cryptocurrencies," MPRA Paper 114556, University Library of Munich, Germany.
    4. Loh, Xiu-Ming & Lee, Voon-Hsien & Leong, Lai-Ying & Aw, Eugene Cheng-Xi & Cham, Tat-Huei & Tang, Yun-Chia & Hew, Jun-Jie, 2023. "Understanding consumers’ resistance to pay with cryptocurrency in the sharing economy: A hybrid SEM-fsQCA approach," Journal of Business Research, Elsevier, vol. 159(C).

  2. Hausken, Kjell, 2016. "Additive Multi-Effort Contests," UiS Working Papers in Economics and Finance 2016/2, University of Stavanger.

    Cited by:

    1. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    2. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    3. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

  3. Hausken, Kjell, 2016. "The Ranking of Researchers by Publications and Citations," UiS Working Papers in Economics and Finance 2016/11, University of Stavanger.

    Cited by:

    1. Nadia Simoes & Nuno Crespo, 2020. "A flexible approach for measuring author-level publishing performance," Scientometrics, Springer;Akadémiai Kiadó, vol. 122(1), pages 331-355, January.
    2. Marlo M. Vernon & C. Makenzie Danley & Frances M. Yang, 2021. "Developing a measure of innovation from research in higher education data," Scientometrics, Springer;Akadémiai Kiadó, vol. 126(5), pages 3919-3928, May.
    3. Mark Levene & Martyn Harris & Trevor Fenner, 2020. "A two-dimensional bibliometric index reflecting both quality and quantity," Scientometrics, Springer;Akadémiai Kiadó, vol. 123(3), pages 1235-1246, June.

  4. Welburn, Jonathan William & Hausken, Kjell, 2015. "A Game-Theoretic Model with Empirics of Economic Crises," UiS Working Papers in Economics and Finance 2015/7, University of Stavanger.

    Cited by:

    1. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.
    2. Widodo, Erwin & Rochmadhan, Oryza Akbar & Lukmandono, & Januardi,, 2022. "Modeling Bayesian inspection game for non-performing loan problems," Operations Research Perspectives, Elsevier, vol. 9(C).
    3. Jonathan William Welburn & Kjell Hausken, 2017. "Game Theoretic Modeling of Economic Systems and the European Debt Crisis," Computational Economics, Springer;Society for Computational Economics, vol. 49(2), pages 177-226, February.

  5. Welburn, Jonathan & Hausken, Kjell, 2014. "A Game Theoretic Model of Economic Crises," UiS Working Papers in Economics and Finance 2014/23, University of Stavanger.

    Cited by:

    1. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.
    2. Welburn, Jonathan William & Hausken, Kjell, 2015. "A Game-Theoretic Model with Empirics of Economic Crises," UiS Working Papers in Economics and Finance 2015/7, University of Stavanger.
    3. Widodo, Erwin & Rochmadhan, Oryza Akbar & Lukmandono, & Januardi,, 2022. "Modeling Bayesian inspection game for non-performing loan problems," Operations Research Perspectives, Elsevier, vol. 9(C).
    4. Jonathan William Welburn & Kjell Hausken, 2017. "Game Theoretic Modeling of Economic Systems and the European Debt Crisis," Computational Economics, Springer;Society for Computational Economics, vol. 49(2), pages 177-226, February.
    5. Jonathan W. Welburn, 2020. "Crises Beyond Belief: Findings on Contagion, the Role of Beliefs, and the Eurozone Debt Crisis from a Borrower–Lender Game," Computational Economics, Springer;Society for Computational Economics, vol. 56(2), pages 263-317, August.
    6. Anubha Goel & Aparna Mehra, 2019. "Analyzing Contagion Effect in Markets During Financial Crisis Using Stochastic Autoregressive Canonical Vine Model," Computational Economics, Springer;Society for Computational Economics, vol. 53(3), pages 921-950, March.

  6. Mthuli Ncube & John Anyanwu & Kjell Hausken, 2014. "Working Paper 195 - Inequality, Economic Growth, and Poverty in the Middle East and North Africa (MENA)," Working Paper Series 999, African Development Bank.

    Cited by:

    1. Simplice A. Asongu & Nicholas M. Odhiambo, 2018. "How Enhancing Information and Communication Technology has affected Inequality in Africa for Sustainable Development: An Empirical Investigation," Research Africa Network Working Papers 18/054, Research Africa Network (RAN).
    2. Simplice A. Asongu & Nicholas M. Odhiambo, 2018. "ICT, Financial Access and Gender Inclusion in the Formal Economic Sector: Evidence from Africa," The African Finance Journal, Africagrowth Institute, vol. 20(2), pages 45-65.
    3. Simplice A. Asongu & Nicholas M. Odhiambo, 2019. "Foreign Aid Complementarities and Inclusive Human Development in Africa," Research Africa Network Working Papers 19/021, Research Africa Network (RAN).
    4. Simplice Asongu & Uchenna EFOBI & Ibukun BEECROFT, 2014. "Inclusive human development in pre-crisis times of globalisation-driven debts," Working Papers of the African Governance and Development Institute. 14/024, African Governance and Development Institute..
    5. Burhan Can Karahasan & Fırat Bilgel, 2021. "The Topography and Sources of Multidimensional Poverty in Turkey," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 154(2), pages 413-445, April.
    6. Simplice Asongu & Rexon Nting, 2020. "The comparative economics of financial access in gender economic inclusion," African Journal of Economic and Management Studies, Emerald Group Publishing Limited, vol. 12(2), pages 193-207, December.
    7. Kouadio, Hugues Kouassi & Gakpa, Lewis-Landry, 2022. "Do economic growth and institutional quality reduce poverty and inequality in West Africa?," Journal of Policy Modeling, Elsevier, vol. 44(1), pages 41-63.
    8. Simplice Asongu & Joseph Nnanna, 2018. "Foreign aid and sustainable inclusive human development in Africa," Working Papers of the African Governance and Development Institute. 18/044, African Governance and Development Institute..
    9. Simplice Asongu, 2015. "Rational Asymmetric Development: Transfer Mispricing and Sub-Saharan Africa’s Extreme Poverty Tragedy," Working Papers of the African Governance and Development Institute. 15/054, African Governance and Development Institute., revised Aug 2015.
    10. Simplice Asongu & Jacinta C. Nwachukwu, 2016. "Globalization and Inclusive Human Development in Africa," Working Papers of the African Governance and Development Institute. 16/049, African Governance and Development Institute..
    11. Antonella Biscione & Dorothée Boccanfuso & Raul Caruso, 2020. "A Hypothesis on Poverty Change in Albania (2007-2016)," Rivista Internazionale di Scienze Sociali, Vita e Pensiero, Pubblicazioni dell'Universita' Cattolica del Sacro Cuore, vol. 128(3), pages 301-320.
    12. Romuald Foueka, 2020. "Analyse du différentiel de performances scolaires dans les pays PASEC sur la base de la régression quantile contrefactuelle," African Development Review, African Development Bank, vol. 32(4), pages 605-618, December.
    13. Amal Jmaii & Damien Rousselière & Christophe Daniel, 2017. "Semi†parametric Regression†based Decomposition Methods: Evidence from Regional Inequality in Tunisia," African Development Review, African Development Bank, vol. 29(4), pages 660-673, December.
    14. Simplice A. Asongu & Stella-Maris I. Orim & Rexon T. Nting, 2019. "Inequality, Information Technology and Inclusive Education in Sub-Saharan Africa," Working Papers 19/035, European Xtramile Centre of African Studies (EXCAS).
    15. Simplice A. Asongu & Ndemaze Asongu, 2017. "Comparative Determinants of Quality of Growth in Developing Countries," Research Africa Network Working Papers 17/013, Research Africa Network (RAN).
    16. Oasis Kodila-Tedika & Simplice Asongu & Julio Mukendi Kayembe, 2014. "Middle class in Africa: Determinants and Consequences," Working Papers of the African Governance and Development Institute. 14/026, African Governance and Development Institute..
    17. Simplice A. Asongu & Joseph Nnanna & Paul N. Acha-Anyi, 2019. "Inequality and gender economic inclusion: The moderating role of financial access in Sub-Saharan Africa," Working Papers of The Association for Promoting Women in Research and Development in Africa (ASPROWORDA). 19/004, The Association for Promoting Women in Research and Development in Africa (ASPROWORDA).
    18. Simplice A. Asongu & Joseph I. Uduji & Elda N. Okolo-Obasi, 2019. "Thresholds of External Flows for Inclusive Human Development in Sub-Saharan Africa," CEREDEC Working Papers 19/045, Centre de Recherche pour le Développement Economique (CEREDEC).
    19. Asongu, Simplice & Nwachukwu, Jacinta, 2017. "Quality of Growth Empirics: Comparative Gaps, Benchmarking and Policy Syndromes," MPRA Paper 83072, University Library of Munich, Germany.
    20. Simplice A. Asongu & Joseph Nnanna & Paul N. Acha-Anyi, 2020. "Inclusive Education for Inclusive Economic Participation: the Financial Access Channel," Working Papers of The Association for Promoting Women in Research and Development in Africa (ASPROWORDA). 20/003, The Association for Promoting Women in Research and Development in Africa (ASPROWORDA).
    21. Obadiah Jonathan Gimba & Mehdi Seraj & Huseyin Ozdeser, 2021. "What drives income inequality in sub‐Saharan Africa and its sub‐regions? An examination of long‐run and short‐run effects," African Development Review, African Development Bank, vol. 33(4), pages 729-741, December.
    22. Chong Hui Ling & Khalid Ahmed & Rusnah Muhamad & Muhammad Shahbaz & Nanthakumar Loganathan, 2017. "Testing the Social Cost of Rapid Economic Development in Malaysia: The Effect of Trade on Life Expectancy," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 130(3), pages 1005-1023, February.
    23. Joseph I. Uduji & Elda N. Okolo-Obasi & Simplice A. Asongu, 2019. "Growth Enhancement Support Scheme (GESS) and Farmers’ Fertilizer Use in Rural Nigeria," Working Papers of the African Governance and Development Institute. 19/055, African Governance and Development Institute..
    24. Asongu, Simplice & Leke, Ivo, 2017. "External Flows and Inclusive Human Development in Sub-Saharan Africa," MPRA Paper 85485, University Library of Munich, Germany.
    25. Simplice A. Asongu & Jacinta C. Nwachukwu, 2016. "Mobile Phone Penetration, Mobile Banking and Inclusive Development in Africa," The African Finance Journal, Africagrowth Institute, vol. 18(1), pages 34-52.
    26. Simplice A. Asongu & Jacinta C. Nwachukwu, 2015. "Foreign Aid and Inclusive Development: Updated Evidence from Africa, 2005-2012," Research Africa Network Working Papers 15/062, Research Africa Network (RAN).
    27. Simplice A. Asongu & Nicholas M. Odhiambo, 2022. "Enhancing ICT for Female Economic Participation in Sub-Saharan Africa," Working Papers of The Association for Promoting Women in Research and Development in Africa (ASPROWORDA). 22/002, The Association for Promoting Women in Research and Development in Africa (ASPROWORDA).
    28. Fambeu, Ariel Herbert & Yomi, Patricia Tchawa, 2023. "Is democracy pro poor in Sub-Saharan Africa?," Journal of Policy Modeling, Elsevier, vol. 45(1), pages 10-30.
    29. Reham Rizk & Ronia Hawash, 2020. "Education Gap and Youth: A Growing Challenge in The MENA Region," Working Papers 1394, Economic Research Forum, revised 20 May 2020.
    30. Simplice A. Asongu & Joseph Nnanna, 2020. "Inclusive Human Development in Sub-Saharan Africa," Working Papers 20/014, European Xtramile Centre of African Studies (EXCAS).
    31. Arayssi, Mahmoud & Fakih, Ali, 2017. "Finance–growth nexus in a changing political region: How important was the Arab Spring?," Economic Analysis and Policy, Elsevier, vol. 55(C), pages 106-123.
    32. Asongu, Simplice & Nwachukwu, Jacinta, 2016. "The Comparative Inclusive Human Development of Globalisation in Africa," MPRA Paper 76122, University Library of Munich, Germany, revised Sep 2016.
    33. Joseph I. Uduji & Elda N. Okolo-Obasi & Simplice A. Asongu, 2019. "Growth Enhancement Support Scheme (GESS) and Farmers’ Fertilizer Use in Rural Nigeria," Research Africa Network Working Papers 19/055, Research Africa Network (RAN).
    34. Mark Edem Kunawotor & Charles Barnor & Raymond Dziwornu, 2021. "The Income Redistributive Effects of Taxes in Africa," Economics Bulletin, AccessEcon, vol. 41(3), pages 1579-1591.
    35. Asongu, Simplice & Kodila-Tedika, Oasis, 2014. "Institutions and Poverty: A Critical Comment Based on Evolving Currents and Debates," MPRA Paper 64461, University Library of Munich, Germany.
    36. Davidmac O. Ekeocha & Chimere O. Iheonu, 2021. "Household‐level poverty, consumption poverty thresholds, income inequality and quality of lives in sub‐Saharan Africa," African Development Review, African Development Bank, vol. 33(2), pages 234-248, June.
    37. Mark Edem Kunawotor & Godfred Alufar Bokpin & Charles Barnor, 2020. "Drivers of income inequality in Africa: Does institutional quality matter?," African Development Review, African Development Bank, vol. 32(4), pages 718-729, December.
    38. Mohamed Ali Chroufa & Nouri Chtourou, 2022. "Inequality and Growth in Tunisia: New Evidence from Threshold Regression," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 163(2), pages 901-924, September.
    39. Asongu, Simplice & Odhiambo, Nicholas, 2020. "Insurance and Inequality in Sub-Saharan Africa: Policy Thresholds," MPRA Paper 103139, University Library of Munich, Germany.
    40. Simplice A. Asongu, 2014. "A brief clarification to the questionable economics of foreign aid for inclusive human development," Research Africa Network Working Papers 14/028, Research Africa Network (RAN).
    41. Abdellatif Chatri & Otman Chahbi & Mustapha Snihji, 2021. "The multilevel analysis of students’ achievement: Evidence from Morocco," African Development Review, African Development Bank, vol. 33(1), pages 117-129, March.
    42. Seher Gülşah Topuz, 2022. "The Relationship Between Income Inequality and Economic Growth: Are Transmission Channels Effective?," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 162(3), pages 1177-1231, August.
    43. Kjell Hausken & Mthuli Ncube, 2018. "Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal," African Development Review, African Development Bank, vol. 30(2), pages 219-232, June.
    44. BANDA, Iges & WILLIAMS-ADEYANJU, Zainab & SKRAME, Dea, 2022. "Poverty, Education And Economic Growth: A Case Study Of Western Balkan Countries," Journal of Financial and Monetary Economics, Centre of Financial and Monetary Research "Victor Slavescu", vol. 10(1), pages 30-43, October.
    45. Kwami Ossadzifo Wonyra & Tomgouani Lanie & Yacobou Sanoussi, 2021. "Effets Potentiels de Court‐terme de la Pandémie de la COVID‐19 sur la Pauvreté dans les Pays de l'Union Economique et Monétaire Ouest Africaine (UEMOA)," African Development Review, African Development Bank, vol. 33(S1), pages 60-74, April.
    46. Carr, Olivia G. & Jilani-Hyler, Nadia & Murray, Gregg R., 2022. "Identifying factors related to school closures due to COVID-19 in the Middle East and North Africa region," International Journal of Educational Development, Elsevier, vol. 90(C).
    47. Luciana Koprencka & Valbona Gjini & Redian Hysi, 2018. "Real Estate Market in Tirana," European Journal of Marketing and Economics Articles, Revistia Research and Publishing, vol. 1, May - Aug.
    48. Aynalem Shita & Nand Kumar & Seema Singh, 2021. "Technology, poverty and income distribution nexus: The case of fertilizer adoption in Ethiopia," African Development Review, African Development Bank, vol. 33(4), pages 742-755, December.
    49. Hakki Hakan Yilmaz & Ali Sertaç Kanaci, 2021. "Redistribution, Growth and Productivity Relationship in Fiscal Policy in Core and Peripheral Countries," Hacienda Pública Española / Review of Public Economics, IEF, vol. 238(3), pages 61-79, September.
    50. Rasheed O. Alao & Andrew A. Alola, 2022. "The role of foreign aids and income inequality in poverty reduction: A sustainable development approach for Africa?," Journal of Social and Economic Development, Springer;Institute for Social and Economic Change, vol. 24(2), pages 456-469, December.

  7. Hausken, Kjell & Ncube, Mthuli, 2013. "Quantitative easing, global economic crisis and market response," UiS Working Papers in Economics and Finance 2013/4, University of Stavanger.

    Cited by:

    1. Monica Hernandez, 2017. "An Unintended Consequence of Uncoordinated International Monetary Policy on Central America," Working Papers 1728, New School for Social Research, Department of Economics.

  8. Hausken, Kjell, 2012. "Strategic defense and attack for series and parallel reliability systems: reply to rejoinder," MPRA Paper 36410, University Library of Munich, Germany.

    Cited by:

    1. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.
    2. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.

  9. Hausken, Kjell & Ncube, Mthuli, 2012. "Production and Conflict in Risky Elections," UiS Working Papers in Economics and Finance 2012/14, University of Stavanger.

    Cited by:

    1. Mthuli Ncube & Basil Jones, 2014. "Working Paper 197 - Estimating the Economic Cost of Fragility in Africa," Working Paper Series 2105, African Development Bank.

  10. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.

    Cited by:

    1. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.
    2. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.

  11. Bhimani, Al & Hausken, Kjell & Ncube , Mthuli, 2009. "Agent Takeover Risk of Principal in Outsourcing Relationships," UiS Working Papers in Economics and Finance 2009/2, University of Stavanger.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    3. Silke Friedrich, 2011. "Policy Persistence and Rent Extraction," ifo Working Paper Series 110, ifo Institute - Leibniz Institute for Economic Research at the University of Munich.
    4. Silke Friedrich, 2013. "Policy Persistence and Rent Extraction," CESifo Working Paper Series 4325, CESifo.
    5. Rajorshi Sen Gupta, 2018. "Risk Management and Intellectual Property Protection in Outsourcing," Global Business Review, International Management Institute, vol. 19(2), pages 393-406, April.

  12. Hausken, Kjell & Mattli, Walter & Plümper, Thomas, 2006. "Widening versus Deepening of International Unions," MPRA Paper 75882, University Library of Munich, Germany.

    Cited by:

    1. Sunandan Ghosh, 2019. "Enlargement Decisions of Regional Trading Blocs with Asymmetric Members," Working Papers id:12992, eSocialSciences.
    2. Berglöf, Erik & Friebel, Guido & Burkart, Mike & Paltseva, Elena, 2008. "Widening and Deepening: Reforming the European Union," CEPR Discussion Papers 6672, C.E.P.R. Discussion Papers.
    3. Konstantinidis, Nikitas, 2015. "On the political geometry of international unions: A coalition-theoretic approach," Research in Economics, Elsevier, vol. 69(3), pages 453-473.

  13. Kjell Hausken & Jack Hirshleifer, 2005. "Truthful Signalling, The Heritability Paradox, and the Malthusian Equi-Marginal Principle," UCLA Economics Working Papers 842, UCLA Department of Economics.

    Cited by:

    1. Cyrus Chu, C.Y. & Lee, Ronald D., 2012. "Sexual dimorphism and sexual selection: A unified economic analysis," Theoretical Population Biology, Elsevier, vol. 82(4), pages 355-363.
    2. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.

  14. Kjell Hausken & John F. Knutsen, 2004. "An Enabling Mechanism for the Creation, Adjustment, and Dissolution of States and Governmental Units," Public Economics 0409011, University Library of Munich, Germany.

    Cited by:

    1. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.

  15. Kjell Hausken & Jack Hirshleifer, 2003. "The Truthful Signalling Hypothesis: An Economic Approach," Levine's Working Paper Archive 618897000000000808, David K. Levine.

    Cited by:

    1. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    2. Kjell Hausken, 2006. "A General Equilibrium Model of Signaling and Exchange," Levine's Working Paper Archive 618897000000001035, David K. Levine.
    3. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.

  16. Kjell Hausken & John F. Knutsen, 2002. "The Birth, Adjustment and Death of States," Public Economics 0205004, University Library of Munich, Germany.

    Cited by:

    1. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics - The Open-Access, Open-Assessment E-Journal (2007-2020), Kiel Institute for the World Economy (IfW Kiel), vol. 4, pages 1-38.

  17. Hausken, Kjell & Plümper, Thomas & Schneider, Gerald, 2002. "The Trilemma of the Protectionist Autocrat: An Assessment of the Political Determinants of Foreign Economic Liberalization," MPRA Paper 75866, University Library of Munich, Germany.

    Cited by:

    1. Oliver Morrissey, 2004. "Conditionality and Aid Effectiveness Re‐evaluated," The World Economy, Wiley Blackwell, vol. 27(2), pages 153-171, February.
    2. Oliver Morrissey, 2002. "Recipient Governments' Willingness and Ability to Meet Aid Conditionality: The Effectiveness of Aid Finance and Conditions," WIDER Working Paper Series DP2002-105, World Institute for Development Economic Research (UNU-WIDER).

  18. Mohr, Matthias & Hausken, Kjell, 1996. "Conflict, interest and strategy: A risk limit approach to conflict," MPIfG Discussion Paper 96/7, Max Planck Institute for the Study of Societies.

    Cited by:

    1. Kjell Hausken, 2007. "Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria," Theory and Decision, Springer, vol. 62(2), pages 135-160, March.

  19. Hausken, Kjell & Plümper, Thomas, 1996. "Hegemons, leaders and followers: A game-theoretic approach to the postwar dynamics of international political economy," MPIfG Discussion Paper 96/1, Max Planck Institute for the Study of Societies.

    Cited by:

    1. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.

Articles

  1. Guizhou Wang & Kjell Hausken, 2022. "A Bitcoin price prediction model assuming oscillatory growth and lengthening cycles," Cogent Economics & Finance, Taylor & Francis Journals, vol. 10(1), pages 2087287-208, December.

    Cited by:

    1. Bhaskar Tripathi & Rakesh Kumar Sharma, 2023. "Modeling Bitcoin Prices using Signal Processing Methods, Bayesian Optimization, and Deep Neural Networks," Computational Economics, Springer;Society for Computational Economics, vol. 62(4), pages 1919-1945, December.

  2. Guizhou Wang & Kjell Hausken, 2022. "Interest Rates, the Taylor Rule, the Quantity Equation, and the Phillips Curve," Eurasian Journal of Economics and Finance, Eurasian Publications, vol. 10(3), pages 83-93.

    Cited by:

    1. Guizhou Wang & Kjell Hausken, 2022. "A Generalized Interest Rates Model with Scaling," International Journal of Economics and Financial Issues, Econjournals, vol. 12(5), pages 143-150, September.

  3. Bhimani, Alnoor & Hausken, Kjell & Arif, Sameen, 2022. "Do national development factors affect cryptocurrency adoption?," Technological Forecasting and Social Change, Elsevier, vol. 181(C).
    See citations under working paper version above.
  4. Guizhou Wang & Kjell Hausken, 2022. "A game between central banks and households involving central bank digital currencies, other digital currencies and negative interest rates," Cogent Economics & Finance, Taylor & Francis Journals, vol. 10(1), pages 2114178-211, December.

    Cited by:

    1. Wang, Zhan-ao & Samuel, Ribeiro-Navarrete & Chen, Xiao-qian & Xu, Bing & Huang, Wei-lun, 2023. "Central bank digital currencies: Consumer data-driven sustainable operation management policy," Technological Forecasting and Social Change, Elsevier, vol. 196(C).

  5. Kjell Hausken, 2021. "Axiomatizing additive multi-effort contests," SN Business & Economics, Springer, vol. 1(11), pages 1-12, November.

    Cited by:

    1. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.

  6. Hausken, Kjell, 2021. "The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty," Reliability Engineering and System Safety, Elsevier, vol. 206(C).

    Cited by:

    1. Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
    2. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    3. Chen, Chao & Yang, Ming & Reniers, Genserik, 2021. "A dynamic stochastic methodology for quantifying HAZMAT storage resilience," Reliability Engineering and System Safety, Elsevier, vol. 215(C).

  7. Kjell Hausken, 2021. "Governments Playing Games and Combating the Dynamics of a Terrorist Organization," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 23(02), pages 1-26, June.

    Cited by:

    1. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).

  8. Guizhou Wang & Kjell Hausken, 2021. "Conventionalists, Pioneers and Criminals Choosing Between a National Currency and a Global Currency," Journal of Banking and Financial Economics, University of Warsaw, Faculty of Management, vol. 2(16), pages 104-133, December.

    Cited by:

    1. Patroklos Patsoulis & Marios Psychalis & Georgios A. Deirmentzoglou, 2022. "Stability and Growth Pact: Too Young to Die, Too Old to Rock ‘n’ Roll," JRFM, MDPI, vol. 15(12), pages 1-12, December.

  9. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.

    Cited by:

    1. Bhaskar, Ratikant & Hunjra, Ahmed Imran & Bansal, Shashank & Pandey, Dharen Kumar, 2022. "Central Bank Digital Currencies: Agendas for future research," Research in International Business and Finance, Elsevier, vol. 62(C).
    2. Monika Eisenbardt & Tomasz Eisenbardt, 2023. "Can Cryptocurrencies Be Feasibly Adopted as a National Currency? The Perspective of the Younger Generation," European Research Studies Journal, European Research Studies Journal, vol. 0(2), pages 463-481.

  10. Mthuli Ncube & Kazbi Soonawalla & Kjell Hausken, 2021. "The Links between Business Environment, Economic Growth and Social Equity: A Study of African Countries," Journal of African Business, Taylor & Francis Journals, vol. 22(1), pages 61-84, January.

    Cited by:

    1. Sara Casagrande & Bruno Dallago, 2022. "To Be, or Not to Be: The Role of Self-Perception in European Countries’ Performance Assessment," Sustainability, MDPI, vol. 14(20), pages 1-23, October.
    2. Waseem Ul Hameed & Asifa Jahangir & Ali Junaid Khan & Jawad Iqbal, 2022. "How to Develop Social Equity for Consumers? A Technology-Based Framework," iRASD Journal of Economics, International Research Alliance for Sustainable Development (iRASD), vol. 4(2), pages 173-186, June.

  11. Kjell Hausken, 2020. "Modeling the evolution of countries and ethnic groups," International Journal of Modern Physics C (IJMPC), World Scientific Publishing Co. Pte. Ltd., vol. 31(01), pages 1-15, January.

    Cited by:

    1. Julide Yazar & Robert J. Gitter, 2023. "Border Games: A Game Theoretic Model of Undocumented Immigration," Games, MDPI, vol. 14(5), pages 1-19, August.

  12. Kjell Hausken & Mthuli Ncube, 2020. "Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention," International Journal of Strategic Decision Sciences (IJSDS), IGI Global, vol. 11(1), pages 56-75, January.

    Cited by:

    1. Kjell Hausken and & Ncube, Mthuli, 2019. "Insurgent attacks, government protection, and international intervention," International Journal of Development and Conflict, Gokhale Institute of Politics and Economics, vol. 9(2), pages 142-175.

  13. Kjell Hausken, 2020. "Additive multi-effort contests," Theory and Decision, Springer, vol. 89(2), pages 203-248, September.
    See citations under working paper version above.
  14. Kjell Hausken, 2020. "Game theoretic analysis of ideologically biased clickbait or fake news and real news," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(2), pages 39-57.

    Cited by:

    1. Daniel Menció-Padrón & Gemayqzel Bouza-Allende, 2023. "Simulating the propagation of rumours with spreaders of distinct characters," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 33(3), pages 75-87.

  15. Kjell Hausken, 2020. "The Shapley value of coalitions to other coalitions," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-10, December.

    Cited by:

    1. Tobias Hiller, 2023. "Measuring the Difficulties in Forming a Coalition Government," Games, MDPI, vol. 14(2), pages 1-15, March.
    2. Zhengxing Zou & René Brink & Yukihiko Funaki, 2022. "Sharing the surplus and proportional values," Theory and Decision, Springer, vol. 93(1), pages 185-217, July.

  16. Kjell Hausken, 2020. "Additive multi-effort contests with multiple investment opportunities," Applied Economics Letters, Taylor & Francis Journals, vol. 27(1), pages 67-71, January.

    Cited by:

    1. Kjell Hausken, 2020. "Additive multi-effort contests," Theory and Decision, Springer, vol. 89(2), pages 203-248, September.

  17. Kjell Hausken, 2019. "Defence and attack of complex interdependent systems," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(3), pages 364-376, March.

    Cited by:

    1. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    2. Baraldi, Piero & Castellano, Andrea & Shokry, Ahmed & Gentile, Ugo & Serio, Luigi & Zio, Enrico, 2020. "A Feature Selection-based Approach for the Identification of Critical Components in Complex Technical Infrastructures: Application to the CERN Large Hadron Collider," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    3. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    4. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    5. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    6. Valcamonico, Dario & Sansavini, Giovanni & Zio, Enrico, 2020. "Cooperative co-evolutionary approach to optimize recovery for improving resilience in multi-communities," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    7. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    8. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    9. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    10. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    11. Gatmiry, Zohreh S. & Hafezalkotob, Ashkan & Khakzar bafruei, Morteza & Soltani, Roya, 2021. "Food web conservation vs. strategic threats: A security game approach," Ecological Modelling, Elsevier, vol. 442(C).
    12. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    13. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    14. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    15. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
    16. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    17. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).

  18. Mthuli Ncube & Kjell Hausken, 2019. "Evidence On The Troubled Assets Relief Program, Bailout Size, Returns And Tail Risk," The International Journal of Business and Finance Research, The Institute for Business and Finance Research, vol. 13(2), pages 1-20.

    Cited by:

    1. Mthuli Ncube & Kjell Hausken, 2019. "Evidence On The Impact Of The Troubled Assets Relief Program On Stock Returns," The International Journal of Business and Finance Research, The Institute for Business and Finance Research, vol. 13(1), pages 1-30.

  19. Kjell Hausken & John F. Moxnes, 2019. "Innovation, Development and National Indices," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 141(3), pages 1165-1188, February.

    Cited by:

    1. Marta Kuc-Czarnecka & Samuele Lo Piano & Andrea Saltelli, 2020. "Quantitative Storytelling in the Making of a Composite Indicator," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 149(3), pages 775-802, June.
    2. Marlo M. Vernon & C. Makenzie Danley & Frances M. Yang, 2021. "Developing a measure of innovation from research in higher education data," Scientometrics, Springer;Akadémiai Kiadó, vol. 126(5), pages 3919-3928, May.

  20. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).

    Cited by:

    1. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    2. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).

  21. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.

    Cited by:

    1. Iny Hwang & Youngsoo Kim & Michael K. Lim, 2023. "Optimal Ratcheting in Executive Compensation," Decision Analysis, INFORMS, vol. 20(2), pages 166-185, June.

  22. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.

    Cited by:

    1. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.

  23. Mthuli Ncube & Kjell Hausken, 2019. "Evidence On The Impact Of The Troubled Assets Relief Program On Stock Returns," The International Journal of Business and Finance Research, The Institute for Business and Finance Research, vol. 13(1), pages 1-30.

    Cited by:

    1. Mthuli Ncube & Kjell Hausken, 2019. "Evidence On The Troubled Assets Relief Program, Bailout Size, Returns And Tail Risk," The International Journal of Business and Finance Research, The Institute for Business and Finance Research, vol. 13(2), pages 1-20.

  24. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.

    Cited by:

    1. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    2. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    3. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).

  25. Kjell Hausken, 2019. "A Game Theoretic Model of Adversaries and Media Manipulation," Games, MDPI, vol. 10(4), pages 1-15, December.

    Cited by:

    1. Kjell Hausken, 2020. "Game theoretic analysis of ideologically biased clickbait or fake news and real news," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(2), pages 39-57.

  26. Kjell Hausken, 2018. "A cost–benefit analysis of terrorist attacks," Defence and Peace Economics, Taylor & Francis Journals, vol. 29(2), pages 111-129, February.

    Cited by:

    1. Bin Mai & Shailesh Kulkarni, 2018. "When Hackers Err: The Impacts of False Positives on Information Security Games," Decision Analysis, INFORMS, vol. 15(2), pages 90-109, June.
    2. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    3. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    4. Grant, Matthew J. & Stewart, Mark G., 2017. "Modelling improvised explosive device attacks in the West – Assessing the hazard," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 345-354.
    5. Jaspersen, Johannes G. & Montibeller, Gilberto, 2020. "On the learning patterns and adaptive behavior of terrorist organizations," European Journal of Operational Research, Elsevier, vol. 282(1), pages 221-234.
    6. Daniel G. Arce, 2019. "On the human consequences of terrorism," Public Choice, Springer, vol. 178(3), pages 371-396, March.
    7. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    8. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    9. Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    10. Hausken, Kjell, 2021. "The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty," Reliability Engineering and System Safety, Elsevier, vol. 206(C).
    11. Halkos, George & Managi, Shunsuke & Zisiadou, Argyro, 2017. "Analyzing the determinants of terrorist attacks and their market reactions," Economic Analysis and Policy, Elsevier, vol. 54(C), pages 57-73.
    12. Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
    13. Kjell Hausken, 2020. "Game theoretic analysis of ideologically biased clickbait or fake news and real news," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(2), pages 39-57.
    14. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    15. Halkos, George & Zisiadou, Argyro, 2016. "Exploring the effect of terrorist attacks on markets," MPRA Paper 71877, University Library of Munich, Germany.

  27. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.

    Cited by:

    1. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    2. Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.
    3. William N. Caballero & Ethan Gharst & David Banks & Jeffery D. Weir, 2023. "Multipolar Security Cooperation Planning: A Multiobjective, Adversarial-Risk-Analysis Approach," Decision Analysis, INFORMS, vol. 20(1), pages 16-39, March.
    4. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    5. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

  28. Kjell Hausken & Mthuli Ncube, 2018. "Service delivery weaknesses within education and healthcare: Applying empirics from Kenya, Uganda, Tanzania, and Senegal," Review of Development Economics, Wiley Blackwell, vol. 22(1), pages 133-147, February.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2018. "Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal," African Development Review, African Development Bank, vol. 30(2), pages 219-232, June.

  29. Kjell Hausken & Mthuli Ncube, 2018. "Policy makers, the international community and people living with HIV/AIDS: the need for new commitment mechanisms," International Journal of Public Policy, Inderscience Enterprises Ltd, vol. 14(3/4), pages 275-301.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2020. "Game theoretic analysis of persons, the pharmaceutical industry, and donors in disease contraction and recovery," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-17, December.

  30. Kjell Hausken, 2018. "Formalizing the Precautionary Principle Accounting for Strategic Interaction, Natural Factors, and Technological Factors," Risk Analysis, John Wiley & Sons, vol. 38(10), pages 2055-2072, October.

    Cited by:

    1. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    2. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    3. Hausken, Kjell, 2021. "The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty," Reliability Engineering and System Safety, Elsevier, vol. 206(C).

  31. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.

    Cited by:

    1. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    2. Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.
    3. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    4. Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
    5. Rana Alabdan, 2020. "Phishing Attacks Survey: Types, Vectors, and Technical Approaches," Future Internet, MDPI, vol. 12(10), pages 1-37, September.
    6. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    7. Kjell Hausken, 2018. "Formalizing the Precautionary Principle Accounting for Strategic Interaction, Natural Factors, and Technological Factors," Risk Analysis, John Wiley & Sons, vol. 38(10), pages 2055-2072, October.
    8. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    9. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

  32. Jonathan William Welburn & Kjell Hausken, 2017. "Game Theoretic Modeling of Economic Systems and the European Debt Crisis," Computational Economics, Springer;Society for Computational Economics, vol. 49(2), pages 177-226, February.

    Cited by:

    1. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.
    2. Jonathan W. Welburn, 2020. "Crises Beyond Belief: Findings on Contagion, the Role of Beliefs, and the Eurozone Debt Crisis from a Borrower–Lender Game," Computational Economics, Springer;Society for Computational Economics, vol. 56(2), pages 263-317, August.
    3. Anubha Goel & Aparna Mehra, 2019. "Analyzing Contagion Effect in Markets During Financial Crisis Using Stochastic Autoregressive Canonical Vine Model," Computational Economics, Springer;Society for Computational Economics, vol. 53(3), pages 921-950, March.

  33. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.

    Cited by:

    1. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    2. Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.
    3. Pramod C. Mane & Nagarajan Krishnamurthy & Kapil Ahuja, 2019. "Formation of Stable and Efficient Social Storage Cloud," Games, MDPI, vol. 10(4), pages 1-17, November.
    4. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    5. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    6. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    7. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

  34. Kjell Hausken & Mthuli Ncube, 2017. "Policy makers, the international community and the population in the prevention and treatment of diseases: case study on HIV/AIDS," Health Economics Review, Springer, vol. 7(1), pages 1-12, December.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2020. "Game theoretic analysis of persons, the pharmaceutical industry, and donors in disease contraction and recovery," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-17, December.

  35. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.

    Cited by:

    1. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    2. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    4. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    5. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    6. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    7. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    8. Gatmiry, Zohreh S. & Hafezalkotob, Ashkan & Khakzar bafruei, Morteza & Soltani, Roya, 2021. "Food web conservation vs. strategic threats: A security game approach," Ecological Modelling, Elsevier, vol. 442(C).
    9. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    10. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).

  36. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.

    Cited by:

    1. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    2. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Hannah Lobban & Yasser Almoghathawi & Nazanin Morshedlou & Kash Barker, 2021. "Community vulnerability perspective on robust protection planning in interdependent infrastructure networks," Journal of Risk and Reliability, , vol. 235(5), pages 798-813, October.
    5. Evans B. Sansolis & Carmenda S. Leonoras, 2021. "Viability of a technology-based education afterschool program," Technium Social Sciences Journal, Technium Science, vol. 19(1), pages 76-100, May.
    6. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    7. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    8. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    9. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    10. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    11. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    12. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    13. Gatmiry, Zohreh S. & Hafezalkotob, Ashkan & Khakzar bafruei, Morteza & Soltani, Roya, 2021. "Food web conservation vs. strategic threats: A security game approach," Ecological Modelling, Elsevier, vol. 442(C).
    14. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    15. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    16. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    17. Fang, Yi-Ping & Zio, Enrico, 2019. "An adaptive robust framework for the optimization of the resilience of interdependent infrastructures under natural hazards," European Journal of Operational Research, Elsevier, vol. 276(3), pages 1119-1136.
    18. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    19. Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    20. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    21. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    22. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    23. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
    24. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
    25. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    26. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    27. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    28. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.

  37. Kjell HAUSKEN, 2016. "The Ranking of Researchers by Publications and Citations: Using RePEc Data," Journal of Economics Bibliography, KSP Journals, vol. 3(4), pages 530-558, December.

    Cited by:

    1. Nadia Simoes & Nuno Crespo, 2020. "A flexible approach for measuring author-level publishing performance," Scientometrics, Springer;Akadémiai Kiadó, vol. 122(1), pages 331-355, January.
    2. Marlo M. Vernon & C. Makenzie Danley & Frances M. Yang, 2021. "Developing a measure of innovation from research in higher education data," Scientometrics, Springer;Akadémiai Kiadó, vol. 126(5), pages 3919-3928, May.
    3. Mark Levene & Martyn Harris & Trevor Fenner, 2020. "A two-dimensional bibliometric index reflecting both quality and quantity," Scientometrics, Springer;Akadémiai Kiadó, vol. 123(3), pages 1235-1246, June.

  38. Kjell Hausken & Dipak K. Gupta, 2016. "Determining the ideological orientation of terrorist organisations: the effects of government repression and organised crime," International Journal of Public Policy, Inderscience Enterprises Ltd, vol. 12(1/2), pages 71-97.

    Cited by:

    1. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    2. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    3. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).

  39. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.

    Cited by:

    1. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    2. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    3. Fabrizio Baiardi & Federico Tonelli & Alessandro Bertolini, 2015. "Iterative selection of countermeasures for intelligent threat agents," International Journal of Network Management, John Wiley & Sons, vol. 25(5), pages 340-354, September.
    4. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    5. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    6. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    7. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    8. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    9. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    10. Grant, Matthew J. & Stewart, Mark G., 2017. "Modelling improvised explosive device attacks in the West – Assessing the hazard," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 345-354.
    11. Chen, Chao & Yang, Ming & Reniers, Genserik, 2021. "A dynamic stochastic methodology for quantifying HAZMAT storage resilience," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    12. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    13. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
    14. Thöns, Sebastian & Stewart, Mark G., 2019. "On decision optimality of terrorism risk mitigation measures for iconic bridges," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 574-583.
    15. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    16. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.

  40. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Dennis Fok & André Stel & Andrew Burke & Roy Thurik, 2019. "How entry crowds and grows markets: the gradual disaster management view of market dynamics in the retail industry," Annals of Operations Research, Springer, vol. 283(1), pages 1111-1138, December.
    3. Kyle H. Goldschmidt & Sameer Kumar, 2019. "Reducing the cost of humanitarian operations through disaster preparation and preparedness," Annals of Operations Research, Springer, vol. 283(1), pages 1139-1152, December.
    4. Shitao Gong & Xin Gao & Zhou Li & Linyan Chen, 2021. "Developing a Dynamic Supervision Mechanism to Improve Construction Safety Investment Supervision Efficiency in China: Theoretical Simulation of Evolutionary Game Process," IJERPH, MDPI, vol. 18(7), pages 1-29, March.
    5. Zongjie Pi & Xin Gao & Linyan Chen & Jinghua Liu, 2019. "The New Path to Improve Construction Safety Performance in China: An Evolutionary Game Theoretic Approach," IJERPH, MDPI, vol. 16(13), pages 1-24, July.
    6. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    7. Wenxin Su & Xin Gao & Yukun Jiang & Jinrong Li, 2021. "Developing a Construction Safety Standard System to Enhance Safety Supervision Efficiency in China: A Theoretical Simulation of the Evolutionary Game Process," Sustainability, MDPI, vol. 13(23), pages 1-22, December.
    8. Liangdong Lu & Hong Huang & Jiuchang Wei & Jia Xu, 2020. "Safety Regulations and the Uncertainty of Work‐Related Road Accident Loss: The Triple Identity of Chinese Local Governments Under Principal–Agent Framework," Risk Analysis, John Wiley & Sons, vol. 40(6), pages 1168-1182, June.
    9. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    10. Wen Li & Tong Zhou & Qiang Mei & Xiangyang Liu & Muhammad Imran, 2023. "Evolution of micro and small enterprises’ work safety behavior in high-risk industries," Small Business Economics, Springer, vol. 60(1), pages 85-104, January.
    11. John B. Coles & Jing Zhang & Jun Zhuang, 2022. "Bridging the research-practice gap in disaster relief: using the IFRC Code of Conduct to develop an aid model," Annals of Operations Research, Springer, vol. 312(2), pages 1337-1357, May.
    12. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    13. Bo Shao & Zhigen Hu & Dawei Liu, 2019. "Using Improved Principal Component Analysis to Explore Construction Accident Situations from the Multi-Dimensional Perspective: A Chinese Study," IJERPH, MDPI, vol. 16(18), pages 1-18, September.
    14. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    15. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.
    16. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

  41. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    3. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).

  42. Kjell Hausken & Dipak K. Gupta, 2015. "Government protection against terrorism and crime," Global Crime, Taylor & Francis Journals, vol. 16(2), pages 59-80, April.

    Cited by:

    1. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    2. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    3. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    4. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).

  43. Welburn, Jonathan W. & Hausken, Kjell, 2015. "A game theoretic model of economic crises," Applied Mathematics and Computation, Elsevier, vol. 266(C), pages 738-762.
    See citations under working paper version above.
  44. Kjell Hausken & Sheheryar Banuri & Dipak Gupta & Klaus Abbink, 2015. "Al Qaeda at the bar: coordinating ideologues and mercenaries in terrorist organizations," Public Choice, Springer, vol. 164(1), pages 57-73, July.

    Cited by:

    1. Kjell Hausken & Dipak K. Gupta, 2016. "Determining the ideological orientation of terrorist organisations: the effects of government repression and organised crime," International Journal of Public Policy, Inderscience Enterprises Ltd, vol. 12(1/2), pages 71-97.
    2. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    3. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    4. Ryoji Makino & Kenju Akai & Jun-ichi Takeshita & Takanori Kudo & Keiko Aoki, 2021. "Effect of disclosing the relation between effort and unit reliability on system reliability: An economic experiment," PLOS ONE, Public Library of Science, vol. 16(4), pages 1-18, April.
    5. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).

  45. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.

    Cited by:

    1. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    3. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    4. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    5. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    6. Subhasish M. Chowdhury & Dan Kovenock & David Rojo Arjona & Nathaniel T. Wilcox, 2016. "Focality and Asymmetry in Multi-battle Contests," Working Papers 16-16, Chapman University, Economic Science Institute.
    7. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
    8. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    9. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.

  46. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.

    Cited by:

    1. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    2. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    5. Wu, Di & Liu, Xiang-dong & Yan, Xiang-bin & Peng, Rui & Li, Gang, 2019. "Equilibrium analysis of bitcoin block withholding attack: A generalized model," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 318-328.
    6. Dui, Hongyan & Si, Shubin & Wu, Shaomin & Yam, Richard C.M., 2017. "An importance measure for multistate systems with external factors," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 49-57.
    7. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    8. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    9. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    10. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    11. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    12. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    13. Shan, Xiaojun Gene & Zhuang, Jun, 2020. "A game-theoretic approach to modeling attacks and defenses of smart grids at three levels," Reliability Engineering and System Safety, Elsevier, vol. 195(C).
    14. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    15. Cao, Minhao & Guo, Jianjun & Xiao, Hui & Wu, Liang, 2022. "Reliability analysis and optimal generator allocation and protection strategy of a non-repairable power grid system," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    16. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    17. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    18. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.

  47. Kjell Hausken & Mthuli Ncube, 2014. "Determinants of Election Outcomes: New Evidence from Africa," African Development Review, African Development Bank, vol. 26(4), pages 610-630, December.

    Cited by:

    1. Olayemi M. Olabiyi, 2020. "Electoral participation and household food insecurity in sub‐Saharan Africa," African Development Review, African Development Bank, vol. 32(3), pages 392-403, September.
    2. Tugba Zeydanli, 2017. "Elections and Subjective Living Conditions in Sub†Saharan Africa," African Development Review, African Development Bank, vol. 29(4), pages 545-561, December.

  48. Mthuli Ncube & John C. Anyanwu & Kjell Hausken, 2014. "Inequality, Economic Growth and Poverty in the Middle East and North Africa (MENA)," African Development Review, African Development Bank, vol. 26(3), pages 435-453, September.

    Cited by:

    1. Simplice A. Asongu & Nicholas M. Odhiambo, 2018. "How Enhancing Information and Communication Technology has affected Inequality in Africa for Sustainable Development: An Empirical Investigation," Research Africa Network Working Papers 18/054, Research Africa Network (RAN).
    2. Simplice A. Asongu & Nicholas M. Odhiambo, 2018. "ICT, Financial Access and Gender Inclusion in the Formal Economic Sector: Evidence from Africa," The African Finance Journal, Africagrowth Institute, vol. 20(2), pages 45-65.
    3. Simplice A. Asongu & Nicholas M. Odhiambo, 2019. "Foreign Aid Complementarities and Inclusive Human Development in Africa," Research Africa Network Working Papers 19/021, Research Africa Network (RAN).
    4. Simplice Asongu & Uchenna EFOBI & Ibukun BEECROFT, 2014. "Inclusive human development in pre-crisis times of globalisation-driven debts," Working Papers of the African Governance and Development Institute. 14/024, African Governance and Development Institute..
    5. Burhan Can Karahasan & Fırat Bilgel, 2021. "The Topography and Sources of Multidimensional Poverty in Turkey," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 154(2), pages 413-445, April.
    6. Simplice Asongu & Rexon Nting, 2020. "The comparative economics of financial access in gender economic inclusion," African Journal of Economic and Management Studies, Emerald Group Publishing Limited, vol. 12(2), pages 193-207, December.
    7. Kouadio, Hugues Kouassi & Gakpa, Lewis-Landry, 2022. "Do economic growth and institutional quality reduce poverty and inequality in West Africa?," Journal of Policy Modeling, Elsevier, vol. 44(1), pages 41-63.
    8. Simplice Asongu & Joseph Nnanna, 2018. "Foreign aid and sustainable inclusive human development in Africa," Working Papers of the African Governance and Development Institute. 18/044, African Governance and Development Institute..
    9. Simplice Asongu, 2015. "Rational Asymmetric Development: Transfer Mispricing and Sub-Saharan Africa’s Extreme Poverty Tragedy," Working Papers of the African Governance and Development Institute. 15/054, African Governance and Development Institute., revised Aug 2015.
    10. Simplice Asongu & Jacinta C. Nwachukwu, 2016. "Globalization and Inclusive Human Development in Africa," Working Papers of the African Governance and Development Institute. 16/049, African Governance and Development Institute..
    11. Antonella Biscione & Dorothée Boccanfuso & Raul Caruso, 2020. "A Hypothesis on Poverty Change in Albania (2007-2016)," Rivista Internazionale di Scienze Sociali, Vita e Pensiero, Pubblicazioni dell'Universita' Cattolica del Sacro Cuore, vol. 128(3), pages 301-320.
    12. Amal Jmaii & Damien Rousselière & Christophe Daniel, 2017. "Semi†parametric Regression†based Decomposition Methods: Evidence from Regional Inequality in Tunisia," African Development Review, African Development Bank, vol. 29(4), pages 660-673, December.
    13. Romuald Foueka, 2020. "Analyse du différentiel de performances scolaires dans les pays PASEC sur la base de la régression quantile contrefactuelle," African Development Review, African Development Bank, vol. 32(4), pages 605-618, December.
    14. Simplice A. Asongu & Stella-Maris I. Orim & Rexon T. Nting, 2019. "Inequality, Information Technology and Inclusive Education in Sub-Saharan Africa," Working Papers 19/035, European Xtramile Centre of African Studies (EXCAS).
    15. John C. Anyanwu, 2016. "Empirical Analysis of the Main Drivers of Income Inequality in Southern Africa," Annals of Economics and Finance, Society for AEF, vol. 17(2), pages 337-364, November.
    16. Simplice A. Asongu & Ndemaze Asongu, 2017. "Comparative Determinants of Quality of Growth in Developing Countries," Research Africa Network Working Papers 17/013, Research Africa Network (RAN).
    17. Oasis Kodila-Tedika & Simplice Asongu & Julio Mukendi Kayembe, 2014. "Middle class in Africa: Determinants and Consequences," Working Papers of the African Governance and Development Institute. 14/026, African Governance and Development Institute..
    18. Simplice A. Asongu & Joseph I. Uduji & Elda N. Okolo-Obasi, 2019. "Thresholds of External Flows for Inclusive Human Development in Sub-Saharan Africa," CEREDEC Working Papers 19/045, Centre de Recherche pour le Développement Economique (CEREDEC).
    19. Simplice A. Asongu & Joseph Nnanna & Paul N. Acha-Anyi, 2019. "Inequality and gender economic inclusion: The moderating role of financial access in Sub-Saharan Africa," Working Papers of The Association for Promoting Women in Research and Development in Africa (ASPROWORDA). 19/004, The Association for Promoting Women in Research and Development in Africa (ASPROWORDA).
    20. Asongu, Simplice & Nwachukwu, Jacinta, 2017. "Quality of Growth Empirics: Comparative Gaps, Benchmarking and Policy Syndromes," MPRA Paper 83072, University Library of Munich, Germany.
    21. Simplice A. Asongu & Joseph Nnanna & Paul N. Acha-Anyi, 2020. "Inclusive Education for Inclusive Economic Participation: the Financial Access Channel," Working Papers of The Association for Promoting Women in Research and Development in Africa (ASPROWORDA). 20/003, The Association for Promoting Women in Research and Development in Africa (ASPROWORDA).
    22. Obadiah Jonathan Gimba & Mehdi Seraj & Huseyin Ozdeser, 2021. "What drives income inequality in sub‐Saharan Africa and its sub‐regions? An examination of long‐run and short‐run effects," African Development Review, African Development Bank, vol. 33(4), pages 729-741, December.
    23. Chong Hui Ling & Khalid Ahmed & Rusnah Muhamad & Muhammad Shahbaz & Nanthakumar Loganathan, 2017. "Testing the Social Cost of Rapid Economic Development in Malaysia: The Effect of Trade on Life Expectancy," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 130(3), pages 1005-1023, February.
    24. Joseph I. Uduji & Elda N. Okolo-Obasi & Simplice A. Asongu, 2019. "Growth Enhancement Support Scheme (GESS) and Farmers’ Fertilizer Use in Rural Nigeria," Working Papers of the African Governance and Development Institute. 19/055, African Governance and Development Institute..
    25. Asongu, Simplice & Leke, Ivo, 2017. "External Flows and Inclusive Human Development in Sub-Saharan Africa," MPRA Paper 85485, University Library of Munich, Germany.
    26. Simplice A. Asongu & Jacinta C. Nwachukwu, 2016. "Mobile Phone Penetration, Mobile Banking and Inclusive Development in Africa," The African Finance Journal, Africagrowth Institute, vol. 18(1), pages 34-52.
    27. Simplice A. Asongu & Jacinta C. Nwachukwu, 2015. "Foreign Aid and Inclusive Development: Updated Evidence from Africa, 2005-2012," Research Africa Network Working Papers 15/062, Research Africa Network (RAN).
    28. Simplice A. Asongu & Nicholas M. Odhiambo, 2022. "Enhancing ICT for Female Economic Participation in Sub-Saharan Africa," Working Papers of The Association for Promoting Women in Research and Development in Africa (ASPROWORDA). 22/002, The Association for Promoting Women in Research and Development in Africa (ASPROWORDA).
    29. Fambeu, Ariel Herbert & Yomi, Patricia Tchawa, 2023. "Is democracy pro poor in Sub-Saharan Africa?," Journal of Policy Modeling, Elsevier, vol. 45(1), pages 10-30.
    30. Reham Rizk & Ronia Hawash, 2020. "Education Gap and Youth: A Growing Challenge in The MENA Region," Working Papers 1394, Economic Research Forum, revised 20 May 2020.
    31. Simplice A. Asongu & Joseph Nnanna, 2020. "Inclusive Human Development in Sub-Saharan Africa," Working Papers 20/014, European Xtramile Centre of African Studies (EXCAS).
    32. Arayssi, Mahmoud & Fakih, Ali, 2017. "Finance–growth nexus in a changing political region: How important was the Arab Spring?," Economic Analysis and Policy, Elsevier, vol. 55(C), pages 106-123.
    33. Asongu, Simplice & Nwachukwu, Jacinta, 2016. "The Comparative Inclusive Human Development of Globalisation in Africa," MPRA Paper 76122, University Library of Munich, Germany, revised Sep 2016.
    34. Joseph I. Uduji & Elda N. Okolo-Obasi & Simplice A. Asongu, 2019. "Growth Enhancement Support Scheme (GESS) and Farmers’ Fertilizer Use in Rural Nigeria," Research Africa Network Working Papers 19/055, Research Africa Network (RAN).
    35. Mark Edem Kunawotor & Charles Barnor & Raymond Dziwornu, 2021. "The Income Redistributive Effects of Taxes in Africa," Economics Bulletin, AccessEcon, vol. 41(3), pages 1579-1591.
    36. Asongu, Simplice & Kodila-Tedika, Oasis, 2014. "Institutions and Poverty: A Critical Comment Based on Evolving Currents and Debates," MPRA Paper 64461, University Library of Munich, Germany.
    37. Davidmac O. Ekeocha & Chimere O. Iheonu, 2021. "Household‐level poverty, consumption poverty thresholds, income inequality and quality of lives in sub‐Saharan Africa," African Development Review, African Development Bank, vol. 33(2), pages 234-248, June.
    38. Mark Edem Kunawotor & Godfred Alufar Bokpin & Charles Barnor, 2020. "Drivers of income inequality in Africa: Does institutional quality matter?," African Development Review, African Development Bank, vol. 32(4), pages 718-729, December.
    39. Nur Feriyanto, 2015. "Dominant Economic Sectors in Kulonprogo, Gunungkidul, and Bantul Regencies in Yogyakarta Special Province," Economic Journal of Emerging Markets, Universitas Islam Indonesia, vol. 7(2), pages 93-106, April.
    40. Mohamed Ali Chroufa & Nouri Chtourou, 2022. "Inequality and Growth in Tunisia: New Evidence from Threshold Regression," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 163(2), pages 901-924, September.
    41. Asongu, Simplice & Odhiambo, Nicholas, 2020. "Insurance and Inequality in Sub-Saharan Africa: Policy Thresholds," MPRA Paper 103139, University Library of Munich, Germany.
    42. Simplice A. Asongu, 2014. "A brief clarification to the questionable economics of foreign aid for inclusive human development," Research Africa Network Working Papers 14/028, Research Africa Network (RAN).
    43. Ernestine Atangana, 2022. "With the Continuing Increase in Sub-Saharan African Countries, Will Sustainable Development of Goal 1 Ever Be Achieved by 2030?," Sustainability, MDPI, vol. 14(16), pages 1-28, August.
    44. Abdellatif Chatri & Otman Chahbi & Mustapha Snihji, 2021. "The multilevel analysis of students’ achievement: Evidence from Morocco," African Development Review, African Development Bank, vol. 33(1), pages 117-129, March.
    45. Seher Gülşah Topuz, 2022. "The Relationship Between Income Inequality and Economic Growth: Are Transmission Channels Effective?," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 162(3), pages 1177-1231, August.
    46. Kjell Hausken & Mthuli Ncube, 2018. "Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal," African Development Review, African Development Bank, vol. 30(2), pages 219-232, June.
    47. Arne Bigsten, 2018. "Determinants of the Evolution of Inequality in Africa," Journal of African Economies, Centre for the Study of African Economies, vol. 27(1), pages 127-148.
    48. BANDA, Iges & WILLIAMS-ADEYANJU, Zainab & SKRAME, Dea, 2022. "Poverty, Education And Economic Growth: A Case Study Of Western Balkan Countries," Journal of Financial and Monetary Economics, Centre of Financial and Monetary Research "Victor Slavescu", vol. 10(1), pages 30-43, October.
    49. Simplice A. Asongu, 2015. "Rational Asymmetric Development: Transfer Mispricing and Sub-Saharan Africa’s Extreme Poverty Tragedy," Research Africa Network Working Papers 15/054, Research Africa Network (RAN).
    50. Egla Mansi & Eglantina Hysa & Mirela Panait & Marian Catalin Voica, 2020. "Poverty—A Challenge for Economic Development? Evidences from Western Balkan Countries and the European Union," Sustainability, MDPI, vol. 12(18), pages 1-24, September.
    51. Kwami Ossadzifo Wonyra & Tomgouani Lanie & Yacobou Sanoussi, 2021. "Effets Potentiels de Court‐terme de la Pandémie de la COVID‐19 sur la Pauvreté dans les Pays de l'Union Economique et Monétaire Ouest Africaine (UEMOA)," African Development Review, African Development Bank, vol. 33(S1), pages 60-74, April.
    52. Carr, Olivia G. & Jilani-Hyler, Nadia & Murray, Gregg R., 2022. "Identifying factors related to school closures due to COVID-19 in the Middle East and North Africa region," International Journal of Educational Development, Elsevier, vol. 90(C).
    53. Luciana Koprencka & Valbona Gjini & Redian Hysi, 2018. "Real Estate Market in Tirana," European Journal of Marketing and Economics Articles, Revistia Research and Publishing, vol. 1, May - Aug.
    54. R Varela & L Rodríguez-Díaz & M deCastro, 2020. "Persistent heat waves projected for Middle East and North Africa by the end of the 21st century," PLOS ONE, Public Library of Science, vol. 15(11), pages 1-18, November.
    55. Aynalem Shita & Nand Kumar & Seema Singh, 2021. "Technology, poverty and income distribution nexus: The case of fertilizer adoption in Ethiopia," African Development Review, African Development Bank, vol. 33(4), pages 742-755, December.
    56. Hakki Hakan Yilmaz & Ali Sertaç Kanaci, 2021. "Redistribution, Growth and Productivity Relationship in Fiscal Policy in Core and Peripheral Countries," Hacienda Pública Española / Review of Public Economics, IEF, vol. 238(3), pages 61-79, September.
    57. Jiquan Peng & Zihao Zhao & Lili Chen, 2022. "The Impact of High-Standard Farmland Construction Policy on Rural Poverty in China," Land, MDPI, vol. 11(9), pages 1-20, September.
    58. Marinko Škare & Sabina Lacmanovic, 2015. "Human capital and economic growth: a review essay," The AMFITEATRU ECONOMIC journal, Academy of Economic Studies - Bucharest, Romania, vol. 17(39), pages 735-735, May.
    59. Rasheed O. Alao & Andrew A. Alola, 2022. "The role of foreign aids and income inequality in poverty reduction: A sustainable development approach for Africa?," Journal of Social and Economic Development, Springer;Institute for Social and Economic Change, vol. 24(2), pages 456-469, December.

  49. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.

    Cited by:

    1. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    2. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    3. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    4. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    5. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    6. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    7. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    8. Gatmiry, Zohreh S. & Hafezalkotob, Ashkan & Khakzar bafruei, Morteza & Soltani, Roya, 2021. "Food web conservation vs. strategic threats: A security game approach," Ecological Modelling, Elsevier, vol. 442(C).
    9. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    10. Ryoji Makino & Kenju Akai & Jun-ichi Takeshita & Takanori Kudo & Keiko Aoki, 2021. "Effect of disclosing the relation between effort and unit reliability on system reliability: An economic experiment," PLOS ONE, Public Library of Science, vol. 16(4), pages 1-18, April.
    11. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    12. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).

  50. Kjell Hausken & Mthuli Ncube, 2014. "Political Economy of Service Delivery: Monitoring Versus Contestation," The Developing Economies, Institute of Developing Economies, vol. 52(1), pages 68-84, March.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2018. "Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal," African Development Review, African Development Bank, vol. 30(2), pages 219-232, June.

  51. Kjell Hausken, 2014. "Returns to information security investment: Endogenizing the expected loss," Information Systems Frontiers, Springer, vol. 16(2), pages 329-336, April.

    Cited by:

    1. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    2. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    3. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    4. Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 21(2), pages 261-300, April.
    5. Feng Xu & Xin (Robert) Luo & Hongyun Zhang & Shan Liu & Wei (Wayne) Huang, 2019. "Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect," Information Systems Frontiers, Springer, vol. 21(5), pages 1069-1083, October.
    6. Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
    7. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 0. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 0, pages 1-18.
    8. Tung-Hsien Wu & Shi-Ming Huang & Shaio Yan Huang & David C. Yen, 0. "The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance," Information Systems Frontiers, Springer, vol. 0, pages 1-16.
    9. Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
    10. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 2021. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 23(3), pages 773-790, June.
    11. Tung-Hsien Wu & Shi-Ming Huang & Shaio Yan Huang & David C. Yen, 2017. "The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance," Information Systems Frontiers, Springer, vol. 19(5), pages 1133-1148, October.
    12. Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan, 2019. "A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs," Information Systems Frontiers, Springer, vol. 21(5), pages 959-977, October.
    13. Yosra Miaoui & Noureddine Boudriga, 0. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 0, pages 1-40.
    14. Mahmud Akhter Shareef & Vinod Kumar & Yogesh K. Dwivedi & Uma Kumar, 2016. "Service delivery through mobile-government (mGov): Driving factors and cultural impacts," Information Systems Frontiers, Springer, vol. 18(2), pages 315-332, April.
    15. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

  52. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2013. "Individual vs. overarching protection for minimizing the expected damage caused by an attack," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 117-125.

    Cited by:

    1. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    2. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    4. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    5. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    6. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    7. Cao, Minhao & Guo, Jianjun & Xiao, Hui & Wu, Liang, 2022. "Reliability analysis and optimal generator allocation and protection strategy of a non-repairable power grid system," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    8. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    9. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.

  53. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.

    Cited by:

    1. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    2. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    3. Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2022. "Co-residence based data theft game in cloud system with virtual machine replication and cancellation," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    4. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    5. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    6. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    7. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    8. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimal early warning defense of N-version programming service against co-resident attacks in cloud system," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    9. Xing, Liudong & Levitin, Gregory, 2017. "Balancing theft and corruption threats by data partition in cloud system with independent server protection," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 248-254.
    10. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    11. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    12. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2021. "Minimization of Expected User Losses Considering Co-resident Attacks in Cloud System with Task Replication and Cancellation," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    13. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    14. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    15. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.

  54. Kjell Hausken, 2013. "Combined Series And Parallel Systems Subject To Individual Versus Overarching Defense And Attack," Asia-Pacific Journal of Operational Research (APJOR), World Scientific Publishing Co. Pte. Ltd., vol. 30(02), pages 1-33.

    Cited by:

    1. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    3. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    4. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    5. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
    6. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.

  55. Gregory Levitin & Kjell Hausken, 2013. "Parallel systems under two sequential attacks with contest intensity variation," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 21(1), pages 207-224, January.

    Cited by:

    1. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    2. Gregory Levitin & Maxim Finkelstein, 2017. "A new stress–strength model for systems subject to stochastic shocks," Journal of Risk and Reliability, , vol. 231(2), pages 172-179, April.

  56. Willigers, Bart J.A. & Hausken, Kjell, 2013. "The strategic interaction between the government and international oil companies in the UK: An example of a country with dwindling hydrocarbon reserves," Energy Policy, Elsevier, vol. 57(C), pages 276-286.

    Cited by:

    1. Felipe Costa Araujo & Alexandre Bevilacqua Leoneti, 2020. "Evaluating the Stability of the Oil and Gas Exploration and Production Regulatory Framework in Brazil," Group Decision and Negotiation, Springer, vol. 29(1), pages 143-156, February.

  57. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.

    Cited by:

    1. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
    2. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    3. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    4. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    5. Darvishan, Ayda & Lim, Gino J., 2021. "Dynamic network flow optimization for real-time evacuation reroute planning under multiple road disruptions," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    6. Nogal, Maria & O'Connor, Alan & Caulfield, Brian & Martinez-Pastor, Beatriz, 2016. "Resilience of traffic networks: From perturbation to recovery via a dynamic restricted equilibrium model," Reliability Engineering and System Safety, Elsevier, vol. 156(C), pages 84-96.
    7. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    8. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    9. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    10. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    11. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    12. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    13. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    14. Manxi Wu & Saurabh Amin, 2019. "Securing Infrastructure Facilities: When Does Proactive Defense Help?," Dynamic Games and Applications, Springer, vol. 9(4), pages 984-1025, December.
    15. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    16. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.

  58. Liv‐Helen Heggland & Aslaug Mikkelsen & Kjell Hausken, 2013. "Models, phases and cases of patient participation in decision‐making in surgical treatment in Norway: A qualitative study," Nursing & Health Sciences, John Wiley & Sons, vol. 15(1), pages 39-44, March.

    Cited by:

    1. Marja Härkänen & Marjo Kervinen & Jouni Ahonen & Hannele Turunen & Katri Vehviläinen‐Julkunen, 2015. "An observational study of how patients are identified before medication administrations in medical and surgical wards," Nursing & Health Sciences, John Wiley & Sons, vol. 17(2), pages 188-194, June.

  59. Levitin, Gregory & Hausken, Kjell & Ben Haim, Hanoch, 2013. "Defending majority voting systems against a strategic attacker," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 37-44.

    Cited by:

    1. Li, Yijia & Hu, Xiaoxiao & Zhao, Peng, 2021. "On the reliability of a voting system under cyber attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    2. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    3. Wang, Tai-Ran & Pedroni, Nicola & Zio, Enrico, 2016. "Identification of protective actions to reduce the vulnerability of safety-critical systems to malevolent acts: A sensitivity-based decision-making approach," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 9-18.
    4. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    5. Wu, Di & Liu, Xiang-dong & Yan, Xiang-bin & Peng, Rui & Li, Gang, 2019. "Equilibrium analysis of bitcoin block withholding attack: A generalized model," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 318-328.

  60. G Levitin & K Hausken, 2013. "Defence resource distribution between protection and decoys for constant resource stockpiling pace," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 64(9), pages 1409-1417, September.

    Cited by:

    1. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    3. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    4. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    5. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    6. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.

  61. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    3. Shitao Gong & Xin Gao & Zhou Li & Linyan Chen, 2021. "Developing a Dynamic Supervision Mechanism to Improve Construction Safety Investment Supervision Efficiency in China: Theoretical Simulation of Evolutionary Game Process," IJERPH, MDPI, vol. 18(7), pages 1-29, March.
    4. Liu, Yang & Cui, Na & Zhang, Jianghua, 2019. "Integrated temporary facility location and casualty allocation planning for post-disaster humanitarian medical service," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 128(C), pages 1-16.
    5. Chunlin Xin & Jianwen Zhang & Chia-Huei Wu & Sang-Bing Tsai, 2020. "Safety Investment Decision Problem without Probability Distribution: A Robust Optimization Approach," Mathematical Problems in Engineering, Hindawi, vol. 2020, pages 1-10, November.
    6. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    7. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    8. Zongjie Pi & Xin Gao & Linyan Chen & Jinghua Liu, 2019. "The New Path to Improve Construction Safety Performance in China: An Evolutionary Game Theoretic Approach," IJERPH, MDPI, vol. 16(13), pages 1-24, July.
    9. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    10. Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    11. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    12. Wenxin Su & Xin Gao & Yukun Jiang & Jinrong Li, 2021. "Developing a Construction Safety Standard System to Enhance Safety Supervision Efficiency in China: A Theoretical Simulation of the Evolutionary Game Process," Sustainability, MDPI, vol. 13(23), pages 1-22, December.
    13. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    14. Liangdong Lu & Hong Huang & Jiuchang Wei & Jia Xu, 2020. "Safety Regulations and the Uncertainty of Work‐Related Road Accident Loss: The Triple Identity of Chinese Local Governments Under Principal–Agent Framework," Risk Analysis, John Wiley & Sons, vol. 40(6), pages 1168-1182, June.
    15. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    16. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
    17. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    18. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
    19. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.
    20. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    21. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

  62. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.

    Cited by:

    1. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.
    2. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.

  63. G Levitin & K Hausken, 2012. "Parallel systems under two sequential attacks with imperfect detection of the first attack outcome," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(11), pages 1545-1555, November.

    Cited by:

    1. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    2. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    3. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    4. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.

  64. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
    3. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    4. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    5. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    6. Krishna Kalyanam & David Casbeer & Meir Pachter, 2020. "A sequential partial information bomber‐defender shooting problem," Naval Research Logistics (NRL), John Wiley & Sons, vol. 67(3), pages 223-235, April.
    7. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    8. Ding, Weiyong & Xu, Maochao & Huang, Yu & Zhao, Peng, 2020. "Cyber risks of PMU networks with observation errors: Assessment and mitigation," Reliability Engineering and System Safety, Elsevier, vol. 198(C).
    9. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    10. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    11. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    12. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.

  65. Kjell Hausken, 2012. "On The Impossibility Of Deterrence In Sequential Colonel Blotto Games," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 14(02), pages 1-13.

    Cited by:

    1. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    2. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    3. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.
    4. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    5. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.

  66. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.

    Cited by:

    1. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    2. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimal early warning defense of N-version programming service against co-resident attacks in cloud system," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    3. Chołda, Piotr & Følstad, Eirik L. & Helvik, Bjarne E. & Kuusela, Pirkko & Naldi, Maurizio & Norros, Ilkka, 2013. "Towards risk-aware communications networking," Reliability Engineering and System Safety, Elsevier, vol. 109(C), pages 160-174.
    4. Luo, Liang & Xing, Liudong & Levitin, Gregory, 2019. "Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks," Reliability Engineering and System Safety, Elsevier, vol. 192(C).
    5. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    6. Heping Jia & Rui Peng & Yi Ding & Changzheng Shao, 2020. "Reliability analysis of distributed storage systems considering data loss and theft," Journal of Risk and Reliability, , vol. 234(2), pages 303-321, April.
    7. Xing, Liudong & Levitin, Gregory, 2017. "Balancing theft and corruption threats by data partition in cloud system with independent server protection," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 248-254.
    8. Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2018. "Co-residence based data vulnerability vs. security in cloud computing system with random server assignment," European Journal of Operational Research, Elsevier, vol. 267(2), pages 676-686.
    9. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimization of time constrained N-version programming service components with competing task execution and version corruption processes," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    10. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    11. Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    12. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    13. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

  67. Kjell Hausken, 2012. "The economics of terrorism against two targets," Applied Economics Letters, Taylor & Francis Journals, vol. 19(12), pages 1135-1138, August.

    Cited by:

    1. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    2. Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
    3. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    4. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    5. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.

  68. Hausken, Kjell, 2012. "On the inappropriateness of collective rent seeking analysis when agents exert within-group and between-group efforts," Economics Letters, Elsevier, vol. 116(3), pages 504-507.

    Cited by:

    1. Chen, Hong & Feng, Qun & Cao, Jing, 2014. "Rent-seeking mechanism for safety supervision in the Chinese coal industry based on a tripartite game model," Energy Policy, Elsevier, vol. 72(C), pages 140-145.
    2. Osório, António (António Miguel), 2018. "Group contest success function: The heterogeneous individuals case," Working Papers 2072/332583, Universitat Rovira i Virgili, Department of Economics.
    3. Christoph March & Marco Sahm, 2021. "Parochial altruism and the absence of the group size paradox in inter-group conflicts," Economics Bulletin, AccessEcon, vol. 41(2), pages 361-373.
    4. Feng, Qun & Shi, Xuejun & Zhang, Jianghua, 2019. "Influence of rent-seeking on safety supervision in Chinese construction: Based on a simulation technology," Technological Forecasting and Social Change, Elsevier, vol. 138(C), pages 1-9.
    5. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.

  69. K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Kjell Hausken, 2020. "Additive multi-effort contests," Theory and Decision, Springer, vol. 89(2), pages 203-248, September.
    3. Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.
    4. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    5. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    6. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    7. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    8. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    9. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    10. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    11. Song, Yu & Chen, Bo & Hou, Na & Yang, Yi, 2022. "Terrorist attacks and oil prices: A time-varying causal relationship analysis," Energy, Elsevier, vol. 246(C).
    12. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    13. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    14. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    15. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    16. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    17. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    18. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    19. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    20. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    21. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    22. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.
    23. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    24. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    25. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    26. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    27. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    28. Hausken, Kjell, 2016. "Axiomatization of Group Contest Success Functions," UiS Working Papers in Economics and Finance 2016/8, University of Stavanger.
    29. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    30. Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.
    31. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    32. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    33. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.

  70. G Levitin & K Hausken, 2012. "Individual versus overarching protection against strategic attacks," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(7), pages 969-981, July.

    Cited by:

    1. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    2. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    4. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    5. Peng, Rui & Wu, Di & Xiao, Hui & Xing, Liudong & Gao, Kaiye, 2019. "Redundancy versus protection for a non-reparable phased-mission system subject to external impacts," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    6. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2013. "Individual vs. overarching protection for minimizing the expected damage caused by an attack," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 117-125.
    7. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    8. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    9. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    10. Levitin, Gregory & Xing, Liudong & Dai, Yanshun, 2021. "Security and reliability of N-version cloud-based task solvers with individual version cancellation under data theft attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    11. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
    12. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    13. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    14. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    15. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.

  71. John F. Moxnes & Kjell Hausken, 2012. "Mathematical modelling of acute virus influenza A infections," Mathematical and Computer Modelling of Dynamical Systems, Taylor & Francis Journals, vol. 18(5), pages 521-538, February.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2020. "Game theoretic analysis of persons, the pharmaceutical industry, and donors in disease contraction and recovery," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-17, December.

  72. Knut Arne Sund & Kjell Hausken, 2012. "Fixed price contract versus incentive-based contract in the oil and gas industry," International Journal of Global Energy Issues, Inderscience Enterprises Ltd, vol. 35(5), pages 371-410.

    Cited by:

    1. Jun Tu & Liangdong Wan & Zijiao Sun, 2023. "Safety Improvement of Sustainable Coal Transportation in Mines: A Contract Design Perspective," Sustainability, MDPI, vol. 15(3), pages 1-21, January.

  73. Kjell Hausken, 2012. "Production versus safety in a risky competitive industry," International Journal of Decision Sciences, Risk and Management, Inderscience Enterprises Ltd, vol. 4(1/2), pages 92-107.

    Cited by:

    1. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.

  74. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    See citations under working paper version above.
  75. Kjell Hausken, 2011. "Production, safety, exchange, and risk," International Journal of Business Continuity and Risk Management, Inderscience Enterprises Ltd, vol. 2(4), pages 346-350.

    Cited by:

    1. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    2. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).

  76. Kjell Hausken, 2011. "Protecting complex infrastructures against multiple strategic attackers," International Journal of Systems Science, Taylor & Francis Journals, vol. 42(1), pages 11-29.

    Cited by:

    1. Alcantara-Jiménez, Guillermo & Clempner, Julio B., 2020. "Repeated Stackelberg security games: Learning with incomplete state information," Reliability Engineering and System Safety, Elsevier, vol. 195(C).
    2. Li, Yijia & Hu, Xiaoxiao & Zhao, Peng, 2021. "On the reliability of a voting system under cyber attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    3. Siva Sivatha Sindhu & S. Geetha & A. Kannan, 2012. "Evolving optimised decision rules for intrusion detection using particle swarm paradigm," International Journal of Systems Science, Taylor & Francis Journals, vol. 43(12), pages 2334-2350.
    4. D E Salazar A & C M Rocco S & E Zio, 2008. "Optimal protection of complex networks exposed to a terrorist hazard: A multi-objective evolutionary approach," Journal of Risk and Reliability, , vol. 222(3), pages 327-335, September.
    5. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    6. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    7. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    8. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    9. Nicholas T. Boardman & Brian J. Lunday & Matthew J. Robbins, 2017. "Heterogeneous surface-to-air missile defense battery location: a game theoretic approach," Journal of Heuristics, Springer, vol. 23(6), pages 417-447, December.
    10. Zhang, C. & Liu, X. & Jiang, YP. & Fan, B. & Song, X., 2016. "A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis," European Journal of Operational Research, Elsevier, vol. 250(3), pages 855-864.
    11. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    12. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    13. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    14. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    15. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    16. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    17. Mumtaz Karatas & Ertan Yakıcı & Abdullah Dasci, 2022. "Solving a bi-objective unmanned aircraft system location-allocation problem," Annals of Operations Research, Springer, vol. 319(2), pages 1631-1654, December.
    18. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    19. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    20. Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
    21. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    22. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    23. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    24. Jalali, Sajjad & Seifbarghy, Mehdi & Niaki, Seyed Taghi Akhavan, 2018. "A risk-averse location-protection problem under intentional facility disruptions: A modified hybrid decomposition algorithm," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 114(C), pages 196-219.
    25. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    26. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    27. Wenping Xu & Zongjun Wang & Liu Hong & Ligang He & Xueguang Chen, 2015. "The uncertainty recovery analysis for interdependent infrastructure systems using the dynamic inoperability input–output model," International Journal of Systems Science, Taylor & Francis Journals, vol. 46(7), pages 1299-1306, May.
    28. Oléron Evans, Thomas P. & Bishop, Steven R., 2013. "Static search games played over graphs and general metric spaces," European Journal of Operational Research, Elsevier, vol. 231(3), pages 667-689.
    29. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    30. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    31. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
    32. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    33. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    34. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    35. Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
    36. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.
    37. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.

  77. Kjell Hausken & Jun Zhuang, 2011. "Defending Against a Stockpiling Terrorist," The Engineering Economist, Taylor & Francis Journals, vol. 56(4), pages 321-353.

    Cited by:

    1. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    2. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    3. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    4. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    5. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    6. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    7. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    8. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.

  78. Kjell Hausken, 2011. "Production, safety, fighting, and risk," International Journal of Business Continuity and Risk Management, Inderscience Enterprises Ltd, vol. 2(4), pages 324-329.

    Cited by:

    1. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    2. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).

  79. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.

    Cited by:

    1. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    3. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    4. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    5. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    6. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).

  80. Marianne Storm & Knud Knudsen & Larry Davidson & Kjell Hausken & Jan Johannessen, 2011. ""Service user involvement in practice": The evaluation of an intervention program for service providers and inpatients in Norwegian Community Mental Health Centers," Psychosis, Taylor & Francis Journals, vol. 3(1), pages 29-40.

    Cited by:

    1. Marit By Rise & Aslak Steinsbekk, 2016. "Long Term Effect on Professionals’ Knowledge, Practice and Attitudes towards User Involvement Four Years after Implementing an Organisational Development Plan: A Controlled Study," PLOS ONE, Public Library of Science, vol. 11(3), pages 1-18, March.

  81. Kjell Hausken, 2011. "Strategic defense and attack of series systems when agents move sequentially," IISE Transactions, Taylor & Francis Journals, vol. 43(7), pages 483-504.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Brian Lunday & Hanif Sherali, 2012. "Network interdiction to minimize the maximum probability of evasion with synergy between applied resources," Annals of Operations Research, Springer, vol. 196(1), pages 411-442, July.
    3. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    4. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    5. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    6. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    7. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    8. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    9. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    10. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    11. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    12. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    13. Nageswara S. V. Rao & Chris Y. T. Ma & Fei He & David K. Y. Yau & Jun Zhuang, 2018. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures," Games, MDPI, vol. 9(3), pages 1-24, July.
    14. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.

  82. Kjell Hausken, 2011. "Game Theoretic Analysis Of Two-Period-Dependent Degraded Multistate Reliability Systems," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 13(03), pages 247-267.

    Cited by:

    1. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

  83. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.

    Cited by:

    1. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    2. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    3. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    4. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    5. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    6. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    7. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    8. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    9. Frank Yeong-Sung Lin & Yu-Shun Wang & Ming-Yang Huang, 2013. "Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-11, August.
    10. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

  84. Marianne Storm & Kjell Hausken & Knud Knudsen, 2011. "Inpatient service providers’ perspectives on service user involvement in Norwegian community mental health centres," International Journal of Social Psychiatry, , vol. 57(6), pages 551-563, November.

    Cited by:

    1. Marit By Rise & Aslak Steinsbekk, 2016. "Long Term Effect on Professionals’ Knowledge, Practice and Attitudes towards User Involvement Four Years after Implementing an Organisational Development Plan: A Controlled Study," PLOS ONE, Public Library of Science, vol. 11(3), pages 1-18, March.

  85. Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.

    Cited by:

    1. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    2. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
    3. Anelí Bongers & José L. Torres, 2021. "A bottleneck combat model: an application to the Battle of Thermopylae," Operational Research, Springer, vol. 21(4), pages 2859-2877, December.
    4. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    5. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    6. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    7. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    8. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.

  86. Kjell Hausken & Gregory Levitin, 2011. "Active Vs. Passive Defense Against A Strategic Attacker," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 13(01), pages 1-12.

    Cited by:

    1. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    2. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    3. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    4. McCarter, Matthew & Barker, Kash & Johansson, Jonas & Ramirez-Marquez, Jose E., 2018. "A bi-objective formulation for robust defense strategies in multi-commodity networks," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 154-161.
    5. Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.

  87. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    3. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    4. Jorge González-Ortega & Refik Soyer & David Ríos Insua & Fabrizio Ruggeri, 2021. "An Adversarial Risk Analysis Framework for Batch Acceptance Problems," Decision Analysis, INFORMS, vol. 18(1), pages 25-40, March.
    5. Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
    6. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    7. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    8. Fabrizio Baiardi & Daniele Sgandurra, 2013. "Assessing ICT risk through a Monte Carlo method," Environment Systems and Decisions, Springer, vol. 33(4), pages 486-499, December.
    9. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    10. Deck, Cary & Sheremeta, Roman, 2015. "Tug-of-War in the Laboratory," MPRA Paper 67521, University Library of Munich, Germany.
    11. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    12. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    13. Fabrizio Baiardi & Federico Tonelli & Alessandro Bertolini, 2015. "Iterative selection of countermeasures for intelligent threat agents," International Journal of Network Management, John Wiley & Sons, vol. 25(5), pages 340-354, September.
    14. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    15. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    16. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    17. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    18. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    19. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    20. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    21. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    22. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    23. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    24. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    25. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    26. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    27. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    28. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    29. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    30. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    31. Ioannidis, Christos & Pym, David & Williams, Julian, 2012. "Information security trade-offs and optimal patching policies," European Journal of Operational Research, Elsevier, vol. 216(2), pages 434-444.
    32. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    33. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    34. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    35. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    36. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    37. Ratul Lahkar & Rezina Sultana, 2023. "Rent dissipation in large population Tullock contests," Public Choice, Springer, vol. 197(1), pages 253-282, October.
    38. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    39. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    40. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.
    41. Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.

  88. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.

    Cited by:

    1. Li, Yijia & Hu, Xiaoxiao & Zhao, Peng, 2021. "On the reliability of a voting system under cyber attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    2. Kaiye Gao & Hui Xiao & Li Qu & Shouyang Wang, 2022. "Optimal interception strategy of air defence missile system considering multiple targets and phases," Journal of Risk and Reliability, , vol. 236(1), pages 138-147, February.
    3. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    4. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    5. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    6. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    7. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.

  89. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.

    Cited by:

    1. Kevin S. Ni & Daniel Faissol & Thomas Edmunds & Richard Wheeler, 2013. "Exploitation of Ambiguous Cues to Infer Terrorist Activity," Decision Analysis, INFORMS, vol. 10(1), pages 42-62, March.
    2. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    3. L. Robin Keller & Kelly M. Kophazi, 2011. "From the Editors---Deterrence, Multiattribute Utility, and Probability and Bayes' Updating," Decision Analysis, INFORMS, vol. 8(2), pages 83-87, June.
    4. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    5. Liles, Joseph M. & Robbins, Matthew J. & Lunday, Brian J., 2023. "Improving defensive air battle management by solving a stochastic dynamic assignment problem via approximate dynamic programming," European Journal of Operational Research, Elsevier, vol. 305(3), pages 1435-1449.
    6. Rakesh K. Sarin & L. Robin Keller, 2013. "From the Editors: Probability Approximations, Anti-Terrorism Strategy, and Bull's-Eye Display for Performance Feedback," Decision Analysis, INFORMS, vol. 10(1), pages 1-5, March.
    7. Jason R. W. Merrick & Fabrizio Ruggeri & Refik Soyer & L. Robin Keller, 2012. "From the Editors---Games and Decisions in Reliability and Risk," Decision Analysis, INFORMS, vol. 9(2), pages 81-85, June.
    8. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    9. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    10. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    11. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    12. Song, Yu & Chen, Bo & Hou, Na & Yang, Yi, 2022. "Terrorist attacks and oil prices: A time-varying causal relationship analysis," Energy, Elsevier, vol. 246(C).
    13. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    14. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    15. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    16. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    17. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    18. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    19. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    20. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    21. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    22. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    23. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
    24. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    25. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    26. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    27. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    28. Fei He & Jun Zhuang & Nageswara S. V. Rao, 2020. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems," Annals of Operations Research, Springer, vol. 294(1), pages 741-767, November.
    29. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    30. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    31. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    32. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    33. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    34. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    35. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    36. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    37. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    38. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    39. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.
    40. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

  90. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.

    Cited by:

    1. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    2. Julei Fu & Duoyong Sun & Jian Chai & Jin Xiao & Shouyang Wang, 2015. "The “six-element” analysis method for the research on the characteristics of terrorist activities," Annals of Operations Research, Springer, vol. 234(1), pages 17-35, November.
    3. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    4. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    5. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    6. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    7. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    8. Song, Yu & Chen, Bo & Hou, Na & Yang, Yi, 2022. "Terrorist attacks and oil prices: A time-varying causal relationship analysis," Energy, Elsevier, vol. 246(C).
    9. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    10. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    11. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    12. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    13. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    14. Hamid Mohtadi, 2017. "Risk‐Mitigating Policies and Adversarial Behavior: Case of Backlash," Risk Analysis, John Wiley & Sons, vol. 37(3), pages 459-470, March.
    15. Hamid Mohtadi & Bryan Weber, 2019. "Terrorism risk and optimal policy response: theory and empirics," Indian Growth and Development Review, Emerald Group Publishing Limited, vol. 13(2), pages 449-468, October.
    16. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    17. Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
    18. Jaspersen, Johannes G. & Montibeller, Gilberto, 2020. "On the learning patterns and adaptive behavior of terrorist organizations," European Journal of Operational Research, Elsevier, vol. 282(1), pages 221-234.
    19. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    20. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.

  91. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.

    Cited by:

    1. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    2. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    3. Kaiye Gao & Hui Xiao & Li Qu & Shouyang Wang, 2022. "Optimal interception strategy of air defence missile system considering multiple targets and phases," Journal of Risk and Reliability, , vol. 236(1), pages 138-147, February.
    4. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    5. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.

  92. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.

    Cited by:

    1. Eyal Pecht & Asher Tishler, 2017. "Budget allocation, national security, military intelligence, and human capital: a dynamic model," Defence and Peace Economics, Taylor & Francis Journals, vol. 28(3), pages 367-399, May.
    2. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    5. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    6. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    7. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    8. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    9. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    10. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    11. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    12. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    13. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    14. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    15. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    16. Losada, Chaya & Scaparra, M. Paola & O’Hanley, Jesse R., 2012. "Optimizing system resilience: A facility protection model with recovery time," European Journal of Operational Research, Elsevier, vol. 217(3), pages 519-530.
    17. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.

  93. K Hausken & G Levitin, 2010. "Defence of homogeneous parallel multi-state systems subject to two sequential attacks," Journal of Risk and Reliability, , vol. 224(3), pages 171-183, September.

    Cited by:

    1. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    2. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    3. Yun Zhang & Zhengguo Xu & Xinli Wang & Jiangang Lu & Youxian Sun, 2014. "Single minimal path based backup path for multi-state network," Journal of Risk and Reliability, , vol. 228(2), pages 152-165, April.
    4. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    5. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    6. J Setréus & D Månsson & P Hilber & S Arnborg, 2012. "Component ranking in Great Britain transmission system based on either equipment failures or sabotage," Journal of Risk and Reliability, , vol. 226(1), pages 96-108, February.

  94. Alnoor Bhimani & Kjell Hausken & Mthuli Ncube, 2010. "Agent takeover risk of principal in outsourcing relationships," Global Business and Economics Review, Inderscience Enterprises Ltd, vol. 12(4), pages 329-340.
    See citations under working paper version above.
  95. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.

    Cited by:

    1. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    2. Levitin, Gregory & Xing, Liudong & Amari, Suprasad V. & Dai, Yuanshun, 2013. "Reliability of non-repairable phased-mission systems with propagated failures," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 218-228.
    3. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    4. Hiba Baroud & Kash Barker & Jose E. Ramirez‐Marquez & Claudio M. Rocco, 2015. "Inherent Costs and Interdependent Impacts of Infrastructure Network Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 642-662, April.
    5. Levitin, Gregory & Finkelstein, Maxim, 2017. "Effect of element separation in series-parallel systems exposed to random shocks," European Journal of Operational Research, Elsevier, vol. 260(1), pages 305-315.
    6. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    7. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    8. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    9. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

  96. Kjell Hausken, 2010. "Risk, production and conflict when utilities are as if certain," International Journal of Decision Sciences, Risk and Management, Inderscience Enterprises Ltd, vol. 2(3/4), pages 228-251.

    Cited by:

    1. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    2. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    3. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    4. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    5. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    6. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    7. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    8. Kjell Hausken & Mthuli Ncube, 2016. "How Elections are Impacted by Production, Economic Growth and Conflict," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 18(01), pages 1-29, March.
    9. Hausken, Kjell & Ncube, Mthuli, 2012. "Production and Conflict in Risky Elections," UiS Working Papers in Economics and Finance 2012/14, University of Stavanger.

  97. Kjell Hausken, 2010. "Whether to attack growing assets and enterprises today or tomorrow," International Journal of Business Continuity and Risk Management, Inderscience Enterprises Ltd, vol. 1(4), pages 339-362.

    Cited by:

    1. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.

  98. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics - The Open-Access, Open-Assessment E-Journal (2007-2020), Kiel Institute for the World Economy (IfW Kiel), vol. 4, pages 1-38.
    See citations under working paper version above.
  99. Kjell Hausken & John F. Moxnes, 2010. "A closure approximation technique for epidemic models," Mathematical and Computer Modelling of Dynamical Systems, Taylor & Francis Journals, vol. 16(6), pages 555-574, May.

    Cited by:

    1. Hausken, Kjell & Moxnes, John F., 2011. "Systematization of a set of closure techniques," Theoretical Population Biology, Elsevier, vol. 80(3), pages 175-184.

  100. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.

    Cited by:

    1. Christopher Garcia, 2018. "Optimal multiunit transfer over adversarial paths with increasing intercept probabilities," IISE Transactions, Taylor & Francis Journals, vol. 50(11), pages 989-996, November.
    2. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    3. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    4. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    5. Wang, Shuliang & Hong, Liu & Chen, Xueguang, 2012. "Vulnerability analysis of interdependent infrastructure systems: A methodological framework," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 391(11), pages 3323-3335.
    6. Fabrizio Baiardi & Daniele Sgandurra, 2013. "Assessing ICT risk through a Monte Carlo method," Environment Systems and Decisions, Springer, vol. 33(4), pages 486-499, December.
    7. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    8. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    9. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    10. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    11. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    12. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    13. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    14. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    15. Lalropuia, K.C. & Gupta, Vandana, 2019. "Modeling cyber-physical attacks based on stochastic game and Markov processes," Reliability Engineering and System Safety, Elsevier, vol. 181(C), pages 28-37.
    16. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    17. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    18. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    19. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    20. Fang, Yi-Ping & Zio, Enrico, 2019. "An adaptive robust framework for the optimization of the resilience of interdependent infrastructures under natural hazards," European Journal of Operational Research, Elsevier, vol. 276(3), pages 1119-1136.
    21. Zhang, Jianhua & Song, Bo & Zhang, Zhaojun & Liu, Haikuan, 2014. "An approach for modeling vulnerability of the network of networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 412(C), pages 127-136.
    22. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    23. Oléron Evans, Thomas P. & Bishop, Steven R., 2013. "Static search games played over graphs and general metric spaces," European Journal of Operational Research, Elsevier, vol. 231(3), pages 667-689.
    24. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    25. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    26. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    27. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    28. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    29. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.
    30. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.
    31. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

  101. Marianne Storm & Kjell Hausken & Aslaug Mikkelsen, 2010. "User involvement in in‐patient mental health services: operationalisation, empirical testing, and validation," Journal of Clinical Nursing, John Wiley & Sons, vol. 19(13‐14), pages 1897-1907, July.

    Cited by:

    1. Marianne Storm & Kjell Hausken & Knud Knudsen, 2011. "Inpatient service providers’ perspectives on service user involvement in Norwegian community mental health centres," International Journal of Social Psychiatry, , vol. 57(6), pages 551-563, November.

  102. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.

    Cited by:

    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    3. Cary Deck & Roman Sheremeta, 2010. "Fight or Flight? Defending Against Sequential Attacks in the Game of Siege," Working Papers 10-20, Chapman University, Economic Science Institute.
    4. Brian A Jackson & David R Frelinger & Jennifer Kavanagh & Brett A Wallace, 2021. "Adaptation by intelligent adversaries to defensive measures: framing adaptation options and demonstrating assessment of attacker preferences using proxy intelligence data," The Journal of Defense Modeling and Simulation, , vol. 18(2), pages 61-85, April.
    5. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    6. Hao Jia & Stergios Skaperdas & Samarth Vaidya, 2012. "Contest Functions: Theoretical Foundations and Issues in Estimation," Working Papers 111214, University of California-Irvine, Department of Economics.
    7. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    8. Hannah Lobban & Yasser Almoghathawi & Nazanin Morshedlou & Kash Barker, 2021. "Community vulnerability perspective on robust protection planning in interdependent infrastructure networks," Journal of Risk and Reliability, , vol. 235(5), pages 798-813, October.
    9. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    10. Pei-Yu Chen & Frank Yeong-Sung Lin, 2013. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-9, September.
    11. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    12. Shakun D. Mago & Roman M. Sheremeta, 2017. "Multi‐battle Contests: An Experimental Study," Southern Economic Journal, John Wiley & Sons, vol. 84(2), pages 407-425, October.
    13. Deck, Cary & Sheremeta, Roman, 2012. "Fight or Flight?," MPRA Paper 52130, University Library of Munich, Germany.
    14. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    15. Baba Yumiko, 2012. "A Note on a Comparison of Simultaneous and Sequential Colonel Blotto Games," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 18(3), pages 1-6, December.
    16. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    17. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    18. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    19. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    20. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    21. Asma Ben Yaghlane & Mohamed Naceur Azaiez, 2019. "System survivability to continuous attacks: A game theoretic setting for constant attack rate processes," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(8), pages 1308-1320, August.

  103. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.

    Cited by:

    1. B. S. Mahapatra & G. S. Mahapatra, 2010. "Reliability and cost analysis of series system models using fuzzy parametric geometric programming," Fuzzy Information and Engineering, Springer, vol. 2(4), pages 399-411, December.
    2. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    5. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    6. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    7. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    8. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    9. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    10. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    11. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    12. Pei-Yu Chen & Frank Yeong-Sung Lin, 2013. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-9, September.
    13. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    14. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    15. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    16. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    17. Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.
    18. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    19. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    20. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    21. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    22. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    23. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    24. Frank Yeong-Sung Lin & Yu-Shun Wang & Ming-Yang Huang, 2013. "Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-11, August.
    25. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    26. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    27. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    28. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    29. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    30. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.

  104. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.

    Cited by:

    1. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    2. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    4. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    5. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    6. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    7. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    8. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    9. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    10. William N. Caballero & Ethan Gharst & David Banks & Jeffery D. Weir, 2023. "Multipolar Security Cooperation Planning: A Multiobjective, Adversarial-Risk-Analysis Approach," Decision Analysis, INFORMS, vol. 20(1), pages 16-39, March.
    11. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    12. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    13. Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
    14. B. Golany & N. Goldberg & U. Rothblum, 2015. "Allocating multiple defensive resources in a zero-sum game setting," Annals of Operations Research, Springer, vol. 225(1), pages 91-109, February.
    15. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    16. Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
    17. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    18. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    19. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    20. Ghostine, Rony & Thiriet, Jean-Marc & Aubry, Jean-François, 2011. "Variable delays and message losses: Influence on the reliability of a control loop," Reliability Engineering and System Safety, Elsevier, vol. 96(1), pages 160-171.

  105. Gregory Levitin & Kjell Hausken, 2009. "Intelligence and Impact Contests in Systems with Fake Targets," Defense & Security Analysis, Taylor & Francis Journals, vol. 25(2), pages 157-173, June.

    Cited by:

    1. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    2. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    3. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    4. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    5. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    6. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    7. Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
    8. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    9. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    10. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    11. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    12. Ghostine, Rony & Thiriet, Jean-Marc & Aubry, Jean-François, 2011. "Variable delays and message losses: Influence on the reliability of a control loop," Reliability Engineering and System Safety, Elsevier, vol. 96(1), pages 160-171.

  106. K Hausken & G Levitin, 2009. "Parallel systems with different types of defence resource expenditure under two sequential attacks," Journal of Risk and Reliability, , vol. 223(1), pages 71-85, March.

    Cited by:

    1. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    2. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.
    3. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    4. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    5. Xuefeng Wang & Zhinan Wang & Ying Huang & Yun Chen & Yi Zhang & Huichao Ren & Rongrong Li & Jinhui Pang, 2017. "Measuring interdisciplinarity of a research system: detecting distinction between publication categories and citation categories," Scientometrics, Springer;Akadémiai Kiadó, vol. 111(3), pages 2023-2039, June.
    6. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    7. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    8. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.

  107. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.

    Cited by:

    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    3. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    4. Liles, Joseph M. & Robbins, Matthew J. & Lunday, Brian J., 2023. "Improving defensive air battle management by solving a stochastic dynamic assignment problem via approximate dynamic programming," European Journal of Operational Research, Elsevier, vol. 305(3), pages 1435-1449.
    5. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    6. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    7. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    8. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    9. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    10. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    11. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    12. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    13. Welburn, Jonathan & Grana, Justin & Schwindt, Karen, 2023. "Cyber deterrence with imperfect attribution and unverifiable signaling," European Journal of Operational Research, Elsevier, vol. 306(3), pages 1399-1416.
    14. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    15. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    16. X. Chen & J.-Z. Xu, 2013. "A novel method for waveform jamming based on millimeter-wave alternating current radiometer," Journal of Electromagnetic Waves and Applications, Taylor & Francis Journals, vol. 27(1), pages 66-76, January.
    17. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    18. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    19. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    20. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    21. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    22. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    23. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    24. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    25. Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
    26. Frank Yeong-Sung Lin & Yu-Shun Wang & Ming-Yang Huang, 2013. "Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-11, August.
    27. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    28. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    29. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    30. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    31. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    32. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    33. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    34. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.

  108. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.

    Cited by:

    1. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    2. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    3. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    4. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    5. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    6. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    7. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    8. Fei He & Jun Zhuang & Nageswara S. V. Rao, 2020. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems," Annals of Operations Research, Springer, vol. 294(1), pages 741-767, November.
    9. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    10. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    11. Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
    12. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    13. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.

  109. John F. Moxnes & Kjell Hausken, 2009. "A dynamic model of Nordic diagonal stride skiing, with a literature review of cross country skiing," Computer Methods in Biomechanics and Biomedical Engineering, Taylor & Francis Journals, vol. 12(5), pages 531-551.

    Cited by:

    1. Peter Carlsson & Mats Tinnsten & Mats Ainegren, 2011. "Numerical simulation of cross-country skiing," Computer Methods in Biomechanics and Biomedical Engineering, Taylor & Francis Journals, vol. 14(08), pages 741-746.
    2. Kjell Hausken, 2017. "Exhaustive Classification and Review of Techniques and Research Program for Techniques for Skate Skiing, Classical Skiing, and Ski Mountaineering," The Open Sports Sciences Journal, Bentham Open, vol. 10(1), pages 160-178, October.

  110. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.

    Cited by:

    1. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    2. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    3. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    4. Wang, Wei & Di Maio, Francesco & Zio, Enrico, 2020. "Considering the human operator cognitive process for the interpretation of diagnostic outcomes related to component failures and cyber security attacks," Reliability Engineering and System Safety, Elsevier, vol. 202(C).
    5. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    6. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    7. Pei-Yu Chen & Frank Yeong-Sung Lin, 2013. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-9, September.
    8. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    9. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    10. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    11. Xuefeng Wang & Zhinan Wang & Ying Huang & Yun Chen & Yi Zhang & Huichao Ren & Rongrong Li & Jinhui Pang, 2017. "Measuring interdisciplinarity of a research system: detecting distinction between publication categories and citation categories," Scientometrics, Springer;Akadémiai Kiadó, vol. 111(3), pages 2023-2039, June.
    12. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    13. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    14. Gregory Levitin & Kjell Hausken, 2013. "Parallel systems under two sequential attacks with contest intensity variation," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 21(1), pages 207-224, January.
    15. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    16. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    17. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    18. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    19. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    20. Asma Ben Yaghlane & Mohamed Naceur Azaiez, 2019. "System survivability to continuous attacks: A game theoretic setting for constant attack rate processes," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(8), pages 1308-1320, August.
    21. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.

  111. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.

    Cited by:

    1. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2011. "Evaluating the damage associated with intentional network disintegration," Reliability Engineering and System Safety, Elsevier, vol. 96(4), pages 433-439.
    2. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    3. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    4. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    5. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    6. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2013. "Evaluating the damage associated with intentional supply deprivation in multi-commodity network," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 11-17.
    7. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    8. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    9. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    10. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    11. McCarter, Matthew & Barker, Kash & Johansson, Jonas & Ramirez-Marquez, Jose E., 2018. "A bi-objective formulation for robust defense strategies in multi-commodity networks," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 154-161.

  112. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.

    Cited by:

    1. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    2. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    3. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    4. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    5. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    6. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    7. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    8. Kaiye Gao & Hui Xiao & Li Qu & Shouyang Wang, 2022. "Optimal interception strategy of air defence missile system considering multiple targets and phases," Journal of Risk and Reliability, , vol. 236(1), pages 138-147, February.
    9. Wu, Di & Liu, Xiang-dong & Yan, Xiang-bin & Peng, Rui & Li, Gang, 2019. "Equilibrium analysis of bitcoin block withholding attack: A generalized model," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 318-328.
    10. Reniers, Genserik & Soudan, Karel, 2010. "A game-theoretical approach for reciprocal security-related prevention investment decisions," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 1-9.
    11. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    12. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    13. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    14. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    15. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    16. Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
    17. Wu Jun & Yang Hui & Cheng Yuan, 2015. "Domino Effect Analysis, Assessment and Prevention in Process Industries," Journal of Systems Science and Information, De Gruyter, vol. 3(6), pages 481-498, December.
    18. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    19. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    20. Henry, Devanandham & Emmanuel Ramirez-Marquez, Jose, 2012. "Generic metrics and quantitative approaches for system resilience as a function of time," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 114-122.
    21. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    22. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    23. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    24. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    25. Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
    26. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    27. Guozhen Xiong & Chi Zhang & Fei Zhou, 2017. "A robust reliability redundancy allocation problem under abnormal external failures guided by a new importance measure," Journal of Risk and Reliability, , vol. 231(2), pages 180-199, April.
    28. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    29. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    30. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    31. Sayed, Ahmed R. & Wang, Cheng & Bi, Tianshu, 2019. "Resilient operational strategies for power systems considering the interactions with natural gas systems," Applied Energy, Elsevier, vol. 241(C), pages 548-566.
    32. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    33. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    34. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    35. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    36. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    37. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    38. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    39. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    40. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    41. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    42. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    43. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    44. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    45. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    46. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    47. Li, Xingyu & Epureanu, Bogdan I., 2020. "AI-based competition of autonomous vehicle fleets with application to fleet modularity," European Journal of Operational Research, Elsevier, vol. 287(3), pages 856-874.
    48. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
    49. Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    50. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    51. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    52. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    53. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    54. Asma Ben Yaghlane & Mohamed Naceur Azaiez, 2019. "System survivability to continuous attacks: A game theoretic setting for constant attack rate processes," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(8), pages 1308-1320, August.
    55. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    56. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    57. McCarter, Matthew & Barker, Kash & Johansson, Jonas & Ramirez-Marquez, Jose E., 2018. "A bi-objective formulation for robust defense strategies in multi-commodity networks," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 154-161.

  113. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Gregor, Martin, 2015. "Task divisions in teams with complementary tasks," Journal of Economic Behavior & Organization, Elsevier, vol. 117(C), pages 102-120.
    3. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    4. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    5. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    6. Subhasish M. Chowdhury & Iryna Topolyan, 2013. "The Attack-and-Defence Group Contests," University of East Anglia Applied and Financial Economics Working Paper Series 049, School of Economics, University of East Anglia, Norwich, UK..
    7. Shakun Mago & Roman Sheremeta, 2017. "New Hampshire Effect: Behavior in Sequential and Simultaneous Multi-Battle Contests," Working Papers 17-25, Chapman University, Economic Science Institute.
    8. Subhasish M. Chowdhury & Dan Kovenock J. & Roman M. Sheremeta, 2009. "An Experimental Investigation of Colonel Blotto Games," CESifo Working Paper Series 2688, CESifo.
    9. Zeynep B. Irfanoglu & Shakun D. Mago & Roman M. Sheremeta, 2014. "The New Hampshire Effect: Behavior in Sequential and Simultaneous Election Contests," Working Papers 14-15, Chapman University, Economic Science Institute.
    10. Christopher Garcia, 2018. "Optimal multiunit transfer over adversarial paths with increasing intercept probabilities," IISE Transactions, Taylor & Francis Journals, vol. 50(11), pages 989-996, November.
    11. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.
    12. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    13. Alper Atamtürk & Andrés Gómez, 2017. "Maximizing a Class of Utility Functions Over the Vertices of a Polytope," Operations Research, INFORMS, vol. 65(2), pages 433-445, March-Apr.
    14. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    15. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    16. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
    17. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    18. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    19. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    20. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    21. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    22. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    23. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    24. Reniers, Genserik & Soudan, Karel, 2010. "A game-theoretical approach for reciprocal security-related prevention investment decisions," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 1-9.
    25. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    26. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    27. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    28. Ríos Insua, David & Ruggeri, Fabrizio & Soyer, Refik & Rasines, Daniel G., 2018. "Adversarial issues in reliability," European Journal of Operational Research, Elsevier, vol. 266(3), pages 1113-1119.
    29. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    30. Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
    31. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    32. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Barker, Kash & Moronta, Jose, 2018. "Quantifying the resilience of community structures in networks," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 466-474.
    33. Subhasish M. Chowdhury & Iryna Topolyan, 2015. "The Group All-Pay Auction with Heterogeneous Impact Functions," University of East Anglia Applied and Financial Economics Working Paper Series 069, School of Economics, University of East Anglia, Norwich, UK..
    34. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    35. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    36. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    37. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    38. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    39. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    40. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    41. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    42. Paola Cappanera & Maria Paola Scaparra, 2011. "Optimal Allocation of Protective Resources in Shortest-Path Networks," Transportation Science, INFORMS, vol. 45(1), pages 64-80, February.
    43. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    44. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    45. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    46. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    47. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    48. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    49. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    50. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    51. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    52. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    53. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    54. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    55. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    56. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    57. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.
    58. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    59. Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
    60. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    61. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2021. "Minimization of Expected User Losses Considering Co-resident Attacks in Cloud System with Task Replication and Cancellation," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    62. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    63. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    64. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    65. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    66. Kiril Tenekedjiev & Simon Cooley & Boyan Mednikarov & Guixin Fan & Natalia Nikolova, 2021. "Reliability Simulation of Two Component Warm-Standby System with Repair, Switching, and Back-Switching Failures under Three Aging Assumptions," Mathematics, MDPI, vol. 9(20), pages 1-40, October.
    67. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    68. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    69. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    70. Subhasish M. Chowdhury & Iryna Topolyan, 2016. "The Attack-And-Defense Group Contests: Best Shot Versus Weakest Link," Economic Inquiry, Western Economic Association International, vol. 54(1), pages 548-557, January.
    71. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    72. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    73. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    74. Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.

  114. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Kjell Hausken, 2019. "A Game Theoretic Model of Adversaries and Media Manipulation," Games, MDPI, vol. 10(4), pages 1-15, December.
    3. Das, Satya P. & Roy Chowdhury, Prabal, 2008. "Deterrence, Preemption and Panic: A Common-Enemy Problem of Terrorism," MPRA Paper 8223, University Library of Munich, Germany.
    4. J. Atsu Amegashie & Marco Runkel, 2008. "The Paradoxes of Revenge in Conflicts," Working Papers 0805, University of Guelph, Department of Economics and Finance.
    5. Khusrav Gaibulloev & Todd Sandler, 2023. "Common myths of terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 37(2), pages 271-301, April.
    6. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.
    7. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    8. Satya P. Das & Sajal Lahiri, 2021. "Why direct counter‐terrorism measures only may fail: An analysis of direct and preventive counter‐terrorism measures," International Journal of Economic Theory, The International Society for Economic Theory, vol. 17(4), pages 416-445, December.
    9. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    10. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    11. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    12. Shakun D. Mago & Roman M. Sheremeta, 2017. "Multi‐battle Contests: An Experimental Study," Southern Economic Journal, John Wiley & Sons, vol. 84(2), pages 407-425, October.
    13. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    14. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    15. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    16. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
    17. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
    18. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    19. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    20. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    21. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    22. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    23. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.

  115. John F. Moxnes & Kjell Hausken, 2008. "Cross-country skiing motion equations, locomotive forces and mass scaling laws," Mathematical and Computer Modelling of Dynamical Systems, Taylor & Francis Journals, vol. 14(6), pages 535-569, April.

    Cited by:

    1. Kjell Hausken, 2017. "Exhaustive Classification and Review of Techniques and Research Program for Techniques for Skate Skiing, Classical Skiing, and Ski Mountaineering," The Open Sports Sciences Journal, Bentham Open, vol. 10(1), pages 160-178, October.

  116. Hausken, Kjell & Hirshleifer, Jack, 2008. "Truthful signalling, the heritability paradox, and the Malthusian equi-marginal principle," Theoretical Population Biology, Elsevier, vol. 73(1), pages 11-23.
    See citations under working paper version above.
  117. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.

    Cited by:

    1. Kjell Hausken, 2019. "A Game Theoretic Model of Adversaries and Media Manipulation," Games, MDPI, vol. 10(4), pages 1-15, December.
    2. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    3. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    4. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    5. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    6. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    7. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    8. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    9. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    10. Gregory Levitin & Maxim Finkelstein, 2017. "A new stress–strength model for systems subject to stochastic shocks," Journal of Risk and Reliability, , vol. 231(2), pages 172-179, April.
    11. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    12. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    13. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

  118. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.

    Cited by:

    1. Gregor, Martin, 2015. "Task divisions in teams with complementary tasks," Journal of Economic Behavior & Organization, Elsevier, vol. 117(C), pages 102-120.
    2. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    3. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    4. Subhasish M. Chowdhury & Iryna Topolyan, 2013. "The Attack-and-Defence Group Contests," University of East Anglia Applied and Financial Economics Working Paper Series 049, School of Economics, University of East Anglia, Norwich, UK..
    5. Shakun Mago & Roman Sheremeta, 2017. "New Hampshire Effect: Behavior in Sequential and Simultaneous Multi-Battle Contests," Working Papers 17-25, Chapman University, Economic Science Institute.
    6. Subhasish M. Chowdhury & Dan Kovenock J. & Roman M. Sheremeta, 2009. "An Experimental Investigation of Colonel Blotto Games," CESifo Working Paper Series 2688, CESifo.
    7. Zeynep B. Irfanoglu & Shakun D. Mago & Roman M. Sheremeta, 2014. "The New Hampshire Effect: Behavior in Sequential and Simultaneous Election Contests," Working Papers 14-15, Chapman University, Economic Science Institute.
    8. Christopher Garcia, 2018. "Optimal multiunit transfer over adversarial paths with increasing intercept probabilities," IISE Transactions, Taylor & Francis Journals, vol. 50(11), pages 989-996, November.
    9. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.
    10. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    11. Alper Atamtürk & Andrés Gómez, 2017. "Maximizing a Class of Utility Functions Over the Vertices of a Polytope," Operations Research, INFORMS, vol. 65(2), pages 433-445, March-Apr.
    12. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    13. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    14. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
    15. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    16. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    17. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    18. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    19. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    20. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    21. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    22. Reniers, Genserik & Soudan, Karel, 2010. "A game-theoretical approach for reciprocal security-related prevention investment decisions," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 1-9.
    23. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    24. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    25. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    26. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    27. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    28. Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
    29. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    30. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Barker, Kash & Moronta, Jose, 2018. "Quantifying the resilience of community structures in networks," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 466-474.
    31. Subhasish M. Chowdhury & Iryna Topolyan, 2015. "The Group All-Pay Auction with Heterogeneous Impact Functions," University of East Anglia Applied and Financial Economics Working Paper Series 069, School of Economics, University of East Anglia, Norwich, UK..
    32. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    33. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    34. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    35. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    36. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    37. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    38. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    39. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    40. Paola Cappanera & Maria Paola Scaparra, 2011. "Optimal Allocation of Protective Resources in Shortest-Path Networks," Transportation Science, INFORMS, vol. 45(1), pages 64-80, February.
    41. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    42. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    43. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    44. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    45. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    46. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    47. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    48. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    49. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    50. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    51. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    52. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    53. Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
    54. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2021. "Minimization of Expected User Losses Considering Co-resident Attacks in Cloud System with Task Replication and Cancellation," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    55. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    56. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    57. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    58. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    59. Kiril Tenekedjiev & Simon Cooley & Boyan Mednikarov & Guixin Fan & Natalia Nikolova, 2021. "Reliability Simulation of Two Component Warm-Standby System with Repair, Switching, and Back-Switching Failures under Three Aging Assumptions," Mathematics, MDPI, vol. 9(20), pages 1-40, October.
    60. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    61. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    62. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    63. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    64. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    65. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    66. Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.

  119. John F. Moxnes & Kjell Hausken, 2008. "The dynamics of athletic performance, fitness and fatigue," Mathematical and Computer Modelling of Dynamical Systems, Taylor & Francis Journals, vol. 14(6), pages 515-533, May.

    Cited by:

    1. Guillaume Roels, 2020. "High-Performance Practice Processes," Management Science, INFORMS, vol. 66(4), pages 1509-1526, April.

  120. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.

    Cited by:

    1. D E Salazar A & C M Rocco S & E Zio, 2008. "Optimal protection of complex networks exposed to a terrorist hazard: A multi-objective evolutionary approach," Journal of Risk and Reliability, , vol. 222(3), pages 327-335, September.
    2. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    3. Vahabi,Mehrdad, 2019. "The Political Economy of Predation," Cambridge Books, Cambridge University Press, number 9781107591370.
    4. Alper Atamtürk & Andrés Gómez, 2017. "Maximizing a Class of Utility Functions Over the Vertices of a Polytope," Operations Research, INFORMS, vol. 65(2), pages 433-445, March-Apr.
    5. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    6. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    7. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    8. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    9. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    10. Dui, Hongyan & Si, Shubin & Wu, Shaomin & Yam, Richard C.M., 2017. "An importance measure for multistate systems with external factors," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 49-57.
    11. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    12. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    13. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    14. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    15. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    16. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    17. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    18. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    19. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    20. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    21. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    22. Gregory Levitin & Maxim Finkelstein, 2017. "A new stress–strength model for systems subject to stochastic shocks," Journal of Risk and Reliability, , vol. 231(2), pages 172-179, April.
    23. Gregory Levitin & Kjell Hausken, 2013. "Parallel systems under two sequential attacks with contest intensity variation," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 21(1), pages 207-224, January.
    24. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.
    25. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    26. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    27. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    28. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    29. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    30. McCarter, Matthew & Barker, Kash & Johansson, Jonas & Ramirez-Marquez, Jose E., 2018. "A bi-objective formulation for robust defense strategies in multi-commodity networks," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 154-161.
    31. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.

  121. Kjell Hausken, 2007. "Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria," Theory and Decision, Springer, vol. 62(2), pages 135-160, March.

    Cited by:

    1. Jan Libich & Dat Thanh Nguyen, 2022. "When a compromise gets compromised by another compromise," Australian Economic Papers, Wiley Blackwell, vol. 61(4), pages 678-716, December.
    2. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

  122. Moxnes, John F. & Hausken, Kjell, 2007. "The population dynamics of potato cyst nematodes," Ecological Modelling, Elsevier, vol. 207(2), pages 339-348.

    Cited by:

    1. Stucchi, Luciano & Giménez-Benavides, Luis & Galeano, Javier, 2019. "The role of parasitoids in a nursery-pollinator system: A population dynamics model," Ecological Modelling, Elsevier, vol. 396(C), pages 50-58.

  123. Hausken, Kjell, 2007. "Information sharing among firms and cyber attacks," Journal of Accounting and Public Policy, Elsevier, vol. 26(6), pages 639-688.

    Cited by:

    1. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
    2. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    3. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    4. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    5. Tania Wallis & Rafał Leszczyna, 2022. "EE-ISAC—Practical Cybersecurity Solution for the Energy Sector," Energies, MDPI, vol. 15(6), pages 1-23, March.
    6. Xiaotong Li & Qianyao Xue, 2021. "An economic analysis of information security investment decision making for substitutable enterprises," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 42(5), pages 1306-1316, July.
    7. Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.
    8. Camélia Radu & Nadia Smaili, 2022. "Board Gender Diversity and Corporate Response to Cyber Risk: Evidence from Cybersecurity Related Disclosure," Journal of Business Ethics, Springer, vol. 177(2), pages 351-374, May.
    9. Xiaofei Qian & Xinbao Liu & Jun Pei & Panos M. Pardalos, 2018. "A new game of information sharing and security investment between two allied firms," International Journal of Production Research, Taylor & Francis Journals, vol. 56(12), pages 4069-4086, June.
    10. Daniel Schatz & Rabih Bashroush, 2017. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 19(5), pages 1205-1228, October.
    11. Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 21(2), pages 261-300, April.
    12. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    13. Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
    14. Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
    15. Xiaofei Qian & Jun Pei & Xinbao Liu & Mi Zhou & Panos M. Pardalos, 2019. "Information security decisions for two firms in a market with different types of customers," Journal of Combinatorial Optimization, Springer, vol. 38(4), pages 1263-1285, November.
    16. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    17. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    18. Meilin He & Laura Devine & Jun Zhuang, 2018. "Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 215-225, February.
    19. Daniel Schatz & Rabih Bashroush, 0. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
    20. Xinbao Liu & Xiaofei Qian & Jun Pei & Panos M. Pardalos, 2018. "Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size," Journal of Global Optimization, Springer, vol. 70(2), pages 413-436, February.
    21. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    22. Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite, 2014. "Dynamic competition in IT security: A differential games approach," Information Systems Frontiers, Springer, vol. 16(4), pages 643-661, September.
    23. Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
    24. Xing Gao & Siyu Gong, 2022. "An economic analysis of information security outsourcing with competitive firms," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(7), pages 2748-2758, October.
    25. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    26. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
    27. Alain Mermoud & Marcus Matthias Keupp & Kévin Huguenin & Maximilian Palmié & Dimitri Percia David, 2019. "To share or not to share: A behavioral perspective on human participation in security information sharing," Post-Print hal-02147702, HAL.
    28. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    29. Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security economics: A self‐defense versus cyber‐insurance dilemma," Applied Stochastic Models in Business and Industry, John Wiley & Sons, vol. 35(3), pages 448-478, May.
    30. Xiaotong Li, 2022. "An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(3), pages 595-606, April.
    31. Solak, Senay & Zhuo, Yueran, 2020. "Optimal policies for information sharing in information system security," European Journal of Operational Research, Elsevier, vol. 284(3), pages 934-950.
    32. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    33. Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2016. "Mandatory Standards and Organizational Information Security," Information Systems Research, INFORMS, vol. 27(1), pages 70-86, March.
    34. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    35. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    36. Yosra Miaoui & Noureddine Boudriga, 0. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 0, pages 1-40.
    37. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

  124. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.

    Cited by:

    1. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.

  125. Magne Emhjellen & Kjell Hausken & Petter Osmundsen, 2006. "The choice of strategic core – impact of financial volume," International Journal of Global Energy Issues, Inderscience Enterprises Ltd, vol. 26(1/2), pages 136-157.

    Cited by:

    1. Emhjellen, Magne & Osmundsen, Petter, 2013. "CCS – Failing to pass decision gates," UiS Working Papers in Economics and Finance 2013/7, University of Stavanger.
    2. Elmhjellen, Magne & Osmundsen, Petter, 2016. "Oil project selection by metrics," UiS Working Papers in Economics and Finance 2016/5, University of Stavanger.
    3. Osmundsen, Petter & Lovas, Kjell & Emhjellen, Magne, 2017. "Petroleum tax competition subject to capital rationing," UiS Working Papers in Economics and Finance 2017/5, University of Stavanger.
    4. Osmundsen, Petter & Emhjellen, Magne, 2010. "Decision criteria for climate projects," UiS Working Papers in Economics and Finance 2010/2, University of Stavanger.

  126. Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.

    Cited by:

    1. Guang Zhu & Hu Liu & Mining Feng, 2018. "An Evolutionary Game-Theoretic Approach for Assessing Privacy Protection in mHealth Systems," IJERPH, MDPI, vol. 15(10), pages 1-27, October.
    2. Schilling, Andreas & Werners, Brigitte, 2016. "Optimal selection of IT security safeguards from an existing knowledge base," European Journal of Operational Research, Elsevier, vol. 248(1), pages 318-327.
    3. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    4. Alessandro Mazzoccoli, 2023. "Optimal Cyber Security Investment in a Mixed Risk Management Framework: Examining the Role of Cyber Insurance and Expenditure Analysis," Risks, MDPI, vol. 11(9), pages 1-14, August.
    5. Guang Zhu & Hu Liu & Mining Feng, 2018. "Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach," Mathematics, MDPI, vol. 6(10), pages 1-19, September.
    6. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    7. Jaume Belles‐Sampera & Montserrat Guillén & Miguel Santolino, 2014. "Beyond Value‐at‐Risk: GlueVaR Distortion Risk Measures," Risk Analysis, John Wiley & Sons, vol. 34(1), pages 121-134, January.
    8. Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
    9. Linda J. Tallau & Manish Gupta & Raj Sharman, 2010. "Information security investment decisions: evaluating the Balanced Scorecard method," International Journal of Business Information Systems, Inderscience Enterprises Ltd, vol. 5(1), pages 34-57.
    10. Hee-Kyung Kong & Tae-Sung Kim & Jungduk Kim, 2012. "An analysis on effects of information security investments: a BSC perspective," Journal of Intelligent Manufacturing, Springer, vol. 23(4), pages 941-953, August.
    11. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    12. Kjell Hausken, 2014. "Returns to information security investment: Endogenizing the expected loss," Information Systems Frontiers, Springer, vol. 16(2), pages 329-336, April.
    13. Daniel Schatz & Rabih Bashroush, 2017. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 19(5), pages 1205-1228, October.
    14. Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 21(2), pages 261-300, April.
    15. Mansooreh Ezhei & Behrouz Tork Ladani, 2020. "Interdependency Analysis in Security Investment against Strategic Attacks," Information Systems Frontiers, Springer, vol. 22(1), pages 187-201, February.
    16. Hamid Mohtadi & Swati Agiwal, 2012. "Optimal Security Investments and Extreme Risk," Risk Analysis, John Wiley & Sons, vol. 32(8), pages 1309-1325, August.
    17. Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
    18. Feng Xu & Xin (Robert) Luo & Hongyun Zhang & Shan Liu & Wei (Wayne) Huang, 2019. "Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect," Information Systems Frontiers, Springer, vol. 21(5), pages 1069-1083, October.
    19. Xiaofei Qian & Jun Pei & Xinbao Liu & Mi Zhou & Panos M. Pardalos, 2019. "Information security decisions for two firms in a market with different types of customers," Journal of Combinatorial Optimization, Springer, vol. 38(4), pages 1263-1285, November.
    20. Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
    21. Alessandro Mazzoccoli & Maurizio Naldi, 2022. "An Overview of Security Breach Probability Models," Risks, MDPI, vol. 10(11), pages 1-29, November.
    22. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    23. Derrick Huang, C. & Hu, Qing & Behara, Ravi S., 2008. "An economic analysis of the optimal information security investment in the case of a risk-averse firm," International Journal of Production Economics, Elsevier, vol. 114(2), pages 793-804, August.
    24. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    25. Fabio BISOGNI & Simona CAVALLINI & Sara DI TROCCHIO, 2011. "Cybersecurity at European Level: The Role of Information Availability," Communications & Strategies, IDATE, Com&Strat dept., vol. 1(81), pages 105-124, 1st quart.
    26. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    27. Soumyo D. Moitra, 2014. "A Model for Estimating the Benefits from Network Security Systems," International Journal of Business Analytics (IJBAN), IGI Global, vol. 1(3), pages 1-20, July.
    28. Lu Xu & Yanhui Li & Jing Fu, 2019. "Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization," Mathematics, MDPI, vol. 7(7), pages 1-20, July.
    29. Huang, C. Derrick & Behara, Ravi S., 2013. "Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints," International Journal of Production Economics, Elsevier, vol. 141(1), pages 255-268.
    30. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    31. Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
    32. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
    33. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    34. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    35. Lawrence A. Gordon & Martin P. Loeb, 2006. "Economic aspects of information security: An emerging field of research," Information Systems Frontiers, Springer, vol. 8(5), pages 335-337, December.
    36. Xiaofei Qian & Xinbao Liu & Jun Pei & Panos M. Pardalos & Lin Liu, 2017. "A game-theoretic analysis of information security investment for multiple firms in a network," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(10), pages 1290-1305, October.
    37. Paul, Jomon A. & Zhang, Minjiao, 2021. "Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker," European Journal of Operational Research, Elsevier, vol. 291(1), pages 349-364.
    38. Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2016. "Mandatory Standards and Organizational Information Security," Information Systems Research, INFORMS, vol. 27(1), pages 70-86, March.
    39. Lu Xu & Yanhui Li & Qi Yao, 2022. "Information security investment and purchase decision for personalized products," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(6), pages 2619-2635, September.
    40. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    41. Anna Nagurney & Ladimer Nagurney, 2015. "A game theory model of cybersecurity investments with information asymmetry," Netnomics, Springer, vol. 16(1), pages 127-148, August.
    42. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    43. Gurvirender P.S. Tejay & Babak Shoraka, 2011. "Reducing cyber harassment through de jure standards: a study on the lack of the information security management standard adoption in the USA," International Journal of Management and Decision Making, Inderscience Enterprises Ltd, vol. 11(5/6), pages 324-343.
    44. Mayadunne, Sanjaya & Park, Sungjune, 2016. "An economic model to evaluate information security investment of risk-taking small and medium enterprises," International Journal of Production Economics, Elsevier, vol. 182(C), pages 519-530.
    45. Yosra Miaoui & Noureddine Boudriga, 0. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 0, pages 1-40.
    46. Loic Mar'echal & Alain Mermoud & Dimitri Percia David & Mathias Humbert, 2024. "Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data," Papers 2402.04765, arXiv.org, revised Feb 2024.
    47. Bin Srinidhi & Jia Yan & Giri Kumar Tayi, 2008. "Firm-level Resource Allocation to Information Security in the Presence of Financial Distress," Working Papers 2008-17, School of Economic Sciences, Washington State University.
    48. Jaume Belles-Sampera & Montserrat Guillén & Miguel Santolino, 2013. "“Beyond Value-at-Risk: GlueVaR Distortion Risk Measures”," IREA Working Papers 201302, University of Barcelona, Research Institute of Applied Economics, revised Feb 2013.
    49. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

  127. Kjell Hausken, 2006. "The Stability Of Anarchy And Breakdown Of Production," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 589-603.

    Cited by:

    1. Caruso, Raul, 2012. "Differentials in Property Rights in a two sector-economy," NEPS Working Papers 2/2012, Network of European Peace Scientists.
    2. Caruso Raul, 2011. "On the Nature of Peace Economics," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 16(2), pages 1-13, January.
    3. Naghshpour Shahdad & St. Marie Joseph J., 2009. "Globalization Discontent: The Effects of Globalization on Ethnic Protest," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 14(3), pages 1-29, March.
    4. Raul Caruso, 2010. "Butter, Guns And Ice-Cream Theory And Evidence From Sub-Saharan Africa," Defence and Peace Economics, Taylor & Francis Journals, vol. 21(3), pages 269-283.
    5. Benjamin Powell & Edward Stringham, 2009. "Public choice and the economic analysis of anarchy: a survey," Public Choice, Springer, vol. 140(3), pages 503-538, September.
    6. Anna Balestra & Raul Caruso, 2022. "Vaccines between War and Market," Working Papers 1019, European Centre of Peace Science, Integration and Cooperation (CESPIC), Catholic University 'Our Lady of Good Counsel'.
    7. Raul Caruso & Jon Echevarria-Coco, 2023. "International prices and continuing conflict: Theory and evidence from sub-Saharan Africa (1980–2017)," Journal of Peace Research, Peace Research Institute Oslo, vol. 60(6), pages 889-905, November.

  128. Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
    3. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    4. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
    5. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    6. Hare, Forrest & Goldstein, Jonathan, 2010. "The interdependent security problem in the defense industrial base: An agent-based model on a social network," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 128-139.
    7. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    8. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    9. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    10. Daniel Schatz & Rabih Bashroush, 2017. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 19(5), pages 1205-1228, October.
    11. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    12. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    13. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    14. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    15. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    16. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    17. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    18. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    19. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
    20. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    21. Xing Gao, 2020. "Open Source or Closed Source? A Competitive Analysis with Software Security," Decision Analysis, INFORMS, vol. 17(1), pages 56-73, March.
    22. Meyer Sunniva F., 2011. "Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 17(1), pages 1-37, September.
    23. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    24. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    25. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    26. Meilin He & Laura Devine & Jun Zhuang, 2018. "Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 215-225, February.
    27. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    28. Daniel Schatz & Rabih Bashroush, 0. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
    29. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    30. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    31. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    32. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    33. Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
    34. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    35. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    36. Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite, 2014. "Dynamic competition in IT security: A differential games approach," Information Systems Frontiers, Springer, vol. 16(4), pages 643-661, September.
    37. Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
    38. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    39. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
    40. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    41. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    42. Hulisi Öğüt & Srinivasan Raghunathan & Nirup Menon, 2011. "Cyber Security Risk Management: Public Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and Observability of Self‐Protection," Risk Analysis, John Wiley & Sons, vol. 31(3), pages 497-512, March.
    43. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    44. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    45. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    46. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    47. Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2016. "Mandatory Standards and Organizational Information Security," Information Systems Research, INFORMS, vol. 27(1), pages 70-86, March.
    48. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    49. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    50. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    51. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    52. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    53. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    54. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    55. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    56. Masoud, Najeb & Al-Utaibi, Ghassan, 2022. "The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence," Research in Economics, Elsevier, vol. 76(2), pages 131-140.
    57. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    58. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

  129. Kjell Hausken & John F. Moxnes, 2005. "The Dynamics Of Crime And Punishment," International Journal of Modern Physics C (IJMPC), World Scientific Publishing Co. Pte. Ltd., vol. 16(11), pages 1701-1732.

    Cited by:

    1. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.
    2. Shuying Li & Jun Zhuang & Shifei Shen, 2017. "Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time‐Series and Intervention Analysis," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1287-1297, July.
    3. Cheng‐Kuang Wu & Yi‐Ming Chen & Dachrahn Wu & Ching‐Lin Chi, 2020. "A Game Theory Approach for Assessment of Risk and Deployment of Police Patrols in Response to Criminal Activity in San Francisco," Risk Analysis, John Wiley & Sons, vol. 40(3), pages 534-549, March.

  130. Kjell Hausken & John F. Moxnes, 2005. "The Dynamics Of Multilateral Exchange," International Journal of Modern Physics C (IJMPC), World Scientific Publishing Co. Pte. Ltd., vol. 16(04), pages 607-631.

    Cited by:

    1. Hausken, Kjell & Moxnes, John F., 2011. "Systematization of a set of closure techniques," Theoretical Population Biology, Elsevier, vol. 80(3), pages 175-184.
    2. Kjell Hausken, 2018. "Janet Tai Landa: Economic success of Chinese merchants in Southeast Asia: identity, ethnic cooperation and conflict: integrating the social sciences with evolutionary biology," Journal of Bioeconomics, Springer, vol. 20(2), pages 251-256, July.
    3. Kjell Hausken, 2013. "Exchange of goods while investing into production and safety," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 23(1), pages 29-35.

  131. Kjell Hausken & John F. Moxnes, 2005. "The Dynamics Of Bilateral Exchange And Division Of Labor," International Journal of Modern Physics C (IJMPC), World Scientific Publishing Co. Pte. Ltd., vol. 16(01), pages 117-137.

    Cited by:

    1. Kjell Hausken, 2013. "Exchange of goods while investing into production and safety," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 23(1), pages 29-35.

  132. Kjell Hausken & John F. Moxnes, 2005. "Approximations and empirics for stochastic war equations," Naval Research Logistics (NRL), John Wiley & Sons, vol. 52(7), pages 682-700, October.

    Cited by:

    1. Anelí Bongers & José L. Torres, 2021. "A bottleneck combat model: an application to the Battle of Thermopylae," Operational Research, Springer, vol. 21(4), pages 2859-2877, December.
    2. Michael J Armstrong, 2014. "The salvo combat model with a sequential exchange of fire," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(10), pages 1593-1601, October.
    3. Kress, Moshe & Caulkins, Jonathan P. & Feichtinger, Gustav & Grass, Dieter & Seidl, Andrea, 2018. "Lanchester model for three-way combat," European Journal of Operational Research, Elsevier, vol. 264(1), pages 46-54.

  133. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.

    Cited by:

    1. Jay Pil Choi & Subhasish M. Chowdhury & Jaesoo Kim, 2016. "Group Contests with Internal Conflict and Power Asymmetry," Scandinavian Journal of Economics, Wiley Blackwell, vol. 118(4), pages 816-840, October.
    2. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
    3. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
    4. Kjell Hausken, 2020. "Additive multi-effort contests," Theory and Decision, Springer, vol. 89(2), pages 203-248, September.
    5. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    6. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2011. "Evaluating the damage associated with intentional network disintegration," Reliability Engineering and System Safety, Elsevier, vol. 96(4), pages 433-439.
    7. David K. Levine & Salvatore Modica, 2012. "Conflict and the evolution of societies," Working Papers 2012-032, Federal Reserve Bank of St. Louis.
    8. Hector Galindo Silva, 2018. "Conflict externalization and the quest for peace: theory and case evidence from Colombia," Vniversitas Económica 16838, Universidad Javeriana - Bogotá.
    9. K Hausken & G Levitin, 2010. "Defence of homogeneous parallel multi-state systems subject to two sequential attacks," Journal of Risk and Reliability, , vol. 224(3), pages 171-183, September.
    10. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    11. Kjell Hausken & Mthuli Ncube, 2014. "Political Economy of Service Delivery: Monitoring Versus Contestation," The Developing Economies, Institute of Developing Economies, vol. 52(1), pages 68-84, March.
    12. Levine, David K. & Modica, Salvatore, 2022. "Survival of the Weakest: Why the West Rules," Journal of Economic Behavior & Organization, Elsevier, vol. 204(C), pages 394-421.
    13. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    14. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    15. Kjell Hausken, 2006. "The Stability Of Anarchy And Breakdown Of Production," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 589-603.
    16. Hassani Mahmooei, Behrooz & Parris, Brett, 2012. "Dynamics of effort allocation and evolution of trust: an agent-based model," MPRA Paper 44919, University Library of Munich, Germany.
    17. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    18. Kjell Hausken, 2014. "Returns to information security investment: Endogenizing the expected loss," Information Systems Frontiers, Springer, vol. 16(2), pages 329-336, April.
    19. Indraneel Dasgupta & Ranajoy Guha Neogi, 2018. "Between-group contests over group-specific public goods with within-group fragmentation," Public Choice, Springer, vol. 174(3), pages 315-334, March.
    20. Daniel Houser & Jian Song, 2021. "Non-exclusive Group Contests: An Experimental Analysis," Working Papers 1083, George Mason University, Interdisciplinary Center for Economic Science.
    21. Caruso, Raul, 2007. "Recirpcity in the shadow of Threat," MPRA Paper 1788, University Library of Munich, Germany.
    22. David K. Levine & Salvatore Modica, 2013. "Conflict, evolution, hegemony, and the power of the state," Working Papers 2013-023, Federal Reserve Bank of St. Louis.
    23. Hassani-Mahmooei, Behrooz & Parris, Brett W., 2013. "Resource scarcity, effort allocation and environmental security: An agent-based theoretical approach," Economic Modelling, Elsevier, vol. 30(C), pages 183-192.
    24. Caruso Raul, 2006. "Conflict and Conflict Management with Interdependent Instruments and Asymmetric Stakes, (The Good-Cop and the Bad-Cop Game)," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 12(1), pages 1-55, September.
    25. Atallah, Samer, 2017. "Price shocks and political conflict," International Journal of Development and Conflict, Gokhale Institute of Politics and Economics, vol. 7(2), pages 65-80.
    26. Hassani Mahmooei, Behrooz & Parris, Brett, 2012. "Why might climate change not cause conflict? an agent-based computational response," MPRA Paper 44918, University Library of Munich, Germany.
    27. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    28. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    29. David K Levine & Salvatore Modica, 2011. "Anti-Malthus: Conflict and the Evolution of Societies," Levine's Bibliography 786969000000000148, UCLA Department of Economics.
    30. Behrooz Hassani-Mahmooei & Brett W. Parris, 2014. "Dynamics of effort allocation and evolution of trust: an agent-based model," Computational and Mathematical Organization Theory, Springer, vol. 20(2), pages 133-154, June.
    31. Dasgupta, Indraneel & Pal, Sarmistha, 2018. "Touch Thee Not: Group Conflict, Caste Power, and Untouchability in Rural India," IZA Discussion Papers 12016, Institute of Labor Economics (IZA).
    32. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    33. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    34. Nitzan, Shmuel & Ueda, Kaoru, 2009. "Collective contests for commons and club goods," Journal of Public Economics, Elsevier, vol. 93(1-2), pages 48-55, February.
    35. Raul Caruso, 2009. "Spesa pubblica e criminalità organizzata in Italia: evidenza empirica su dati Panel nel periodo 1997-2003," Economia & lavoro, Carocci editore, issue 1, pages 1-73.
    36. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    37. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    38. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics - The Open-Access, Open-Assessment E-Journal (2007-2020), Kiel Institute for the World Economy (IfW Kiel), vol. 4, pages 1-38.
    39. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    40. Send, Jonas, 2020. "Conflict between non-exclusive groups," Journal of Economic Behavior & Organization, Elsevier, vol. 177(C), pages 858-874.
    41. Kjell Hausken & Mthuli Ncube, 2013. "Working Paper 173 - Production and Conflict in Risky Elections," Working Paper Series 469, African Development Bank.
    42. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    43. Antoine Pietri, 2017. "Les modèles de « rivalité coercitive » dans l’analyse économique des conflits," Revue d'économie politique, Dalloz, vol. 127(3), pages 307-352.
    44. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    45. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    46. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2013. "Evaluating the damage associated with intentional supply deprivation in multi-commodity network," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 11-17.
    47. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    48. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    49. David K Levine & Salvatore Modica, 2016. "An Evolutionary Model of Intervention and Peace," Levine's Bibliography 786969000000001391, UCLA Department of Economics.
    50. Kjell Hausken, 2021. "Axiomatizing additive multi-effort contests," SN Business & Economics, Springer, vol. 1(11), pages 1-12, November.
    51. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    52. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    53. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    54. Alex Coram, 2006. "An asymmetric dynamic struggle between pirates and producers," UMASS Amherst Economics Working Papers 2006-07, University of Massachusetts Amherst, Department of Economics.
    55. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    56. Hubert János Kiss & Alfonso Rosa-Garcia & Vita Zhukova, 2023. "Group contest in a coopetitive setup: experimental evidence," Journal of Economic Interaction and Coordination, Springer;Society for Economic Science with Heterogeneous Interacting Agents, vol. 18(3), pages 463-490, July.
    57. Gregory Levitin & Maxim Finkelstein, 2017. "A new stress–strength model for systems subject to stochastic shocks," Journal of Risk and Reliability, , vol. 231(2), pages 172-179, April.
    58. Gregory Levitin & Kjell Hausken, 2013. "Parallel systems under two sequential attacks with contest intensity variation," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 21(1), pages 207-224, January.
    59. Brouwer, Thijs & Potters, Jan, 2019. "Friends for (almost) a day: Studying breakaways in cycling races," Journal of Economic Psychology, Elsevier, vol. 75(PB).
    60. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    61. Kjell Hausken & Andreas Ortmann, 2007. "A first experimental test of multilevel game theory: the PD case," Applied Economics Letters, Taylor & Francis Journals, vol. 15(4), pages 261-264.
    62. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    63. Johannes Münster, 2009. "Group contest success functions," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 41(2), pages 345-357, November.
    64. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    65. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    66. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    67. K Hausken & G Levitin, 2009. "Parallel systems with different types of defence resource expenditure under two sequential attacks," Journal of Risk and Reliability, , vol. 223(1), pages 71-85, March.
    68. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.
    69. Kjell Hausken & Mthuli Ncube, 2016. "How Elections are Impacted by Production, Economic Growth and Conflict," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 18(01), pages 1-29, March.
    70. Kyung Hwan Baik & Dongryul Lee, 2012. "Do Rent‐Seeking Groups Announce Their Sharing Rules?," Economic Inquiry, Western Economic Association International, vol. 50(2), pages 348-363, April.
    71. Thomas Gries & Claus-Jochen Haake, 2016. "An Economic Theory of 'Destabilization War'," Working Papers CIE 95, Paderborn University, CIE Center for International Economics.
    72. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    73. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    74. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    75. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    76. Gries, Thomas & Haake, Claus-Jochen, 2016. "An Economic Theory of 'Destabilization War' '- Compromise for Peace versus Conventional, Guerilla, or Terrorist Warfare," VfS Annual Conference 2016 (Augsburg): Demographic Change 145617, Verein für Socialpolitik / German Economic Association.
    77. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    78. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    79. Hausken, Kjell & Ncube, Mthuli, 2012. "Production and Conflict in Risky Elections," UiS Working Papers in Economics and Finance 2012/14, University of Stavanger.
    80. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    81. Kjell Hausken & Mthuli Ncube, 2013. "Working Paper 172 - Political Economy of Service Delivery: Monitoring versus Contestation," Working Paper Series 468, African Development Bank.
    82. Fausto, Cavalli & Mario, Gilli & Ahmad, Naimzada, 2017. "A New Approach to Contest Models," Working Papers 364, University of Milano-Bicocca, Department of Economics, revised 03 Mar 2017.
    83. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    84. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    85. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    86. David K Levine & Salvatore Modica, 2022. "Survival of the Weakest: Why the West Rules," Levine's Working Paper Archive 786969000000001458, David K. Levine.
    87. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    88. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

  134. Hausken, Kjell, 2005. "The battle of the sexes when the future is important," Economics Letters, Elsevier, vol. 87(1), pages 89-93, April.

    Cited by:

    1. Langlais, Eric, 2010. "An analysis of bounded rationality in judicial litigations: the case with loss/disappointment averses plaintiffs," MPRA Paper 22291, University Library of Munich, Germany.
    2. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
    3. Hausken, Kjell, 2007. "Reputation, incomplete information, and differences in patience in repeated games with multiple equilibria," Economics Letters, Elsevier, vol. 97(2), pages 138-144, November.
    4. Kjell Hausken, 2007. "Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria," Theory and Decision, Springer, vol. 62(2), pages 135-160, March.
    5. Wilko Bolt & Alexander F. Tieman, 2006. "On Myopic Equilibria in Dynamic Games with Endogenous Discounting," IMF Working Papers 2006/302, International Monetary Fund.

  135. Kjell Hausken & Ross Cressman, 2004. "Formalization Of Multi-Level Games," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 6(02), pages 195-221.

    Cited by:

    1. Fenling Feng & Chengguang Liu & Jiaqi Zhang, 2020. "China's Railway Transportation Safety Regulation System Based on Evolutionary Game Theory and System Dynamics," Risk Analysis, John Wiley & Sons, vol. 40(10), pages 1944-1966, October.
    2. Tverskoi, Denis & Senthilnathan, Athmanathan & Gavrilets, Sergey, 2021. "The dynamics of cooperation, power, and inequality in a group-structured society," SocArXiv 24svr, Center for Open Science.
    3. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    4. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.

  136. Kjell Hausken & Christian W. Martin & Thomas Plümper, 2004. "Government Spending and Taxation in Democracies and Autocracies," Constitutional Political Economy, Springer, vol. 15(3), pages 239-259, September.

    Cited by:

    1. Blum, Johannes, 2018. "Defense Burden and the Effect of Democracy: Evidence from a Spatial Panel Analysis," Munich Reprints in Economics 62815, University of Munich, Department of Economics.
    2. Daniel Sakyi, 2013. "On the implications of trade openness, foreign aid and democracy for Wagner’s law in developing countries: panel data evidence from west African monetary zone (WAMZ)," Journal of Developing Areas, Tennessee State University, College of Business, vol. 47(2), pages 319-339, July-Dece.
    3. Dodlova, Marina & Lucas, Viola, 2021. "Regime security and taxation in autocracies: Who is taxed and how?," European Journal of Political Economy, Elsevier, vol. 67(C).
    4. Neudorfer, Natascha S., 2018. "Commodities and corruption – How the middle class and democratic institutions lead to less corruption in resource-rich countries," Resources Policy, Elsevier, vol. 58(C), pages 175-191.
    5. Bougharriou, Nouha & Benayed, Walid & Gabsi, Foued Badr, 2022. "Democratic transition and fiscal policy in the Arab world," Economic Systems, Elsevier, vol. 46(2).
    6. Johannes Blum & Florian Dorn & Axel Heuer, 2021. "Political institutions and health expenditure," International Tax and Public Finance, Springer;International Institute of Public Finance, vol. 28(2), pages 323-363, April.
    7. Sajjad Faraji Dizaji & Mohammad Reza Farzanegan & Alireza Naghavi, 2015. "Political Institutions and Government Spending Behavior: Theory and Evidence from Iran," Development Working Papers 381, Centro Studi Luca d'Agliano, University of Milano.
    8. Giovanni B. Pittaluga & Elena Seghezza & Pierluigi Morelli, 2018. "Suffrage Extension, Government Size and National Identity in Europe Before WWI," Rivista di storia economica, Società editrice il Mulino, issue 2, pages 137-172.
    9. Offiong Helen Solomon & Sibhaa Shrestha, 2014. "Does the informal sector thrive under democracy or autocracy? the case of Nepal," Journal of Developing Areas, Tennessee State University, College of Business, vol. 48(3), pages 245-267, July-Sept.
    10. Plümper, Thomas & Neumayer, Eric, 2009. "Famine Mortality, Rational Political Inactivity, and International Food Aid," World Development, Elsevier, vol. 37(1), pages 50-61, January.
    11. Gnangnon, Sèna Kimm, 2021. "Aid for trade unpredictability and trade-related government expenditure in recipient-countries," The Quarterly Review of Economics and Finance, Elsevier, vol. 79(C), pages 107-125.
    12. Samuel Kwabena Obeng Author-Name: Daniel Sakyi, 2017. "Explaining the Growth of Government Spending in Ghana," Journal of Developing Areas, Tennessee State University, College of Business, vol. 51(1), pages 103-128, January-M.
    13. Toke Aidt & Peter Jensen, 2013. "Democratization and the size of government: evidence from the long 19th century," Public Choice, Springer, vol. 157(3), pages 511-542, December.
    14. Jakob Haan, 2014. "Democracy, Elections and Government Budget Deficits," German Economic Review, Verein für Socialpolitik, vol. 15(1), pages 131-142, February.
    15. Alexander Libman, 2012. "Democracy and Growth: Is The Effect Non-Linear?," Economic Research Guardian, Weissberg Publishing, vol. 2(1), pages 99-120, May.
    16. Casper Hunnerup Dahl, 2014. "Parties and institutions: empirical evidence on veto players and the growth of government," Public Choice, Springer, vol. 159(3), pages 415-433, June.
    17. Libman, Alexander, 2008. "Democracy and growth: is the effect non-linear?," MPRA Paper 17795, University Library of Munich, Germany.
    18. Samuel Adams & Daniel Sakyi, 2012. "Globalization, Democracy, and Government Spending in Sub-Saharan Africa: Evidence from Panel Data," Chapters, in: Zlatan Delic (ed.), Globalization and Responsibility, IntechOpen.
    19. Abel Escribà-Folch, 2009. "Do authoritarian institutions mobilize economic cooperation?," Constitutional Political Economy, Springer, vol. 20(1), pages 71-93, March.
    20. Johannes Blum, 2020. "Democracy’s Third Wave and National Defense Spending," ifo Working Paper Series 339, ifo Institute - Leibniz Institute for Economic Research at the University of Munich.
    21. Fasoranti, Modupe Mary & Alimi, Rasaq Santos, 2017. "Government Size, Political Institutions and Output Growth in Nigeria," MPRA Paper 80562, University Library of Munich, Germany.
    22. Nouha Bougharriou & Walid Benayed & Foued Badr Gabsi, 2021. "Under Which Condition Does the Democratization of the Arab World Improve FDI?," Comparative Economic Studies, Palgrave Macmillan;Association for Comparative Economic Studies, vol. 63(2), pages 224-248, June.
    23. Aloys L. Prinz & Christian J. Sander, 2020. "Political leadership and the quality of public goods and services: Does religion matter?," Economics of Governance, Springer, vol. 21(4), pages 299-334, December.
    24. Morten Endrikat, 2017. "Natural resource rents, autocracy and the composition of government spending," MAGKS Papers on Economics 201727, Philipps-Universität Marburg, Faculty of Business Administration and Economics, Department of Economics (Volkswirtschaftliche Abteilung).
    25. Daniel Sakyi & Samuel Adams, 2012. "Democracy, Government Spending and Economic Growth: The Case of Ghana, 1960–2008," Margin: The Journal of Applied Economic Research, National Council of Applied Economic Research, vol. 6(3), pages 361-383, August.
    26. Sajjad Faraji Dizaji & Mohammad Reza Farzanegan, 2014. "Political Institutions and Government Spending Behavior in Iran," CESifo Working Paper Series 4620, CESifo.
    27. Balamatsias, Pavlos, 2018. "Democracy and government spending," MPRA Paper 84975, University Library of Munich, Germany.
    28. Dragoi Andreea, 2015. "Greece Crisis and The European Model of The Welfare State," Revista de Economie Mondiala / The Journal of Global Economics, Institute for World Economy, Romanian Academy, vol. 7(3).
    29. Johannes Blum, 2021. "Democracy’s third wave and national defense spending," Public Choice, Springer, vol. 189(1), pages 183-212, October.
    30. Abel L. Costa Fernandes & Paulo R. Mota, 2012. "The Present Sovereign Debt Crisis Of The Euro Zone Peripheral Countries: A Case Of Non-Mature Democracies And Less Developed Economies," FEP Working Papers 458, Universidade do Porto, Faculdade de Economia do Porto.
    31. Oualid Lajili and Philippe Gilles, 2018. "Financial Liberalization, Political Openness and Growth in Developing Countries: Relationship and Transmission Channels," Journal of Economic Development, Chung-Ang Unviersity, Department of Economics, vol. 43(1), pages 1-27, March.
    32. Joan Costa-Font & Ana Rico, 2006. "Vertical Competition in the Spanish National Health System (NHS)," Public Choice, Springer, vol. 128(3), pages 477-498, September.
    33. Profeta, Paola & Puglisi, Riccardo & Scabrosetti, Simona, 2013. "Does democracy affect taxation and government spending? Evidence from developing countries," Journal of Comparative Economics, Elsevier, vol. 41(3), pages 684-718.

  137. Kjell Hausken, 2004. "Mutual Raiding of Production and the Emergence of Exchange," Economic Inquiry, Western Economic Association International, vol. 42(4), pages 572-586, October.

    Cited by:

    1. Caruso, Raul, 2012. "Differentials in Property Rights in a two sector-economy," NEPS Working Papers 2/2012, Network of European Peace Scientists.
    2. Anderton, Charles H. & Carter, John R., 2007. "A Survey of Peace Economics," Handbook of Defense Economics, in: Keith Hartley & Todd Sandler (ed.), Handbook of Defense Economics, edition 1, volume 2, chapter 35, pages 1211-1258, Elsevier.
    3. Charles Anderton & John Carter, 2004. "Vulnerable Trade: The Dark Side of an Edgeworth Box," Working Papers 0411, College of the Holy Cross, Department of Economics.
    4. Caruso Raul, 2011. "On the Nature of Peace Economics," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 16(2), pages 1-13, January.
    5. Raul Caruso, 2010. "Butter, Guns And Ice-Cream Theory And Evidence From Sub-Saharan Africa," Defence and Peace Economics, Taylor & Francis Journals, vol. 21(3), pages 269-283.
    6. Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.
    7. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics - The Open-Access, Open-Assessment E-Journal (2007-2020), Kiel Institute for the World Economy (IfW Kiel), vol. 4, pages 1-38.
    8. Michelle R. Garfinkel & Stergios Skaperdas, 2006. "Economics of Conflict: An Overview," Working Papers 050623, University of California-Irvine, Department of Economics, revised Sep 2006.
    9. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    10. Antoine Pietri, 2017. "Les modèles de « rivalité coercitive » dans l’analyse économique des conflits," Revue d'économie politique, Dalloz, vol. 127(3), pages 307-352.
    11. Peter T. Leeson, 2007. "Trading with Bandits," Journal of Law and Economics, University of Chicago Press, vol. 50(2), pages 303-321.
    12. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    13. Tridimas, George, 2011. "The political economy of power-sharing," European Journal of Political Economy, Elsevier, vol. 27(2), pages 328-342, June.
    14. Leeson,Peter T., 2014. "Anarchy Unbound," Cambridge Books, Cambridge University Press, number 9781107025806.
    15. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    16. Hoffmann, Magnus, 2006. "Enforcement of Property Rights in a Barter Economy," MPRA Paper 3260, University Library of Munich, Germany.
    17. Anna Balestra & Raul Caruso, 2022. "Vaccines between War and Market," Working Papers 1019, European Centre of Peace Science, Integration and Cooperation (CESPIC), Catholic University 'Our Lady of Good Counsel'.
    18. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    19. Kjell Hausken, 2013. "Exchange of goods while investing into production and safety," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 23(1), pages 29-35.
    20. Caruso, Raul, 2007. "A Tentative Model of Conflict, Appropriation and Production in a two-sector Economy," MPRA Paper 4053, University Library of Munich, Germany.
    21. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    22. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    23. Raul Caruso & Jon Echevarria-Coco, 2023. "International prices and continuing conflict: Theory and evidence from sub-Saharan Africa (1980–2017)," Journal of Peace Research, Peace Research Institute Oslo, vol. 60(6), pages 889-905, November.

  138. Hausken, Kjell & Plumper, Thomas, 2002. "Containing Contagious Financial Crises: The Political Economy of Joint Intervention into the Asian Crisis," Public Choice, Springer, vol. 111(3-4), pages 209-236, June.

    Cited by:

    1. Welburn, Jonathan & Hausken, Kjell, 2014. "Game-Theoretic Perspectives on Financial Crises," UiS Working Papers in Economics and Finance 2014/22, University of Stavanger.
    2. Welburn, Jonathan W. & Hausken, Kjell, 2015. "A game theoretic model of economic crises," Applied Mathematics and Computation, Elsevier, vol. 266(C), pages 738-762.
    3. Coyne, Christopher J., 2011. "Constitutions and crisis," Journal of Economic Behavior & Organization, Elsevier, vol. 80(2), pages 351-357.
    4. Sorin BURNETE, 2009. "Emerging Economies Faced With The Downside Of Financial Globalization: Hedges And Way Outs," Review of Economic and Business Studies, Alexandru Ioan Cuza University, Faculty of Economics and Business Administration, issue 3, pages 41-55, May.
    5. Hausken, Kjell & Plümper, Thomas & Schneider, Gerald, 2002. "The Trilemma of the Protectionist Autocrat: An Assessment of the Political Determinants of Foreign Economic Liberalization," MPRA Paper 75866, University Library of Munich, Germany.
    6. Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
    7. Thomas Plümper & Vera E. Troeger, 2006. "Fear of Floating and the External Effects of Currency Unions," The Institute for International Integration Studies Discussion Paper Series iiisdp181, IIIS.
    8. Hausken, Kjell & Mattli, Walter & Plümper, Thomas, 2006. "Widening versus Deepening of International Unions," MPRA Paper 75882, University Library of Munich, Germany.
    9. Troeger, Vera, 2012. "Monetary Policy Flixibility in floating Exchange Rate Regimes: Currency Denomination and Import Shares," CAGE Online Working Paper Series 82, Competitive Advantage in the Global Economy (CAGE).
    10. Robin Pope & Reinhard Selten & Johannes Kaiser & Sebastian Kube & Jürgen Hagen, 2012. "Exchange rate determination: a theory of the decisive role of central bank cooperation and conflict," International Economics and Economic Policy, Springer, vol. 9(1), pages 13-51, March.
    11. Pope, Robin & Selten, Reinhard & Kube, Sebastian & von Hagen, Jürgen, 2009. "Prominent Numbers, Indices and Ratios in Exchange Rate Determination and Financial Crashes: in Economists’ Models, in the Field and in the Laboratory," Bonn Econ Discussion Papers 18/2009, University of Bonn, Bonn Graduate School of Economics (BGSE).
    12. Welburn, Jonathan William & Hausken, Kjell, 2015. "A Game-Theoretic Model with Empirics of Economic Crises," UiS Working Papers in Economics and Finance 2015/7, University of Stavanger.
    13. Pope, Robin & Selten, Reinhard & Kaiser, Johannes & Kube, Sebastian & von Hagen, Jürgen, 2007. "The damage from clean floats: From an anti-inflationary monetary policy," Bonn Econ Discussion Papers 19/2007, University of Bonn, Bonn Graduate School of Economics (BGSE).
    14. Jonathan William Welburn & Kjell Hausken, 2017. "Game Theoretic Modeling of Economic Systems and the European Debt Crisis," Computational Economics, Springer;Society for Computational Economics, vol. 49(2), pages 177-226, February.
    15. Jonathan W. Welburn, 2020. "Crises Beyond Belief: Findings on Contagion, the Role of Beliefs, and the Eurozone Debt Crisis from a Borrower–Lender Game," Computational Economics, Springer;Society for Computational Economics, vol. 56(2), pages 263-317, August.
    16. Pope, Robin & Selten, Reinhard & Kube, Sebastian & von Hagen, Jürgen, 2009. "Managed Floats to Damp Shocks like 1982-5 and 2006-9: Field and Laboratory Evidence for Chinese Interest in a Single World Currency," Bonn Econ Discussion Papers 26/2009, University of Bonn, Bonn Graduate School of Economics (BGSE).
    17. Anubha Goel & Aparna Mehra, 2019. "Analyzing Contagion Effect in Markets During Financial Crisis Using Stochastic Autoregressive Canonical Vine Model," Computational Economics, Springer;Society for Computational Economics, vol. 53(3), pages 921-950, March.
    18. Jiang, Hai & Tang, Shenfeng & Li, Lifang & Xu, Fangming & Di, Qian, 2022. "Re-examining the Contagion Channels of Global Financial Crises: Evidence from the Twelve Years since the US Subprime Crisis," Research in International Business and Finance, Elsevier, vol. 60(C).

  139. Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.

    Cited by:

    1. Insua, David Rios & Ruggeri, Fabrizio & Soyer, Refik & Wilson, Simon, 2020. "Advances in Bayesian decision making in reliability," European Journal of Operational Research, Elsevier, vol. 282(1), pages 1-18.
    2. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    3. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    4. Stefano Barbieri & David Malueg, 2014. "Group efforts when performance is determined by the “best shot”," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 56(2), pages 333-373, June.
    5. Claus Dierksmeier, 2020. "From Jensen to Jensen: Mechanistic Management Education or Humanistic Management Learning?," Journal of Business Ethics, Springer, vol. 166(1), pages 73-87, September.
    6. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    7. Martina de Gramatica & Fabio Massacci & Woohyun Shim & Uğur Turhan & Julian Williams, 2017. "Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 372-395, February.
    8. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    9. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    10. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    11. Zhao, Yunfei & Huang, Linan & Smidts, Carol & Zhu, Quanyan, 2020. "Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    12. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    13. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    14. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    15. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    16. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    17. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    18. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    19. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    20. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    21. Namun Cho & Tae-Seok Jang, 2019. "Asset Market Volatility and New Keynesian Macroeconomics: A Game-Theoretic Approach," Computational Economics, Springer;Society for Computational Economics, vol. 54(1), pages 245-266, June.
    22. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    23. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    24. Kirchgässner, Gebhard, 2010. "On minimal morals," European Journal of Political Economy, Elsevier, vol. 26(3), pages 330-339, September.
    25. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    26. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    27. Shouqiang Wang & David Banks, 2011. "Network routing for insurgency: An adversarial risk analysis framework," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(6), pages 595-607, September.
    28. Grant, Matthew J. & Stewart, Mark G., 2017. "Modelling improvised explosive device attacks in the West – Assessing the hazard," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 345-354.
    29. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    30. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    31. Sang-Hyun Kim & Brian Tomlin, 2013. "Guilt by Association: Strategic Failure Prevention and Recovery Capacity Investments," Management Science, INFORMS, vol. 59(7), pages 1631-1649, July.
    32. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    33. Ryoji Makino & Kenju Akai & Jun-ichi Takeshita & Takanori Kudo & Keiko Aoki, 2021. "Effect of disclosing the relation between effort and unit reliability on system reliability: An economic experiment," PLOS ONE, Public Library of Science, vol. 16(4), pages 1-18, April.
    34. Kjell Hausken, 2018. "Formalizing the Precautionary Principle Accounting for Strategic Interaction, Natural Factors, and Technological Factors," Risk Analysis, John Wiley & Sons, vol. 38(10), pages 2055-2072, October.
    35. Askeland, Tore & Flage, Roger & Aven, Terje, 2017. "Moving beyond probabilities – Strength of knowledge characterisations applied to security," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 196-205.
    36. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    37. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    38. Edward JM Colbert & Alexander Kott & Lawrence P Knachel, 2020. "The game-theoretic model and experimental investigation of cyber wargaming," The Journal of Defense Modeling and Simulation, , vol. 17(1), pages 21-38, January.
    39. Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
    40. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    41. Longxia Qian & Ren Zhang & Mei Hong & Hongrui Wang & Lizhi Yang, 2016. "A new multiple integral model for water shortage risk assessment and its application in Beijing, China," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 80(1), pages 43-67, January.
    42. Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
    43. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    44. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    45. Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.

  140. Hausken, Kjell & Moxnes, John F., 2002. "Stochastic conditional and unconditional warfare," European Journal of Operational Research, Elsevier, vol. 140(1), pages 61-87, July.

    Cited by:

    1. Duffey, Romney B, 2017. "Dynamic theory of losses in wars and conflicts," European Journal of Operational Research, Elsevier, vol. 261(3), pages 1013-1027.
    2. Liles, Joseph M. & Robbins, Matthew J. & Lunday, Brian J., 2023. "Improving defensive air battle management by solving a stochastic dynamic assignment problem via approximate dynamic programming," European Journal of Operational Research, Elsevier, vol. 305(3), pages 1435-1449.
    3. Anelí Bongers & José L. Torres, 2021. "A bottleneck combat model: an application to the Battle of Thermopylae," Operational Research, Springer, vol. 21(4), pages 2859-2877, December.
    4. Kjell Hausken & John F. Moxnes, 2005. "Approximations and empirics for stochastic war equations," Naval Research Logistics (NRL), John Wiley & Sons, vol. 52(7), pages 682-700, October.
    5. C-Y Hung & G K Yang & P S Deng & T Tang & S-P Lan & P Chu, 2005. "Fitting Lanchester's square law to the Ardennes Campaign," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 56(8), pages 942-946, August.
    6. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    7. Michael J Armstrong, 2014. "The salvo combat model with a sequential exchange of fire," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(10), pages 1593-1601, October.
    8. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    9. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    10. Kress, Moshe & Caulkins, Jonathan P. & Feichtinger, Gustav & Grass, Dieter & Seidl, Andrea, 2018. "Lanchester model for three-way combat," European Journal of Operational Research, Elsevier, vol. 264(1), pages 46-54.
    11. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    12. Liu, Liwei & Yu, Jun & Guo, Zhi, 2006. "A kind of stochastic duel model for guerrilla war," European Journal of Operational Research, Elsevier, vol. 171(2), pages 430-438, June.

  141. Kjell Hausken & Matthias Mohr, 2001. "The value of a player in n-person games," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 18(3), pages 465-483.

    Cited by:

    1. Alessio Guandalini & Claudio Ceccarelli, 2022. "Impact measurement and dimension reduction of auxiliary variables in calibration estimator using the Shapley decomposition," Statistical Methods & Applications, Springer;Società Italiana di Statistica, vol. 31(4), pages 759-784, October.
    2. Tobias Hiller, 2023. "Measuring the Difficulties in Forming a Coalition Government," Games, MDPI, vol. 14(2), pages 1-15, March.
    3. Musegaas, M. & Borm, P.E.M. & Quant, M., 2015. "Three-Valued Simple Games," Discussion Paper 2015-026, Tilburg University, Center for Economic Research.
    4. Julien Reynaud & Fabien Lange & Lukasz Gatarek & Christian Thimann, 2007. "Proximity in coalition building," Working Paper Series 0808, Óbuda University, Keleti Faculty of Business and Management, revised Jul 2008.
    5. Bernd Irlenbusch & Matthias Sutter, 2006. "An experimental analysis of voting in the Stability and Growth Pact in the European Monetary Union," Public Choice, Springer, vol. 129(3), pages 417-434, December.
    6. Kjell Hausken, 2020. "The Shapley value of coalitions to other coalitions," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-10, December.
    7. Filipe Bandeiras & Álvaro Gomes & Mário Gomes & Paulo Coelho, 2023. "Application and Challenges of Coalitional Game Theory in Power Systems for Sustainable Energy Trading Communities," Energies, MDPI, vol. 16(24), pages 1-42, December.

  142. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.

    Cited by:

    1. Kjell Hausken, 2006. "The Stability Of Anarchy And Breakdown Of Production," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 589-603.
    2. Kjell Hausken & John F. Knutsen, 2002. "The Birth, Adjustment and Death of States," Public Economics 0205004, University Library of Munich, Germany.
    3. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics - The Open-Access, Open-Assessment E-Journal (2007-2020), Kiel Institute for the World Economy (IfW Kiel), vol. 4, pages 1-38.
    4. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    5. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.

  143. Hausken, Kjell, 2000. "Cooperation and between-group competition," Journal of Economic Behavior & Organization, Elsevier, vol. 42(3), pages 417-425, July.

    Cited by:

    1. Rafael Reuveny & John W. Maxwell, "undated". "Conflict and Renewable Resources," Working Papers 2004-26, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy.
    2. Kjell Hausken, 2006. "The Stability Of Anarchy And Breakdown Of Production," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 589-603.
    3. Heinrich Ursprung, 2011. "The Evolution of Sharing Rules in Rent Seeking Contests: Incentives Crowd Out Cooperation," Working Paper Series of the Department of Economics, University of Konstanz 2011-02, Department of Economics, University of Konstanz.
    4. Tverskoi, Denis & Senthilnathan, Athmanathan & Gavrilets, Sergey, 2021. "The dynamics of cooperation, power, and inequality in a group-structured society," SocArXiv 24svr, Center for Open Science.
    5. Jacobsson, Adam, 2005. "War and Peace - Cyclical Phenomena?," Research Papers in Economics 2005:8, Stockholm University, Department of Economics.
    6. Dieter Bös, 2004. "Contests Among Bureaucrats," Public Choice, Springer, vol. 119(3_4), pages 359-380, June.
    7. Bös, Dieter, 2002. "Contests Among Bureaucrats," Bonn Econ Discussion Papers 27/2002, University of Bonn, Bonn Graduate School of Economics (BGSE).
    8. Volker Müller-Benedict, 2002. "Xenophobia and Social Closure: a Development of a Model from Coleman," Journal of Artificial Societies and Social Simulation, Journal of Artificial Societies and Social Simulation, vol. 5(1), pages 1-2.
    9. Dieter Bös, 2002. "Contests Among Bureaucrats," CESifo Working Paper Series 807, CESifo.
    10. Juan Camilo Cardenas & Anna Dreber & Emma von Essen & Eva Ranehill, 2015. "Cooperativeness and competitiveness in children," Documentos CEDE 12644, Universidad de los Andes, Facultad de Economía, CEDE.
    11. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    12. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    13. Philippe Grégoire & Arthur Robson, 2003. "Imitation, Group Selection and Cooperation," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 5(03), pages 229-247.
    14. Rafael Reuveny & John W. Maxwell, 2001. "Conflict and Renewable Resources," Journal of Conflict Resolution, Peace Science Society (International), vol. 45(6), pages 719-742, December.
    15. Sadiraj, V. & Tuinstra, J. & Winden, F. van, 2004. "Interest Group Size Dynamics and Policymaking," CeNDEF Working Papers 04-06, Universiteit van Amsterdam, Center for Nonlinear Dynamics in Economics and Finance.
    16. Wang, Jianwei & Xu, Wenshu & Chen, Wei & Yu, Fengyuan & He, Jialu, 2021. "Inter-group selection of strategy promotes cooperation in public goods game," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 583(C).
    17. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.

  144. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.

    Cited by:

    1. Hausken, Kjell, 2000. "Cooperation and between-group competition," Journal of Economic Behavior & Organization, Elsevier, vol. 42(3), pages 417-425, July.
    2. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    3. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    4. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    5. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.

  145. Kjell Hausken, 1997. "Game-theoretic and Behavioral Negotiation Theory," Group Decision and Negotiation, Springer, vol. 6(6), pages 511-528, December.

    Cited by:

    1. Beuk, Frederik & Rubin, Eran, 2021. "Data-based negotiator allocation management," Business Horizons, Elsevier, vol. 64(4), pages 537-552.
    2. Hendrik Hakenes & Svetlana Katolnik, 2018. "Optimal Team Size and Overconfidence," Group Decision and Negotiation, Springer, vol. 27(4), pages 665-687, August.
    3. Kjell Hausken, 2018. "Janet Tai Landa: Economic success of Chinese merchants in Southeast Asia: identity, ethnic cooperation and conflict: integrating the social sciences with evolutionary biology," Journal of Bioeconomics, Springer, vol. 20(2), pages 251-256, July.
    4. Luis C. Dias & Rudolf Vetschera, 2022. "Two-party Bargaining Processes Based on Subjective Expectations: A Model and a Simulation Study," Group Decision and Negotiation, Springer, vol. 31(4), pages 843-869, August.
    5. Ewa Roszkowska & Tom R. Burns, 2010. "Fuzzy Bargaining Games: Conditions of Agreement, Satisfaction, and Equilibrium," Group Decision and Negotiation, Springer, vol. 19(5), pages 421-440, September.

  146. Kjell Hausken & Thomas Plãœmper, 1996. "Hegemonic Decline and International Leadership," Politics & Society, , vol. 24(3), pages 273-295, September.

    Cited by:

    1. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.

  147. Kjell Hausken, 1995. "Intra-Level and Inter-Level Interaction," Rationality and Society, , vol. 7(4), pages 465-488, October.

    Cited by:

    1. Andreas Ortmann & Ralph Hertwig, 2002. "The Costs of Deception: Evidence from Psychology," Experimental Economics, Springer;Economic Science Association, vol. 5(2), pages 111-131, October.
    2. Fenling Feng & Chengguang Liu & Jiaqi Zhang, 2020. "China's Railway Transportation Safety Regulation System Based on Evolutionary Game Theory and System Dynamics," Risk Analysis, John Wiley & Sons, vol. 40(10), pages 1944-1966, October.
    3. Johannes Münster & Klaas Staal, 2012. "How organizational structure can reduce rent-seeking," Public Choice, Springer, vol. 150(3), pages 579-594, March.
    4. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.
    5. Gunnthorsdottir, Anna & Rapoport, Amnon, 2006. "Embedding social dilemmas in intergroup competition reduces free-riding," Organizational Behavior and Human Decision Processes, Elsevier, vol. 101(2), pages 184-199, November.
    6. Tverskoi, Denis & Senthilnathan, Athmanathan & Gavrilets, Sergey, 2021. "The dynamics of cooperation, power, and inequality in a group-structured society," SocArXiv 24svr, Center for Open Science.
    7. Hausken, Kjell, 2000. "Cooperation and between-group competition," Journal of Economic Behavior & Organization, Elsevier, vol. 42(3), pages 417-425, July.
    8. Kjell Hausken & Andreas Ortmann, 2007. "A first experimental test of multilevel game theory: the PD case," Applied Economics Letters, Taylor & Francis Journals, vol. 15(4), pages 261-264.
    9. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.

  148. Hausken, Kjell, 1995. "The dynamics of within-group and between-group interaction," Journal of Mathematical Economics, Elsevier, vol. 24(7), pages 655-687.

    Cited by:

    1. Baik, Kyung Hwan & Lee, Sanghack, 2007. "Collective rent seeking when sharing rules are private information," European Journal of Political Economy, Elsevier, vol. 23(3), pages 768-776, September.
    2. Anna Gunnthorsdottir & Amnon Rapoport, 2003. "The effect of sharing rules on group competition," Experimental 0307003, University Library of Munich, Germany.
    3. Andreas Ortmann & Ralph Hertwig, 2002. "The Costs of Deception: Evidence from Psychology," Experimental Economics, Springer;Economic Science Association, vol. 5(2), pages 111-131, October.
    4. Kyung Hwan Baik, 2016. "Endogenous Group Formation in Contests: Unobservable Sharing Rules," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 25(2), pages 400-419, April.
    5. Fenling Feng & Chengguang Liu & Jiaqi Zhang, 2020. "China's Railway Transportation Safety Regulation System Based on Evolutionary Game Theory and System Dynamics," Risk Analysis, John Wiley & Sons, vol. 40(10), pages 1944-1966, October.
    6. Benndorf, Volker & Martínez-Martínez, Ismael & Normann, Hans-Theo, 2021. "Games with coupled populations: An experiment in continuous time," Journal of Economic Theory, Elsevier, vol. 195(C).
    7. Sherrill Shaffer & Jason F. Shogren, 2008. "Related Contests: A General Parameterization," CAMA Working Papers 2008-27, Centre for Applied Macroeconomic Analysis, Crawford School of Public Policy, The Australian National University.
    8. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.
    9. Hausken, Kjell, 2000. "Cooperation and between-group competition," Journal of Economic Behavior & Organization, Elsevier, vol. 42(3), pages 417-425, July.
    10. Dieter Bös, 2004. "Contests Among Bureaucrats," Public Choice, Springer, vol. 119(3_4), pages 359-380, June.
    11. Kjell Hausken, 2018. "Janet Tai Landa: Economic success of Chinese merchants in Southeast Asia: identity, ethnic cooperation and conflict: integrating the social sciences with evolutionary biology," Journal of Bioeconomics, Springer, vol. 20(2), pages 251-256, July.
    12. Bös, Dieter, 2002. "Contests Among Bureaucrats," Bonn Econ Discussion Papers 27/2002, University of Bonn, Bonn Graduate School of Economics (BGSE).
    13. Dieter Bös, 2002. "Contests Among Bureaucrats," CESifo Working Paper Series 807, CESifo.
    14. Kyung Hwan Baik & Bouwe R. Dijkstra & Sanghack Lee & Shi Young Lee, 2005. "The equivalence of rent-seeking outcomes for competitive-share and strategic groups," Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 323-328, Springer.
    15. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    16. Kjell Hausken, 1995. "Intra-Level and Inter-Level Interaction," Rationality and Society, , vol. 7(4), pages 465-488, October.
    17. Sun, Guang-Zhen & Ng, Yew-Kwang, 1999. "The Effect of Number and Size of Interest Groups on Social Rent Dissipation," Public Choice, Springer, vol. 101(3-4), pages 251-265, December.
    18. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    19. Noh, Suk Jae, 1999. "A General Equilibrium Model of Two Group Conflict with Endogenous Intra-group Sharing Rules," Public Choice, Springer, vol. 98(3-4), pages 251-267, March.
    20. Philippe Grégoire & Arthur Robson, 2003. "Imitation, Group Selection and Cooperation," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 5(03), pages 229-247.
    21. Kyung Hwan Baik & Dongryul Lee, 2012. "Do Rent‐Seeking Groups Announce Their Sharing Rules?," Economic Inquiry, Western Economic Association International, vol. 50(2), pages 348-363, April.
    22. Baik, Kyung Hwan & Lee, Sanghack, 2001. "Strategic Groups and Rent Dissipation," Economic Inquiry, Western Economic Association International, vol. 39(4), pages 672-684, October.
    23. Sadiraj, V. & Tuinstra, J. & Winden, F. van, 2004. "Interest Group Size Dynamics and Policymaking," CeNDEF Working Papers 04-06, Universiteit van Amsterdam, Center for Nonlinear Dynamics in Economics and Finance.
    24. Emerson M. S. Niou & Guofu Tan, 2005. "External Threat and Collective Action," Economic Inquiry, Western Economic Association International, vol. 43(3), pages 519-530, July.
    25. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.
    26. Sherrill Shaffer & Jason Shogren, 2008. "Infinitely repeated contests: How strategic interaction affects the efficiency of governance," Regulation & Governance, John Wiley & Sons, vol. 2(2), pages 234-252, June.

Chapters

  1. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

    Cited by:

    1. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    2. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.

  2. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
    3. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    4. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    5. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    6. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    7. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    8. Yao Zhang & Hoang Pham, 2016. "Reliability and Maintenance of the Surveillance Systems Considering Two Dependent Processes," Springer Series in Reliability Engineering, in: Hoang Pham (ed.), Quality and Reliability Management and Its Applications, pages 277-306, Springer.
    9. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    10. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    11. Ha Hwang & JiYoung Park, 2019. "The Game-Theoretic National Interstate Economic Model: Economically Optimizing U.S. Aviation Security Policies Against Terrorist Attacks," Advances in Spatial Science, in: Yasuhide Okuyama & Adam Rose (ed.), Advances in Spatial and Economic Modeling of Disaster Impacts, chapter 0, pages 399-421, Springer.
    12. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    13. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    14. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    15. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    16. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    17. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    18. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    19. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    20. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    21. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    22. Yang Yang & Adam R. Pah & Brian Uzzi, 2019. "Quantifying the future lethality of terror organizations," Proceedings of the National Academy of Sciences, Proceedings of the National Academy of Sciences, vol. 116(43), pages 21463-21468, October.
    23. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    24. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    25. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    26. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    27. Subhayu Bandyopadhyay & Todd Sandler, 2020. "Counterterrorism Policy: Spillovers, Regime Stability, and Corner Solutions," Working Papers 2020-015, Federal Reserve Bank of St. Louis.
    28. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    29. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    30. Chen, Chao & Yang, Ming & Reniers, Genserik, 2021. "A dynamic stochastic methodology for quantifying HAZMAT storage resilience," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    31. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    32. Yupo Chan, 2015. "Network Throughput and Reliability: Preventing Hazards and Attacks Through Gaming—Part 2: A Research Agenda," Springer Series in Reliability Engineering, in: Kjell Hausken & Jun Zhuang (ed.), Game Theoretic Analysis of Congestion, Safety and Security, edition 127, pages 141-172, Springer.
    33. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    34. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    35. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    36. Yupo Chan, 2015. "Network Throughput and Reliability: Preventing Hazards and Attacks Through Gaming—Part I: Modeling," Springer Series in Reliability Engineering, in: Kjell Hausken & Jun Zhuang (ed.), Game Theoretic Analysis of Congestion, Safety and Security, edition 127, pages 113-139, Springer.
    37. Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    38. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    39. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    40. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    41. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    42. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
    43. Amanda Melendez & David Caballero-Russi & Mariantonieta Gutierrez Soto & Luis Felipe Giraldo, 2022. "Computational models of community resilience," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 111(2), pages 1121-1152, March.
    44. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    45. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    46. Oded Berman & Arieh Gavious & Rongbing Huang, 2011. "Location of response facilities: a simultaneous game between state and terrorist," International Journal of Operational Research, Inderscience Enterprises Ltd, vol. 10(1), pages 102-120.
    47. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    48. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    49. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

Books

  1. Kjell Hausken & Jun Zhuang (ed.), 2015. "Game Theoretic Analysis of Congestion, Safety and Security," Springer Series in Reliability Engineering, Springer, edition 127, number 978-3-319-11674-7, January.

    Cited by:

    1. Nogal, Maria & O'Connor, Alan & Caulfield, Brian & Martinez-Pastor, Beatriz, 2016. "Resilience of traffic networks: From perturbation to recovery via a dynamic restricted equilibrium model," Reliability Engineering and System Safety, Elsevier, vol. 156(C), pages 84-96.
    2. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    3. R. Piccinelli & G. Sansavini & R. Lucchetti & E. Zio, 2017. "A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2182-2190, November.
    4. Li, Yongli & Gao, Xin & Xu, Zhiwei & Zhou, Xuanrui, 2018. "Network-based queuing model for simulating passenger throughput at an airport security checkpoint," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 13-24.
    5. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    6. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    7. Hansen, Mark & Liu, Yi, 2015. "Airline competition and market frequency: A comparison of the s-curve and schedule delay models," Transportation Research Part B: Methodological, Elsevier, vol. 78(C), pages 301-317.

  2. Kjell Hausken & Jun Zhuang (ed.), 2015. "Game Theoretic Analysis of Congestion, Safety and Security," Springer Series in Reliability Engineering, Springer, edition 127, number 978-3-319-13009-5, January.

    Cited by:

    1. Nogal, Maria & O'Connor, Alan & Caulfield, Brian & Martinez-Pastor, Beatriz, 2016. "Resilience of traffic networks: From perturbation to recovery via a dynamic restricted equilibrium model," Reliability Engineering and System Safety, Elsevier, vol. 156(C), pages 84-96.
    2. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    3. R. Piccinelli & G. Sansavini & R. Lucchetti & E. Zio, 2017. "A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2182-2190, November.
    4. Li, Yongli & Gao, Xin & Xu, Zhiwei & Zhou, Xuanrui, 2018. "Network-based queuing model for simulating passenger throughput at an airport security checkpoint," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 13-24.
    5. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    6. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    7. Hansen, Mark & Liu, Yi, 2015. "Airline competition and market frequency: A comparison of the s-curve and schedule delay models," Transportation Research Part B: Methodological, Elsevier, vol. 78(C), pages 301-317.

  3. Kjell Hausken & Mthuli Ncube, 2013. "Quantitative Easing and Its Impact in the US, Japan, the UK and Europe," SpringerBriefs in Economics, Springer, edition 127, number 978-1-4614-9646-5, October.

    Cited by:

    1. Fabo, Brian & Jančoková, Martina & Kempf, Elisabeth & Pástor, Ľuboš, 2021. "Fifty shades of QE: Comparing findings of central bankers and academics," Journal of Monetary Economics, Elsevier, vol. 120(C), pages 1-20.
    2. Fabo, Brian & Jančoková, Martina & Kempf, Elisabeth & Pástor, Ľuboš, 2024. "Fifty shades of QE: Robust evidence," Journal of Banking & Finance, Elsevier, vol. 159(C).
    3. Aleksandra Nocoń, 2020. "Sustainable Approach to the Normalization Process of the UK’s Monetary Policy," Sustainability, MDPI, vol. 12(21), pages 1-14, November.
    4. Jakub Jakl, 2020. "Outreach and Effects of the ECB Corporate Sector Purchase Programme," Prague Economic Papers, Prague University of Economics and Business, vol. 2020(3), pages 291-314.
    5. Engelbert Stockhammer & Collin Constantine & Severin Reissl, 2016. "Explaining the Euro crisis: Current account imbalances, credit booms and economic policy in different economic paradigms," Working Papers PKWP1617, Post Keynesian Economics Society (PKES).
    6. Gibran Watfe, 2015. "The Impact of the ECB's Asset Purchase Programmes on Sovereign Bond Spreads in the Euro Area," Bruges European Economic Research Papers 35, European Economic Studies Department, College of Europe.
    7. Cohen, Lior, 2023. "The effects of the BoJ's ETF purchases on equities and corporate investment," Economic Modelling, Elsevier, vol. 129(C).
    8. Grahame Johnson & Sharon Kozicki & Romanos Priftis & Lena Suchanek & Jonathan Witmer & Jing Yang, 2020. "Implementation and Effectiveness of Extended Monetary Policy Tools: Lessons from the Literature," Discussion Papers 2020-16, Bank of Canada.
    9. Dana Kiseľáková & Paulina Filip & Erika Onuferová & Tomáš Valentiny, 2020. "The Impact of Monetary Policies on the Sustainable Economic and Financial Development in the Euro Area Countries," Sustainability, MDPI, vol. 12(22), pages 1-21, November.
    10. Marie‐Helene Gagnon & Celine Gimet, 2020. "Unconventional economic policies and sentiment: An international assessment," The World Economy, Wiley Blackwell, vol. 43(6), pages 1544-1591, June.

IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.