IDEAS home Printed from https://ideas.repec.org/r/kap/jrisku/v26y2003i2-3p201-29.html
   My bibliography  Save this item

The Ecology of Terror Defense

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
  2. Steiner, Lasse & Frey, Bruno S., 2012. "Correcting the Imbalances of the World Heritage List," EBLA Working Papers 201206, University of Turin.
  3. Geoffrey Heal & Howard Kunreuther, 2003. "You Only Die Once: Managing Discrete Interdependent Risks," NBER Working Papers 9885, National Bureau of Economic Research, Inc.
  4. Xueli Hu & Fujun Lai & Gufan Chen & Rongcheng Zou & Qingxiang Feng, 2019. "Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification," Sustainability, MDPI, vol. 11(5), pages 1-16, March.
  5. W. Kip Viscusi & Richard J. Zeckhauser, 2017. "Recollection Bias and Its Underpinnings: Lessons from Terrorism Risk Assessments," Risk Analysis, John Wiley & Sons, vol. 37(5), pages 969-981, May.
  6. Seidl, Andrea & Kaplan, Edward H. & Caulkins, Jonathan P. & Wrzaczek, Stefan & Feichtinger, Gustav, 2016. "Optimal control of a terror queue," European Journal of Operational Research, Elsevier, vol. 248(1), pages 246-256.
  7. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
  8. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
  9. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
  10. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
  11. Louis Anthony Cox, Jr, 2009. "Improving Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 336-341, March.
  12. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
  13. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
  14. Edward H. Kaplan & Alex Mintz & Shaul Mishal, 2006. "Tactical Prevention of Suicide Bombings in Israel," Interfaces, INFORMS, vol. 36(6), pages 553-561, December.
  15. Thomann, Christian & Schulenburg, J.-Matthias, 2006. "Supply and Demand for Terrorism Insurance: Lessons from Germany," Hannover Economic Papers (HEP) dp-340, Leibniz Universität Hannover, Wirtschaftswissenschaftliche Fakultät.
  16. Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
  17. Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
  18. Meyer Sunniva F., 2011. "Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 17(1), pages 1-37, September.
  19. Marco Pelliccia, 2020. "Decentralized Defence of a (Directed) Network Structure," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
  20. Howard C. Kunreuther & Erwann O. Michel-Kerjan, 2007. "Evaluating The Effectiveness of Terrorism Risk Financing Solutions," NBER Working Papers 13359, National Bureau of Economic Research, Inc.
  21. Howard Kunreuther & Erwann Michel-Kerjan & Beverly Porter, 2003. "Assessing, Managing, and Financing Extreme Events: Dealing with Terrorism," NBER Working Papers 10179, National Bureau of Economic Research, Inc.
  22. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
  23. Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
  24. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
  25. McGraw, A. Peter & Todorov, Alexander & Kunreuther, Howard, 2011. "A policy maker's dilemma: Preventing terrorism or preventing blame," Organizational Behavior and Human Decision Processes, Elsevier, vol. 115(1), pages 25-34, May.
  26. Heikkila, Jaakko, 2006. "Economics of invasive alien species: pre-emptive versus reactive control," Discussion Papers 11865, MTT Agrifood Research Finland.
  27. Sanghoon Lee, 2010. "Dynamic Inconsistency in Counterterrorism," Conflict Management and Peace Science, Peace Science Society (International), vol. 27(4), pages 369-385, September.
  28. Bayón, L. & Fortuny Ayuso, P. & García-Nieto, P.J. & Grau, J.M. & Ruiz, M.M., 2019. "Optimal control of counter-terrorism tactics," Applied Mathematics and Computation, Elsevier, vol. 347(C), pages 477-491.
  29. Stranlund, John K. & Field, Barry C., 2006. "On the Production of Homeland Security Under True Uncertainty," Working Paper Series 14505, University of Massachusetts, Amherst, Department of Resource Economics.
  30. Lakdawalla, Darius & Zanjani, George, 2005. "Insurance, self-protection, and the economics of terrorism," Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
  31. Jonathan S. Feinstein & Edward H. Kaplan, 2010. "Analysis of a Strategic Terror Organization," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 281-302, April.
  32. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
  33. Darius Lakdawalla & Eric Talley, 2006. "Optimal Liability for Terrorism," NBER Working Papers 12578, National Bureau of Economic Research, Inc.
  34. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
  35. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
  36. W. Kip Viscusi & Richard J. Zeckhauser, 2005. "Recollection Bias and the Combat of Terrorism," The Journal of Legal Studies, University of Chicago Press, vol. 34(1), pages 27-55, January.
  37. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
  38. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
  39. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
  40. A. J. Novak & G. Feichtinger & G. Leitmann, 2010. "A Differential Game Related to Terrorism: Nash and Stackelberg Strategies," Journal of Optimization Theory and Applications, Springer, vol. 144(3), pages 533-555, March.
  41. G. Feichtinger & A. J. Novak, 2008. "Terror and Counterterror Operations: Differential Game with Cyclical Nash Solution," Journal of Optimization Theory and Applications, Springer, vol. 139(3), pages 541-556, December.
  42. Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
  43. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
  44. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
  45. Edieal J. Pinker, 2007. "An Analysis of Short-Term Responses to Threats of Terrorism," Management Science, INFORMS, vol. 53(6), pages 865-880, June.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.