IDEAS home Printed from https://ideas.repec.org/r/kap/jrisku/v26y2003i2-3p231-49.html
   My bibliography  Save this item

Interdependent Security

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Tilman Bruck, 2005. "An Economic Analysis Of Security Policies," Defence and Peace Economics, Taylor & Francis Journals, vol. 16(5), pages 375-389.
  2. Roumani, Yaman & Nwankpa, Joseph K. & Roumani, Yazan F., 2016. "Examining the relationship between firm’s financial records and security vulnerabilities," International Journal of Information Management, Elsevier, vol. 36(6), pages 987-994.
  3. Carolyn Kousky & Erzo Luttmer & Richard Zeckhauser, 2006. "Private investment and government protection," Journal of Risk and Uncertainty, Springer, vol. 33(1), pages 73-100, September.
  4. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
  5. Hannah Brenkert‐Smith & Katherine L. Dickinson & Patricia A. Champ & Nicholas Flores, 2013. "Social Amplification of Wildfire Risk: The Role of Social Interactions and Information Sources," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 800-817, May.
  6. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
  7. Hare, Forrest & Goldstein, Jonathan, 2010. "The interdependent security problem in the defense industrial base: An agent-based model on a social network," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 128-139.
  8. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
  9. Peter H. Kriss & Roberto Weber, 2013. "Organizational formation and change: lessons from economic laboratory experiments," Chapters, in: Anna Grandori (ed.), Handbook of Economic Organization, chapter 14, Edward Elgar Publishing.
  10. Tim Lohse & Julio R. Robledo & Ulrich Schmidt, 2012. "Self‐Insurance and Self‐Protection as Public Goods," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 79(1), pages 57-76, March.
  11. Liying Mu & Milind Dawande & Xianjun Geng & Vijay Mookerjee, 2016. "Milking the Quality Test: Improving the Milk Supply Chain Under Competing Collection Intermediaries," Management Science, INFORMS, vol. 62(5), pages 1259-1277, May.
  12. Mohamed Belhaj & Frédéric Deroian, 2010. "Endogenous effort in communication networks under strategic complementarity," International Journal of Game Theory, Springer;Game Theory Society, vol. 39(3), pages 391-408, July.
  13. Jentzsch, Nicola, 2015. "What Is Special in the Economics of Cybersecurity and Privacy?," EconStor Research Reports 126227, ZBW - Leibniz Information Centre for Economics.
  14. Stephan Kroll & Aric P. Shafran, 2018. "Spatial externalities and risk in interdependent security games," Journal of Risk and Uncertainty, Springer, vol. 56(3), pages 237-257, June.
  15. Konrad, Kai A. & Morath, Florian, 2023. "How to preempt attacks in multi-front conflict with limited resources," European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
  16. Diego Cerdeiro & Marcin Dziubinski & Sanjeev Goyal, 2015. "Contagion Risk and Network Design," Working Papers 2015.56, Fondazione Eni Enrico Mattei.
  17. Martin Eling, 2013. "Recent Research Developments Affecting Nonlife Insurance—The CAS Risk Premium Project 2011 Update," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 16(1), pages 35-46, March.
  18. Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
  19. Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part I)," Discussion Papers of DIW Berlin 1049, DIW Berlin, German Institute for Economic Research.
  20. Nitin Bakshi & Stephen E. Flynn & Noah Gans, 2011. "Estimating the Operational Impact of Container Inspections at International Ports," Management Science, INFORMS, vol. 57(1), pages 1-20, January.
  21. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
  22. Katherine L. Dickinson & Hannah Brenkert-Smith & Greg Madonia & Nicholas E. Flores, 2020. "Risk interdependency, social norms, and wildfire mitigation: a choice experiment," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(1), pages 1327-1354, August.
  23. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
  24. Kay-Yut Chen & Jingguo Wang & Yan Lang, 2022. "Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals," Management Science, INFORMS, vol. 68(7), pages 5269-5286, July.
  25. Lu Li & Richard Peter, 2021. "Should we do more when we know less? The effect of technology risk on optimal effort," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 88(3), pages 695-725, September.
  26. Geoffrey Heal & Howard Kunreuther, 2010. "Social Reinforcement: Cascades, Entrapment, and Tipping," American Economic Journal: Microeconomics, American Economic Association, vol. 2(1), pages 86-99, February.
  27. Scott Farrow, 2007. "The Economics Of Homeland Security Expenditures: Foundational Expected Cost‐Effectiveness Approaches," Contemporary Economic Policy, Western Economic Association International, vol. 25(1), pages 14-26, January.
  28. Annette Hofmann, 2007. "Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks," The Geneva Papers on Risk and Insurance Theory, Springer;International Association for the Study of Insurance Economics (The Geneva Association), vol. 32(1), pages 91-111, June.
  29. Dulbecco, Philippe & Laporte, Bertrand, 2005. "How can the security of international trade be financed in developing countries? A global public good Approach," World Development, Elsevier, vol. 33(8), pages 1201-1214, August.
  30. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
  31. Annette Hofmann & Casey Rothschild, 2019. "On the efficiency of self-protection with spillovers in risk," The Geneva Risk and Insurance Review, Palgrave Macmillan;International Association for the Study of Insurance Economics (The Geneva Association), vol. 44(2), pages 207-221, September.
  32. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
  33. Martina de Gramatica & Fabio Massacci & Woohyun Shim & Uğur Turhan & Julian Williams, 2017. "Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 372-395, February.
  34. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
  35. Anthony M. Barrett, 2010. "Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention," Decision Analysis, INFORMS, vol. 7(4), pages 366-377, December.
  36. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
  37. Gregory DeAngelo & Taylor Leland Smith, 2020. "Private security, maritime piracy and the provision of international public safety," Journal of Risk and Uncertainty, Springer, vol. 60(1), pages 77-97, February.
  38. Erwann Michel-Kerjan, 2003. "Terrorisme à grande échelle partage de risques et politiques publiques," Revue d'économie politique, Dalloz, vol. 113(5), pages 625-648.
  39. Katherine Daniell & Alec Morton & David Ríos Insua, 2016. "Policy analysis and policy analytics," Annals of Operations Research, Springer, vol. 236(1), pages 1-13, January.
  40. Sanjith Gopalakrishnan & Sriram Sankaranarayanan, 2023. "Cooperative security against interdependent risks," Production and Operations Management, Production and Operations Management Society, vol. 32(11), pages 3504-3520, November.
  41. Andrew M. Smith & Andrés D. González & Leonardo Dueñas‐Osorio & Raissa M. D'Souza, 2020. "Interdependent Network Recovery Games," Risk Analysis, John Wiley & Sons, vol. 40(1), pages 134-152, January.
  42. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
  43. Fraser, Clive D., 2021. "Protection in numbers? Self-protection as a local public good," Journal of Mathematical Economics, Elsevier, vol. 96(C).
  44. Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
  45. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
  46. Nell, Martin & Richter, Andreas & Schiller, Jörg, 2009. "When prices hardly matter: Incomplete insurance contracts and markets for repair goods," European Economic Review, Elsevier, vol. 53(3), pages 343-354, April.
  47. Shafran, Aric P., 2012. "Learning in games with risky payoffs," Games and Economic Behavior, Elsevier, vol. 75(1), pages 354-371.
  48. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
  49. Scott DuHadway & Steven Carnovale & Benjamin Hazen, 2019. "Understanding risk management for intentional supply chain disruptions: risk detection, risk mitigation, and risk recovery," Annals of Operations Research, Springer, vol. 283(1), pages 179-198, December.
  50. Mario Gilli & Paolo Tedeschi, 2020. "European Union and Transnational Terrorism. A Normative Analysis of Strategic Spillovers," Working Papers 437, University of Milano-Bicocca, Department of Economics, revised Mar 2020.
  51. Shafran, Aric P. & Lepore, Jason J., 2011. "Subsidization to induce tipping," Economics Letters, Elsevier, vol. 110(1), pages 32-35, January.
  52. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
  53. Thomann, Christian & Schulenburg, J.-Matthias, 2006. "Supply and Demand for Terrorism Insurance: Lessons from Germany," Hannover Economic Papers (HEP) dp-340, Leibniz Universität Hannover, Wirtschaftswissenschaftliche Fakultät.
  54. Moore, Tyler, 2010. "The economics of cybersecurity: Principles and policy options," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 103-117.
  55. Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
  56. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
  57. Terrence August & Duy Dao & Marius Florin Niculescu, 2022. "Economics of Ransomware: Risk Interdependence and Large-Scale Attacks," Management Science, INFORMS, vol. 68(12), pages 8979-9002, December.
  58. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 0. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 0, pages 1-18.
  59. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
  60. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
  61. Alexander Muermann & Howard Kunreuther, 2007. "Self-Protection and Insurance with Interdependencies," NBER Working Papers 12827, National Bureau of Economic Research, Inc.
  62. Md. Hamid Uddin & Md. Hakim Ali & Mohammad Kabir Hassan, 2020. "Cybersecurity hazards and financial system vulnerability: a synthesis of literature," Risk Management, Palgrave Macmillan, vol. 22(4), pages 239-309, December.
  63. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
  64. Lohse, Tim & Robledo, Julio R., 2012. "Public self-insurance and the Samaritan's dilemma in a federation," Discussion Papers, Research Professorship & Project "The Future of Fiscal Federalism" SP II 2012-103, WZB Berlin Social Science Center.
  65. Spencer Wheatley & Annette Hofmann & Didier Sornette, 2021. "Addressing insurance of data breach cyber risks in the catastrophe framework," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 46(1), pages 53-78, January.
  66. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
  67. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
  68. Marco Pelliccia, 2020. "Decentralized Defence of a (Directed) Network Structure," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
  69. V'ictor Gallego & Roi Naveiro & David R'ios Insua & Wolfram Rozas, 2021. "Data sharing games," Papers 2101.10721, arXiv.org.
  70. Piotr Więcek, 2017. "Total Reward Semi-Markov Mean-Field Games with Complementarity Properties," Dynamic Games and Applications, Springer, vol. 7(3), pages 507-529, September.
  71. Howard Kunreuther & Erwann Michel-Kerjan, 2004. "Policy Watch: Challenges for Terrorism Risk Insurance in the United States," Journal of Economic Perspectives, American Economic Association, vol. 18(4), pages 201-214, Fall.
  72. Sachin Adlakha & Ramesh Johari, 2013. "Mean Field Equilibrium in Dynamic Games with Strategic Complementarities," Operations Research, INFORMS, vol. 61(4), pages 971-989, August.
  73. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
  74. Howard C. Kunreuther & Erwann O. Michel-Kerjan, 2007. "Evaluating The Effectiveness of Terrorism Risk Financing Solutions," NBER Working Papers 13359, National Bureau of Economic Research, Inc.
  75. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
  76. Howard Kunreuther & Erwann Michel-Kerjan & Beverly Porter, 2003. "Assessing, Managing, and Financing Extreme Events: Dealing with Terrorism," NBER Working Papers 10179, National Bureau of Economic Research, Inc.
  77. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
  78. Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
  79. Howard Kunreuther & Erwann Michel-Kerjan, 2004. "Dealing with Extreme Events: Challenges for Terrorism Risk Coverage in the United States," Working Papers hal-00242930, HAL.
  80. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
  81. Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite, 2014. "Dynamic competition in IT security: A differential games approach," Information Systems Frontiers, Springer, vol. 16(4), pages 643-661, September.
  82. Timothy C. Salmon & Roberto A. Weber, 2017. "Maintaining Efficiency while Integrating Entrants from Lower Performing Groups: an Experimental Study," Economic Journal, Royal Economic Society, vol. 127(600), pages 417-444, March.
  83. Miao, Meixia & Jiang, Tao & You, Ilsun, 2015. "Payment-based incentive mechanism for secure cloud deduplication," International Journal of Information Management, Elsevier, vol. 35(3), pages 379-386.
  84. Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
  85. Ralph L. Keeney, 2007. "Modeling Values for Anti‐Terrorism Analysis," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 585-596, June.
  86. James R. Meldrum & Hannah Brenkert-Smith & Patricia A. Champ & Jamie Gomez & Hilary Byerly & Lilia Falk & Christopher M. Barth, 2021. "Would you like to know more? The effect of personalized wildfire risk information and social comparisons on information-seeking behavior in the wildland–urban interface," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 106(3), pages 2139-2161, April.
  87. Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
  88. Min Gong & Jonathan Baron & Howard Kunreuther, 2009. "Group cooperation under uncertainty," Journal of Risk and Uncertainty, Springer, vol. 39(3), pages 251-270, December.
  89. Tim Lohse & Julio R. Robledo, 2013. "Public Self-Insurance and the Samaritan’s Dilemma in a Federation," Public Finance Review, , vol. 41(1), pages 92-120, January.
  90. Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
  91. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 2021. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 23(3), pages 773-790, June.
  92. Alexander Muermann & Howard Kunreuther, 2008. "Self-protection and insurance with interdependencies," Journal of Risk and Uncertainty, Springer, vol. 36(2), pages 103-123, April.
  93. Stranlund, John K. & Field, Barry C., 2006. "On the Production of Homeland Security Under True Uncertainty," Working Paper Series 14505, University of Massachusetts, Amherst, Department of Resource Economics.
  94. Farzaneh Farhadi & Hamidreza Tavafoghi & Demosthenis Teneketzis & S. Jamaloddin Golestani, 2019. "An Efficient Dynamic Allocation Mechanism for Security in Networks of Interdependent Strategic Agents," Dynamic Games and Applications, Springer, vol. 9(4), pages 914-941, December.
  95. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
  96. Hoy, Michael & Polborn, Mattias K., 2015. "The value of technology improvements in games with externalities: A fresh look at offsetting behavior," Journal of Public Economics, Elsevier, vol. 131(C), pages 12-20.
  97. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
  98. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
  99. Lakdawalla, Darius & Zanjani, George, 2005. "Insurance, self-protection, and the economics of terrorism," Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
  100. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
  101. Hulisi Öğüt & Srinivasan Raghunathan & Nirup Menon, 2011. "Cyber Security Risk Management: Public Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and Observability of Self‐Protection," Risk Analysis, John Wiley & Sons, vol. 31(3), pages 497-512, March.
  102. Sang-Hyun Kim & Brian Tomlin, 2013. "Guilt by Association: Strategic Failure Prevention and Recovery Capacity Investments," Management Science, INFORMS, vol. 59(7), pages 1631-1649, July.
  103. Erwann Michel-Kerjan, 2003. "New Challenges in Critical Infrastructures : A US Perspective," Working Papers hal-00242947, HAL.
  104. Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
  105. Terrence August & Marius Florin Niculescu & Hyoduk Shin, 2014. "Cloud Implications on Software Network Structure and Security Risks," Information Systems Research, INFORMS, vol. 25(3), pages 489-510, September.
  106. Darius Lakdawalla & Eric Talley, 2006. "Optimal Liability for Terrorism," NBER Working Papers 12578, National Bureau of Economic Research, Inc.
  107. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
  108. Howard Kunreuther & Gabriel Silvasi & Eric T. Bradlow & Dylan Small, 2007. "Deterministic and Stochastic Prisoner's Dilemma Games: Experiments in Interdependent Security," NBER Technical Working Papers 0341, National Bureau of Economic Research, Inc.
  109. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
  110. Rachel Hess & Charles Holt & Angela Smith, 2007. "Coordination of strategic responses to security threats: Laboratory evidence," Experimental Economics, Springer;Economic Science Association, vol. 10(3), pages 235-250, September.
  111. W. Kip Viscusi & Richard J. Zeckhauser, 2005. "Recollection Bias and the Combat of Terrorism," The Journal of Legal Studies, University of Chicago Press, vol. 34(1), pages 27-55, January.
  112. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
  113. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
  114. Patricia A Champ & Hannah Brenkert‐Smith, 2016. "Is Seeing Believing? Perceptions of Wildfire Risk Over Time," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 816-830, April.
  115. Hui, Kai-Lung & Zhou, Jiali, 2020. "The Economics of Hacking," MPRA Paper 102706, University Library of Munich, Germany.
  116. Howard Kunreuther & Gabriel Silvasi & Eric T. Bradlow & Dylan Small, 2009. "Bayesian analysis of deterministic and stochastic prisoner's dilemma games," Judgment and Decision Making, Society for Judgment and Decision Making, vol. 4(5), pages 363-384, August.
  117. Radoslav Raykov, 2015. "Catastrophe insurance equilibrium with correlated claims," Theory and Decision, Springer, vol. 78(1), pages 89-115, January.
  118. Geoffrey Heal & Howard Kunreuther, 2006. "Supermodularity and Tipping," NBER Working Papers 12281, National Bureau of Economic Research, Inc.
  119. Amandha Ganegoda & John Evans, 2014. "A framework to manage the measurable, immeasurable and the unidentifiable financial risk," Australian Journal of Management, Australian School of Business, vol. 39(1), pages 5-34, February.
  120. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
  121. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
  122. Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
  123. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
  124. repec:cup:judgdm:v:4:y:2009:i:5:p:363-384 is not listed on IDEAS
  125. Wang, Chunhua, 2014. "Regulating land development in a natural disaster-prone area: The roles of building codes," Resource and Energy Economics, Elsevier, vol. 36(1), pages 209-228.
  126. Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
  127. Anna Nagurney & Ladimer Nagurney, 2015. "A game theory model of cybersecurity investments with information asymmetry," Netnomics, Springer, vol. 16(1), pages 127-148, August.
  128. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
  129. Kriss, Peter H. & Blume, Andreas & Weber, Roberto A., 2016. "Coordination with decentralized costly communication," Journal of Economic Behavior & Organization, Elsevier, vol. 130(C), pages 225-241.
  130. Loretta Mastroeni & Alessandro Mazzoccoli & Maurizio Naldi, 2023. "Cyber Insurance Premium Setting for Multi-Site Companies under Risk Correlation," Risks, MDPI, vol. 11(10), pages 1-18, September.
  131. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
  132. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
  133. Lam, W., 2015. "Attack-Deterring and Damage-Control Investments in Cybersecurity," LIDAM Discussion Papers CORE 2015023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
  134. Geoffrey Heal & Howard Kunreuther, 2010. "Environment and Energy: Catastrophic Liabilities from Nuclear Power Plants," NBER Chapters, in: Measuring and Managing Federal Financial Risk, pages 235-257, National Bureau of Economic Research, Inc.
  135. Scott Musman & Andrew Turner, 2018. "A game theoretic approach to cyber security risk management," The Journal of Defense Modeling and Simulation, , vol. 15(2), pages 127-146, April.
  136. Elsadig Musa Ahmed, 2021. "Modelling Information and Communications Technology Cyber Security Externalities Spillover Effects on Sustainable Economic Growth," Journal of the Knowledge Economy, Springer;Portland International Center for Management of Engineering and Technology (PICMET), vol. 12(1), pages 412-430, March.
  137. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
  138. Detlef Seese & Christof Weinhardt & Frank Schlottmann (ed.), 2008. "Handbook on Information Technology in Finance," International Handbooks on Information Systems, Springer, number 978-3-540-49487-4, December.
  139. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
  140. Da, Gaofeng & Xu, Maochao & Zhao, Peng, 2021. "Multivariate dependence among cyber risks based on L-hop propagation," Insurance: Mathematics and Economics, Elsevier, vol. 101(PB), pages 525-546.
  141. Nagurney, Anna & Shukla, Shivani, 2017. "Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability," European Journal of Operational Research, Elsevier, vol. 260(2), pages 588-600.
  142. Cerdeiro, Diego A. & Dziubiński, Marcin & Goyal, Sanjeev, 2017. "Individual security, contagion, and network design," Journal of Economic Theory, Elsevier, vol. 170(C), pages 182-226.
  143. Shafi, Kamran & Bender, Axel & Zhong, Weicai & Abbass, Hussein A., 2012. "Spatio-temporal dynamics of security investments in an interdependent risk environment," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 391(20), pages 5004-5017.
  144. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
  145. Katherine A. Daniell & Alec Morton & David Ríos Insua, 2016. "Policy analysis and policy analytics," Annals of Operations Research, Springer, vol. 236(1), pages 1-13, January.
  146. Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.