IDEAS home Printed from
   My bibliography  Save this item

Interdependent Security


Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.

Cited by:

  1. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
  2. Peter H. Kriss & Roberto Weber, 2013. "Organizational formation and change: lessons from economic laboratory experiments," Chapters,in: Handbook of Economic Organization, chapter 14 Edward Elgar Publishing.
  3. Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
  4. Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part I)," Discussion Papers of DIW Berlin 1049, DIW Berlin, German Institute for Economic Research.
  5. Nitin Bakshi & Stephen E. Flynn & Noah Gans, 2011. "Estimating the Operational Impact of Container Inspections at International Ports," Management Science, INFORMS, vol. 57(1), pages 1-20, January.
  6. Geoffrey Heal & Howard Kunreuther, 2010. "Social Reinforcement: Cascades, Entrapment, and Tipping," American Economic Journal: Microeconomics, American Economic Association, vol. 2(1), pages 86-99, February.
  7. Scott Farrow, 2007. "The Economics Of Homeland Security Expenditures: Foundational Expected Cost-Effectiveness Approaches," Contemporary Economic Policy, Western Economic Association International, vol. 25(1), pages 14-26, January.
  8. repec:spr:annopr:v:237:y:2016:i:1:d:10.1007_s10479-014-1684-5 is not listed on IDEAS
  9. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
  10. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
  11. Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
  12. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
  13. Erwann Michel-Kerjan, 2003. "Terrorisme à grande échelle partage de risques et politiques publiques," Revue d'économie politique, Dalloz, vol. 113(5), pages 625-648.
  14. Carolyn Kousky & Erzo Luttmer & Richard Zeckhauser, 2006. "Private investment and government protection," Journal of Risk and Uncertainty, Springer, vol. 33(1), pages 73-100, September.
  15. Shafran, Aric P. & Lepore, Jason J., 2011. "Subsidization to induce tipping," Economics Letters, Elsevier, vol. 110(1), pages 32-35, January.
  16. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
  17. Thomann, Christian & Schulenburg, J.-Matthias, 2006. "Supply and Demand for Terrorism Insurance: Lessons from Germany," Hannover Economic Papers (HEP) dp-340, Leibniz Universität Hannover, Wirtschaftswissenschaftliche Fakultät.
  18. Tim Lohse & Julio R. Robledo & Ulrich Schmidt, 2012. "Self‐Insurance and Self‐Protection as Public Goods," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 79(1), pages 57-76, March.
  19. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
  20. repec:spr:dyngam:v:7:y:2017:i:3:d:10.1007_s13235-016-0194-2 is not listed on IDEAS
  21. Howard Kunreuther & Erwann Michel-Kerjan, 2004. "Policy Watch: Challenges for Terrorism Risk Insurance in the United States," Journal of Economic Perspectives, American Economic Association, vol. 18(4), pages 201-214, Fall.
  22. repec:eee:reensy:v:93:y:2008:i:10:p:1444-1451 is not listed on IDEAS
  23. Howard Kunreuther & Erwann Michel-Kerjan & Beverly Porter, 2003. "Assessing, Managing, and Financing Extreme Events: Dealing with Terrorism," NBER Working Papers 10179, National Bureau of Economic Research, Inc.
  24. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
  25. repec:eee:reensy:v:138:y:2015:i:c:p:93-104 is not listed on IDEAS
  26. repec:eee:reensy:v:94:y:2009:i:11:p:1711-1717 is not listed on IDEAS
  27. Timothy C. Salmon & Roberto A. Weber, 2017. "Maintaining Efficiency while Integrating Entrants from Lower Performing Groups: an Experimental Study," Economic Journal, Royal Economic Society, vol. 127(600), pages 417-444, March.
  28. Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
  29. Tilman Bruck, 2005. "An Economic Analysis Of Security Policies," Defence and Peace Economics, Taylor & Francis Journals, vol. 16(5), pages 375-389.
  30. repec:spr:infosf:v:16:y:2014:i:3:d:10.1007_s10796-012-9348-y is not listed on IDEAS
  31. John K. Stranlund & Barry C. Field, 2006. "On the Production of Homeland Security Under True Uncertainty," Working Papers 2006-5, University of Massachusetts Amherst, Department of Resource Economics.
  32. repec:eee:reensy:v:136:y:2015:i:c:p:35-46 is not listed on IDEAS
  33. Lakdawalla, Darius & Zanjani, George, 2005. "Insurance, self-protection, and the economics of terrorism," Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
  34. Erwann Michel-Kerjan, 2003. "New Challenges in Critical Infrastructures : A US Perspective," Working Papers hal-00242947, HAL.
  35. Mohamed Belhaj & Frédéric Deroian, 2010. "Endogenous effort in communication networks under strategic complementarity," International Journal of Game Theory, Springer;Game Theory Society, vol. 39(3), pages 391-408, July.
  36. Rachel Hess & Charles Holt & Angela Smith, 2007. "Coordination of strategic responses to security threats: Laboratory evidence," Experimental Economics, Springer;Economic Science Association, vol. 10(3), pages 235-250, September.
  37. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
  38. repec:eee:reensy:v:95:y:2010:i:1:p:29-42 is not listed on IDEAS
  39. Radoslav Raykov, 2015. "Catastrophe insurance equilibrium with correlated claims," Theory and Decision, Springer, vol. 78(1), pages 89-115, January.
  40. Geoffrey Heal & Howard Kunreuther, 2006. "Supermodularity and Tipping," NBER Working Papers 12281, National Bureau of Economic Research, Inc.
  41. Amandha Ganegoda & John Evans, 2014. "A framework to manage the measurable, immeasurable and the unidentifiable financial risk," Australian Journal of Management, Australian School of Business, vol. 39(1), pages 5-34, February.
  42. Nell, Martin & Richter, Andreas & Schiller, Jörg, 2009. "When prices hardly matter: Incomplete insurance contracts and markets for repair goods," European Economic Review, Elsevier, vol. 53(3), pages 343-354, April.
  43. Tim Lohse & Julio R. Robledo, 2013. "Public Self-Insurance and the Samaritan’s Dilemma in a Federation," Public Finance Review, , vol. 41(1), pages 92-120, January.
  44. Anna Nagurney & Ladimer Nagurney, 2015. "A game theory model of cybersecurity investments with information asymmetry," Netnomics, Springer, vol. 16(1), pages 127-148, August.
  45. Kriss, Peter H. & Blume, Andreas & Weber, Roberto A., 2016. "Coordination with decentralized costly communication," Journal of Economic Behavior & Organization, Elsevier, vol. 130(C), pages 225-241.
  46. Lam, W., 2015. "Attack-Deterring and Damage-Control Investments in Cybersecurity," CORE Discussion Papers 2015023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
  47. Geoffrey Heal & Howard Kunreuther, 2010. "Environment and Energy: Catastrophic Liabilities from Nuclear Power Plants," NBER Chapters,in: Measuring and Managing Federal Financial Risk, pages 235-257 National Bureau of Economic Research, Inc.
  48. Shafi, Kamran & Bender, Axel & Zhong, Weicai & Abbass, Hussein A., 2012. "Spatio-temporal dynamics of security investments in an interdependent risk environment," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 391(20), pages 5004-5017.
  49. repec:spr:annopr:v:236:y:2016:i:1:d:10.1007_s10479-015-1902-9 is not listed on IDEAS
  50. Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.
  51. Jentzsch, Nicola, 2015. "What Is Special in the Economics of Cybersecurity and Privacy?," EconStor Research Reports 126227, ZBW - German National Library of Economics.
  52. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
  53. Annette Hofmann, 2007. "Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks," The Geneva Papers on Risk and Insurance Theory, Springer;International Association for the Study of Insurance Economics (The Geneva Association), vol. 32(1), pages 91-111, June.
  54. Dulbecco, Philippe & Laporte, Bertrand, 2005. "How can the security of international trade be financed in developing countries? A global public good Approach," World Development, Elsevier, vol. 33(8), pages 1201-1214, August.
  55. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
  56. Shafran, Aric P., 2012. "Learning in games with risky payoffs," Games and Economic Behavior, Elsevier, vol. 75(1), pages 354-371.
  57. repec:eee:reensy:v:147:y:2016:i:c:p:1-8 is not listed on IDEAS
  58. Alexander Muermann & Howard Kunreuther, 2007. "Self-Protection and Insurance with Interdependencies," NBER Working Papers 12827, National Bureau of Economic Research, Inc.
  59. Marco Pelliccia, 2015. "Decentralised Defence of a (Directed) Network Structure," Birkbeck Working Papers in Economics and Finance 1506, Birkbeck, Department of Economics, Mathematics & Statistics.
  60. Howard C. Kunreuther & Erwann O. Michel-Kerjan, 2007. "Evaluating The Effectiveness of Terrorism Risk Financing Solutions," NBER Working Papers 13359, National Bureau of Economic Research, Inc.
  61. Howard Kunreuther & Erwann Michel-Kerjan, 2004. "Dealing with Extreme Events: Challenges for Terrorism Risk Coverage in the United States," Working Papers hal-00242930, HAL.
  62. repec:spr:infosf:v:16:y:2014:i:4:d:10.1007_s10796-012-9373-x is not listed on IDEAS
  63. Diego Cerdeiro & Marcin Dziubinski & Sanjeev Goyal, 2015. "Contagion Risk and Network Design," Cambridge Working Papers in Economics 1547, Faculty of Economics, University of Cambridge.
  64. Min Gong & Jonathan Baron & Howard Kunreuther, 2009. "Group cooperation under uncertainty," Journal of Risk and Uncertainty, Springer, vol. 39(3), pages 251-270, December.
  65. Alexander Muermann & Howard Kunreuther, 2008. "Self-protection and insurance with interdependencies," Journal of Risk and Uncertainty, Springer, vol. 36(2), pages 103-123, April.
  66. Hoy, Michael & Polborn, Mattias K., 2015. "The value of technology improvements in games with externalities: A fresh look at offsetting behavior," Journal of Public Economics, Elsevier, vol. 131(C), pages 12-20.
  67. repec:eee:reensy:v:93:y:2008:i:11:p:1740-1750 is not listed on IDEAS
  68. Darius Lakdawalla & Eric Talley, 2006. "Optimal Liability for Terrorism," NBER Working Papers 12578, National Bureau of Economic Research, Inc.
  69. Howard Kunreuther & Gabriel Silvasi & Eric T. Bradlow & Dylan Small, 2007. "Deterministic and Stochastic Prisoner's Dilemma Games: Experiments in Interdependent Security," NBER Technical Working Papers 0341, National Bureau of Economic Research, Inc.
  70. W. Kip Viscusi & Richard J. Zeckhauser, 2005. "Recollection Bias and the Combat of Terrorism," The Journal of Legal Studies, University of Chicago Press, vol. 34(1), pages 27-55, January.
  71. repec:spr:infosf:v:17:y:2015:i:2:d:10.1007_s10796-013-9411-3 is not listed on IDEAS
  72. Howard Kunreuther & Gabriel Silvasi & Eric T. Bradlow & Dylan Small, 2009. "Bayesian analysis of deterministic and stochastic prisoner's dilemma games," Judgment and Decision Making, Society for Judgment and Decision Making, vol. 4(5), pages 363-384, August.
  73. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
  74. Wang, Chunhua, 2014. "Regulating land development in a natural disaster-prone area: The roles of building codes," Resource and Energy Economics, Elsevier, vol. 36(1), pages 209-228.
  75. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
  76. repec:eee:reensy:v:119:y:2013:i:c:p:1-10 is not listed on IDEAS
  77. Nagurney, Anna & Shukla, Shivani, 2017. "Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability," European Journal of Operational Research, Elsevier, vol. 260(2), pages 588-600.
IDEAS is a RePEc service hosted by the Research Division of the Federal Reserve Bank of St. Louis . RePEc uses bibliographic data supplied by the respective publishers.