IDEAS home Printed from https://ideas.repec.org/r/sae/jocore/v49y2005i2p201-217.html

IDS Models of Airline Security

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Michael R. Greenberg & Karen Lowrie & Henry Mayer & Tayfur Altiok, 2011. "Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects," Risk Analysis, John Wiley & Sons, vol. 31(12), pages 1849-1858, December.
  2. Nitin Bakshi & Stephen E. Flynn & Noah Gans, 2011. "Estimating the Operational Impact of Container Inspections at International Ports," Management Science, INFORMS, vol. 57(1), pages 1-20, January.
  3. Becker Jordan & Kuokštytė Ringailė & Kuokštis Vytautas, 2023. "The Political Economy of Transatlantic Security – A Policy Perspective," The Economists' Voice, De Gruyter, vol. 20(1), pages 55-77, June.
  4. Daniel Jacobson & Edward H. Kaplan, 2007. "Suicide Bombings and Targeted Killings in (Counter-) Terror Games," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(5), pages 772-792, October.
  5. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
  6. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
  7. Geoffrey Heal & Howard Kunreuther, 2010. "Social Reinforcement: Cascades, Entrapment, and Tipping," American Economic Journal: Microeconomics, American Economic Association, vol. 2(1), pages 86-99, February.
  8. Stranlund, John K. & Field, Barry C., 2006. "On the Production of Homeland Security Under True Uncertainty," Working Paper Series 14505, University of Massachusetts, Amherst, Department of Resource Economics.
  9. Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
  10. Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
  11. Heiets, Iryna & La, Jiezhuoma & Zhou, Wenhui & Xu, Shaoxin & Wang, Xingyue & Xu, Yuchen, 2022. "Digital transformation of airline industry," Research in Transportation Economics, Elsevier, vol. 92(C).
  12. B. Peter Rosendorff & Todd Sandler, 2005. "The Political Economy of Transnational Terrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 171-182, April.
  13. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
  14. João Ricardo Faria & Emilson C. D. Silva & Daniel G. Arce, 2017. "Intertemporal Versus Spatial Externalities in Counterterror Policy Games," Dynamic Games and Applications, Springer, vol. 7(3), pages 402-421, September.
  15. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
  16. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
  17. Hare, Forrest & Goldstein, Jonathan, 2010. "The interdependent security problem in the defense industrial base: An agent-based model on a social network," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 128-139.
  18. Erte Xiao & Howard Kunreuther, 2016. "Punishment and Cooperation in Stochastic Social Dilemmas," Journal of Conflict Resolution, Peace Science Society (International), vol. 60(4), pages 670-693, June.
  19. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
  20. Geoffrey Heal & Howard Kunreuther, 2006. "Supermodularity and Tipping," NBER Working Papers 12281, National Bureau of Economic Research, Inc.
  21. Geoffrey Heal & Howard Kunreuther, 2010. "Environment and Energy: Catastrophic Liabilities from Nuclear Power Plants," NBER Chapters, in: Measuring and Managing Federal Financial Risk, pages 235-257, National Bureau of Economic Research, Inc.
  22. Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
  23. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
  24. Siddharth Suri & Duncan J Watts, 2011. "Cooperation and Contagion in Web-Based, Networked Public Goods Experiments," PLOS ONE, Public Library of Science, vol. 6(3), pages 1-18, March.
  25. Martin Gregor, 2011. "Tradeoffs of foreign assistance for the weakest-link global public goods," International Tax and Public Finance, Springer;International Institute of Public Finance, vol. 18(2), pages 233-251, April.
  26. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
  27. Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2023. "Attack and interception in networks," Theoretical Economics, Econometric Society, vol. 18(4), November.
  28. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
  29. Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
  30. Sanghoon Lee, 2010. "Dynamic Inconsistency in Counterterrorism," Conflict Management and Peace Science, Peace Science Society (International), vol. 27(4), pages 369-385, September.
  31. Daniel G. Arce M. & Todd Sandler, 2005. "Counterterrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 183-200, April.
  32. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
  33. Todd Sandler, 2006. "Hirshleifer'S Social Composition Function In Defense Economics," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 645-655.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.