IDEAS home Printed from https://ideas.repec.org/a/inm/ordeca/v1y2004i3p129-130.html
   My bibliography  Save this article

From the Editors…

Author

Listed:
  • Robert T. Clemen

    (Fuqua School of Business, Duke University, Durham, North Carolina 27708)

  • Don N. Kleinmuntz

    (Department of Business Administration, University of Illinois at Urbana-Champaign, 1206 South Sixth Street, Champaign, Illinois 61820-6980)

Abstract

The first two articles in this issue address the relationship between game theory and decision analysis. How can decision analysts best employ game-theoretic concepts in their prescriptive models? Two additional articles consider the value of prioritization in analyzing a portfolio of research-and-development (R&D) projects and analyze whether it is better to obtain estimates of correlation coefficients from multiple experts or multiple estimates from a single expert.

Suggested Citation

  • Robert T. Clemen & Don N. Kleinmuntz, 2004. "From the Editors…," Decision Analysis, INFORMS, vol. 1(3), pages 129-130, September.
  • Handle: RePEc:inm:ordeca:v:1:y:2004:i:3:p:129-130
    DOI: 10.1287/deca.1040.0026
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/deca.1040.0026
    Download Restriction: no

    File URL: https://libkey.io/10.1287/deca.1040.0026?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Martin Shubik, 1983. "Comment on "The Confusion of Is and Ought in Game Theoretic Contexts"," Management Science, INFORMS, vol. 29(12), pages 1380-1383, December.
    2. Joseph B. Kadane & Patrick D. Larkey, 1983. "The Confusion of Is and Ought in Game Theoretic Contexts," Management Science, INFORMS, vol. 29(12), pages 1365-1379, December.
    3. Jacob W. Ulvila & John E. Gaffney, 2004. "A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems," Decision Analysis, INFORMS, vol. 1(1), pages 35-50, March.
    4. Joseph B. Kadane & Patrick D. Larkey, 1982. "Subjective Probability and the Theory of Games," Management Science, INFORMS, vol. 28(2), pages 113-120, February.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Guilhem Lecouteux, 2018. "Bayesian game theorists and non-Bayesian players," The European Journal of the History of Economic Thought, Taylor & Francis Journals, vol. 25(6), pages 1420-1454, November.
    2. Robert Nau, 2001. "De Finetti was Right: Probability Does Not Exist," Theory and Decision, Springer, vol. 51(2), pages 89-124, December.
    3. Velu, C. & Iyer, S., 2008. "The Rationality of Irrationality for Managers: Returns- Based Beliefs and the Traveller’s Dilemma," Cambridge Working Papers in Economics 0826, Faculty of Economics, University of Cambridge.
    4. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    5. Peter Boatwright & Sharad Borle & Joseph B. Kadane, 2010. "Common Value vs. Private Value Categories in Online Auctions: A Distinction Without a Difference?," Decision Analysis, INFORMS, vol. 7(1), pages 86-98, March.
    6. Tetsuo Kondo, 1990. "Some Notes on Rational Behavior, Normative Behavior, Moral Behavior, and Cooperation," Journal of Conflict Resolution, Peace Science Society (International), vol. 34(3), pages 495-530, September.
    7. James E. Smith & Detlof von Winterfeldt, 2004. "Anniversary Article: Decision Analysis in Management Science," Management Science, INFORMS, vol. 50(5), pages 561-574, May.
    8. ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
    9. Rudolf Vetschera, 2003. "Experimentation and Learning in Repeated Cooperation," Computational and Mathematical Organization Theory, Springer, vol. 9(1), pages 37-60, May.
    10. Huseyin Cavusoglu & Srinivasan Raghunathan, 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis, INFORMS, vol. 1(3), pages 131-148, September.
    11. Joseph Kadane & Javier Girón & Daniel Peña & Peter Fishburn & Simon French & D. Lindley & Giovanni Parmigiani & Robert Winkler, 1993. "Several Bayesians: A review," TEST: An Official Journal of the Spanish Society of Statistics and Operations Research, Springer;Sociedad de Estadística e Investigación Operativa, vol. 2(1), pages 1-32, December.
    12. Alberto Redondo & David Ríos Insua, 2020. "Protecting From Malware Obfuscation Attacks Through Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 40(12), pages 2598-2609, December.
    13. R. J. Aumann & J. H. Dreze, 2009. "Assessing Strategic Risk," American Economic Journal: Microeconomics, American Economic Association, vol. 1(1), pages 1-16, February.
    14. Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
    15. William N. Caballero & Ethan Gharst & David Banks & Jeffery D. Weir, 2023. "Multipolar Security Cooperation Planning: A Multiobjective, Adversarial-Risk-Analysis Approach," Decision Analysis, INFORMS, vol. 20(1), pages 16-39, March.
    16. Colin Camerer & Teck-Hua Ho & Juin Kuan Chong, 2003. "A cognitive hierarchy theory of one-shot games: Some preliminary results," Levine's Bibliography 506439000000000495, UCLA Department of Economics.
    17. R. J. Aumann & J. H. Dreze, 2005. "When All is Said and Done, How Should You Play and What Should You Expect?," Discussion Paper Series dp387, The Federmann Center for the Study of Rationality, the Hebrew University, Jerusalem.
    18. ,, 2008. "Subjective expected utility in games," Theoretical Economics, Econometric Society, vol. 3(3), September.
    19. Matthias Bogaert & Michel Ballings & Martijn Hosten & Dirk Van den Poel, 2017. "Identifying Soccer Players on Facebook Through Predictive Analytics," Decision Analysis, INFORMS, vol. 14(4), pages 274-297, December.
    20. Rode, Julian, 2007. "Truth and Trust in Communication: An Experimental Study of Behavior under Asymmetric Information," Ratio Working Papers 111, The Ratio Institute.

    More about this item

    Keywords

    decision analysis; editorial;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:1:y:2004:i:3:p:129-130. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.