IDEAS home Printed from https://ideas.repec.org/a/spr/annopr/v237y2016i1p27-4010.1007-s10479-014-1684-5.html
   My bibliography  Save this article

The strategic interaction between a company and the government surrounding disasters

Author

Listed:
  • Kjell Hausken
  • Jun Zhuang

Abstract

We analyze the tradeoff between safety and production. The government chooses safety effort and tax rate in the first stage, and then the company strikes a balance between safety effort and production in the second stage. The government, representing the general public, earns taxes on production. Both players’ safety efforts mitigate the negative impact of a disaster. The disaster probability is modeled as a contest between the disaster magnitude and the two players’ safety efforts. Seven propositions are developed. First, as the safety effort of one player approaches infinity, the marginal change in the other player’s safety effort, with respect to the first player’s safety effort, approaches zero. Second, an infinitely large safety effort by any player causes the disaster probability and the negative impact of the disaster to decrease toward a constant. Third, as one player’s safety effort approaches infinity, the other player’s safety effort approaches zero. Fourth, the two players’ safety efforts are strategic substitutes so that an increase in one player’s safety effort decreases the other player’s safety effort. This enables the players to free ride on each other’s safety efforts. Fifth, higher tax rate causes the company to exert higher safety effort. Sixth, with maximum tax rate the company focuses exclusively on safety effort and generates no profit. Seventh, the company’s safety effort is inverse $$U$$ U shaped in the disaster magnitude. Copyright Springer Science+Business Media New York 2016

Suggested Citation

  • Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
  • Handle: RePEc:spr:annopr:v:237:y:2016:i:1:p:27-40:10.1007/s10479-014-1684-5
    DOI: 10.1007/s10479-014-1684-5
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10479-014-1684-5
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10479-014-1684-5?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to look for a different version below or search for a different version of it.

    Other versions of this item:

    References listed on IDEAS

    as
    1. Golbe, Devra L, 1986. "Safety and Profits in the Airline Industry," Journal of Industrial Economics, Wiley Blackwell, vol. 34(3), pages 305-318, March.
    2. Viscusi, W Kip, 1993. "The Value of Risks to Life and Health," Journal of Economic Literature, American Economic Association, vol. 31(4), pages 1912-1946, December.
    3. Skiba, A K, 1978. "Optimal Growth with a Convex-Concave Production Function," Econometrica, Econometric Society, vol. 46(3), pages 527-539, May.
    4. Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
    5. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    6. Stergios Skaperdas, 1996. "Contest success functions (*)," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
    7. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    8. Efraim Sadka, 2007. "Public-Private Partnerships: A Public Economics Perspective," CESifo Economic Studies, CESifo Group, vol. 53(3), pages 466-490, September.
    9. Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
    10. Jean Tirole, 1988. "The Theory of Industrial Organization," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262200716, April.
    11. Carmichael, H Lorne, 1986. "Reputations for Safety: Market Performance and Policy Remedies," Journal of Labor Economics, University of Chicago Press, vol. 4(4), pages 458-472, October.
    12. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    13. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    14. Blome, Constantin & Schoenherr, Tobias, 2011. "Supply chain risk management in financial crises--A multiple case-study approach," International Journal of Production Economics, Elsevier, vol. 134(1), pages 43-57, November.
    15. May Cheung & Jun Zhuang, 2012. "Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters," Decision Analysis, INFORMS, vol. 9(2), pages 156-164, June.
    16. Wu, Desheng Dash & Olson, David L. & Birge, John R., 2011. "Introduction to special issue on "Enterprise risk management in operations"," International Journal of Production Economics, Elsevier, vol. 134(1), pages 1-2, November.
    17. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    18. Osmundsen, Petter & Aven, Terje & Tomasgard, Asgeir, 2010. "On incentives for assurance of petroleum supply," Reliability Engineering and System Safety, Elsevier, vol. 95(2), pages 143-148.
    19. repec:bla:kyklos:v:41:y:1988:i:3:p:379-95 is not listed on IDEAS
    20. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Wen Li & Tong Zhou & Qiang Mei & Xiangyang Liu & Muhammad Imran, 2023. "Evolution of micro and small enterprises’ work safety behavior in high-risk industries," Small Business Economics, Springer, vol. 60(1), pages 85-104, January.
    2. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
    3. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.
    4. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    5. Dennis Fok & André Stel & Andrew Burke & Roy Thurik, 2019. "How entry crowds and grows markets: the gradual disaster management view of market dynamics in the retail industry," Annals of Operations Research, Springer, vol. 283(1), pages 1111-1138, December.
    6. Liangdong Lu & Hong Huang & Jiuchang Wei & Jia Xu, 2020. "Safety Regulations and the Uncertainty of Work‐Related Road Accident Loss: The Triple Identity of Chinese Local Governments Under Principal–Agent Framework," Risk Analysis, John Wiley & Sons, vol. 40(6), pages 1168-1182, June.
    7. John B. Coles & Jing Zhang & Jun Zhuang, 2022. "Bridging the research-practice gap in disaster relief: using the IFRC Code of Conduct to develop an aid model," Annals of Operations Research, Springer, vol. 312(2), pages 1337-1357, May.
    8. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    9. Bo Shao & Zhigen Hu & Dawei Liu, 2019. "Using Improved Principal Component Analysis to Explore Construction Accident Situations from the Multi-Dimensional Perspective: A Chinese Study," IJERPH, MDPI, vol. 16(18), pages 1-18, September.
    10. Shitao Gong & Xin Gao & Zhou Li & Linyan Chen, 2021. "Developing a Dynamic Supervision Mechanism to Improve Construction Safety Investment Supervision Efficiency in China: Theoretical Simulation of Evolutionary Game Process," IJERPH, MDPI, vol. 18(7), pages 1-29, March.
    11. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    12. Wenxin Su & Xin Gao & Yukun Jiang & Jinrong Li, 2021. "Developing a Construction Safety Standard System to Enhance Safety Supervision Efficiency in China: A Theoretical Simulation of the Evolutionary Game Process," Sustainability, MDPI, vol. 13(23), pages 1-22, December.
    13. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    14. Kyle H. Goldschmidt & Sameer Kumar, 2019. "Reducing the cost of humanitarian operations through disaster preparation and preparedness," Annals of Operations Research, Springer, vol. 283(1), pages 1139-1152, December.
    15. Zongjie Pi & Xin Gao & Linyan Chen & Jinghua Liu, 2019. "The New Path to Improve Construction Safety Performance in China: An Evolutionary Game Theoretic Approach," IJERPH, MDPI, vol. 16(13), pages 1-24, July.
    16. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
    2. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    3. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    4. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    5. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    6. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    7. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    8. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    9. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    10. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    11. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    12. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    13. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    14. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    15. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    16. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    17. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    18. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    19. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    20. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.

    More about this item

    Keywords

    Disaster; Safety effort; Production; Profit ; Taxation; Conflict; Contest; C72; D72; D74; H21; H71;
    All these keywords.

    JEL classification:

    • C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games
    • D72 - Microeconomics - - Analysis of Collective Decision-Making - - - Political Processes: Rent-seeking, Lobbying, Elections, Legislatures, and Voting Behavior
    • D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions
    • H21 - Public Economics - - Taxation, Subsidies, and Revenue - - - Efficiency; Optimal Taxation
    • H71 - Public Economics - - State and Local Government; Intergovernmental Relations - - - State and Local Taxation, Subsidies, and Revenue

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:annopr:v:237:y:2016:i:1:p:27-40:10.1007/s10479-014-1684-5. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.