IDEAS home Printed from https://ideas.repec.org/e/c/pol171.html
   My authors  Follow this author

Santiago Oliveros

Citations

Many of the citations below have been collected in an experimental project, CitEc, where a more detailed citation analysis can be found. These are citations from works listed in RePEc that could be analyzed mechanically. So far, only a minority of all works could be analyzed. See under "Corrections" how you can help improve the citation analysis.

Working papers

  1. Matias Iaryczower & Santiago Oliveros, 2022. "Collective Hold-Up," NBER Working Papers 29984, National Bureau of Economic Research, Inc.

    Cited by:

    1. Ying Chen & Jan Zapal, 2021. "Sequential Vote Buying," CERGE-EI Working Papers wp692, The Center for Economic Research and Graduate Education - Economics Institute, Prague.

  2. Iaryczower, M & Oliveros, S, 2015. "Competing For Loyalty: The Dynamics of Rallying Support," Economics Discussion Papers 14459, University of Essex, Department of Economics.

    Cited by:

    1. Johannes Münster & Markus Reisinger, 2021. "Sequencing Bilateral Negotiations with Externalities," ECONtribute Discussion Papers Series 096, University of Bonn and University of Cologne, Germany.
    2. Louis-Sidois, Charles & Musolff, Leon Andreas, 2024. "Buying voters with uncertain instrumental preferences," Theoretical Economics, Econometric Society, vol. 19(3), July.
    3. Iaryczower, M & Oliveros, S, 2013. "Power Brokers: Middlemen in Legislative Bargaining," Economics Discussion Papers 8980, University of Essex, Department of Economics.
    4. Meirowitz, Adam & Pi, Shaoting, 2022. "Voting and trading: The shareholder’s dilemma," Journal of Financial Economics, Elsevier, vol. 146(3), pages 1073-1096.
    5. Suchan Chae & Seho Kim, 2019. "The effects of third-party transfers in sequential anchored bargaining," International Journal of Game Theory, Springer;Game Theory Society, vol. 48(1), pages 143-155, March.
    6. Ying Chen & Jan Zapal, 2021. "Sequential Vote Buying," CERGE-EI Working Papers wp692, The Center for Economic Research and Graduate Education - Economics Institute, Prague.

  3. Ahn, DS & Oliveros, S, 2013. "Approval Voting and Scoring Rules with Common Values," Economics Discussion Papers 8983, University of Essex, Department of Economics.

    Cited by:

    1. Sebastien Courtin & Matias Nunez, 2013. "A Map of Approval Voting Equilibria Outcomes," Working Papers hal-00914887, HAL.
    2. Dirk Helbing & Farzam Fanitabasi & Fosca Giannotti & Regula Hänggli & Carina I. Hausladen & Jeroen van den Hoven & Sachit Mahajan & Dino Pedreschi & Evangelos Pournaras, 2021. "Ethics of Smart Cities: Towards Value-Sensitive Design and Co-Evolving City Life," Sustainability, MDPI, vol. 13(20), pages 1-25, October.
    3. Castanheira, Micael & Bouton, Laurent & Llorente-Saguer, Aniol, 2012. "Divided Majority and Information Aggregation: Theory and Experiment," CEPR Discussion Papers 9234, C.E.P.R. Discussion Papers.
    4. François Durand & Antonin Macé & Matías Núñez, 2024. "Voter coordination in elections: A case for approval voting," Post-Print halshs-04630490, HAL.
    5. Laurent Bouton & Aniol Llorente-Saguer & Antonin Macé & Dimitrios Xefteris, 2024. "Voting Rights, Agenda Control and Information Aggregation," PSE Working Papers halshs-03519689, HAL.
    6. Giles, Adam & Postl, Peter, 2014. "Equilibrium and effectiveness of two-parameter scoring rules," Mathematical Social Sciences, Elsevier, vol. 68(C), pages 31-52.
    7. Matias Nunez & Jean-Francois Laslier, 2014. "Bargaining through Approval," THEMA Working Papers 2014-06, THEMA (THéorie Economique, Modélisation et Applications), Université de Cergy-Pontoise.
    8. Amrita Dhillon & Grammateia Kotsialou & Dilip Ravindran & Dimitrios Xefteris, 2023. "Information aggregation with delegation of votes," Papers 2306.03960, arXiv.org.
    9. Herrera, Helios & Llorente-Saguer, Aniol & McMurray, Joseph C., 2019. "Information aggregation and turnout in proportional representation: A laboratory experiment," Journal of Public Economics, Elsevier, vol. 179(C).
    10. Matias Nunez, 2013. "The Strategic Sincerity of Approval Voting," Post-Print hal-00917101, HAL.
    11. Tsakas, Nikolas & Xefteris, Dimitrios, 2021. "Information aggregation with runoff voting," Journal of Economic Theory, Elsevier, vol. 191(C).
    12. François Durand & Antonin Macé & Matias Nunez, 2019. "Analysis of Approval Voting in Poisson Games," PSE Working Papers halshs-02049865, HAL.
    13. Eyal Baharad & Leif Danziger, 2018. "Voting in Hiring Committees: Which "Almost" Rule is Optimal?," CESifo Working Paper Series 6851, CESifo.
    14. Baharad, Eyal & Danziger, Leif, 2018. "Voting in Hiring Committees: Which "Almost" Rule Is Optimal?," IZA Discussion Papers 11287, Institute of Labor Economics (IZA).
    15. Sébastien Courtin & Matias Nunez, 2013. "Dominance Solvable Approval Voting Games," THEMA Working Papers 2013-27, THEMA (THéorie Economique, Modélisation et Applications), Université de Cergy-Pontoise.
    16. Postl, Peter, 2017. "Évaluation et comparaison des règles de vote derrière le voile de l’ignorance : Tour d'horizon sélectif et analyse des règles de scores à deux paramètres," L'Actualité Economique, Société Canadienne de Science Economique, vol. 93(1-2), pages 249-290, Mars-Juin.
    17. Baharad, Eyal & Danziger, Leif, 2018. "Voting in Hiring Committees: Which "Almost" Rule Is Optimal?," GLO Discussion Paper Series 185, Global Labor Organization (GLO).
    18. Chernomaz, K. & Goertz, J.M.M., 2023. "(A)symmetric equilibria and adaptive learning dynamics in small-committee voting," Journal of Economic Dynamics and Control, Elsevier, vol. 147(C).
    19. Laurent Bouton & Micael Castanheira De Moura, 2012. "One Person, Many Votes: Divided Majority and Information Aggregation," ULB Institutional Repository 2013/108675, ULB -- Universite Libre de Bruxelles.
    20. Nikolas Tsakas & Dimitrios Xefteris, 2019. "Stress-Testing the Runoff Rule in the Laboratory," University of Cyprus Working Papers in Economics 10-2019, University of Cyprus Department of Economics.
    21. Francesco Sinopoli & Giovanna Iannantuoni & Carlos Pimienta, 2014. "Counterexamples on the Superiority of Approval versus Plurality," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 16(5), pages 824-834, October.
    22. Eyal Baharad & Leif Danziger, 2018. "Voting in Hiring Committees: Which “Almost” Rule is Optimal?," Group Decision and Negotiation, Springer, vol. 27(1), pages 129-151, February.
    23. Haradhan Kumar Mohajan, 2011. "Approval Voting: A Multi-outcome Election," KASBIT Business Journals (KBJ), Khadim Ali Shah Bukhari Institute of Technology (KASBIT), vol. 4, pages 77-88, December.
    24. GOERTZ, Johanna & MANIQUET, François, 2013. "Large elections with multiple alternatives: a Condorcet Jury Theorem and inefficient equilibria," LIDAM Discussion Papers CORE 2013023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
    25. Paulo Barelli & Sourav Bhattacharya & Lucas Siga, 2022. "Full Information Equivalence in Large Elections," Econometrica, Econometric Society, vol. 90(5), pages 2161-2185, September.
    26. Svetlana Kosterina, 2023. "Information structures and information aggregation in threshold equilibria in elections," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 75(2), pages 493-522, February.

  4. Iaryczower, M & Oliveros, S, 2013. "Power Brokers: Middlemen in Legislative Bargaining," Economics Discussion Papers 8980, University of Essex, Department of Economics.

    Cited by:

    1. Casella, Alessandra & Turban, Sébastien, 2014. "Democracy undone. Systematic minority advantage in competitive vote markets," Games and Economic Behavior, Elsevier, vol. 88(C), pages 47-70.
    2. Alessandra Casella & Antonin Macé, 2020. "Does Vote Trading Improve Welfare?," NBER Working Papers 27743, National Bureau of Economic Research, Inc.
    3. Dimitrios Xefteris & Nicholas Ziros, 2016. "Strategic vote trading in power-sharing systems," University of Cyprus Working Papers in Economics 01-2016, University of Cyprus Department of Economics.
    4. Iaryczower, M & Oliveros, S, 2015. "Competing For Loyalty: The Dynamics of Rallying Support," Economics Discussion Papers 14459, University of Essex, Department of Economics.

  5. Oliveros, S, 2013. "Aggregation of endogenous information in large elections," Economics Discussion Papers 8984, University of Essex, Department of Economics.

    Cited by:

    1. Castanheira, Micael & Bouton, Laurent & Llorente-Saguer, Aniol, 2012. "Divided Majority and Information Aggregation: Theory and Experiment," CEPR Discussion Papers 9234, C.E.P.R. Discussion Papers.
    2. Christian Bruns, 2013. "Elections and Market Provision of Information," CESifo Working Paper Series 4091, CESifo.
    3. Triossi, Matteo, 2013. "Costly information acquisition. Is it better to toss a coin?," Games and Economic Behavior, Elsevier, vol. 82(C), pages 169-191.
    4. Cesar Martinelli, 2011. "Ignorance and Naivete in Large Elections," Working Papers 1107, Centro de Investigacion Economica, ITAM.
    5. Matteo Triossiv, 2010. "Costly information acquisition. Better to toss a coin?," Documentos de Trabajo 267, Centro de Economía Aplicada, Universidad de Chile.

  6. Oliveros, S & Vardy, F, 2013. "Demand for Slant: How Abstention Shapes Voters? Choice of News Media," Economics Discussion Papers 8986, University of Essex, Department of Economics.

    Cited by:

    1. Ozerturk, Saltuk, 2022. "Media access, bias and public opinion," European Economic Review, Elsevier, vol. 147(C).
    2. Vladimir Novak & Andrei Matveenko & Silvio Ravaioli, 2023. "The Status Quo and Belief Polarization of Inattentive Agents: Theory and Experiment," CRC TR 224 Discussion Paper Series crctr224_2023_385, University of Bonn and University of Mannheim, Germany.
    3. Marcel Garz & Jil Sörensen & Daniel F. Stone, 2019. "Partisan Selective Engagement: Evidence from Facebook," CESifo Working Paper Series 7975, CESifo.
    4. Sun, Junze & Schram, Arthur & Sloof, Randolph, 2021. "Elections under biased candidate endorsements — an experimental study," Games and Economic Behavior, Elsevier, vol. 125(C), pages 141-158.
    5. Piolatto, Amedeo & Schuett, Florian, 2015. "Media competition and electoral politics," Journal of Public Economics, Elsevier, vol. 130(C), pages 80-93.
    6. Sendhil Mullainathan & Andrei Shleifer, 2005. "The Market for News," American Economic Review, American Economic Association, vol. 95(4), pages 1031-1053, September.
    7. Gratton, Gabriele, 2014. "Pandering and electoral competition," Games and Economic Behavior, Elsevier, vol. 84(C), pages 163-179.
    8. Denter, Philipp & Dumav, Martin & Ginzburg, Boris, 2019. "Social Connectivity, Media Bias, and Correlation Neglect," MPRA Paper 97626, University Library of Munich, Germany.
    9. Mayank Aggarwal & Anindya S. Chakrabarti & Chirantan Chatterjee, 2023. "Movies, stigma and choice: Evidence from the pharmaceutical industry," Health Economics, John Wiley & Sons, Ltd., vol. 32(5), pages 1019-1039, May.
    10. Garz, Marcel & Sood, Gaurav & Stone, Daniel F. & Wallace, Justin, 2020. "The supply of media slant across outlets and demand for slant within outlets: Evidence from US presidential campaign news," European Journal of Political Economy, Elsevier, vol. 63(C).
    11. Saptarshi Ghosh & Nidhi Jain & Cesar Martinelli & Jaideep Roy, 2019. "Swings, News, and Elections," Working Papers 1076, George Mason University, Interdisciplinary Center for Economic Science.
    12. Vaccari, Federico, 2020. "Influential News and Policy-making," MPRA Paper 100464, University Library of Munich, Germany.
    13. Piolatto, A. & Schuett, F., 2013. "Media Competition and Electoral Politics," Other publications TiSEM f564dc8d-b328-4ba0-a2b0-f, Tilburg University, School of Economics and Management.
    14. Li, Anqi & Hu, Lin, 2023. "Electoral accountability and selection with personalized information aggregation," Games and Economic Behavior, Elsevier, vol. 140(C), pages 296-315.
    15. Joan Calzada & Nestor Duch-Brown & Ricard Gil, 2021. "Do search engines increase concentration in media markets?," UB School of Economics Working Papers 2021/415, University of Barcelona School of Economics.
    16. Eraslan, Hulya & Ozerturk, Saltuk, 2017. "Information Gatekeeping and Media Bias," Working Papers 17-001, Rice University, Department of Economics.
    17. Hulya Eraslan & Saltuk Ozerturk, 2018. "Information Gatekeeping and Media Bias," Koç University-TUSIAD Economic Research Forum Working Papers 1808, Koc University-TUSIAD Economic Research Forum.
    18. Helios Herrera & Aniol Llorente-Saguer & Joseph C. McMurray, 2016. "The Marginal Voter's Curse," Working Papers 798, Queen Mary University of London, School of Economics and Finance.
    19. Guo, Wen-Chung & Lai, Fu-Chuan & Suen, Wing, 2018. "Downs meets d’Aspremont and company: Convergence versus differentiation in politics and the media," International Journal of Industrial Organization, Elsevier, vol. 60(C), pages 96-125.

  7. David S Ahn & Santiago Oliveros, 2010. "The Condorcet Jur(ies) Theorem," Levine's Working Paper Archive 661465000000000268, David K. Levine.

    Cited by:

    1. Eliaz, Kfir & de Clippel, Geoffroy, 2012. "Premise-Based versus Outcome-Based Information Aggregation," CEPR Discussion Papers 8733, C.E.P.R. Discussion Papers.
    2. Emanuele Bracco & Federico Revelli, 2017. "Concurrent Elections and Political Accountability: Evidence from Italian Local Elections," Working Papers 170337308, Lancaster University Management School, Economics Department.
    3. Bozbay, İrem & Dietrich, Franz & Peters, Hans, 2014. "Judgment aggregation in search for the truth," Games and Economic Behavior, Elsevier, vol. 87(C), pages 571-590.
    4. Franz Dietrich, 2016. "Judgment aggregation and agenda manipulation," Université Paris1 Panthéon-Sorbonne (Post-Print and Working Papers) hal-01252817, HAL.
    5. Ben-Yashar, Ruth & Danziger, Leif, 2014. "On the Optimal Composition of Committees," IZA Discussion Papers 7963, Institute of Labor Economics (IZA).
    6. Aureli Alabert & Mercè Farré, 2022. "The doctrinal paradox: comparison of decision rules in a probabilistic framework," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 58(4), pages 863-895, May.
    7. Xie, Yinxi & Xie, Yang, 2017. "Machiavellian experimentation," Journal of Comparative Economics, Elsevier, vol. 45(4), pages 685-711.
    8. Alexander Lundberg, 2020. "The importance of expertise in group decisions," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 55(3), pages 495-521, October.
    9. Saori CHIBA, 2018. "Hidden Profiles and Persuasion Cascades in Group Decision-Making," Discussion papers e-18-001, Graduate School of Economics , Kyoto University.
    10. Svetlana Kosterina, 2023. "Information structures and information aggregation in threshold equilibria in elections," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 75(2), pages 493-522, February.

  8. David S. Ahn & Santiago Oliveros, 2010. "Combinatorial Voting," Levine's Working Paper Archive 661465000000000263, David K. Levine.

    Cited by:

    1. Azar, José, 2017. "Portfolio Diversification, Market Power, and the Theory of the Firm," IESE Research Papers D/1170, IESE Business School.
    2. Katherine Baldiga & Jerry Green, 2013. "Assent-maximizing social choice," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 40(2), pages 439-460, February.
    3. Jac C. Heckelman & Robi Ragan, 2021. "Symmetric Scoring Rules And A New Characterization Of The Borda Count," Economic Inquiry, Western Economic Association International, vol. 59(1), pages 287-299, January.
    4. Eliaz, Kfir & de Clippel, Geoffroy, 2012. "Premise-Based versus Outcome-Based Information Aggregation," CEPR Discussion Papers 8733, C.E.P.R. Discussion Papers.
    5. Emanuele Bracco & Federico Revelli, 2017. "Concurrent Elections and Political Accountability: Evidence from Italian Local Elections," Working Papers 170337308, Lancaster University Management School, Economics Department.
    6. Bozbay, İrem & Dietrich, Franz & Peters, Hans, 2014. "Judgment aggregation in search for the truth," Games and Economic Behavior, Elsevier, vol. 87(C), pages 571-590.
    7. Ahn, David S. & Oliveros, Santiago, 2014. "The Condorcet Jur(ies) Theorem," Journal of Economic Theory, Elsevier, vol. 150(C), pages 841-851.
    8. Irem Bozbay, 2019. "Truth-tracking judgment aggregation over interconnected issues," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 53(2), pages 337-370, August.
    9. Francesco De Sinopoli & Claudia Meroni, 2017. "A concept of sincerity for combinatorial voting," Working Papers 01/2017, University of Verona, Department of Economics.
    10. Meirowitz, Adam & Pi, Shaoting, 2022. "Voting and trading: The shareholder’s dilemma," Journal of Financial Economics, Elsevier, vol. 146(3), pages 1073-1096.
    11. Denter, Philipp, 2021. "Valence, complementarities, and political polarization," Games and Economic Behavior, Elsevier, vol. 128(C), pages 39-57.
    12. Halberstam, Yosh & Montagnes, B. Pablo, 2015. "Presidential coattails versus the median voter: Senator selection in US elections," Journal of Public Economics, Elsevier, vol. 121(C), pages 40-51.
    13. Krasa, Stefan & Polborn, Mattias K., 2012. "Political competition between differentiated candidates," Games and Economic Behavior, Elsevier, vol. 76(1), pages 249-271.

  9. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.

    Cited by:

    1. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    2. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    3. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    4. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    5. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2011. "Evaluating the damage associated with intentional network disintegration," Reliability Engineering and System Safety, Elsevier, vol. 96(4), pages 433-439.
    6. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What Have We Learned? Assessing the Effectiveness of Counterterrorism Strategies in Pakistan," MPRA Paper 77015, University Library of Munich, Germany, revised 20 Feb 2017.
    7. Chenghan Zhou & Andrew Spivey & Haifeng Xu & Thanh H. Nguyen, 2023. "Information Design for Multiple Interdependent Defenders: Work Less, Pay Off More," Games, MDPI, vol. 14(1), pages 1-18, January.
    8. Nakao, Keisuke, 2017. "Denial vs. Punishment: Strategies Shape War, but War Itself Affects Strategies," MPRA Paper 81418, University Library of Munich, Germany.
    9. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    10. Catherine C. Langlois & Jean-Pierre P. Langlois, 2017. "Rational deterrence by proxy: designing cooperative security agreements," Defence and Peace Economics, Taylor & Francis Journals, vol. 28(1), pages 1-33, January.
    11. Khusrav Gaibulloev & Todd Sandler, 2023. "Common myths of terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 37(2), pages 271-301, April.
    12. Yanling Chang & Alan Erera & Chelsea White, 2015. "Value of information for a leader–follower partially observed Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 129-153, December.
    13. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    14. Nicholas T. Boardman & Brian J. Lunday & Matthew J. Robbins, 2017. "Heterogeneous surface-to-air missile defense battery location: a game theoretic approach," Journal of Heuristics, Springer, vol. 23(6), pages 417-447, December.
    15. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    16. Christopher Cotton & Cheng Li, 2015. "Profiling, Screening, and Criminal Recruitment," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 17(6), pages 964-985, December.
    17. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    18. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    19. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    20. E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
    21. Nora, Vladyslav & Uno, Hiroshi, 2014. "Saddle functions and robust sets of equilibria," Journal of Economic Theory, Elsevier, vol. 150(C), pages 866-877.
    22. Dan Kovenock & Brian Roberson, 2015. "The Optimal Defense of Network Connectivity," Working Papers 15-24, Chapman University, Economic Science Institute.
    23. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    24. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    25. Chen Wang & Vicki M. Bier, 2011. "Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility," Decision Analysis, INFORMS, vol. 8(4), pages 286-302, December.
    26. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    27. Ralph L. Keeney, 2007. "Modeling Values for Anti‐Terrorism Analysis," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 585-596, June.
    28. Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
    29. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
    30. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    31. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    32. Marco Pelliccia, 2020. "Decentralized Defence of a (Directed) Network Structure," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
    33. Wang, Jian & Cui, Lei, 2023. "Patrolling games with coordination between monitoring devices and patrols," Reliability Engineering and System Safety, Elsevier, vol. 233(C).
    34. Ben-Gad, M. & Ben Haim, Y. & Peled, D., 2019. "Allocating Security Expenditures under Knightian Uncertainty: an Info-Gap Approach," Working Papers 19/06, Department of Economics, City University London.
    35. Ahnert, Toni & Brolley, Michael & Cimon, David & Riordan, Ryan, 2022. "Cyber Risk and Security Investment," CEPR Discussion Papers 17403, C.E.P.R. Discussion Papers.
    36. Perea, Federico & Puerto, Justo, 2013. "Revisiting a game theoretic framework for the robust railway network design against intentional attacks," European Journal of Operational Research, Elsevier, vol. 226(2), pages 286-292.
    37. Michael Greenberg & Karen Lowrie, 2019. "Vicki Bier: A More Sensible Way to View Risk," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 744-748, April.
    38. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    39. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    40. Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
    41. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    42. W. Matthew Carlyle & Shane G. Henderson & Roberto Szechtman, 2011. "Allocating capacity in parallel queues to improve their resilience to deliberate attack," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(8), pages 731-742, December.
    43. Daron Acemoglu & Azarakhsh Malekian & Asuman Ozdaglar, 2013. "Network Security and Contagion," NBER Working Papers 19174, National Bureau of Economic Research, Inc.
    44. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    45. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    46. Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
    47. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    48. Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
    49. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
    50. Subhayu Bandyopadhyay & Todd Sandler, 2009. "The interplay between preemptive and defensive counterterrorism measures: a two-stage game," Working Papers 2008-034, Federal Reserve Bank of St. Louis.
    51. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
    52. Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
    53. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    54. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    55. Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
    56. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    57. Bhan, Aditya & Kabiraj, Tarun, 2018. "Countering Terror Cells: Offence versus Defence," MPRA Paper 88873, University Library of Munich, Germany.
    58. Gian Maria Campedelli & Mihovil Bartulovic & Kathleen M. Carley, 2019. "Pairwise similarity of jihadist groups in target and weapon transitions," Journal of Computational Social Science, Springer, vol. 2(2), pages 245-270, July.
    59. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    60. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    61. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    62. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2013. "Evaluating the damage associated with intentional supply deprivation in multi-commodity network," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 11-17.
    63. Roponen, Juho & Ríos Insua, David & Salo, Ahti, 2020. "Adversarial risk analysis under partial information," European Journal of Operational Research, Elsevier, vol. 287(1), pages 306-316.
    64. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    65. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    66. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    67. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    68. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    69. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    70. Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.
    71. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    72. Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
    73. Yacov Y. Haimes, 2011. "On the Complex Quantification of Risk: Systems‐Based Perspective on Terrorism," Risk Analysis, John Wiley & Sons, vol. 31(8), pages 1175-1186, August.
    74. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    75. Fabrizio Baiardi & Daniele Sgandurra, 2013. "Assessing ICT risk through a Monte Carlo method," Environment Systems and Decisions, Springer, vol. 33(4), pages 486-499, December.
    76. Todd Sandler, 2010. "Terrorism and Policy: Introduction," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(2), pages 203-213, April.
    77. Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
    78. Fabrizio Baiardi & Federico Tonelli & Alessandro Bertolini, 2015. "Iterative selection of countermeasures for intelligent threat agents," International Journal of Network Management, John Wiley & Sons, vol. 25(5), pages 340-354, September.
    79. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    80. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    81. Ruiz Estrada, Mario Arturo & Koutronas, Evangelos, 2016. "Terrorist attack assessment: Paris November 2015 and Brussels March 2016," Journal of Policy Modeling, Elsevier, vol. 38(3), pages 553-571.
    82. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    83. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    84. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    85. Cheng Li & Christopher Cotton, 2023. "Profiling restrictions in a model of law enforcement and strategic crime," European Journal of Law and Economics, Springer, vol. 55(3), pages 511-532, June.
    86. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    87. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    88. Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
    89. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    90. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    91. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    92. Subhayu Bandyopadhyay & Todd Sandler, 2020. "Counterterrorism Policy: Spillovers, Regime Stability, and Corner Solutions," Working Papers 2020-015, Federal Reserve Bank of St. Louis.
    93. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    94. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.
    95. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    96. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    97. Manxi Wu & Saurabh Amin, 2019. "Securing Infrastructure Facilities: When Does Proactive Defense Help?," Dynamic Games and Applications, Springer, vol. 9(4), pages 984-1025, December.
    98. Subhayu Bandyopadhyay & Todd Sandler, 2023. "The Trade-Offs of Counterterrorism Policies," Review, Federal Reserve Bank of St. Louis, vol. 105(3), pages 177-197, July.
    99. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    100. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    101. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    102. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    103. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    104. Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
    105. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
    106. Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.
    107. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    108. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    109. Todd Sandler, 2013. "Introduction: Advances in the Study of the Economics of Terrorism," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 768-773, April.
    110. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    111. Jasmin Wachter & Stefan Rass & Sandra König, 2018. "Security from the Adversary’s Inertia–Controlling Convergence Speed When Playing Mixed Strategy Equilibria," Games, MDPI, vol. 9(3), pages 1-15, August.
    112. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    113. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    114. Eiselt, H.A. & Bhadury, Joy & Burkey, Mark L., 2011. "An optimization-based framework for modeling counterterrorism strategies," MPRA Paper 36117, University Library of Munich, Germany.
    115. Deck, Cary & Sheremeta, Roman, 2012. "Fight or Flight?," MPRA Paper 52130, University Library of Munich, Germany.
    116. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    117. Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
    118. Timothy Mathews & Shane Sanders, 2019. "Strategic and experimental analyses of conflict and terrorism," Public Choice, Springer, vol. 179(3), pages 169-174, June.
    119. Arrah-Marie Jo, 2019. "Software vulnerability disclosure and security investment [L'impact de la divulgation d’une faille de sécurité : au-delà des motivations de l’éditeur de logiciel]," Post-Print hal-03033198, HAL.
    120. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    121. Ur Rehman Faiz, 2015. "The Spatial Analysis of Terrorism in Pakistan," Asian Journal of Law and Economics, De Gruyter, vol. 6(2), pages 125-165, October.
    122. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    123. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    124. Hamid Mohtadi & Bryan S. Weber, 2021. "Catastrophe And Rational Policy: Case Of National Security," Economic Inquiry, Western Economic Association International, vol. 59(1), pages 140-161, January.
    125. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    126. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
    127. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    128. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.
    129. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.
    130. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

Articles

  1. Iaryczower, Matias & Oliveros, Santiago, 2023. "Collective hold-up," Theoretical Economics, Econometric Society, vol. 18(3), July.
    See citations under working paper version above.
  2. Matias Iaryczower & Santiago Oliveros, 2017. "Competing for Loyalty: The Dynamics of Rallying Support," American Economic Review, American Economic Association, vol. 107(10), pages 2990-3005, October.
    See citations under working paper version above.
  3. Ahn, David S. & Oliveros, Santiago, 2016. "Approval voting and scoring rules with common values," Journal of Economic Theory, Elsevier, vol. 166(C), pages 304-310.
    See citations under working paper version above.
  4. Iaryczower, Matias & Oliveros, Santiago, 2016. "Power brokers: Middlemen in legislative bargaining," Journal of Economic Theory, Elsevier, vol. 162(C), pages 209-236.
    See citations under working paper version above.
  5. Santiago Oliveros & Felix Várdy, 2015. "Demand for Slant: How Abstention Shapes Voters' Choice of News Media," Economic Journal, Royal Economic Society, vol. 125(587), pages 1327-1368, September.
    See citations under working paper version above.
  6. Ahn, David S. & Oliveros, Santiago, 2014. "The Condorcet Jur(ies) Theorem," Journal of Economic Theory, Elsevier, vol. 150(C), pages 841-851.
    See citations under working paper version above.
  7. Oliveros, Santiago, 2013. "Abstention, ideology and information acquisition," Journal of Economic Theory, Elsevier, vol. 148(3), pages 871-902.

    Cited by:

    1. Yaron Azrieli, 2018. "The price of ‘one person, one vote’," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 50(2), pages 353-385, February.
    2. Piolatto, Amedeo & Schuett, Florian, 2015. "Media competition and electoral politics," Journal of Public Economics, Elsevier, vol. 130(C), pages 80-93.
    3. Ennio Bilancini & Leonardo Boncinelli, 2014. "Signaling with Costly Acquisition of Signals," Center for Economic Research (RECent) 100, University of Modena and Reggio E., Dept. of Economics "Marco Biagi".
    4. Sourav Bhattacharya, 2013. "Condorcet Jury Theorem in a Spatial Model of Elections," Working Paper 517, Department of Economics, University of Pittsburgh, revised Nov 2013.
    5. Emanuele Bracco & Federico Revelli, 2017. "Concurrent Elections and Political Accountability: Evidence from Italian Local Elections," Working Papers 170337308, Lancaster University Management School, Economics Department.
    6. Bhattacharya, Sourav & Duffy, John & Kim, SunTak, 2017. "Voting with endogenous information acquisition: Experimental evidence," Games and Economic Behavior, Elsevier, vol. 102(C), pages 316-338.
    7. Gianmarco León, 2015. "Turnout, Political Preferences and Information: Experimental Evidence from Peru," Working Papers 691, Barcelona School of Economics.
    8. Gersbach, Hans & Mamageishvili, Akaki & Tejada, Oriol, 2020. "Appointed Learning for the Common Good: Optimal Committee Size and Efficient Rewards," CEPR Discussion Papers 15311, C.E.P.R. Discussion Papers.
    9. Ruth Ben-Yashar & Leif Danziger, 2014. "When is Voting Optimal?," CESifo Working Paper Series 5116, CESifo.
    10. Bruns, Christian & Himmler, Oliver, 2016. "Mass media, instrumental information, and electoral accountability," Journal of Public Economics, Elsevier, vol. 134(C), pages 75-84.
    11. Prato, Carlo & Wolton, Stephane, 2017. "Rational ignorance, populism, and reform," LSE Research Online Documents on Economics 86371, London School of Economics and Political Science, LSE Library.
    12. Gersbach, Hans & Mamageishvili, Akaki & Tejada, Oriol, 2022. "Appointed learning for the common good: Optimal committee size and monetary transfers," Games and Economic Behavior, Elsevier, vol. 136(C), pages 153-176.
    13. Javier Rivas Ruiz & F Mengel, 2015. "Common value elections with private information and informative priors: theory and experiments," Department of Economics Working Papers 44/15, University of Bath, Department of Economics.
    14. Siddhartha Bandyopadhyay & Moumita Deb & Johannes Lohse & Rebecca McDonald, 2024. "The swing voter's curse revisited: Transparency's impact on committee voting," Discussion Papers 24-01, Department of Economics, University of Birmingham.
    15. Malin Arve & Claudine Desrieux, 2023. "Committee Preferences and Information Acquisition," Journal of Industry, Competition and Trade, Springer, vol. 23(3), pages 243-260, December.
    16. Jens GroЯer & Michael Seebauer, 2013. "The curse of uninformed voting: An experimental study," Working Paper Series in Economics 64, University of Cologne, Department of Economics.
    17. Piolatto, A. & Schuett, F., 2013. "Media Competition and Electoral Politics," Other publications TiSEM f564dc8d-b328-4ba0-a2b0-f, Tilburg University, School of Economics and Management.
    18. Nguyen, Phuc Lam Thy & Alsakka, Rasha & Mantovan, Noemi, 2023. "The impact of sovereign credit ratings on voters’ preferences," Journal of Banking & Finance, Elsevier, vol. 154(C).
    19. Bruns, Christian & Himmler, Oliver, 2014. "A Theory of Political Accountability and Journalism," MPRA Paper 59286, University Library of Munich, Germany.
    20. Santiago Oliveros & Felix Várdy, 2015. "Demand for Slant: How Abstention Shapes Voters' Choice of News Media," Economic Journal, Royal Economic Society, vol. 125(587), pages 1327-1368, September.
    21. Christian Bruns, 2013. "Elections and Market Provision of Information," CESifo Working Paper Series 4091, CESifo.
    22. Poy, Samuele & Schüller, Simone, 2020. "Internet and voting in the social media era: Evidence from a local broadband policy," Research Policy, Elsevier, vol. 49(1).
    23. Prato, Carlo & Wolton, Stephane, 2014. "The Voters' Curses: The Upsides and Downsides of Political Engagement," MPRA Paper 53482, University Library of Munich, Germany.
    24. Meyer, Jacob & Rentschler, Lucas, 2023. "Abstention and informedness in nonpartisan elections," Games and Economic Behavior, Elsevier, vol. 142(C), pages 381-410.
    25. Keiichi Morimoto, 2021. "Information Use and the Condorcet Jury Theorem," Mathematics, MDPI, vol. 9(10), pages 1-22, May.
    26. Ralph-Christopher Bayer & Marco Faravelli & Carlos Pimienta, 2023. "The Wisdom of the Crowd: Uninformed Voting and the Efficiency of Democracy," Discussion Papers 2023-08, School of Economics, The University of New South Wales.
    27. Sourav Bhattacharya & John Duffy & Sun-Tak Kim, 2015. "Voting with Endogenous Information Acquisition: Theory and Evidence," Working Papers 151602, University of California-Irvine, Department of Economics.
    28. Joseph McMurray, 2015. "The paradox of information and voter turnout," Public Choice, Springer, vol. 165(1), pages 13-23, October.
    29. Andersen, Jørgen Juel & Heggedal, Tom-Reiel, 2019. "Political rents and voter information in search equilibrium," Games and Economic Behavior, Elsevier, vol. 114(C), pages 146-168.
    30. Großer, Jens & Seebauer, Michael, 2016. "The curse of uninformed voting: An experimental study," Games and Economic Behavior, Elsevier, vol. 97(C), pages 205-226.
    31. Cesar Martinelli, 2011. "Ignorance and Naivete in Large Elections," Working Papers 1107, Centro de Investigacion Economica, ITAM.
    32. Ginzburg, Boris & Guerra, José-Alberto, 2019. "When collective ignorance is bliss: Theory and experiment on voting for learning," Journal of Public Economics, Elsevier, vol. 169(C), pages 52-64.
    33. Guha, Brishti, 2022. "Ambiguity aversion, group size, and deliberation: Costly information and decision accuracy," Journal of Economic Behavior & Organization, Elsevier, vol. 201(C), pages 115-133.
    34. Prato, Carlo & Wolton, Stephane, 2013. "Rational Ignorance, Elections, and Reform," MPRA Paper 68638, University Library of Munich, Germany, revised 10 Dec 2015.
    35. Bandyopadhyay, Siddhartha & Deb, Moumita & Lohse, Johannes & McDonald, Rebecca, 2024. "The Swing Voter’s Curse Revisited: Transparency’s Impact on Committee Voting," Working Papers 0744, University of Heidelberg, Department of Economics.
    36. Johan A Elkink & Sarah Parlane & Thomas Sattler, 2020. "When one side stays home: A joint model of turnout and vote choice," Working Papers 202012, Geary Institute, University College Dublin.

  8. David S. Ahn & Santiago Oliveros, 2012. "Combinatorial Voting," Econometrica, Econometric Society, vol. 80(1), pages 89-141, January.
    See citations under working paper version above.
  9. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    See citations under working paper version above.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.