Allocating Security Expenditures under Knightian Uncertainty: an Info-Gap Approach
Author
Abstract
Suggested Citation
Download full text from publisher
Other versions of this item:
- Michael Ben-Gad & Yakov Ben-Haim & Dan Peled, 2020. "Allocating Security Expenditures under Knightian Uncertainty: An Info-Gap Approach," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(7), pages 830-850, October.
References listed on IDEAS
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Michael Intriligator & Dagobert Brito, 1981. "Nuclear proliferation and the probability of nuclear war," Public Choice, Springer, vol. 37(2), pages 247-260, January.
- Wallace J. Thies, 1987. "Alliances and Collective Goods," Journal of Conflict Resolution, Peace Science Society (International), vol. 31(2), pages 298-332, June.
- Brito, D L, 1972. "A Dynamic Model of an Armaments Race," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 13(2), pages 359-375, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Michael Ben‐Gad, 2022. "Russia versus the West: Facing the long‐term challenge," Economic Affairs, Wiley Blackwell, vol. 42(2), pages 385-394, June.
- Gitana Dudzevičiūtė & Vida Česnuitytė & Dalia Prakapienė, 2021. "Defence Expenditure–Government Debt Nexus in the Context of Sustainability in Selected Small European Union Countries," Sustainability, MDPI, vol. 13(12), pages 1-18, June.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Michael P. Leidy & Robert W. Staiger, 1985. "Economic Issues and Methodology in Arms Race Analysis," Journal of Conflict Resolution, Peace Science Society (International), vol. 29(3), pages 503-530, September.
- Michael D. Intriligator, 1982. "Research on Conflict Theory," Journal of Conflict Resolution, Peace Science Society (International), vol. 26(2), pages 307-327, June.
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
- Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022.
"Network defense and behavioral biases: an experimental study,"
Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
- Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
- Bhan, Aditya & Kabiraj, Tarun, 2018. "Countering Terror Cells: Offence versus Defence," MPRA Paper 88873, University Library of Munich, Germany.
- Michael D. Intriligator & D. L. Brito, 1976. "Formal Models of Arms Races," Conflict Management and Peace Science, Peace Science Society (International), vol. 2(1), pages 77-88, February.
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Robert H. Kupperman & Harvey A. Smith, 1976. "Formal Models of Arms Races: Discussion," Conflict Management and Peace Science, Peace Science Society (International), vol. 2(1), pages 89-96, February.
- Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
- Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
- van der Ploeg, F. & de Zeeuw, A.J., 1987.
"Conflict over arms accumulation in market and command economies,"
Research Memorandum
FEW 265, Tilburg University, School of Economics and Management.
- van der Ploeg, F. & de Zeeuw, A.J., 1990. "Conflict over arms accumulation in market and command economies," Other publications TiSEM 6e74c41a-2c95-4abc-ad00-5, Tilburg University, School of Economics and Management.
- van der Ploeg, F. & de Zeeuw, A.J., 1987. "Conflict over arms accumulation in market and command economies," Other publications TiSEM e452393c-226d-4b27-a5ab-b, Tilburg University, School of Economics and Management.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
Review of Economic Studies,
Oxford University Press, vol. 81(4), pages 1518-1542.
- S. Goyal & A. Vigier, 2013. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1327, Faculty of Economics, University of Cambridge.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
- Devi Prasad DASH & Debi Prasad BAL & Manoranjan SAHOO, 2016.
"Nexus between defense expenditure and economic growth in BRIC economies: An empirical investigation,"
Theoretical and Applied Economics, Asociatia Generala a Economistilor din Romania / Editura Economica, vol. 0(1(606), S), pages 89-102, Spring.
- Dash, Devi Prasad & Bal, Debi Prasad & Sahoo, Manoranjan, 2016. "Nexus between defense expenditure and economic growth in BRIC economies: An empirical investigation," MPRA Paper 77014, University Library of Munich, Germany.
- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017.
"What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan,"
Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
- Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What Have We Learned? Assessing the Effectiveness of Counterterrorism Strategies in Pakistan," MPRA Paper 77015, University Library of Munich, Germany, revised 20 Feb 2017.
- Yanling Chang & Alan Erera & Chelsea White, 2015. "Value of information for a leader–follower partially observed Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 129-153, December.
More about this item
Keywords
Defense; Knightian Uncertainty; Robustness; Info-gap;All these keywords.
NEP fields
This paper has been announced in the following NEP Reports:- NEP-UPT-2019-05-13 (Utility Models and Prospect Theory)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:cty:dpaper:19/06. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Research Publications Librarian (email available below). General contact details of provider: https://edirc.repec.org/data/decituk.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.