My bibliography
Save this item
Interdependent Security
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Hannah Brenkert‐Smith & Katherine L. Dickinson & Patricia A. Champ & Nicholas Flores, 2013. "Social Amplification of Wildfire Risk: The Role of Social Interactions and Information Sources," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 800-817, May.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010.
"The Economics of Terrorism and Counter-Terrorism: A Survey (Part I),"
Discussion Papers of DIW Berlin
1049, DIW Berlin, German Institute for Economic Research.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2011. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)," Economics of Security Working Paper Series 45, DIW Berlin, German Institute for Economic Research.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)," Discussion Papers of DIW Berlin 1050, DIW Berlin, German Institute for Economic Research.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)," CESifo Working Paper Series 3012, CESifo.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part I)," CESifo Working Paper Series 3011, CESifo.
- Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2011. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part I)," Economics of Security Working Paper Series 44, DIW Berlin, German Institute for Economic Research.
- Geoffrey Heal & Howard Kunreuther, 2010.
"Social Reinforcement: Cascades, Entrapment, and Tipping,"
American Economic Journal: Microeconomics, American Economic Association, vol. 2(1), pages 86-99, February.
- Geoffrey Heal & Howard Kunreuther, 2007. "Social Reinforcement: Cascades, Entrapment and Tipping," NBER Working Papers 13579, National Bureau of Economic Research, Inc.
- Kjell Hausken & Jun Zhuang, 2016.
"The strategic interaction between a company and the government surrounding disasters,"
Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
- Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
- Martina de Gramatica & Fabio Massacci & Woohyun Shim & Uğur Turhan & Julian Williams, 2017. "Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 372-395, February.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Gregory DeAngelo & Taylor Leland Smith, 2020. "Private security, maritime piracy and the provision of international public safety," Journal of Risk and Uncertainty, Springer, vol. 60(1), pages 77-97, February.
- Katherine Daniell & Alec Morton & David Ríos Insua, 2016. "Policy analysis and policy analytics," Annals of Operations Research, Springer, vol. 236(1), pages 1-13, January.
- Thomann, Christian & Schulenburg, J.-Matthias, 2006. "Supply and Demand for Terrorism Insurance: Lessons from Germany," Hannover Economic Papers (HEP) dp-340, Leibniz Universität Hannover, Wirtschaftswissenschaftliche Fakultät.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2023.
"Politically influenced counterterrorism policy and welfare efficiency,"
European Journal of Political Economy, Elsevier, vol. 76(C).
- Subhayu Bandyopadhyay & Todd Sandler, 2022. "Politically influenced counterterrorism policy and welfare efficiency," Working Papers 2022-007, Federal Reserve Bank of St. Louis.
- Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
- Timothy C. Salmon & Roberto A. Weber, 2017.
"Maintaining Efficiency while Integrating Entrants from Lower Performing Groups: an Experimental Study,"
Economic Journal, Royal Economic Society, vol. 127(600), pages 417-444, March.
- Timothy C. Salmon & Roberto A. Weber, 2011. "Maintaining efficiency while integrating entrants from lower-performing groups: an experimental study," ECON - Working Papers 035, Department of Economics - University of Zurich, revised Jul 2014.
- Miao, Meixia & Jiang, Tao & You, Ilsun, 2015. "Payment-based incentive mechanism for secure cloud deduplication," International Journal of Information Management, Elsevier, vol. 35(3), pages 379-386.
- Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
- Ralph L. Keeney, 2007. "Modeling Values for Anti‐Terrorism Analysis," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 585-596, June.
- Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
- Farzaneh Farhadi & Hamidreza Tavafoghi & Demosthenis Teneketzis & S. Jamaloddin Golestani, 2019. "An Efficient Dynamic Allocation Mechanism for Security in Networks of Interdependent Strategic Agents," Dynamic Games and Applications, Springer, vol. 9(4), pages 914-941, December.
- Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
- Tilman Bruck, 2005.
"An Economic Analysis Of Security Policies,"
Defence and Peace Economics, Taylor & Francis Journals, vol. 16(5), pages 375-389.
- Tilman Brück, 2004. "An Economic Analysis of Security Policies," Discussion Papers of DIW Berlin 456, DIW Berlin, German Institute for Economic Research.
- Tilman Br�ck, 2004. "An Economic Analysis of Security Policies," HiCN Working Papers 06, Households in Conflict Network.
- Marco Pelliccia, 2020.
"Decentralized Defence of a (Directed) Network Structure,"
Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
- Marco Pelliccia, 2015. "Decentralised Defence of a (Directed) Network Structure," Birkbeck Working Papers in Economics and Finance 1506, Birkbeck, Department of Economics, Mathematics & Statistics.
- Hulisi Öğüt & Srinivasan Raghunathan & Nirup Menon, 2011. "Cyber Security Risk Management: Public Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and Observability of Self‐Protection," Risk Analysis, John Wiley & Sons, vol. 31(3), pages 497-512, March.
- Erwann Michel-Kerjan, 2003. "New Challenges in Critical Infrastructures : A US Perspective," Working Papers hal-00242947, HAL.
- Patricia A Champ & Hannah Brenkert‐Smith, 2016. "Is Seeing Believing? Perceptions of Wildfire Risk Over Time," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 816-830, April.
- Hui, Kai-Lung & Zhou, Jiali, 2020. "The Economics of Hacking," MPRA Paper 102706, University Library of Munich, Germany.
- Radoslav Raykov, 2015. "Catastrophe insurance equilibrium with correlated claims," Theory and Decision, Springer, vol. 78(1), pages 89-115, January.
- Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
- Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
- repec:cup:judgdm:v:4:y:2009:i:5:p:363-384 is not listed on IDEAS
- Kriss, Peter H. & Blume, Andreas & Weber, Roberto A., 2016. "Coordination with decentralized costly communication," Journal of Economic Behavior & Organization, Elsevier, vol. 130(C), pages 225-241.
- Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
- Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.
- Hare, Forrest & Goldstein, Jonathan, 2010. "The interdependent security problem in the defense industrial base: An agent-based model on a social network," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 128-139.
- Erwann Michel-Kerjan, 2003.
"Terrorisme à grande échelle partage de risques et politiques publiques,"
Revue d'économie politique, Dalloz, vol. 113(5), pages 625-648.
- Erwann Michel-Kerjan, 2004. "Terrorisme à grande échelle : partage de risques et politiques publiques," Working Papers hal-00242918, HAL.
- Shafran, Aric P., 2012. "Learning in games with risky payoffs," Games and Economic Behavior, Elsevier, vol. 75(1), pages 354-371.
- Tim Lohse & Julio R. Robledo & Ulrich Schmidt, 2012.
"Self‐Insurance and Self‐Protection as Public Goods,"
Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 79(1), pages 57-76, March.
- Lohse, Tim & Julio R. Robledo & Ulrich Schmidt, 2006. "Self-Insurance and Self-Protection as Public Goods," Hannover Economic Papers (HEP) dp-354, Leibniz Universität Hannover, Wirtschaftswissenschaftliche Fakultät.
- Lohse, Tim & Robledo, Julio & Schmidt, Ulrich, 2010. "Self-Insurance and Self-Protection as Public Goods," Kiel Working Papers 1613, Kiel Institute for the World Economy (IfW Kiel).
- Schmidt, Ulrich & Robledo, Julio R. & Lohse, Tim, 2007. "Self-Insurance and Self-Protection as Public Goods," Economics Working Papers 2007-16, Christian-Albrechts-University of Kiel, Department of Economics.
- Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
- Lohse, Tim & Robledo, Julio R., 2012.
"Public self-insurance and the Samaritan's dilemma in a federation,"
Discussion Papers, Research Professorship & Project "The Future of Fiscal Federalism"
SP II 2012-103, WZB Berlin Social Science Center.
- Lohse, Tim & Robledo, Julio R., 2012. "Public Self-Insurance and the Samaritan's Dilemma in a Federation," Ruhr Economic Papers 330, RWI - Leibniz-Institut für Wirtschaftsforschung, Ruhr-University Bochum, TU Dortmund University, University of Duisburg-Essen.
- Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
- Howard Kunreuther & Erwann Michel-Kerjan, 2004.
"Policy Watch: Challenges for Terrorism Risk Insurance in the United States,"
Journal of Economic Perspectives, American Economic Association, vol. 18(4), pages 201-214, Fall.
- Howard Kunreuther & Erwann Michel-Kerjan, 2004. "Policy Watch: Challenges for Terrorism Risk Insurance in the United States," NBER Working Papers 10870, National Bureau of Economic Research, Inc.
- Cerdeiro, Diego & Dziubinski, Marcin & Goyal, Sanjeev, 2015.
"Contagion Risk and Network Design,"
Climate Change and Sustainable Development
206416, Fondazione Eni Enrico Mattei (FEEM).
- Diego Cerdeiro & Marcin Dziubinski & Sanjeev Goyal, 2015. "Contagion Risk and Network Design," Working Papers 2015.56, Fondazione Eni Enrico Mattei.
- Diego Cerdeiro & Marcin Dziubinski & Sanjeev Goyal, 2015. "Contagion Risk and Network Design," Cambridge Working Papers in Economics 1547, Faculty of Economics, University of Cambridge.
- Min Gong & Jonathan Baron & Howard Kunreuther, 2009. "Group cooperation under uncertainty," Journal of Risk and Uncertainty, Springer, vol. 39(3), pages 251-270, December.
- Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
- Hoy, Michael & Polborn, Mattias K., 2015.
"The value of technology improvements in games with externalities: A fresh look at offsetting behavior,"
Journal of Public Economics, Elsevier, vol. 131(C), pages 12-20.
- Michael Hoy & Mattias Polborn, 2014. "The Value of Technology Improvements in Games with Externalities: A Fresh Look at Offsetting Behavior," CESifo Working Paper Series 4798, CESifo.
- Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Howard Kunreuther & Gabriel Silvasi & Eric T. Bradlow & Dylan Small, 2007. "Deterministic and Stochastic Prisoner's Dilemma Games: Experiments in Interdependent Security," NBER Technical Working Papers 0341, National Bureau of Economic Research, Inc.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Da, Gaofeng & Xu, Maochao & Zhao, Peng, 2021. "Multivariate dependence among cyber risks based on L-hop propagation," Insurance: Mathematics and Economics, Elsevier, vol. 101(PB), pages 525-546.
- John K. Stranlund & Barry C. Field, 2006.
"On the Production of Homeland Security Under True Uncertainty,"
Working Papers
2006-5, University of Massachusetts Amherst, Department of Resource Economics.
- Stranlund, John K. & Field, Barry C., 2006. "On the Production of Homeland Security Under True Uncertainty," Working Paper Series 14505, University of Massachusetts, Amherst, Department of Resource Economics.
- Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
- Peter H. Kriss & Roberto Weber, 2013. "Organizational formation and change: lessons from economic laboratory experiments," Chapters, in: Anna Grandori (ed.), Handbook of Economic Organization, chapter 14, Edward Elgar Publishing.
- Nitin Bakshi & Stephen E. Flynn & Noah Gans, 2011. "Estimating the Operational Impact of Container Inspections at International Ports," Management Science, INFORMS, vol. 57(1), pages 1-20, January.
- Katherine L. Dickinson & Hannah Brenkert-Smith & Greg Madonia & Nicholas E. Flores, 2020. "Risk interdependency, social norms, and wildfire mitigation: a choice experiment," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(1), pages 1327-1354, August.
- Scott Farrow, 2007. "The Economics Of Homeland Security Expenditures: Foundational Expected Cost‐Effectiveness Approaches," Contemporary Economic Policy, Western Economic Association International, vol. 25(1), pages 14-26, January.
- Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
- Andrew M. Smith & Andrés D. González & Leonardo Dueñas‐Osorio & Raissa M. D'Souza, 2020. "Interdependent Network Recovery Games," Risk Analysis, John Wiley & Sons, vol. 40(1), pages 134-152, January.
- Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
- Scott DuHadway & Steven Carnovale & Benjamin Hazen, 2019. "Understanding risk management for intentional supply chain disruptions: risk detection, risk mitigation, and risk recovery," Annals of Operations Research, Springer, vol. 283(1), pages 179-198, December.
- Carolyn Kousky & Erzo Luttmer & Richard Zeckhauser, 2006.
"Private investment and government protection,"
Journal of Risk and Uncertainty, Springer, vol. 33(1), pages 73-100, September.
- Carolyn Kousky & Erzo F.P. Luttmer & Richard J. Zeckhauser, 2006. "Private Investment and Government Protection," NBER Working Papers 12255, National Bureau of Economic Research, Inc.
- Kousky, Carolyn & Luttmer, Erzo F. P. & Zeckhauser, Richard, 2006. "Private Investment and Government Protection," Working Paper Series rwp06-017, Harvard University, John F. Kennedy School of Government.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
- Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
- Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2023.
"Voluntary participation in a terror group and counterterrorism policy,"
Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
- Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
- Rachel Hess & Charles Holt & Angela Smith, 2007. "Coordination of strategic responses to security threats: Laboratory evidence," Experimental Economics, Springer;Economic Science Association, vol. 10(3), pages 235-250, September.
- Geoffrey Heal & Howard Kunreuther, 2010. "Environment and Energy: Catastrophic Liabilities from Nuclear Power Plants," NBER Chapters, in: Measuring and Managing Federal Financial Risk, pages 235-257, National Bureau of Economic Research, Inc.
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Liying Mu & Milind Dawande & Xianjun Geng & Vijay Mookerjee, 2016. "Milking the Quality Test: Improving the Milk Supply Chain Under Competing Collection Intermediaries," Management Science, INFORMS, vol. 62(5), pages 1259-1277, May.
- Mohamed Belhaj & Frédéric Deroian, 2010.
"Endogenous effort in communication networks under strategic complementarity,"
International Journal of Game Theory, Springer;Game Theory Society, vol. 39(3), pages 391-408, July.
- Mohamed Belhaj & Frédéric Deroïan, 2008. "Endogenous efforts on communication networks under strategic complementarity," Working Papers halshs-00339159, HAL.
- Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
- Dulbecco, Philippe & Laporte, Bertrand, 2005.
"How can the security of international trade be financed in developing countries? A global public good Approach,"
World Development, Elsevier, vol. 33(8), pages 1201-1214, August.
- Philippe Dulbecco & Bertrand Laporte, 2005. "How Can the Security of International Trade Be Financed in Developing Countries? A Global Public Good Approach," CAE Working Papers 33, Aix-Marseille Université, CERGAM.
- Annette Hofmann & Casey Rothschild, 2019. "On the efficiency of self-protection with spillovers in risk," The Geneva Risk and Insurance Review, Palgrave Macmillan;International Association for the Study of Insurance Economics (The Geneva Association), vol. 44(2), pages 207-221, September.
- Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
- Terrence August & Duy Dao & Marius Florin Niculescu, 2022. "Economics of Ransomware: Risk Interdependence and Large-Scale Attacks," Management Science, INFORMS, vol. 68(12), pages 8979-9002, December.
- Tim Lohse & Julio R. Robledo, 2013.
"Public Self-Insurance and the Samaritan’s Dilemma in a Federation,"
Public Finance Review, , vol. 41(1), pages 92-120, January.
- Lohse, Tim & Robledo, Julio R., 2012. "Public self-insurance and the Samaritan's dilemma in a federation," Discussion Papers, Research Professorship & Project "The Future of Fiscal Federalism" SP II 2012-103, WZB Berlin Social Science Center.
- Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 2021. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 23(3), pages 773-790, June.
- Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
- Loretta Mastroeni & Alessandro Mazzoccoli & Maurizio Naldi, 2023. "Cyber Insurance Premium Setting for Multi-Site Companies under Risk Correlation," Risks, MDPI, vol. 11(10), pages 1-18, September.
- Scott Musman & Andrew Turner, 2018. "A game theoretic approach to cyber security risk management," The Journal of Defense Modeling and Simulation, , vol. 15(2), pages 127-146, April.
- Cerdeiro, Diego A. & Dziubiński, Marcin & Goyal, Sanjeev, 2017. "Individual security, contagion, and network design," Journal of Economic Theory, Elsevier, vol. 170(C), pages 182-226.
- Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
- Konrad, Kai A. & Morath, Florian, 2023.
"How to preempt attacks in multi-front conflict with limited resources,"
European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
- Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
- Lu Li & Richard Peter, 2021. "Should we do more when we know less? The effect of technology risk on optimal effort," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 88(3), pages 695-725, September.
- Mario Gilli & Paolo Tedeschi, 2020. "European Union and Transnational Terrorism. A Normative Analysis of Strategic Spillovers," Working Papers 437, University of Milano-Bicocca, Department of Economics, revised Mar 2020.
- Shafran, Aric P. & Lepore, Jason J., 2011. "Subsidization to induce tipping," Economics Letters, Elsevier, vol. 110(1), pages 32-35, January.
- Md. Hamid Uddin & Md. Hakim Ali & Mohammad Kabir Hassan, 2020. "Cybersecurity hazards and financial system vulnerability: a synthesis of literature," Risk Management, Palgrave Macmillan, vol. 22(4), pages 239-309, December.
- Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
- V'ictor Gallego & Roi Naveiro & David R'ios Insua & Wolfram Rozas, 2021. "Data sharing games," Papers 2101.10721, arXiv.org.
- Terrence August & Marius Florin Niculescu & Hyoduk Shin, 2014. "Cloud Implications on Software Network Structure and Security Risks," Information Systems Research, INFORMS, vol. 25(3), pages 489-510, September.
- Nell, Martin & Richter, Andreas & Schiller, Jörg, 2009.
"When prices hardly matter: Incomplete insurance contracts and markets for repair goods,"
European Economic Review, Elsevier, vol. 53(3), pages 343-354, April.
- Martin Nell & Andreas Richter & Jörg Schiller, 2005. "When prices hardly matter: Incomplete insurance contracts and markets for repair goods," Risk and Insurance 0501002, University Library of Munich, Germany.
- Nell, Martin & Richter, Andreas & Schiller, Jörg, 2005. "When prices hardly matter: Incomplete insurance contracts and markets for repair goods," Working Papers on Risk and Insurance 14, University of Hamburg, Institute for Risk and Insurance.
- Nell, Martin & Richter, Andreas & Schiller, Jörg, 2006. "When prices hardly matter: Incomplete insurance contracts and markets for repair goods," Discussion Papers in Business Administration 1187, University of Munich, Munich School of Management.
- Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
- Anna Nagurney & Ladimer Nagurney, 2015. "A game theory model of cybersecurity investments with information asymmetry," Netnomics, Springer, vol. 16(1), pages 127-148, August.
- Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
- Lam, W., 2015. "Attack-Deterring and Damage-Control Investments in Cybersecurity," LIDAM Discussion Papers CORE 2015023, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Shafi, Kamran & Bender, Axel & Zhong, Weicai & Abbass, Hussein A., 2012. "Spatio-temporal dynamics of security investments in an interdependent risk environment," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 391(20), pages 5004-5017.
- Roumani, Yaman & Nwankpa, Joseph K. & Roumani, Yazan F., 2016. "Examining the relationship between firm’s financial records and security vulnerabilities," International Journal of Information Management, Elsevier, vol. 36(6), pages 987-994.
- Kay-Yut Chen & Jingguo Wang & Yan Lang, 2022. "Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals," Management Science, INFORMS, vol. 68(7), pages 5269-5286, July.
- Subhayu Bandyopadhyay & Todd Sandler, 2011.
"The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game,"
Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
- Subhayu Bandyopadhyay & Todd Sandler, 2009. "The interplay between preemptive and defensive counterterrorism measures: a two-stage game," Working Papers 2008-034, Federal Reserve Bank of St. Louis.
- Fraser, Clive D., 2021. "Protection in numbers? Self-protection as a local public good," Journal of Mathematical Economics, Elsevier, vol. 96(C).
- Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 0. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 0, pages 1-18.
- Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
- Alexander Muermann & Howard Kunreuther, 2007. "Self-Protection and Insurance with Interdependencies," NBER Working Papers 12827, National Bureau of Economic Research, Inc.
- Spencer Wheatley & Annette Hofmann & Didier Sornette, 2021. "Addressing insurance of data breach cyber risks in the catastrophe framework," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 46(1), pages 53-78, January.
- Howard C. Kunreuther & Erwann O. Michel-Kerjan, 2007. "Evaluating The Effectiveness of Terrorism Risk Financing Solutions," NBER Working Papers 13359, National Bureau of Economic Research, Inc.
- Howard Kunreuther & Erwann Michel-Kerjan, 2004. "Dealing with Extreme Events: Challenges for Terrorism Risk Coverage in the United States," Working Papers hal-00242930, HAL.
- James R. Meldrum & Hannah Brenkert-Smith & Patricia A. Champ & Jamie Gomez & Hilary Byerly & Lilia Falk & Christopher M. Barth, 2021. "Would you like to know more? The effect of personalized wildfire risk information and social comparisons on information-seeking behavior in the wildland–urban interface," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 106(3), pages 2139-2161, April.
- Darius Lakdawalla & Eric Talley, 2006. "Optimal Liability for Terrorism," NBER Working Papers 12578, National Bureau of Economic Research, Inc.
- W. Kip Viscusi & Richard J. Zeckhauser, 2005. "Recollection Bias and the Combat of Terrorism," The Journal of Legal Studies, University of Chicago Press, vol. 34(1), pages 27-55, January.
- Howard Kunreuther & Gabriel Silvasi & Eric T. Bradlow & Dylan Small, 2009. "Bayesian analysis of deterministic and stochastic prisoner's dilemma games," Judgment and Decision Making, Society for Judgment and Decision Making, vol. 4(5), pages 363-384, August.
- Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
- Wang, Chunhua, 2014. "Regulating land development in a natural disaster-prone area: The roles of building codes," Resource and Energy Economics, Elsevier, vol. 36(1), pages 209-228.
- Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
- Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
- Detlef Seese & Christof Weinhardt & Frank Schlottmann (ed.), 2008. "Handbook on Information Technology in Finance," International Handbooks on Information Systems, Springer, number 978-3-540-49487-4, November.
- Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
- Stephan Kroll & Aric P. Shafran, 2018. "Spatial externalities and risk in interdependent security games," Journal of Risk and Uncertainty, Springer, vol. 56(3), pages 237-257, June.
- Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
- Anthony M. Barrett, 2010. "Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention," Decision Analysis, INFORMS, vol. 7(4), pages 366-377, December.
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
- Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
- Piotr Więcek, 2017. "Total Reward Semi-Markov Mean-Field Games with Complementarity Properties," Dynamic Games and Applications, Springer, vol. 7(3), pages 507-529, September.
- Sachin Adlakha & Ramesh Johari, 2013. "Mean Field Equilibrium in Dynamic Games with Strategic Complementarities," Operations Research, INFORMS, vol. 61(4), pages 971-989, August.
- Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
- Howard Kunreuther & Erwann Michel-Kerjan & Beverly Porter, 2003. "Assessing, Managing, and Financing Extreme Events: Dealing with Terrorism," NBER Working Papers 10179, National Bureau of Economic Research, Inc.
- Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
- Lakdawalla, Darius & Zanjani, George, 2005.
"Insurance, self-protection, and the economics of terrorism,"
Journal of Public Economics, Elsevier, vol. 89(9-10), pages 1891-1905, September.
- Darius Lakdawalla & George Zanjani, 2002. "Insurance, Self-Protection, and the Economics of Terrorism," NBER Working Papers 9215, National Bureau of Economic Research, Inc.
- Sang-Hyun Kim & Brian Tomlin, 2013. "Guilt by Association: Strategic Failure Prevention and Recovery Capacity Investments," Management Science, INFORMS, vol. 59(7), pages 1631-1649, July.
- Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
- Geoffrey Heal & Howard Kunreuther, 2006. "Supermodularity and Tipping," NBER Working Papers 12281, National Bureau of Economic Research, Inc.
- Amandha Ganegoda & John Evans, 2014. "A framework to manage the measurable, immeasurable and the unidentifiable financial risk," Australian Journal of Management, Australian School of Business, vol. 39(1), pages 5-34, February.
- Katherine A. Daniell & Alec Morton & David Ríos Insua, 2016. "Policy analysis and policy analytics," Annals of Operations Research, Springer, vol. 236(1), pages 1-13, January.
- Jentzsch, Nicola, 2015. "What Is Special in the Economics of Cybersecurity and Privacy?," EconStor Research Reports 126227, ZBW - Leibniz Information Centre for Economics.
- Martin Eling, 2013. "Recent Research Developments Affecting Nonlife Insurance—The CAS Risk Premium Project 2011 Update," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 16(1), pages 35-46, March.
- Annette Hofmann, 2007. "Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks," The Geneva Papers on Risk and Insurance Theory, Springer;International Association for the Study of Insurance Economics (The Geneva Association), vol. 32(1), pages 91-111, June.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Moore, Tyler, 2010. "The economics of cybersecurity: Principles and policy options," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 103-117.
- Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
- Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite, 2014. "Dynamic competition in IT security: A differential games approach," Information Systems Frontiers, Springer, vol. 16(4), pages 643-661, September.
- Alexander Muermann & Howard Kunreuther, 2008. "Self-protection and insurance with interdependencies," Journal of Risk and Uncertainty, Springer, vol. 36(2), pages 103-123, April.
- Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
- Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
- Elsadig Musa Ahmed, 2021. "Modelling Information and Communications Technology Cyber Security Externalities Spillover Effects on Sustainable Economic Growth," Journal of the Knowledge Economy, Springer;Portland International Center for Management of Engineering and Technology (PICMET), vol. 12(1), pages 412-430, March.
- Nagurney, Anna & Shukla, Shivani, 2017. "Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability," European Journal of Operational Research, Elsevier, vol. 260(2), pages 588-600.