IDEAS home Printed from https://ideas.repec.org/r/sae/jocore/v49y2005i2p201-217.html
   My bibliography  Save this item

IDS Models of Airline Security

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Geoffrey Heal & Howard Kunreuther, 2010. "Social Reinforcement: Cascades, Entrapment, and Tipping," American Economic Journal: Microeconomics, American Economic Association, vol. 2(1), pages 86-99, February.
  2. B. Peter Rosendorff & Todd Sandler, 2005. "The Political Economy of Transnational Terrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 171-182, April.
  3. Sanghoon Lee, 2010. "Dynamic Inconsistency in Counterterrorism," Conflict Management and Peace Science, Peace Science Society (International), vol. 27(4), pages 369-385, September.
  4. Todd Sandler, 2006. "Hirshleifer'S Social Composition Function In Defense Economics," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 645-655.
  5. Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2023. "Attack and interception in networks," Theoretical Economics, Econometric Society, vol. 18(4), November.
  6. Hare, Forrest & Goldstein, Jonathan, 2010. "The interdependent security problem in the defense industrial base: An agent-based model on a social network," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 128-139.
  7. Erte Xiao & Howard Kunreuther, 2016. "Punishment and Cooperation in Stochastic Social Dilemmas," Journal of Conflict Resolution, Peace Science Society (International), vol. 60(4), pages 670-693, June.
  8. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
  9. Becker Jordan & Kuokštytė Ringailė & Kuokštis Vytautas, 2023. "The Political Economy of Transatlantic Security – A Policy Perspective," The Economists' Voice, De Gruyter, vol. 20(1), pages 55-77, June.
  10. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
  11. Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
  12. John K. Stranlund & Barry C. Field, 2006. "On the Production of Homeland Security Under True Uncertainty," Working Papers 2006-5, University of Massachusetts Amherst, Department of Resource Economics.
  13. Nitin Bakshi & Stephen E. Flynn & Noah Gans, 2011. "Estimating the Operational Impact of Container Inspections at International Ports," Management Science, INFORMS, vol. 57(1), pages 1-20, January.
  14. Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
  15. Geoffrey Heal & Howard Kunreuther, 2010. "Environment and Energy: Catastrophic Liabilities from Nuclear Power Plants," NBER Chapters, in: Measuring and Managing Federal Financial Risk, pages 235-257, National Bureau of Economic Research, Inc.
  16. Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
  17. João Ricardo Faria & Emilson C. D. Silva & Daniel G. Arce, 2017. "Intertemporal Versus Spatial Externalities in Counterterror Policy Games," Dynamic Games and Applications, Springer, vol. 7(3), pages 402-421, September.
  18. Nagurney, Anna & Shukla, Shivani & Nagurney, Ladimer S. & Saberi, Sara, 2018. "A game theory model for freight service provision security investments for high-value cargo," Economics of Transportation, Elsevier, vol. 16(C), pages 21-28.
  19. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
  20. Heiets, Iryna & La, Jiezhuoma & Zhou, Wenhui & Xu, Shaoxin & Wang, Xingyue & Xu, Yuchen, 2022. "Digital transformation of airline industry," Research in Transportation Economics, Elsevier, vol. 92(C).
  21. Daniel G. Arce M. & Todd Sandler, 2005. "Counterterrorism," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 183-200, April.
  22. Subhayu Bandyopadhyay & Todd Sandler, 2011. "The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game," Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
  23. Michael R. Greenberg & Karen Lowrie & Henry Mayer & Tayfur Altiok, 2011. "Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects," Risk Analysis, John Wiley & Sons, vol. 31(12), pages 1849-1858, December.
  24. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
  25. Siddharth Suri & Duncan J Watts, 2011. "Cooperation and Contagion in Web-Based, Networked Public Goods Experiments," PLOS ONE, Public Library of Science, vol. 6(3), pages 1-18, March.
  26. Geoffrey Heal & Howard Kunreuther, 2006. "Supermodularity and Tipping," NBER Working Papers 12281, National Bureau of Economic Research, Inc.
  27. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
  28. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
  29. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
  30. Daniel Jacobson & Edward H. Kaplan, 2007. "Suicide Bombings and Targeted Killings in (Counter-) Terror Games," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(5), pages 772-792, October.
  31. Martin Gregor, 2011. "Tradeoffs of foreign assistance for the weakest-link global public goods," International Tax and Public Finance, Springer;International Institute of Public Finance, vol. 18(2), pages 233-251, April.
  32. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
  33. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.