메뉴 건너뛰기




Volumn 5, Issue 1, 2009, Pages 31-43

Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence

Author keywords

Centralization; Deterrence; Non cooperative games; Secrecy; Terrorism

Indexed keywords


EID: 64549092443     PISSN: 09731318     EISSN: 29938341     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (77)

References (20)
  • 1
    • 46649106463 scopus 로고    scopus 로고
    • Terrorism and game theory
    • Sandler T., Arce D., Terrorism and game theory, Simulation and Gaming, Vol. 34, No. 3, pp. 319-337, 2003.
    • (2003) Simulation and Gaming , vol.34 , Issue.3 , pp. 319-337
    • Sandler, T.1    Arce, D.2
  • 2
    • 0040679785 scopus 로고    scopus 로고
    • Measuring the positive externalities from unobservable victim precaution: An empirical analysis of Lojack
    • Ayres I., Levitt S., Measuring the positive externalities from unobservable victim precaution: An empirical analysis of Lojack, The Quarterly Journal of Economics, Vol. 113, No. 1, pp. 43-77, 1998.
    • (1998) The Quarterly Journal of Economics , vol.113 , Issue.1 , pp. 43-77
    • Ayres, I.1    Levitt, S.2
  • 3
    • 85181135731 scopus 로고    scopus 로고
    • Bier V. M., Game-theoretic and reliability methods in counter-terrorism and security, Mathematical and Statistical Methods in Reliability (A. Wilson, N. Limnios, S. Keller-McNulty, and Y. Armijo, editors), Series on Quality, Reliability and Engineering Statistics, World Scientific, Singapore, pp. 17-28, 2005.
    • Bier V. M., Game-theoretic and reliability methods in counter-terrorism and security, Mathematical and Statistical Methods in Reliability (A. Wilson, N. Limnios, S. Keller-McNulty, and Y. Armijo, editors), Series on Quality, Reliability and Engineering Statistics, World Scientific, Singapore, pp. 17-28, 2005.
  • 4
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier V. M., Oliveros S., Samuelson L., Choosing what to protect: Strategic defensive allocation against an unknown attacker, Journal of Public Economic Theory, Vol. 9, No. 4, pp. 563-587, 2007.
    • (2007) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 6
    • 64549120103 scopus 로고    scopus 로고
    • Behavioral game theory: Thinking, learning and teaching
    • Guth, Steffen Huck editor, Palgrave Press
    • Camerer C., Ho T., Chong J., Behavioral game theory: Thinking, learning and teaching, in Essays in Honor of Werner Guth, Steffen Huck (editor), Palgrave Press, 2005.
    • (2005) Essays in Honor of Werner
    • Camerer, C.1    Ho, T.2    Chong, J.3
  • 10
    • 2442421197 scopus 로고    scopus 로고
    • Decentralization as a disincentive for terror
    • Frey B., Luechinger S., Decentralization as a disincentive for terror, European Journal of Political Economy, Vol. 20, No. 2, pp. 509-515, 2004.
    • (2004) European Journal of Political Economy , vol.20 , Issue.2 , pp. 509-515
    • Frey, B.1    Luechinger, S.2
  • 11
    • 64549164035 scopus 로고    scopus 로고
    • Air marshals - secrecy ruined by dress code
    • July 9
    • Hudson A., Air marshals - secrecy ruined by dress code, The Washington Times, July 9, 2004.
    • (2004) The Washington Times
    • Hudson, A.1
  • 12
    • 0036434064 scopus 로고    scopus 로고
    • Two competing models of how people learn in games
    • Hopkins E. Two competing models of how people learn in games, Econometrica, Vol. 70, No. 6, pp. 2141-2166, 2002.
    • (2002) Econometrica , vol.70 , Issue.6 , pp. 2141-2166
    • Hopkins, E.1
  • 14
    • 33749589535 scopus 로고    scopus 로고
    • Advanced techniques for modeling terrorism risk
    • Major J., Advanced techniques for modeling terrorism risk, Journal of Risk Finance, Vol. 4, No. 1, pp 15-24, 2002.
    • (2002) Journal of Risk Finance , vol.4 , Issue.1 , pp. 15-24
    • Major, J.1
  • 15
    • 0037786760 scopus 로고    scopus 로고
    • Terrorism and probability neglect
    • Sunstein C., Terrorism and probability neglect, The Journal of Risk and Uncertainty, Vol. 26, No. 2-3, pp. 121-136, 2003.
    • (2003) The Journal of Risk and Uncertainty , vol.26 , Issue.2-3 , pp. 121-136
    • Sunstein, C.1
  • 16
    • 85181152979 scopus 로고    scopus 로고
    • U.S. Customs and Border Protection, Keeping cargo safe: Container Security Initiative (CSI), accessed on January 15, 2008, at: http://www.cbp.gov/xp/cgov/border_security/international_activities/csi/
    • U.S. Customs and Border Protection, Keeping cargo safe: Container Security Initiative (CSI), accessed on January 15, 2008, at: http://www.cbp.gov/xp/cgov/border_security/international_activities/csi/
  • 17
    • 85181057107 scopus 로고    scopus 로고
    • U.S. Customs and Border Protection, Securing U.S. Ports, accessed on January 15, 2008, at: http://www.cbp.gov/xp/cgov/newsroom/ fact_sheets/port_security/securing_us_parts.xml
    • U.S. Customs and Border Protection, Securing U.S. Ports, accessed on January 15, 2008, at: http://www.cbp.gov/xp/cgov/newsroom/ fact_sheets/port_security/securing_us_parts.xml
  • 18
    • 84856696717 scopus 로고    scopus 로고
    • Quantitative terrorism risk assessment
    • Woo G., Quantitative terrorism risk assessment, The Journal of Risk Finance, Vol. 4, No. 1, pp. 7-14, 2002.
    • (2002) The Journal of Risk Finance , vol.4 , Issue.1 , pp. 7-14
    • Woo, G.1
  • 19
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters - Defensive strategy with endogenous attacker effort
    • Zhuang J., Bier V. M. Balancing terrorism and natural disasters - Defensive strategy with endogenous attacker effort, Operations Research, Vol. 55, No. 5, pp. 976-991, 2007.
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.