-
2
-
-
0040679785
-
Measuring the positive externalities from unobservable victim precaution: An empirical analysis of lojack
-
Ayres, I. and Levitt, S. (1998) Measuring the positive externalities from unobservable victim precaution: an empirical analysis of lojack. The Quarterly Journal of Economics 113(1) 43-77.
-
(1998)
The Quarterly Journal of Economics
, vol.113
, Issue.1
, pp. 43-77
-
-
Ayres, I.1
Levitt, S.2
-
3
-
-
0000037696
-
Equilibrium selection in signaling games
-
Banks, J. and Sobel, J. (1987) Equilibrium selection in signaling games. Econometrica 55(3) 647-661.
-
(1987)
Econometrica
, vol.55
, Issue.3
, pp. 647-661
-
-
Banks, J.1
Sobel, J.2
-
4
-
-
33748519601
-
Hiding in plain sight - using signals to detect terrorists
-
Basuchoudhary, A. and Razzolini, L. (2006) Hiding in plain sight - using signals to detect terrorists. Public Choice 128(1-2) 245-255.
-
(2006)
Public Choice
, vol.128
, Issue.1-2
, pp. 245-255
-
-
Basuchoudhary, A.1
Razzolini, L.2
-
5
-
-
78649800959
-
Game-theoretic and reliability methods in counter-terrorism and security
-
edited by A. Wilson, N. Limnios, S. Keller-McNulty and Y. Armijo. Singapore: World Scientific
-
Bier, V. (2005) Game-theoretic and reliability methods in counter-terrorism and security. In Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability and Engineering Statistics, edited by A. Wilson, N. Limnios, S. Keller-McNulty and Y. Armijo. Singapore: World Scientific, pp. 17-28.
-
(2005)
Mathematical and Statistical Methods In Reliability, Series On Quality, Reliability and Engineering Statistics
, pp. 17-28
-
-
Bier, V.1
-
6
-
-
34547641190
-
Choosing what to protect
-
Bier, V., Oliveros, S. and Samuelson, L. (2007) Choosing what to protect. Journal of Public Economic Theory 9(4) 563-587.
-
(2007)
Journal of Public Economic Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.1
Oliveros, S.2
Samuelson, L.3
-
8
-
-
23644441812
-
Deception in simple voting games
-
Brams, S. and Zagare, F. (1977) Deception in simple voting games. Social Science Research 6 257-272.
-
(1977)
Social Science Research
, vol.6
, pp. 257-272
-
-
Brams, S.1
Zagare, F.2
-
9
-
-
27344439516
-
A two-sided optimization for theater ballistic missile defense
-
Brown, G., Carlyle, M., Diehl, D., Kline, J. and Wood, K. (2005) A two-sided optimization for theater ballistic missile defense. Operations Research 53(5) 263-275.
-
(2005)
Operations Research
, vol.53
, Issue.5
, pp. 263-275
-
-
Brown, G.1
Carlyle, M.2
Diehl, D.3
Kline, J.4
Wood, K.5
-
10
-
-
0001139863
-
Signaling games and stable equilibria
-
Cho, I. and Kreps, D. (1987) Signaling games and stable equilibria. The Quarterly Journal of Economics 102(2) 179-222.
-
(1987)
The Quarterly Journal of Economics
, vol.102
, Issue.2
, pp. 179-222
-
-
Cho, I.1
Kreps, D.2
-
11
-
-
77954191562
-
-
Clark, G., Jonson, E. and Caldow, W, St. Leonards, NSW, Australia: Allen & Unwin
-
Clark, G., Jonson, E. and Caldow, W. (Eds) (1997) Accountability and Corruption: Public Sector Ethics. St. Leonards, NSW, Australia: Allen & Unwin.
-
(1997)
Accountability and Corruption: Public Sector Ethics
-
-
-
12
-
-
79251504782
-
-
Cambridge, MA: Educators for Social Responsibility
-
Cohen, S. (1990) Government Secrecy in Democracies. Cambridge, MA: Educators for Social Responsibility.
-
(1990)
Government Secrecy In Democracies
-
-
Cohen, S.1
-
13
-
-
0242433408
-
Lying for strategic advantage: Rational and boundedly rational misrepresentation of intentions
-
Crawford, V. (2003) Lying for strategic advantage: Rational and boundedly rational misrepresentation of intentions. American Economic Review 93(1) 133-149.
-
(2003)
American Economic Review
, vol.93
, Issue.1
, pp. 133-149
-
-
Crawford, V.1
-
14
-
-
0000510636
-
Strategic information transmission
-
Crawford, V. and Sobel, J. (1982) Strategic information transmission. Econometrica 50(6) 1431-1451.
-
(1982)
Econometrica
, vol.50
, Issue.6
, pp. 1431-1451
-
-
Crawford, V.1
Sobel, J.2
-
15
-
-
0038127072
-
Verbal and nonverbal dynamics of privacy, secrecy, and deceit
-
DePaulo, B., Wetzel, C., Sternglanz, R. and Wilson, M. (2003) Verbal and nonverbal dynamics of privacy, secrecy, and deceit. Journal of Social Issues 59(2) 391-410.
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 391-410
-
-
Depaulo, B.1
Wetzel, C.2
Sternglanz, R.3
Wilson, M.4
-
16
-
-
64549092443
-
Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
-
Dighe, N., Zhuang, J. and Bier, V. (2009) Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering 5(1) 31-43.
-
(2009)
International Journal of Performability Engineering
, vol.5
, Issue.1
, pp. 31-43
-
-
Dighe, N.1
Zhuang, J.2
Bier, V.3
-
17
-
-
30444461505
-
Dynamic mechanism design with hidden income and hidden actions
-
Doepke, M. and Townsend, R. (2006) Dynamic mechanism design with hidden income and hidden actions. Journal of Economic Theory 126(1) 235-285.
-
(2006)
Journal of Economic Theory
, vol.126
, Issue.1
, pp. 235-285
-
-
Doepke, M.1
Townsend, R.2
-
19
-
-
33744504907
-
The effectiveness of anti-terrorism policies: Vectorautoregression-intervention analysis
-
Enders, W. and Sandler, T. (1993) The effectiveness of anti-terrorism policies: Vectorautoregression-intervention analysis. American Political Science Review 87(4) 829-844.
-
(1993)
American Political Science Review
, vol.87
, Issue.4
, pp. 829-844
-
-
Enders, W.1
Sandler, T.2
-
22
-
-
84879653564
-
First mover disadvantages with private information
-
Gal-Or, E. (1987) First mover disadvantages with private information. Review of Economic Studies 54(2) 279-292.
-
(1987)
Review of Economic Studies
, vol.54
, Issue.2
, pp. 279-292
-
-
Gal-Or, E.1
-
24
-
-
84965673635
-
The role of deception in decision theory
-
Greenberg, I. (1982) The role of deception in decision theory. Journal of Conflict Resolution 26(1) 139-156.
-
(1982)
Journal of Conflict Resolution
, vol.26
, Issue.1
, pp. 139-156
-
-
Greenberg, I.1
-
27
-
-
79251521158
-
Joint doctrine for military deception
-
Joint Chiefs of Staff
-
Joint Chiefs of Staff (1996) Joint doctrine for military deception. Joint Publication, 3-13.4, URL: http://www.c4i.org/jp3_13_4.pdf
-
(1996)
Joint Publication
, vol.4
, pp. 3-13
-
-
-
28
-
-
0000558986
-
Sequential equilibria
-
Kreps, D. and Wilson, R. (1982) Sequential equilibria. Econometrica 50(4) 863-894.
-
(1982)
Econometrica
, vol.50
, Issue.4
, pp. 863-894
-
-
Kreps, D.1
Wilson, R.2
-
31
-
-
34547336458
-
Decision making procedures for committees of careerist experts
-
Levy, G. (2007) Decision making procedures for committees of careerist experts. American Economic Review, Papers and Proceedings 97(2) 306-310.
-
(2007)
American Economic Review, Papers and Proceedings
, vol.97
, Issue.2
, pp. 306-310
-
-
Levy, G.1
-
32
-
-
0036755349
-
Information sharing in a supply chain with horizontal competition
-
Li, L. (2002) Information sharing in a supply chain with horizontal competition. Management Science 48(9) 1196-1212.
-
(2002)
Management Science
, vol.48
, Issue.9
, pp. 1196-1212
-
-
Li, L.1
-
34
-
-
0000287182
-
First-mover (dis)advantages: Retrospective and link with the resource-based view
-
Lieberman, M. and Montgomery, D. (1998) First-mover (dis)advantages: retrospective and link with the resource-based view. Strategic Management Journal 19 1111-1125.
-
(1998)
Strategic Management Journal
, vol.19
, pp. 1111-1125
-
-
Lieberman, M.1
Montgomery, D.2
-
36
-
-
77955845921
-
The politician and the judge: Accountability in government
-
Maskin, E. and Tirole, J. (2004) The politician and the judge: accountability in government. American Economic Review 94(4) 1034-1054.
-
(2004)
American Economic Review
, vol.94
, Issue.4
, pp. 1034-1054
-
-
Maskin, E.1
Tirole, J.2
-
37
-
-
0005517696
-
-
Washington, DC: Brookings Institution Press
-
O'Hanlon, M., Orszag, P., Daalder, I., Destler, I., Gunter, D., Litan, R. and Steinberg, J. (2002) Protecting the American Homeland: A Preliminary Analysis. Washington, DC: Brookings Institution Press.
-
(2002)
Protecting the American Homeland: A Preliminary Analysis
-
-
O'Hanlon, M.1
Orszag, P.2
Daalder, I.3
Destler, I.4
Gunter, D.5
Litan, R.6
Steinberg, J.7
-
39
-
-
36049023055
-
Allocating defensive resources with private information about vulnerability
-
Powell, R. (2007) Allocating defensive resources with private information about vulnerability. The American Political Science Review 101(4) 799-809.
-
(2007)
The American Political Science Review
, vol.101
, Issue.4
, pp. 799-809
-
-
Powell, R.1
-
40
-
-
30844436627
-
The wrong kind of transparency
-
Prat, A. (2005) The wrong kind of transparency. American Economic Review 95(3) 862-877.
-
(2005)
American Economic Review
, vol.95
, Issue.3
, pp. 862-877
-
-
Prat, A.1
-
45
-
-
0030304298
-
Contest success functions
-
Skaperdas, S. (1996) Contest success functions. Economic Theory 7(2) 283-290.
-
(1996)
Economic Theory
, vol.7
, Issue.2
, pp. 283-290
-
-
Skaperdas, S.1
-
47
-
-
79251523688
-
What should be hidden and open in computer security: Lessons from deception, the art of war, law, and economic theory
-
(p. cs/0109089)
-
Swire, P. (2001) What should be hidden and open in computer security: lessons from deception, the art of war, law, and economic theory. ArXiv Computer Science e-prints, (p. cs/0109089).
-
(2001)
ArXiv Computer Science E-prints
-
-
Swire, P.1
-
48
-
-
33646075395
-
A model for when disclosure helps security: What is different about computer and network security?
-
Swire, P. (2004) A model for when disclosure helps security: what is different about computer and network security? Journal on Telecommunications and High Technology Law 2 1-38.
-
(2004)
Journal On Telecommunications and High Technology Law
, vol.2
, pp. 1-38
-
-
Swire, P.1
-
50
-
-
1342283753
-
Suicidal terrorism and discriminatory screening: An efficiency-equity trade-off
-
Yetman, J. (2004) Suicidal terrorism and discriminatory screening: An efficiency-equity trade-off. Defence & Peace Economics 15(3) 221-230.
-
(2004)
Defence & Peace Economics
, vol.15
, Issue.3
, pp. 221-230
-
-
Yetman, J.1
-
51
-
-
2942525472
-
Information transparency of business-to-business electronic markets: A game-theoretic analysis
-
Zhu, K. (2004) Information transparency of business-to-business electronic markets: a game-theoretic analysis. Management Science 50(5) 670-685.
-
(2004)
Management Science
, vol.50
, Issue.5
, pp. 670-685
-
-
Zhu, K.1
-
52
-
-
38549098290
-
Balancing terrorism and natural disasters - defensive strategy with endogenous attacker effort
-
Zhuang, J. and Bier, V. (2007) Balancing terrorism and natural disasters - defensive strategy with endogenous attacker effort. Operations Research 55(5) 976-991.
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.2
-
53
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
-
Zhuang, J., Bier, V. and Alagoz, O. (2010) Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research 203(2) 409-418.
-
(2010)
European Journal of Operational Research
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.2
Alagoz, O.3
-
54
-
-
33847259790
-
Subsidies in interdependent security with heterogeneous discount rates
-
Zhuang, J., Bier, V. and Gupta, A. (2007) Subsidies in interdependent security with heterogeneous discount rates. The Engineering Economist 52(1) 1-19.
-
(2007)
The Engineering Economist
, vol.52
, Issue.1
, pp. 1-19
-
-
Zhuang, J.1
Bier, V.2
Gupta, A.3
|