메뉴 건너뛰기




Volumn 16, Issue 1, 2011, Pages 21-39

Defending against a terrorist who accumulates resources

Author keywords

[No Author keywords available]

Indexed keywords


EID: 80052018326     PISSN: 02755823     EISSN: None     Source Type: Journal    
DOI: 10.5711/1082598316121     Document Type: Article
Times cited : (22)

References (43)
  • 1
    • 33947146473 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • DOI 10.1016/j.ejor.2006.03.057, PII S0377221706004747
    • Azaiez, N., Bier, V.M., 2007. Optimal Resource Allocation for Security in Reliability Systems. European Journal of Operational Research, 181, 773-786. (Pubitemid 46413583)
    • (2007) European Journal of Operational Research , vol.181 , Issue.2 , pp. 773-786
    • Azaiez, M.N.1    Bier, V.M.2
  • 2
    • 79955750542 scopus 로고    scopus 로고
    • The interplay between preemptive and defensive counterterrorism measures: A two- Stage game
    • forthcoming.
    • Bandyopadhyay, S., and Sandler, T. 2011. The interplay between preemptive and defensive counterterrorism measures: A two- Stage game. Economica, Vol 78, forthcoming.
    • (2011) Economica , vol.78
    • Bandyopadhyay, S.1    Sandler, T.2
  • 3
    • 33645877390 scopus 로고    scopus 로고
    • The timing of ETA terrorist attacks
    • DOI 10.1016/j.jpolmod.2005.12.001, PII S0161893806000032
    • Barros, C.P, Passos, J., and Gil-Alana, L. A. 2006. The timing of ETA terrorist attacks. Journal of Policy Modeling 28, 3, 335-346. (Pubitemid 43573913)
    • (2006) Journal of Policy Modeling , vol.28 , Issue.3 , pp. 335-346
    • Barros, C.P.1    Passos, J.2    Gil-Alana, L.A.3
  • 4
    • 33750490397 scopus 로고    scopus 로고
    • Location of terror response facilities: A game between state and terrorist
    • DOI 10.1016/j.ejor.2005.12.022, PII S0377221705009409
    • Berman, O. and Gavious, A. 2007. Location of terror response facilities: A game between state and terrorist. European Journal of Operational Research 177, 2, 1113-1133. (Pubitemid 44647639)
    • (2006) European Journal of Operational Research , vol.177 , Issue.2 , pp. 1113-1133
    • Berman, O.1    Gavious, A.2
  • 5
    • 33947206094 scopus 로고    scopus 로고
    • How does terrorism risk vary across space and time? An analysis based on the Israeli experience
    • Berrebi, C. and Lakdawalla, D. (2007) How does terrorism risk vary across space and time? An analysis based on the Israeli experience. Defence and Peace Economics 18, 2, 113-131.
    • (2007) Defence and Peace Economics , vol.18 , Issue.2 , pp. 113-131
    • Berrebi, C.1    Lakdawalla, D.2
  • 6
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier, V.M., Oliveros S., Samuelson L. 2007. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory 9, 563-587.
    • (2007) Journal of Public Economic Theory , vol.9 , pp. 563-587
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 8
    • 9444279581 scopus 로고    scopus 로고
    • Protection of simple series and parallel systems with components of different values
    • Bier, V.M., Nagaraj, A., Abhichandani, V., 2005. Protection of Simple Series and Parallel Systems with Components of Different Values. Reliability Engineering and System Safety 87, 315-323.
    • (2005) Reliability Engineering and System Safety , vol.87 , pp. 315-323
    • Bier, V.M.1    Nagaraj, A.2    Abhichandani, V.3
  • 9
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defense allocation against an unknown attacker
    • Bier, V.M., Oliveros, S., Samuelson, L., 2007. Choosing What to Protect: Strategic Defense Allocation Against an Unknown Attacker. Journal of Public Economic Theory 9 (4), 563-587.
    • (2007) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 10
    • 45349092442 scopus 로고    scopus 로고
    • Optimal resource allocation for defense of targets based on differing measures of attractiveness
    • DOI 10.1111/j.1539-6924.2008.01053.x
    • Bier, V.M., Haphuriwat, N., Menoyo, J., Zimmerman, R. and Culpen, A. 2008. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness. Risk Analysis 28(3), 763-770. (Pubitemid 351847236)
    • (2008) Risk Analysis , vol.28 , Issue.3 , pp. 763-770
    • Bier, V.M.1    Haphuriwat, N.2    Menoyo, J.3    Zimmerman, R.4    Culpen, A.M.5
  • 11
    • 33845439386 scopus 로고    scopus 로고
    • Defending critical infrastructure
    • DOI 10.1287/inte.1060.0252
    • Brown, G., Carlyle, M., Salmeron, J. and Wood, K. 2006. Defending Critical Infrastructure. Interfaces 36, 530-544. (Pubitemid 44905062)
    • (2006) Interfaces , vol.36 , Issue.6 , pp. 530-544
    • Brown, G.1    Carlyle, M.2    Salmeron, J.3    Wood, K.4
  • 14
    • 84906628863 scopus 로고    scopus 로고
    • What do we know about the substitution effect in transnational terrorism?
    • A. Silke and G. Ilardi (eds) Frank Cass.
    • Enders, W. and Sandler, T. 2003. What do we know about the substitution effect in transnational terrorism?. In A. Silke and G. Ilardi (eds) Research on Terrorism: Trends, Achievements and Failures, Frank Cass.
    • (2003) Research on Terrorism: Trends, Achievements and Failures
    • Enders, W.1    Sandler, T.2
  • 15
    • 16644364092 scopus 로고    scopus 로고
    • After 9/11 IS IT all different now?
    • DOI 10.1177/0022002704272864, Political Economy of Transnational Terrorism
    • Enders, W. and Sandler, T. 2005. After 9/11 Is it all different now? Journal of Conflict Resolution 49, 2, 259-277. (Pubitemid 40482842)
    • (2005) Journal of Conflict Resolution , vol.49 , Issue.2 , pp. 259-277
    • Enders, W.1    Sandler, T.2
  • 16
    • 55649083124 scopus 로고    scopus 로고
    • Terror and counterterror operations: Differential game with cyclical nash solution
    • Feichtinger, G. and Novak, A. 2008. Terror and Counterterror Operations: Differential Game with Cyclical Nash Solution. Journal of Optimization Theory and Applications 139, 3, 541-556.
    • (2008) Journal of Optimization Theory and Applications , vol.139 , Issue.3 , pp. 541-556
    • Feichtinger, G.1    Novak, A.2
  • 19
    • 0041589854 scopus 로고    scopus 로고
    • How to fight terrorismAlternatives to deterrence
    • Frey, B.S., Luechinger, S. 2003. How to fight terrorismAlternatives to deterrence. Defense and Peace Economics 14, 237-249.
    • (2003) Defense and Peace Economics , vol.14 , pp. 237-249
    • Frey, B.S.1    Luechinger, S.2
  • 20
  • 21
    • 33751256271 scopus 로고    scopus 로고
    • Income, interdependence, and substitution effects affecting incentives for security investment
    • DOI 10.1016/j.jaccpubpol.2006.09.001, PII S027842540600086X
    • Hausken, K. 2006. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy 25, 629-665. (Pubitemid 44783207)
    • (2006) Journal of Accounting and Public Policy , vol.25 , Issue.6 , pp. 629-665
    • Hausken, K.1
  • 22
    • 55349145945 scopus 로고    scopus 로고
    • Whether to attack a terrorist's resource stock today or tomorrow
    • Hausken, K. 2008. Whether to Attack a Terrorist's Resource Stock Today or Tomorrow. Games and Economic Behavior 64, 2, 548-564.
    • (2008) Games and Economic Behavior , vol.64 , Issue.2 , pp. 548-564
    • Hausken, K.1
  • 23
    • 84954516300 scopus 로고    scopus 로고
    • Defending against terrorism, natural disaster, and all hazards
    • Bier, V.M. and Azaiez, M.N. (eds.), Springer, New York
    • Hausken, K., Bier, V. and Zhuang, J. 2009. Defending against Terrorism, Natural Disaster, and All Hazards," in Bier, V.M. and Azaiez, M.N. (eds.), Game Theoretic Risk Analysis of Security Threats, Springer, New York, 65-97.
    • (2009) Game Theoretic Risk Analysis of Security Threats , pp. 65-97
    • Hausken, K.1    Bier, V.2    Zhuang, J.3
  • 26
    • 34047142655 scopus 로고    scopus 로고
    • Optimal defense strategy against intentional attacks
    • Levitin, G., 2007. Optimal Defense Strategy Against Intentional Attacks. IEEE Transactions on Reliability 56(1), 148-156.
    • (2007) IEEE Transactions on Reliability , vol.56 , Issue.1 , pp. 148-156
    • Levitin, G.1
  • 27
    • 43249094557 scopus 로고    scopus 로고
    • Protection vs. redundancy in homogeneous parallel systems
    • Levitin, G. and Hausken, K. 2008. Protection vs. Redundancy in Homogeneous Parallel Systems. Reliability Engineering & System Safety 93, 10, 1444-1451.
    • (2008) Reliability Engineering & System Safety , vol.93 , Issue.10 , pp. 1444-1451
    • Levitin, G.1    Hausken, K.2
  • 28
    • 33751078297 scopus 로고    scopus 로고
    • Methodology for ranking the elements of water-supply networks
    • DOI 10.1061/(ASCE)1076-0342(2006)12:4(230)
    • Michaud, D. Apostolakis, G. 2006, Methodology for ranking the elements of water- Supply networks, Journal of Infrastructure Systems, 12(4), pp.230-242. (Pubitemid 44768337)
    • (2006) Journal of Infrastructure Systems , vol.12 , Issue.4 , pp. 230-242
    • Michaud, D.1    Apostolakis, G.E.2
  • 29
    • 33847386386 scopus 로고    scopus 로고
    • Identification of critical locations across multiple infrastructures for terrorist actions
    • DOI 10.1016/j.ress.2006.08.004, PII S0951832006001840
    • Patterson, S. Apostolakis, G. 2007, Identification of critical locations across multiple infrastructures for terrorist actions, Reliability Engineering & System Safety 92(9), pp. 1183-1203. (Pubitemid 46341795)
    • (2007) Reliability Engineering and System Safety , vol.92 , Issue.9 , pp. 1183-1203
    • Patterson, S.A.1    Apostolakis, G.E.2
  • 30
    • 3042546359 scopus 로고    scopus 로고
    • Simulation of the dynamic interactions between terror and anti- Terror organizational structures
    • Raczynski, S. 2004. Simulation of the dynamic interactions between terror and anti- Terror organizational structures. Journal of Artificial Societies and Social Simulation 7, 2.
    • (2004) Journal of Artificial Societies and Social Simulation , vol.7 , pp. 2
    • Raczynski, S.1
  • 35
    • 61249435399 scopus 로고
    • ca. 145-ca. 86 B.C. Translated from the Shih chi of Ssu-ma Ch'ien by Burton Watson. New York: Columbia University Press
    • Sima, Qian, ca. 145-ca. 86 B.C. Records of the grand historian of China. Translated from the Shih chi of Ssu-ma Ch'ien by Burton Watson. New York: Columbia University Press, 1971.
    • (1971) Records of the Grand Historian of China
    • Qian, S.1
  • 36
    • 0030304298 scopus 로고    scopus 로고
    • Contest success functions
    • Skaperdas S. 1996. Contest success functions. Economic Theory 7, 283-290.
    • (1996) Economic Theory , vol.7 , pp. 283-290
    • Skaperdas, S.1
  • 39
    • 0002782259 scopus 로고
    • Efficient rent- seeking
    • Buchanan, J.M., Tollison, R.D., and Tullock, G., Texas A. & M. University Press, College Station
    • Tullock, G. 1980. Efficient Rent- Seeking, in Buchanan, J.M., Tollison, R.D., and Tullock, G., Toward a Theory of the Rent-Seeking Society, Texas A. & M. University Press, College Station, 97-112.
    • (1980) Toward A Theory of the Rent-Seeking Society , pp. 97-112
    • Tullock, G.1
  • 41
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
    • DOI 10.1287/opre.1070.0434
    • Zhuang, J. and Bier, V.M. 2007. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attack Effort. Operations Research 55(5), 976-991. (Pubitemid 351159542)
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 42
    • 79251511489 scopus 로고    scopus 로고
    • Secrecy and deception at equilibrium, with applications to anti- terrorism resource allocation
    • 2011.
    • Zhuang, J. and Bier, V.M. 2011. Secrecy and Deception at Equilibrium, with Applications to Anti- Terrorism Resource Allocation, Defence and Peace Economics, 22(1), 43-61, 2011.
    • (2011) Defence and Peace Economics , vol.22 , Issue.1 , pp. 43-61
    • Zhuang, J.1    Bier, V.M.2
  • 43
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multiple- period attacker- period attackerdefender signaling game
    • Zhuang, J., Bier, V.M., and Alagoz, O. 2010. Modeling Secrecy and Deception in a Multiple- Period Attacker- Period AttackerDefender Signaling Game, European Journal of Operational Research, 203(2): 409-418.
    • (2010) European Journal of Operational Research , vol.203 , Issue.2 , pp. 409-418
    • Zhuang, J.1    Bier, V.M.2    Alagoz, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.