메뉴 건너뛰기




Volumn 56, Issue 4, 2011, Pages 321-353

Defending against a stockpiling terrorist

Author keywords

[No Author keywords available]

Indexed keywords

ASSET VALUATION; DISCOUNT FACTORS; EQUILIBRIUM SOLUTIONS; TERRORIST ATTACKS;

EID: 84857283459     PISSN: 0013791X     EISSN: 15472701     Source Type: Journal    
DOI: 10.1080/0013791X.2011.624260     Document Type: Article
Times cited : (13)

References (41)
  • 1
    • 33947146473 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • DOI 10.1016/j.ejor.2006.03.057, PII S0377221706004747
    • Azaiez,N. and Bier, V.M. (2007) Optimal resource allocation for security in reliability systems. European Journal of Operational Research, 181, 773-786. (Pubitemid 46413583)
    • (2007) European Journal of Operational Research , vol.181 , Issue.2 , pp. 773-786
    • Azaiez, M.N.1    Bier, V.M.2
  • 2
    • 77249147433 scopus 로고    scopus 로고
    • Securing the containerized supply chain: Analysis of government incentives for private investment
    • Bakshi, N. and Gans, N. (2010) Securing the containerized supply chain: Analysis of government incentives for private investment. Management Science, 56(2), 219-233.
    • (2010) Management Science , vol.56 , Issue.2 , pp. 219-233
    • Bakshi, N.1    Gans, N.2
  • 3
    • 79955750542 scopus 로고    scopus 로고
    • The interplay between preemptive and defensive counterterrorism measures: A two-stage game
    • Bandyopadhyay, S. and Sandler, T. (2011) The interplay between preemptive and defensive counterterrorism measures: A two-stage game. Economica, 78(311), 546-564.
    • (2011) Economica , vol.78 , Issue.311 , pp. 546-564
    • Bandyopadhyay, S.1    Sandler, T.2
  • 4
    • 33645877390 scopus 로고    scopus 로고
    • The timing of ETA terrorist attacks
    • DOI 10.1016/j.jpolmod.2005.12.001, PII S0161893806000032
    • Barros, C.P., Passos, J. and Gil-Alana, L.A. (2006) The timing of ETA terrorist attacks. Journal of Policy Modeling, 28(3), 335-346. (Pubitemid 43573913)
    • (2006) Journal of Policy Modeling , vol.28 , Issue.3 , pp. 335-346
    • Barros, C.P.1    Passos, J.2    Gil-Alana, L.A.3
  • 5
    • 33750490397 scopus 로고    scopus 로고
    • Location of terror response facilities: A game between state and terrorist
    • DOI 10.1016/j.ejor.2005.12.022, PII S0377221705009409
    • Berman, O. and Gavious, A. (2007) Location of terror response facilities: A game between state and terrorist. European Journal of Operational Research, 177(2), 1113-1133. (Pubitemid 44647639)
    • (2006) European Journal of Operational Research , vol.177 , Issue.2 , pp. 1113-1133
    • Berman, O.1    Gavious, A.2
  • 6
    • 33947206094 scopus 로고    scopus 로고
    • How does terrorism risk vary across space and time? An analysis based on the Israeli experience
    • Berrebi, C. and Lakdawalla, D. (2007) How does terrorism risk vary across space and time? An analysis based on the Israeli experience. Defence and Peace Economics, 18(2), 113-131.
    • (2007) Defence and Peace Economics , vol.18 , Issue.2 , pp. 113-131
    • Berrebi, C.1    Lakdawalla, D.2
  • 8
    • 45349092442 scopus 로고    scopus 로고
    • Optimal resource allocation for defense of targets based on differing measures of attractiveness
    • DOI 10.1111/j.1539-6924.2008.01053.x
    • Bier, V.M., Haphuriwat, N., Menoyo, J., Zimmerman, R. and Culpen, A. (2008) Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 28(3), 763-770. (Pubitemid 351847236)
    • (2008) Risk Analysis , vol.28 , Issue.3 , pp. 763-770
    • Bier, V.M.1    Haphuriwat, N.2    Menoyo, J.3    Zimmerman, R.4    Culpen, A.M.5
  • 9
    • 9444279581 scopus 로고    scopus 로고
    • Protection of simple series and parallel systems with components of different values
    • Bier, V.M., Nagaraj, A. and Abhichandani, V. (2005) Protection of simple series and parallel systems with components of different values. Reliability Engineering and System Safety, 87, 315-323.
    • (2005) Reliability Engineering and System Safety , vol.87 , pp. 315-323
    • Bier, V.M.1    Nagaraj, A.2    Abhichandani, V.3
  • 10
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier, V.M., Oliveros, S. and Samuelson, L. (2007) Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 563-587.
    • (2007) Journal of Public Economic Theory , vol.9 , pp. 563-587
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 11
    • 33845439386 scopus 로고    scopus 로고
    • Defending critical infrastructure
    • DOI 10.1287/inte.1060.0252
    • Brown, G., Carlyle, M., Salmeron, J. and Wood, K. (2006) Defending critical infrastructure. Interfaces, 36, 530-544. (Pubitemid 44905062)
    • (2006) Interfaces , vol.36 , Issue.6 , pp. 530-544
    • Brown, G.1    Carlyle, M.2    Salmeron, J.3    Wood, K.4
  • 12
    • 78650892231 scopus 로고    scopus 로고
    • A strategic analysis of the war against transnational terrorism
    • Ćarceles-Poveda, E. and Tauman, Y. (2011) A strategic analysis of the war against transnational terrorism. Games and Economic Behavior, 71(1), 49-65.
    • (2011) Games and Economic Behavior , vol.71 , Issue.1 , pp. 49-65
    • Ćarceles-Poveda, E.1    Tauman, Y.2
  • 13
    • 64549092443 scopus 로고    scopus 로고
    • Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
    • Dighe, N., Zhuang, J. and Bier, V.M. (2009) Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 5(1), 31-43.
    • (2009) International Journal of Performability Engineering , vol.5 , Issue.1 , pp. 31-43
    • Dighe, N.1    Zhuang, J.2    Bier, V.M.3
  • 14
    • 33744504907 scopus 로고
    • The effectiveness of anti-terrorism policies: A vector-Autoregression- intervention analysis
    • Enders, W. and Sandler, T. (1993) The effectiveness of anti-terrorism policies: A vector-Autoregression-intervention analysis. American Political Science Review, 87(4), 829-844.
    • (1993) American Political Science Review , vol.87 , Issue.4 , pp. 829-844
    • Enders, W.1    Sandler, T.2
  • 15
    • 0041771284 scopus 로고    scopus 로고
    • What do we know about the substitution effect in transnational terrorism? In
    • A. Silke, editor. Frank Cass, London
    • Enders, W. and Sandler, T. (2004) What do we know about the substitution effect in transnational terrorism? In Research on terrorism: Trends, achievements and failures, A. Silke, editor. Frank Cass, London.
    • (2004) Research on terrorism: Trends, achievements and failures
    • Enders, W.1    Sandler, T.2
  • 16
    • 16644364092 scopus 로고    scopus 로고
    • After 9/11 IS IT all different now?
    • DOI 10.1177/0022002704272864, Political Economy of Transnational Terrorism
    • Enders,W. and Sandler, T. (2005) After 9/11 is it all different now? Journal of Conflict Resolution, 49(2), 259-277. (Pubitemid 40482842)
    • (2005) Journal of Conflict Resolution , vol.49 , Issue.2 , pp. 259-277
    • Enders, W.1    Sandler, T.2
  • 17
    • 55649083124 scopus 로고    scopus 로고
    • Terror and counterterror operations: Differential game with cyclical Nash solution
    • Feichtinger, G. and Novak, A. (2008) Terror and counterterror operations: differential game with cyclical Nash solution. Journal of Optimization Theory and Applications, 139(3), 541-556.
    • (2008) Journal of Optimization Theory and Applications , vol.139 , Issue.3 , pp. 541-556
    • Feichtinger, G.1    Novak, A.2
  • 19
    • 33751256271 scopus 로고    scopus 로고
    • Income, interdependence, and substitution effects affecting incentives for security investment
    • DOI 10.1016/j.jaccpubpol.2006.09.001, PII S027842540600086X
    • Hausken, K. (2006) Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25, 629-665. (Pubitemid 44783207)
    • (2006) Journal of Accounting and Public Policy , vol.25 , Issue.6 , pp. 629-665
    • Hausken, K.1
  • 20
    • 55349145945 scopus 로고    scopus 로고
    • Whether to attack a terrorist's resource stock today or tomorrow
    • Hausken, K. (2008) Whether to attack a terrorist's resource stock today or tomorrow. Games and Economic Behavior, 64(2), 548-564.
    • (2008) Games and Economic Behavior , vol.64 , Issue.2 , pp. 548-564
    • Hausken, K.1
  • 21
    • 84954516300 scopus 로고    scopus 로고
    • Defending against terrorism, natural disaster, and all hazards. In
    • V.M. Bier and M.N. Azaiez, editors. Springer, New York
    • Hausken, K., Bier, V. and Zhuang, J. (2009) Defending against terrorism, natural disaster, and all hazards. In Game theoretic risk analysis of security threats, V.M. Bier and M.N. Azaiez, editors. Springer, New York.
    • (2009) Game Theoretic Risk Analysis of Security Threats
    • Hausken, K.1    Bier, V.2    Zhuang, J.3
  • 22
    • 80052018326 scopus 로고    scopus 로고
    • Defending against a terrorist who accumulates resources
    • Hausken, K. and Zhuang, J. (2011a) Defending against a terrorist who accumulates resources. Military Operations Research, 16(1), 21-39.
    • (2011) Military Operations Research , vol.16 , Issue.1 , pp. 21-39
    • Hausken, K.1    Zhuang, J.2
  • 23
    • 79952852737 scopus 로고    scopus 로고
    • Governments' and terrorists' defense and attack in a T-period game
    • Hausken, K. and Zhuang, J. (2011b) Governments' and terrorists' defense and attack in a T-period game. Decision Analysis, 8(1), 46-70.
    • (2011) Decision Analysis , vol.8 , Issue.1 , pp. 46-70
    • Hausken, K.1    Zhuang, J.2
  • 25
    • 34047142655 scopus 로고    scopus 로고
    • Optimal defense strategy against intentional attacks
    • Levitin, G. (2007) Optimal defense strategy against intentional attacks. IEEE Transactions on Reliability, 56(1), 148-156.
    • (2007) IEEE Transactions on Reliability , vol.56 , Issue.1 , pp. 148-156
    • Levitin, G.1
  • 26
    • 43249094557 scopus 로고    scopus 로고
    • Protection vs. redundancy in homogeneous parallel systems
    • Levitin, G. and Hausken, K. (2008) Protection vs. redundancy in homogeneous parallel systems. Reliability Engineering & System Safety, 93(10), 1444-1451.
    • (2008) Reliability Engineering & System Safety , vol.93 , Issue.10 , pp. 1444-1451
    • Levitin, G.1    Hausken, K.2
  • 27
    • 33751078297 scopus 로고    scopus 로고
    • Methodology for ranking the elements of water-supply networks
    • DOI 10.1061/(ASCE)1076-0342(2006)12:4(230)
    • Michaud, D. and Apostolakis, G. (2006) Methodology for ranking the elements of water-supply networks. Journal of Infrastructure Systems, 12(4), 230-242. (Pubitemid 44768337)
    • (2006) Journal of Infrastructure Systems , vol.12 , Issue.4 , pp. 230-242
    • Michaud, D.1    Apostolakis, G.E.2
  • 28
    • 33846275533 scopus 로고    scopus 로고
    • The efficiency/security trade-off in criminal networks
    • Morselli, C., Giguere, C. and Petit, K. (2007) The efficiency/security trade-off in criminal networks. Social Networks, 29, 143-153.
    • (2007) Social Networks , vol.29 , pp. 143-153
    • Morselli, C.1    Giguere, C.2    Petit, K.3
  • 29
    • 33847386386 scopus 로고    scopus 로고
    • Identification of critical locations across multiple infrastructures for terrorist actions
    • DOI 10.1016/j.ress.2006.08.004, PII S0951832006001840
    • Patterson, S. and Apostolakis, G. (2007) Identification of critical locations across multiple infrastructures for terrorist actions. Reliability Engineering & System Safety, 92(9), 1183-1203. (Pubitemid 46341795)
    • (2007) Reliability Engineering and System Safety , vol.92 , Issue.9 , pp. 1183-1203
    • Patterson, S.A.1    Apostolakis, G.E.2
  • 30
    • 38549176250 scopus 로고    scopus 로고
    • An analysis of short-term responses to threats of terrorism
    • DOI 10.1287/mnsc.1060.0665
    • Pinker, E.J. (2007) An analysis of short-term responses to threats of terrorism. Management Science, 53(6), 865-880. (Pubitemid 351159620)
    • (2007) Management Science , vol.53 , Issue.6 , pp. 865-880
    • Pinker, E.J.1
  • 31
    • 3042546359 scopus 로고    scopus 로고
    • Simulation of the dynamic interactions between terror and antiterror organizational structures
    • Available online at
    • Raczynski, S. (2004) Simulation of the dynamic interactions between terror and antiterror organizational structures. Journal of Artificial Societies and Social Simulation, 7(2). Available online at http://jasss.soc.surrey.ac.uk/ 7/2/8.html
    • (2004) Journal of Artificial Societies and Social Simulation , vol.7 , Issue.2
    • Raczynski, S.1
  • 32
    • 33750462334 scopus 로고    scopus 로고
    • Global terrorism: Deterrence versus pre-emption
    • DOI 10.1111/j.1540-5982.2006.00393.x
    • Sandler, T. and Siqueira, K. (2006) Global terrorism: deterrence versus pre-emption. Canadian Journal of Economics, 39(4), 1370-1387. (Pubitemid 44650490)
    • (2006) Canadian Journal of Economics , vol.39 , Issue.4 , pp. 1370-1387
    • Sandler, T.1    Siqueira, K.2
  • 34
    • 0030304298 scopus 로고    scopus 로고
    • Contest success functions
    • Skaperdas, S. (1996) Contest success functions. Economic Theory, 7, 283-290.
    • (1996) Economic Theory , vol.7 , pp. 283-290
    • Skaperdas, S.1
  • 35
    • 32544460078 scopus 로고    scopus 로고
    • Are global terrorist attacks time-correlated?
    • DOI 10.1016/j.physa.2005.08.030, PII S0378437105008204
    • Telesca, L. and Lovallo,M. (2006) Are global terrorist attacks time-correlated? Physica A - Statistical Mechanics and Its Applications, 362(2), 480-484. (Pubitemid 43234070)
    • (2006) Physica A: Statistical Mechanics and its Applications , vol.362 , Issue.2 , pp. 480-484
    • Telesca, L.1    Lovallo, M.2
  • 36
    • 33745577728 scopus 로고    scopus 로고
    • Defense R&D in the anti-terrorism era
    • Trajtenberg, M. (2006) Defense R&D in the anti-terrorism era. Defence and Peace Economics, 17(3), 177-199.
    • (2006) Defence and Peace Economics , vol.17 , Issue.3 , pp. 177-199
    • Trajtenberg, M.1
  • 37
    • 0002782259 scopus 로고
    • Efficient rent-seeking. In
    • J.M. Buchanan, R.D. Tollison and G. Tullock, editors. Texas A&M University Press, College Station, EX
    • Tullock,G. (1980) Efficient rent-seeking. In Toward a theory of the rent-seeking society, J.M. Buchanan, R.D. Tollison and G. Tullock, editors. Texas A&M University Press, College Station, EX.
    • (1980) Toward a theory of the rent-seeking society
    • Tullock, G.1
  • 38
    • 33749454448 scopus 로고    scopus 로고
    • A dynamical model of terrorism
    • doi:10.1155/DDNS/2006/85653, Available online at
    • Udwadia, F., Leitmann, G. and Lambertini, L. (2006) A dynamical model of terrorism. Discrete Dynamics in Nature and Society, doi:10.1155/DDNS/2006/85653. Available online at http://www.hindawi.com/journals/ddns/2006/085653/abs/
    • (2006) Discrete Dynamics in Nature and Society
    • Udwadia, F.1    Leitmann, G.2    Lambertini, L.3
  • 39
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
    • DOI 10.1287/opre.1070.0434
    • Available online at http://www.hindawi.com/journals/ddns/2006/085653/ abs/ Zhuang, J. and Bier, V.M. (2007) Balancing terrorism and natural disasters- defensive strategy with endogenous attack effort. Operations Research, 55(5), 976-991. (Pubitemid 351159542)
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 40
    • 79251511489 scopus 로고    scopus 로고
    • Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
    • Zhuang, J. and Bier, V.M. (2011) Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Defence and Peace Economics, 22(1), 43-61.
    • (2011) Defence and Peace Economics , vol.22 , Issue.1 , pp. 43-61
    • Zhuang, J.1    Bier, V.M.2
  • 41
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    • Zhuang, J., Bier, V.M. and Alagoz, O. (2010) Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 203(2), 409-418.
    • (2010) European Journal of Operational Research , vol.203 , Issue.2 , pp. 409-418
    • Zhuang, J.1    Bier, V.M.2    Alagoz, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.