메뉴 건너뛰기




Volumn 3, Issue 4, 2010, Pages 197-211

Container transportation as an interdependent security problem

Author keywords

Container transportation; Game theory; Interdependent security

Indexed keywords


EID: 84860247903     PISSN: 19387741     EISSN: 1938775X     Source Type: Journal    
DOI: 10.1007/s12198-010-0047-y     Document Type: Article
Times cited : (18)

References (22)
  • 1
    • 84893926205 scopus 로고    scopus 로고
    • AmCham EU, American Chamber of Commerce to the European Union, December 6th 2007
    • AmCham EU (2007) Comments on the US Legislation to require 100% container scanning. American Chamber of Commerce to the European Union, December 6th 2007 (www. amchameu. eu).
    • (2007) Comments on the US Legislation to require 100% container scanning
  • 2
    • 33947146473 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • Azaiez M, Bier V (2007) Optimal resource allocation for security in reliability systems. Eur J Oper Res 181: 773-786.
    • (2007) Eur J Oper Res , vol.181 , pp. 773-786
    • Azaiez, M.1    Bier, V.2
  • 3
    • 77249147433 scopus 로고    scopus 로고
    • Securing the containerized supply chain: Analysis of government incentives for private investment
    • Bakshi N, Gans N (2010) Securing the containerized supply chain: analysis of government incentives for private investment. Manage Sci 56(2): 219-233.
    • (2010) Manage Sci , vol.56 , Issue.2 , pp. 219-233
    • Bakshi, N.1    Gans, N.2
  • 4
    • 33748519601 scopus 로고    scopus 로고
    • Hiding in plain sight-using signals to detect terrorists
    • Basuchoudhary A, Razzolini L (2006) Hiding in plain sight-using signals to detect terrorists. Public Choice 128: 245-255.
    • (2006) Public Choice , vol.128 , pp. 245-255
    • Basuchoudhary, A.1    Razzolini, L.2
  • 5
    • 52449134341 scopus 로고    scopus 로고
    • Game-theoretic and reliability methods in counterterrorism and security
    • In: Wilson AG, Wilson GD, Olwell DH (eds) (2006), Springer
    • Bier VM (2006) Game-theoretic and reliability methods in counterterrorism and security. In: Wilson AG, Wilson GD, Olwell DH (eds) (2006) Statistical methods in counterterrorism. Springer.
    • (2006) Statistical methods in counterterrorism
    • Bier, V.M.1
  • 6
    • 9444279581 scopus 로고    scopus 로고
    • Protection of simple series and parallel systems with components of different values
    • Bier VM, Nagaraj A, Abhichandani V (2005) Protection of simple series and parallel systems with components of different values. Reliab Eng Syst Saf 87: 315-323.
    • (2005) Reliab Eng Syst Saf , vol.87 , pp. 315-323
    • Bier, V.M.1    Nagaraj, A.2    Abhichandani, V.3
  • 7
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier V, Oliveros S, Samuelson L (2007) Choosing what to protect: strategic defensive allocation against an unknown attacker. J Public Econ Theory 9(4): 563-587.
    • (2007) J Public Econ Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.1    Oliveros, S.2    Samuelson, L.3
  • 9
    • 77952582043 scopus 로고    scopus 로고
    • The International Bank for Reconstruction and Development/The World
    • Donner M, Kruk C (2009) Supply chain security guide. The International Bank for Reconstruction and Development/The World.
    • (2009) Supply chain security guide
    • Donner, M.1    Kruk, C.2
  • 10
    • 84868524529 scopus 로고    scopus 로고
    • European Commission Staff Working Paper, Brussels, 11. 2. 2010, SEC(2010) 131 final
    • Bank EC (2010) Secure trade and 100% scanning of containers. European Commission Staff Working Paper, Brussels, 11. 2. 2010, SEC(2010) 131 final.
    • (2010) Secure trade and 100% scanning of containers
    • Bank, E.C.1
  • 13
    • 16644390753 scopus 로고    scopus 로고
    • IDS models of airline security
    • Heal G, Kunreuther H (2005) IDS models of airline security. J Confl Resolut 49(2): 201-217.
    • (2005) J Confl Resolut , vol.49 , Issue.2 , pp. 201-217
    • Heal, G.1    Kunreuther, H.2
  • 14
    • 0037786763 scopus 로고    scopus 로고
    • Interdependent security
    • Kunreuther H, Heal G (2003) Interdependent security. J Risk Uncertain 26(2/3): 231-249.
    • (2003) J Risk Uncertain , vol.26 , Issue.2-3 , pp. 231-249
    • Kunreuther, H.1    Heal, G.2
  • 15
  • 16
    • 84893945317 scopus 로고    scopus 로고
    • NDIA, National Defense online magazine, March 2009
    • NDIA (2009) Study blasts container scanning process. National Defense online magazine (www. nationaldefensemagazine. org), March 2009.
    • (2009) Study blasts container scanning process
  • 17
    • 0000308219 scopus 로고
    • The calculus of dissent: An analysis of terrorists' choice of targets
    • Sandler T, Lapan HE (1988) The calculus of dissent: an analysis of terrorists' choice of targets. Synthese 76: 245-261.
    • (1988) Synthese , vol.76 , pp. 245-261
    • Sandler, T.1    Lapan, H.E.2
  • 18
    • 46649106463 scopus 로고    scopus 로고
    • Terrorism & game theory
    • Sandler T, Arce D (2003) Terrorism & game theory. Simul Gaming 34(3): 319-337.
    • (2003) Simul Gaming , vol.34 , Issue.3 , pp. 319-337
    • Sandler, T.1    Arce, D.2
  • 19
    • 33750462334 scopus 로고    scopus 로고
    • Global terrorism: Deterrence versus pre-emption
    • Sandler T, Siqueira K (2006) Global terrorism: deterrence versus pre-emption. Can J Econ 39(4).
    • (2006) Can J Econ , vol.39 , Issue.4
    • Sandler, T.1    Siqueira, K.2
  • 20
    • 84893926901 scopus 로고    scopus 로고
    • Security Management magazine online, October 2008
    • Straw J (2008) Outlook for container scanning. Security Management magazine online (www. securitymanagement. com), October 2008.
    • (2008) Outlook for container scanning
    • Straw, J.1
  • 21
    • 33750162923 scopus 로고    scopus 로고
    • Preventing the importation of illicit nuclear materials in shipping containers
    • Wein L, Wilkins A, Baveja M, Flynn S (2006) Preventing the importation of illicit nuclear materials in shipping containers. Risk Anal 26(5).
    • (2006) Risk Anal , vol.26 , Issue.5
    • Wein, L.1    Wilkins, A.2    Baveja, M.3    Flynn, S.4
  • 22
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
    • Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Oper Res 55(5): 976-991.
    • (2007) Oper Res , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.