메뉴 건너뛰기




Volumn 65, Issue 7, 2014, Pages 1108-1119

Subsidizing to disrupt a terrorism supply chain-A four-player game

Author keywords

game theory; homeland security; subsidy; terrorism supply chain; weapons of mass destruction

Indexed keywords

GAME THEORY; MILITARY EQUIPMENT; NATIONAL SECURITY; SECURITY SYSTEMS; SUPPLY CHAINS;

EID: 84902157910     PISSN: 01605682     EISSN: 14769360     Source Type: Journal    
DOI: 10.1057/jors.2013.53     Document Type: Article
Times cited : (25)

References (35)
  • 1
    • 15844375473 scopus 로고    scopus 로고
    • Counterterrorism-a gametheoreticanalysis
    • Arce DG and Sandler T (2005). Counterterrorism-a gametheoreticanalysis. Journal of Conflict Resolution 49(2): 183-200.
    • (2005) Journal of Conflict Resolution , vol.49 , Issue.2 , pp. 183-200
    • Arce, D.G.1    Sandler, T.2
  • 2
    • 77952006728 scopus 로고    scopus 로고
    • Terrorist spectaculars: Backlashattacks and the focus of intelligence
    • Arce DG and Sandler T (2010). Terrorist spectaculars: Backlashattacks and the focus of intelligence. Journal of ConflictResolution 54(2): 354-373.
    • (2010) Journal of ConflictResolution , vol.54 , Issue.2 , pp. 354-373
    • Arce, D.G.1    Sandler, T.2
  • 3
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what toprotect: Strategic defensive allocation against an unknownattacker
    • Bier VM, Oliveros S and Samuelson L (2007). Choosing what toprotect: Strategic defensive allocation against an unknownattacker. Journal of Public Economic Theory 9(4): 563-587.
    • (2007) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 7
    • 33645772011 scopus 로고    scopus 로고
    • In search of the average transnational terrorist attack venue
    • DOI 10.1080/10242690500445387, PII W87156188071572
    • Drakos K and Gofas A (2006). In search of the average transnationalterrorist attack venue. Defence and Peace Economics17(2): 73-93. (Pubitemid 43553742)
    • (2006) Defence and Peace Economics , vol.17 , Issue.2 , pp. 73-93
    • Drakos, K.1    Gofas, A.2
  • 8
    • 16644364092 scopus 로고    scopus 로고
    • After 9/11 IS IT all different now?
    • DOI 10.1177/0022002704272864, Political Economy of Transnational Terrorism
    • Enders W and Sandler T (2005). After 9/11 is it all different now?Journal of Conflict Resolution 49(2): 259-277. (Pubitemid 40482842)
    • (2005) Journal of Conflict Resolution , vol.49 , Issue.2 , pp. 259-277
    • Enders, W.1    Sandler, T.2
  • 9
    • 2442535444 scopus 로고    scopus 로고
    • Stick or CarrotEdwardElgar Publishing Ltd.: Cheltenham, UK and Northampton, MA
    • Frey BS (2004). Dealing with Terrorism: Stick or CarrotEdwardElgar Publishing Ltd.: Cheltenham, UK and Northampton, MA.
    • (2004) Dealing with Terrorism
    • Frey, B.S.1
  • 10
    • 0141444514 scopus 로고
    • A problem in network interdiction
    • Golden B (1978). A problem in network interdiction. NavalResearch Logistics Quarterly 25(4): 711-713.
    • (1978) NavalResearch Logistics Quarterly , vol.25 , Issue.4 , pp. 711-713
    • Golden, B.1
  • 11
    • 84860829757 scopus 로고    scopus 로고
    • The timing and deterrence ofterrorist attacks due to exogenous dynamics
    • Hausken K and Zhuang J (2011). The timing and deterrence ofterrorist attacks due to exogenous dynamics. Journal of theOperational Research Society 63(6): 726-735.
    • (2011) Journal of TheOperational Research Society , vol.63 , Issue.6 , pp. 726-735
    • Hausken, K.1    Zhuang, J.2
  • 12
    • 84860816402 scopus 로고    scopus 로고
    • Modelling 'contracts' between aterrorist group and a government in a sequential game
    • He F and Zhuang J (2012). Modelling 'contracts' between aterrorist group and a government in a sequential game. Journalof the Operational Research Society 63(6): 790-809.
    • (2012) Journalof the Operational Research Society , vol.63 , Issue.6 , pp. 790-809
    • He, F.1    Zhuang, J.2
  • 13
    • 0004095933 scopus 로고    scopus 로고
    • Columbia University Press: New York, NY
    • Hoffman B (2006). Inside Terrorism. Columbia University Press:New York, NY.
    • (2006) Inside Terrorism
    • Hoffman, B.1
  • 14
    • 3543125926 scopus 로고    scopus 로고
    • The investment problem in terrorism
    • DOI 10.1111/j.0013-0427.2004.00379.x
    • Konrad KA (2004). The investment problem in terrorism. Economica 71(283): 449-459. (Pubitemid 39026914)
    • (2004) Economica , vol.71 , Issue.283 , pp. 449-459
    • Konrad, K.A.1
  • 15
    • 0037786763 scopus 로고    scopus 로고
    • Interdependent security
    • 1118 Journal of the Operational Research Society 65, 7
    • Kunreuther H and Heal G (2003). Interdependent security. Journalof Risk and Uncertainty 26(2): 231-249.1118 Journal of the Operational Research Society Vol. 65, No. 7
    • (2003) Journalof Risk and Uncertainty , vol.26 , Issue.2 , pp. 231-249
    • Kunreuther, H.1    Heal, G.2
  • 17
    • 63149134856 scopus 로고    scopus 로고
    • Redundancy vs protection vs false targets for systems under attack
    • Levitin G and Hausken K (2009). Redundancy vs. protection vs. false targets for systems under attack. IEEE Transactions onReliability 58(1): 58-68.
    • (2009) IEEE Transactions OnReliability , vol.58 , Issue.1 , pp. 58-68
    • Levitin, G.1    Hausken, K.2
  • 18
    • 33749589535 scopus 로고    scopus 로고
    • Advanced techniques for modeling terrorism risk
    • Major J (2002). Advanced techniques for modeling terrorism risk. Journal of Risk Finance 4(1): 15-24.
    • (2002) Journal of Risk Finance , vol.4 , Issue.1 , pp. 15-24
    • Major, J.1
  • 21
    • 84888811685 scopus 로고    scopus 로고
    • A stochastic programfor interdicting smuggled nuclear material
    • Woodruff DL(ed) Kluwer Academic Publishers: Dordrecht, The Netherlands
    • Pan F, Charlton WS and Morton DP (2003). A stochastic programfor interdicting smuggled nuclear material. In: Woodruff DL(ed). Network Interdiction and Stochastic Integer Programming. Kluwer Academic Publishers: Dordrecht, The Netherlands,pp 1-20.
    • (2003) Network Interdiction and Stochastic Integer Programming , pp. 1-20
    • Pan, F.1    Charlton, W.S.2    Morton, D.P.3
  • 22
    • 84902164537 scopus 로고    scopus 로고
    • When devils walk the earth: The mentalityand roots of terrorism, and how to respond
    • accessed December 2012
    • Peters R (2001). When devils walk the earth: The mentalityand roots of terrorism, and how to respond. The United StatesCenter for Emerging Threats and Opportunities. http://www.au.af.mil/au/awc/awcgate/usmc/ceto/when-devils-walk- the-earth.pdf, accessed December 2012.
    • (2001) The United StatesCenter for Emerging Threats and Opportunities
    • Peters, R.1
  • 24
    • 52449126228 scopus 로고    scopus 로고
    • Does intent equal capability?Al-Qaeda and weapons of mass destruction
    • Salama S and Hansell L (2005). Does intent equal capability?Al-Qaeda and weapons of mass destruction. The NonproliferatingReview 12(3): 615-653.
    • (2005) The NonproliferatingReview , vol.12 , Issue.3 , pp. 615-653
    • Salama, S.1    Hansell, L.2
  • 25
    • 46649106463 scopus 로고    scopus 로고
    • Terrorism & game theory
    • Sandler T and Arce DG (2003). Terrorism & game theory. Simulation & Gaming 34(3): 319-337.
    • (2003) Simulation & Gaming , vol.34 , Issue.3 , pp. 319-337
    • Sandler, T.1    Arce, D.G.2
  • 26
    • 0000308219 scopus 로고
    • The calculus of dissent-Ananalysis of terrorists' choice of targets
    • Sandler T and Lapan HE (1988). The calculus of dissent-Ananalysis of terrorists' choice of targets. Synthese 76(2): 245-261.
    • (1988) Synthese , vol.76 , Issue.2 , pp. 245-261
    • Sandler, T.1    Lapan, H.E.2
  • 27
    • 33750462334 scopus 로고    scopus 로고
    • Global terrorism: Deterrence versuspre-emption
    • Sandler T and Siqueira K (2006). Global terrorism: Deterrence versuspre-emption. Canadian Journal of Economics 39(4): 1370-1387.
    • (2006) Canadian Journal of Economics , vol.39 , Issue.4 , pp. 1370-1387
    • Sandler, T.1    Siqueira, K.2
  • 28
    • 63449108250 scopus 로고    scopus 로고
    • Games and terrorism: Recentdevelopments
    • Sandler T and Siqueira K (2009). Games and terrorism: Recentdevelopments. Simulation & Gaming 40(2): 164-192.
    • (2009) Simulation & Gaming , vol.40 , Issue.2 , pp. 164-192
    • Sandler, T.1    Siqueira, K.2
  • 30
    • 84875228984 scopus 로고    scopus 로고
    • Hybrid defensive resource allocationsin the face of partially strategic attackers in a sequentialdefender-attacker game
    • Shan X and Zhuang J (2013). Hybrid defensive resource allocationsin the face of partially strategic attackers in a sequentialdefender-attacker game. European Journal of Operational Research228(1): 262-272.
    • (2013) European Journal of Operational Research , vol.228 , Issue.1 , pp. 262-272
    • Shan, X.1    Zhuang, J.2
  • 31
    • 0001590955 scopus 로고
    • Two-person zero-sum games fornetwork interdiction
    • Washburn A and Wood K (1995). Two-person zero-sum games fornetwork interdiction. Operations Research 43(2): 243-251.
    • (1995) Operations Research , vol.43 , Issue.2 , pp. 243-251
    • Washburn, A.1    Wood, K.2
  • 32
    • 33750162923 scopus 로고    scopus 로고
    • Preventing the importation of illicit nuclear materials in shipping containers
    • DOI 10.1111/j.1539-6924.2006.00817.x
    • Wein LM, Wilkins AH, Baveja M and Flynn SE (2006). Preventingthe importation of illicit nuclear materials in shipping containers. Risk Analysis 26(5): 1377-1393. (Pubitemid 44599404)
    • (2006) Risk Analysis , vol.26 , Issue.5 , pp. 1377-1393
    • Wein, L.M.1    Wilkins, A.H.2    Baveja, M.3    Flynn, S.E.4
  • 33
    • 84856696717 scopus 로고    scopus 로고
    • Quantitative terrorism risk assessment
    • Woo G (2002). Quantitative terrorism risk assessment. Journal ofRisk Finance 4(1): 7-14.
    • (2002) Journal OfRisk Finance , vol.4 , Issue.1 , pp. 7-14
    • Woo, G.1
  • 34
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
    • DOI 10.1287/opre.1070.0434
    • Zhuang J and Bier VM (2007). Balancing terrorism and naturaldisasters- Defensive strategy with endogenous attacker effort. Operations Research 55(5): 976-991. (Pubitemid 351159542)
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 35
    • 33847259790 scopus 로고    scopus 로고
    • Subsidies in interdependent security with heterogeneous discount rates
    • DOI 10.1080/00137910601159722, PII 770885300
    • Zhuang J, Bier VM and Ashish G (2007). Subsidies in interdependentsecurity with heterogeneous discount rates. TheEngineering Economist 52(1): 1-19. (Pubitemid 46325421)
    • (2007) Engineering Economist , vol.52 , Issue.1 , pp. 1-19
    • Zhuang, J.1    Bier, V.M.2    Gupta, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.