J Zhuang, VM Bier - Operations Research, 2007 - pubsonline.informs.org
In this paper, we apply game theory to identify equilibrium strategies for both attacker and defender in a fully endogenous model of resource allocation for countering terrorism and …
LA Karoly, C Panis, C Panis - 2004 - books.google.com
What are the forces that will continue to shape the US workforce and workplace over the next 10 to 15 years? With its eye on forming sound policy and helping stakeholders in the …
V Bier, S Oliveros, L Samuelson - Journal of Public Economic …, 2007 - Wiley Online Library
We study a strategic model in which a defender must allocate defensive resources to a collection of locations and an attacker must choose a location to attack. In equilibrium, the …
The Department of Homeland Security is responsible for protecting the United States from terrorism. It does so partly through the Urban Areas Security Initiative, though its distribution …
US insurers are heavily dependent on global reinsurance markets to enable them to provide adequate primary market insurance coverage. This article reviews the response of the …
We study the spatial and temporal determinants of terrorism risk in Israel, using a geocoded database of Israeli terrorist attacks from 1949 to 2004. In selecting targets, terrorists seem to …
K Hausken - Journal of Accounting and Public Policy, 2006 - Elsevier
Firms in cyber war compete with external intruders such as hackers over their assets. Each firm invests in security technology when the required rate of return from security investment …
Catastrophic risk is one of the most significant and challenging areas of corporate risk management. Analyze this risk for your company with Catastrophic Risk and make sure you …
J Hammit, M Rogers, P Sand, JB Wiener - 2013 - api.taylorfrancis.com
The'Precautionary Principle'has sparked the central controversy over European and US risk regulation. The Reality of Precaution is the most comprehensive study to go beyond …