Publication Cover
The Engineering Economist
A Journal Devoted to the Problems of Capital Investment
Volume 52, 2007 - Issue 1
176
Views
61
CrossRef citations to date
0
Altmetric
Original Articles

Subsidies in Interdependent Security With Heterogeneous Discount Rates

, &
Pages 1-19 | Published online: 14 Feb 2007

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (9)

Magdalena Jażdżewska-Gutta & Przemysław Borkowski. (2022) As strong as the weakest link. Transport and supply chain security. Transport Reviews 42:6, pages 762-783.
Read now
Rui Peng, Di Wu, Mengyao Sun & Shaomin Wu. (2021) An attack-defense game on interdependent networks. Journal of the Operational Research Society 72:10, pages 2331-2341.
Read now
Shenming Song & Chen Wang. (2020) Incentivizing catastrophe risk sharing. IISE Transactions 52:12, pages 1358-1385.
Read now
Xing Gao, Weijun Zhong & Shue Mei. (2014) A game-theoretic analysis of information sharing and security investment for complementary firms. Journal of the Operational Research Society 65:11, pages 1682-1691.
Read now
Xiaojun Shan & Jun Zhuang. (2014) Subsidizing to disrupt a terrorism supply chain—a four-player game. Journal of the Operational Research Society 65:7, pages 1108-1119.
Read now
Chi Zhang & Jose Emmanuel Ramirez-Marquez. (2013) Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information. IIE Transactions 45:3, pages 244-258.
Read now
Jun Zhuang & VickiM. Bier. (2011) SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION. Defence and Peace Economics 22:1, pages 43-61.
Read now
Kjell Hausken. (2011) Protecting complex infrastructures against multiple strategic attackers. International Journal of Systems Science 42:1, pages 11-29.
Read now

Articles from other publishers (52)

Kai A. Konrad. (2024) The collective security dilemma of preemptive strikes. European Journal of Operational Research 313:3, pages 1191-1199.
Crossref
Kai A. Konrad & Florian Morath. (2023) How to preempt attacks in multi-front conflict with limited resources. European Journal of Operational Research 305:1, pages 493-500.
Crossref
Xing Gao, Siyu Gong, Ying Wang, Xifan Wang & Manting Qiu. (2022) An economic analysis of information security decisions with mandatory security standards in resource sharing environments. Expert Systems with Applications 206, pages 117894.
Crossref
Xihong Yan, Xiaorong Ren & Xiaofeng Nie. (2022) A budget allocation model for domestic airport network protection. Socio-Economic Planning Sciences 82, pages 101274.
Crossref
Xiaotong Li. (2021) An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform. Managerial and Decision Economics 43:3, pages 595-606.
Crossref
Shun Chen, Xudong Zhao, Zhilong Chen, Benwei Hou & Yipeng Wu. (2022) A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks. International Journal of Critical Infrastructure Protection 36, pages 100494.
Crossref
Xing Gao. (2022) Competitive information security investment under hacker knowledge dissemination. Journal of Industrial and Management Optimization 0:0, pages 0.
Crossref
Fu Chaoqi, Gao Yangjun, Zhong Jilong, Sun Yun, Zhang Pengtao & Wu Tao. (2021) Attack-defense game for critical infrastructure considering the cascade effect. Reliability Engineering & System Safety 216, pages 107958.
Crossref
Shuliang Wang, Xifeng Gu, Shengyang Luan & Mingwei Zhao. (2021) Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory. International Journal of Critical Infrastructure Protection 35, pages 100459.
Crossref
Gautam Bose & Kai A. Konrad. (2020) Devil take the hindmost: Deflecting attacks to other defenders. Reliability Engineering & System Safety 204, pages 107205.
Crossref
Qiaoqin Su & Jianqiang Gu. (2020) Information system security outsourcing and information sharing level decision. Information system security outsourcing and information sharing level decision.
Nafiseh Ghorbani-Renani, Andrés D. González, Kash Barker & Nazanin Morshedlou. (2020) Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience. Reliability Engineering & System Safety 199, pages 106907.
Crossref
Gabriel Kuper, Fabio Massacci, Woohyun Shim & Julian Williams. (2020) Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports. Risk Analysis 40:5, pages 1001-1019.
Crossref
Jay Simon & Ayman Omar. (2020) Cybersecurity investments in the supply chain: Coordination and a strategic attacker. European Journal of Operational Research 282:1, pages 161-171.
Crossref
Xiaojun Gene Shan & Jun Zhuang. (2020) A game-theoretic approach to modeling attacks and defenses of smart grids at three levels. Reliability Engineering & System Safety 195, pages 106683.
Crossref
Qingqing Zhai, Rui Peng & Jun Zhuang. (2019) Defender–Attacker Games with Asymmetric Player Utilities. Risk Analysis 40:2, pages 408-420.
Crossref
Ramón Navarrete Reynoso, Cecilia Ramos-Estrada & Omar J. Purata. 2020. Supply Chain and Logistics Management. Supply Chain and Logistics Management 242 265 .
Yosra Miaoui & Noureddine Boudriga. (2017) Enterprise security investment through time when facing different types of vulnerabilities. Information Systems Frontiers 21:2, pages 261-300.
Crossref
Seyed Alireza Hasheminasab & Behrouz Tork Ladani. (2018) Security Investment in Contagious Networks. Risk Analysis 38:8, pages 1559-1575.
Crossref
Dogucan Mazicioglu & Jason R. W. Merrick. (2017) Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism. Risk Analysis 38:5, pages 962-977.
Crossref
Meilin He, Laura Devine & Jun Zhuang. (2018) Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach. Risk Analysis 38:2, pages 215-225.
Crossref
Cen Song & Jun Zhuang. (2017) Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors. Risk Analysis 38:1, pages 118-133.
Crossref
Qingqing Zhai, Zhi-Sheng Ye, Rui Peng & Wenbin Wang. (2017) Defense and attack of performance-sharing common bus systems. European Journal of Operational Research 256:3, pages 962-975.
Crossref
Nobuyuki Takashima. (2017) International environmental agreements with ancillary benefits: Repeated games analysis. Economic Modelling 61, pages 312-320.
Crossref
Xing Gao & Weijun Zhong. (2015) Economic incentives in security information sharing: the effects of market structures. Information Technology and Management 17:4, pages 361-377.
Crossref
Alireza Azimian, D. Marc Kilgour & Hamid Noori. (2016) Mitigating contagion risk by investing in the safety of rivals. European Journal of Operational Research 254:3, pages 935-945.
Crossref
Sumitra Sri Bhashyam & Gilberto Montibeller. (2015) In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models. Risk Analysis 36:4, pages 666-680.
Crossref
Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang & David K. Y. Yau. (2015) Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models. Risk Analysis 36:4, pages 694-710.
Crossref
Kjell Hausken & Fei He. (2014) On the Effectiveness of Security Countermeasures for Critical Infrastructures. Risk Analysis 36:4, pages 711-726.
Crossref
Jason R. W. Merrick & Philip Leclerc. (2014) Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory. Risk Analysis 36:4, pages 681-693.
Crossref
Baichao Wu, Aiping Tang & Jie Wu. (2016) Modeling cascading failures in interdependent infrastructures under terrorist attacks. Reliability Engineering & System Safety 147, pages 1-8.
Crossref
Ramón Navarrete Reynoso, Cecilia Ramos-Estrada & Omar J. Purata. 2016. Handbook of Research on Military, Aeronautical, and Maritime Logistics and Operations. Handbook of Research on Military, Aeronautical, and Maritime Logistics and Operations 56 78 .
Naji Bricha & Mustapha Nourelfath. (2015) Protection of warehouses and plants under capacity constraint. Reliability Engineering & System Safety 138, pages 93-104.
Crossref
Xing Gao, Weijun Zhong & Shue Mei. (2013) Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers 17:2, pages 423-438.
Crossref
Xiaojun Shan & Jun Zhuang. 2015. OR, Defence and Security. OR, Defence and Security 272 292 .
Min Gong, Geoffrey Heal, David H. Krantz, Howard Kunreuther & Elke U. Weber. (2014) The Role of Subsidies in Coordination Games with Interconnected Risk. Journal of Behavioral Decision Making 27:5, pages 395-407.
Crossref
Vicki M. Bier. 2014. Wiley StatsRef: Statistics Reference Online. Wiley StatsRef: Statistics Reference Online.
Xing Gao, Weijun Zhong & Shue Mei. (2013) Information Security Investment When Hackers Disseminate Knowledge. Decision Analysis 10:4, pages 352-368.
Crossref
Elodie Adida, Debabrata Dey & Hamed Mamani. (2013) Operational issues and network effects in vaccine markets. European Journal of Operational Research 231:2, pages 414-427.
Crossref
Xing Gao, Weijun Zhong & Shue Mei. (2013) A game-theory approach to configuration of detection software with decision errors. Reliability Engineering & System Safety 119, pages 35-43.
Crossref
Naji Bricha & Mustapha Nourelfath. (2013) Critical supply network protection against intentional attacks: A game-theoretical model. Reliability Engineering & System Safety 119, pages 1-10.
Crossref
Jason Merrick & Gregory S. Parnell. (2011) A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management. Risk Analysis 31:9, pages 1488-1510.
Crossref
N. Haphuriwat & V.M. Bier. (2011) Trade-offs between target hardening and overarching protection. European Journal of Operational Research 213:1, pages 320-328.
Crossref
Kjell Hausken & Vicki M. Bier. (2011) Defending against multiple different attackers. European Journal of Operational Research 211:2, pages 370-384.
Crossref
James J. Cochran, Louis A. CoxJr.Jr., Pinar Keskinocak, Jeffrey P. Kharoufeh & J. Cole SmithJamie D. Lloyd & Jason R. W. Merrick. 2011. Wiley Encyclopedia of Operations Research and Management Science. Wiley Encyclopedia of Operations Research and Management Science.
James J. Cochran, Louis A. CoxJr.Jr., Pinar Keskinocak, Jeffrey P. Kharoufeh & J. Cole SmithVicki M. Bier. 2011. Wiley Encyclopedia of Operations Research and Management Science. Wiley Encyclopedia of Operations Research and Management Science.
Jason R. W. Merrick & Laura A. McLay. (2010) Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?. Decision Analysis 7:2, pages 155-171.
Crossref
Kjell Hausken. (2010) Defense and attack of complex and dependent systems. Reliability Engineering & System Safety 95:1, pages 29-42.
Crossref
William Nganje, Vicki Bier, Hoa Han & Lorna Zack. (2008) Models of Interdependent Security along the Milk Supply Chain. American Journal of Agricultural Economics 90:5, pages 1265-1271.
Crossref
Vicki M. Bier. 2007. Encyclopedia of Quantitative Risk Analysis and Assessment. Encyclopedia of Quantitative Risk Analysis and Assessment.
Jun Zhuang & Vicki M. Bier. (2007) Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort. Operations Research 55:5, pages 976-991.
Crossref
Kai A. Konrad & Florian Morath. (2022) How to Preempt Attacks in Multi-front Conflict with Limited Resources. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.