Publication Cover
The Engineering Economist
A Journal Devoted to the Problems of Capital Investment
Volume 55, 2010 - Issue 2
143
Views
31
CrossRef citations to date
0
Altmetric
Original Articles

Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors

Pages 131-149 | Published online: 04 Jun 2010

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Magdalena Jażdżewska-Gutta & Przemysław Borkowski. (2022) As strong as the weakest link. Transport and supply chain security. Transport Reviews 42:6, pages 762-783.
Read now

Articles from other publishers (30)

Kjell Hausken. (2024) Fifty Years of Operations Research in Defense. European Journal of Operational Research.
Crossref
Xing Gao, Siyu Gong, Ying Wang, Xifan Wang & Manting Qiu. (2022) An economic analysis of information security decisions with mandatory security standards in resource sharing environments. Expert Systems with Applications 206, pages 117894.
Crossref
Xiaotong Li. (2021) An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform. Managerial and Decision Economics 43:3, pages 595-606.
Crossref
Fu Chaoqi, Gao Yangjun, Zhong Jilong, Sun Yun, Zhang Pengtao & Wu Tao. (2021) Attack-defense game for critical infrastructure considering the cascade effect. Reliability Engineering & System Safety 216, pages 107958.
Crossref
Fu Chaoqi, Zhang Pengtao, Zhou Lin, Gao Yangjun & Du Na. (2021) Camouflage strategy of a Stackelberg game based on evolution rules. Chaos, Solitons & Fractals 153, pages 111603.
Crossref
Xiaojun Gene Shan & Jun Zhuang. (2020) A game-theoretic approach to modeling attacks and defenses of smart grids at three levels. Reliability Engineering & System Safety 195, pages 106683.
Crossref
Qingqing Zhai, Rui Peng & Jun Zhuang. (2019) Defender–Attacker Games with Asymmetric Player Utilities. Risk Analysis 40:2, pages 408-420.
Crossref
Ha Hwang & JiYoung Park. 2019. Advances in Spatial and Economic Modeling of Disaster Impacts. Advances in Spatial and Economic Modeling of Disaster Impacts 399 421 .
Guang Zhu, Hu Liu & Mining Feng. (2018) An Evolutionary Game-Theoretic Approach for Assessing Privacy Protection in mHealth Systems. International Journal of Environmental Research and Public Health 15:10, pages 2196.
Crossref
Guang Zhu, Hu Liu & Mining Feng. (2018) Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach. Mathematics 6:10, pages 177.
Crossref
Seyed Alireza Hasheminasab & Behrouz Tork Ladani. (2018) Security Investment in Contagious Networks. Risk Analysis 38:8, pages 1559-1575.
Crossref
Peiqiu Guan, Jing Zhang, Vineet M. Payyappalli & Jun Zhuang. (2018) Modeling and Validating Public–Private Partnerships in Disaster Management. Decision Analysis 15:2, pages 55-71.
Crossref
Meilin He, Laura Devine & Jun Zhuang. (2017) Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach. Risk Analysis 38:2, pages 215-225.
Crossref
Xiaojun Shan & Jun Zhuang. 2017. Improving Homeland Security Decisions. Improving Homeland Security Decisions 678 708 .
. 2017. Improving Homeland Security Decisions. Improving Homeland Security Decisions.
Nobuyuki Takashima. (2017) International environmental agreements with ancillary benefits: Repeated games analysis. Economic Modelling 61, pages 312-320.
Crossref
Mostafa Sabbaghi, Sara Behdad & Jun Zhuang. (2016) Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach. International Journal of Production Economics 182, pages 545-563.
Crossref
Peiqiu Guan & Jun Zhuang. (2015) Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF. Risk Analysis 36:4, pages 776-791.
Crossref
Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang & David K. Y. Yau. (2015) Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models. Risk Analysis 36:4, pages 694-710.
Crossref
Chuan Xi Cai, Shu E Mei & Wei Jun Zhong. (2016) A game-theory approach to manage decision errors. MATEC Web of Conferences 44, pages 01016.
Crossref
Jie Xu & Jun Zhuang. (2014) Modeling costly learning and counter-learning in a defender-attacker game with private defender information. Annals of Operations Research 236:1, pages 271-289.
Crossref
Peiqiu Guan & Jun Zhuang. (2015) Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models. Decision Analysis 12:4, pages 173-189.
Crossref
Din?er Konur & Cihan H. Dagli. (2014) Military system of systems architecting with individual system contracts. Optimization Letters 9:8, pages 1749-1767.
Crossref
Xing Gao, Weijun Zhong & Shue Mei. (2013) Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers 17:2, pages 423-438.
Crossref
Elodie Adida, Debabrata Dey & Hamed Mamani. (2013) Operational issues and network effects in vaccine markets. European Journal of Operational Research 231:2, pages 414-427.
Crossref
Xing Gao, Weijun Zhong & Shue Mei. (2013) A game-theory approach to configuration of detection software with decision errors. Reliability Engineering & System Safety 119, pages 35-43.
Crossref
Xiaojun Shan & Jun Zhuang. (2013) Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game. European Journal of Operational Research 228:1, pages 262-272.
Crossref
Andrew Samuel & Seth D. Guikema. (2012) Resource Allocation for Homeland Defense: Dealing with the Team Effect. Decision Analysis 9:3, pages 238-252.
Crossref
Mohammad E. Nikoofal & Jun Zhuang. (2011) Robust Allocation of a Defensive Budget Considering an Attacker's Private Information. Risk Analysis 32:5, pages 930-943.
Crossref
Mohsen Golalikhani & Jun Zhuang. (2010) Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers. Risk Analysis 31:4, pages 533-547.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.