300
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Shock and awe: the effects of disinformation in military confrontation

Pages 211-220 | Received 05 Jan 2012, Accepted 14 Aug 2013, Published online: 03 Mar 2014

References

  • Banerjee, A. 1992. “A Simple Model of Herd Behavior.” Quarterly Journal of Economics 107: 797–817. doi:10.2307/2118364.
  • Bikhchandani, S., D. Hirshleifer, and I. Welch. 1992. “A Theory of Fads, Fashion, Custom, and Cultural Change as Informational Cascades.” Journal of Political Economy 100: 992–1026. 10.1086/261849.
  • Clausewitz, C. V. 1968. On War, edited by A. Rapoport. London: Penguin Books.
  • Costa, D., and M. Kahn. 2003. “Cowards and Heroes: Group Loyalty in the American Civil War.” Quarterly Journal of Economics 118: 519–548. doi:10.1162/003355303321675446.
  • Fudenberg, D., and J. Tirole. 1986. “A ‘Signal-Jamming’ Theory of Predation.” Rand Journal of Economics 17: 366–376. doi:10.2307/2555717.
  • Gul, F., and R. Lundholm. 1995. “Endogenous Timing and the Clustering of Agents’ Decisions.” Journal of Political Economy 103: 1039–1066. doi:10.1086/262012.
  • Hendricks, K., and R. P. McAfee. 2006. “Feints.” Journal of Economics and Management Strategy 15: 431–56. doi:10.1111/j.1530-9134.2006.00106.x.
  • Kaplan, F. (2003): “The Flaw in Shock and Awe.” Slate, March 26.
  • Sun, Tzu. 1963. The Art of War. Translated by Samuel B. Griffith. Oxford: Oxford University Press.
  • Ullman, H., and J. Wade. 2003. Shock and Awe: Achieving Rapid Dominance. Indypublish. Indypublish.com.
  • Zhuang, J., and V. M. Bier. 2011. “Secrecy and Deception at Equilibrium, with Applications to Anti-Terrorism Resource Allocation.” Defence and Peace Economics 22: 43–61. doi:10.1080/10242694.2010.491668.
  • Zhuang, J., V. M. Bier, and O. Alagoz. 2010. “Modeling Secrecy and Deception in a Multiple-period Attacker-Defender Signaling Game.” European Journal of Operational Research 203: 409–418. doi:10.1016/j.ejor.2009.07.028.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.