EconPapers    
Economics at your fingertips  
 

Details about Kjell Hausken

E-mail:
Homepage:http://www6.uis.no/ansatt/hausken/indexpublications.htm
Workplace:Institutt for Industriell Økonomi, Risikostyring og Planlegging (Department of Industrial Economics, Risk Management and Planning), Universitetet i Stavanger (University of Stavanger), (more information at EDIRC)

Access statistics for papers by Kjell Hausken.

Last updated 2021-05-05. Update your information in the RePEc Author Service.

Short-id: pha154


Jump to Journal Articles Books Edited books Chapters

Working Papers

2016

  1. Additive Multi-Effort Contests
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads
    See also Journal Article in Theory and Decision (2020)
  2. Axiomatization of Group Contest Success Functions
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads
  3. The Ranking of Researchers by Publications and Citations
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads View citations (1)

2015

  1. A Game-Theoretic Model with Empirics of Economic Crises
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads View citations (1)
  2. Policy-Makers, the International Community and People Living with HIV: The Need for New Commitment Mechanisms
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads

2014

  1. A Game Theoretic Model of Economic Crises
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads View citations (3)
    See also Journal Article in Applied Mathematics and Computation (2015)
  2. Game-Theoretic Perspectives on Financial Crises
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads
  3. Working Paper 195 - Inequality, Economic Growth, and Poverty in the Middle East and North Africa (MENA)
    Working Paper Series, African Development Bank Downloads View citations (99)

2013

  1. Quantitative easing, global economic crisis and market response
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads
  2. Working Paper 172 - Political Economy of Service Delivery: Monitoring versus Contestation
    Working Paper Series, African Development Bank Downloads
  3. Working Paper 173 - Production and Conflict in Risky Elections
    Working Paper Series, African Development Bank Downloads

2012

  1. Production and Conflict in Risky Elections
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads View citations (1)
  2. Strategic defense and attack for series and parallel reliability systems: reply to rejoinder
    MPRA Paper, University Library of Munich, Germany Downloads View citations (1)
    See also Journal Article in Defence and Peace Economics (2012)

2010

  1. An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units
    Economics Discussion Papers, Kiel Institute for the World Economy (IfW) Downloads
    Also in Public Economics, University Library of Munich, Germany (2004) Downloads

    See also Journal Article in Economics - The Open-Access, Open-Assessment E-Journal (2010)
  2. Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment
    MPRA Paper, University Library of Munich, Germany Downloads View citations (3)

2009

  1. Agent Takeover Risk of Principal in Outsourcing Relationships
    UiS Working Papers in Economics and Finance, University of Stavanger Downloads
    See also Journal Article in Global Business and Economics Review (2010)

2006

  1. A General Equilibrium Model of Signaling and Exchange
    Levine's Working Paper Archive, David K. Levine Downloads
  2. Widening versus Deepening of International Unions
    MPRA Paper, University Library of Munich, Germany Downloads View citations (4)

2005

  1. Truthful Signalling, The Heritability Paradox, and the Malthusian Equi-Marginal Principle
    UCLA Economics Working Papers, UCLA Department of Economics Downloads View citations (1)
    See also Journal Article in Theoretical Population Biology (2008)

2003

  1. The Truthful Signalling Hypothesis: An Economic Approach
    Levine's Working Paper Archive, David K. Levine Downloads View citations (2)
    Also in UCLA Economics Working Papers, UCLA Department of Economics (2002) Downloads View citations (3)

2002

  1. The Birth, Adjustment and Death of States
    Public Economics, University Library of Munich, Germany Downloads View citations (2)
  2. The Trilemma of the Protectionist Autocrat: An Assessment of the Political Determinants of Foreign Economic Liberalization
    MPRA Paper, University Library of Munich, Germany Downloads View citations (2)

1996

  1. Conflict, interest and strategy: A risk limit approach to conflict
    MPIfG Discussion Paper, Max Planck Institute for the Study of Societies Downloads View citations (1)
  2. Hegemons, leaders and followers: A game-theoretic approach to the postwar dynamics of international political economy
    MPIfG Discussion Paper, Max Planck Institute for the Study of Societies Downloads View citations (1)

Journal Articles

2021

  1. Government intervention to combat the dynamics of terrorist organizations
    Journal of the Operational Research Society, 2021, 72, (1), 217-226 Downloads
  2. Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency
    Games, 2021, 12, (2), 1-24 Downloads
  3. The Links between Business Environment, Economic Growth and Social Equity: A Study of African Countries
    Journal of African Business, 2021, 22, (1), 61-84 Downloads
  4. The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty
    Reliability Engineering and System Safety, 2021, 206, (C) Downloads

2020

  1. A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling
    Games, 2020, 11, (4), 1-26 Downloads
  2. Additive multi-effort contests
    Theory and Decision, 2020, 89, (2), 203-248 Downloads
    See also Working Paper (2016)
  3. Additive multi-effort contests with multiple investment opportunities
    Applied Economics Letters, 2020, 27, (1), 67-71 Downloads View citations (1)
  4. Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention
    International Journal of Strategic Decision Sciences (IJSDS), 2020, 11, (1), 56-75 Downloads View citations (1)
  5. Game theoretic analysis of ideologically biased clickbait or fake news and real news
    Operations Research and Decisions, 2020, 2, 39-57 Downloads
  6. Game theoretic analysis of persons, the pharmaceutical industry, and donors in disease contraction and recovery
    Palgrave Communications, 2020, 7, (1), 1-17 Downloads
  7. Governmental combat of migration between competing terrorist organisations
    Operations Research and Decisions, 2020, 3, 21-46 Downloads
  8. Modeling the evolution of countries and ethnic groups
    International Journal of Modern Physics C (IJMPC), 2020, 31, (01), 1-15 Downloads
  9. Strategic choices by the incumbent and challenger during revolution and civil war
    Economics of Peace and Security Journal, 2020, 15, (1), 58-81 Downloads
  10. The Shapley value of coalitions to other coalitions
    Palgrave Communications, 2020, 7, (1), 1-10 Downloads

2019

  1. A Game Theoretic Model of Adversaries and Media Manipulation
    Games, 2019, 10, (4), 1-15 Downloads View citations (1)
  2. Defence and attack of complex interdependent systems
    Journal of the Operational Research Society, 2019, 70, (3), 364-376 Downloads View citations (8)
  3. EVIDENCE ON THE IMPACT OF THE TROUBLED ASSETS RELIEF PROGRAM ON STOCK RETURNS
    The International Journal of Business and Finance Research, 2019, 13, (1), 1-30 Downloads
  4. EVIDENCE ON THE TROUBLED ASSETS RELIEF PROGRAM, BAILOUT SIZE, RETURNS AND TAIL RISK
    The International Journal of Business and Finance Research, 2019, 13, (2), 1-20 Downloads
  5. Governmental combat of the dynamics of multiple competing terrorist organizations
    Mathematics and Computers in Simulation (MATCOM), 2019, 166, (C), 33-55 Downloads View citations (3)
  6. Innovation, Development and National Indices
    Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, 2019, 141, (3), 1165-1188 Downloads View citations (1)
  7. Insurgent attacks, government protection, and international intervention
    International Journal of Development and Conflict, 2019, 9, (2), 142-175 Downloads
  8. Special versus general protection and attack of two assets
    Operations Research and Decisions, 2019, 4, 53-93 Downloads
  9. The dynamics of terrorist organizations
    Operations Research Perspectives, 2019, 6, (C) Downloads View citations (1)
  10. The incumbent, challenger, and population during revolution and civil war
    Economics of Peace and Security Journal, 2019, 14, (2), 32-41 Downloads

2018

  1. A cost–benefit analysis of terrorist attacks
    Defence and Peace Economics, 2018, 29, (2), 111-129 Downloads View citations (13)
  2. Formalizing the Precautionary Principle Accounting for Strategic Interaction, Natural Factors, and Technological Factors
    Risk Analysis, 2018, 38, (10), 2055-2072 Downloads View citations (3)
  3. Janet Tai Landa: Economic success of Chinese merchants in Southeast Asia: identity, ethnic cooperation and conflict: integrating the social sciences with evolutionary biology
    Journal of Bioeconomics, 2018, 20, (2), 251-256 Downloads
  4. Proactivity and Retroactivity of Firms and Information Sharing of Hackers
    International Game Theory Review (IGTR), 2018, 20, (01), 1-30 Downloads View citations (1)
  5. Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal
    African Development Review, 2018, 30, (2), 219-232 Downloads
  6. Service delivery weaknesses within education and healthcare: Applying empirics from Kenya, Uganda, Tanzania, and Senegal
    Review of Development Economics, 2018, 22, (1), 133-147 Downloads

2017

  1. Defense and attack for interdependent systems
    European Journal of Operational Research, 2017, 256, (2), 582-591 Downloads View citations (17)
  2. Exhaustive Classification and Review of Techniques and Research Program for Techniques for Skate Skiing, Classical Skiing, and Ski Mountaineering
    The Open Sports Sciences Journal, 2017, 10, (1), 160-178 Downloads
  3. Game Theoretic Modeling of Economic Systems and the European Debt Crisis
    Computational Economics, 2017, 49, (2), 177-226 Downloads View citations (2)
  4. Incumbent policy, benefits provision, and the triggering and spread of revolutionary uprisings
    Economics of Peace and Security Journal, 2017, 12, (1), 54-63 Downloads
  5. Information Sharing Among Cyber Hackers in Successive Attacks
    International Game Theory Review (IGTR), 2017, 19, (02), 1-33 Downloads View citations (3)
  6. New Economics Journals
    Journal of Economics Bibliography, 2017, 4, (1), 100-109 Downloads
  7. Policy makers, the international community and the population in the prevention and treatment of diseases: case study on HIV/AIDS
    Health Economics Review, 2017, 7, (1), 1-12 Downloads View citations (1)
  8. Security Investment, Hacking, and Information Sharing between Firms and between Hackers
    Games, 2017, 8, (2), 1-23 Downloads View citations (6)
  9. Special versus general protection and attack of parallel and series components
    Reliability Engineering and System Safety, 2017, 165, (C), 239-256 Downloads View citations (6)

2016

  1. Determining the ideological orientation of terrorist organisations: the effects of government repression and organised crime
    International Journal of Public Policy, 2016, 12, (1/2), 71-97 Downloads View citations (3)
  2. Gordon Tullock: A Nobel Prize left unbestowed
    Journal of Bioeconomics, 2016, 18, (2), 121-127 Downloads
  3. How Elections are Impacted by Production, Economic Growth and Conflict
    International Game Theory Review (IGTR), 2016, 18, (01), 1-29 Downloads
  4. How companies and governments react to disasters
    Journal of Risk and Reliability, 2016, 230, (4), 417-426 Downloads View citations (2)
  5. On the Effectiveness of Security Countermeasures for Critical Infrastructures
    Risk Analysis, 2016, 36, (4), 711-726 Downloads View citations (9)
  6. The Ranking of Researchers by Publications and Citations: Using RePEc Data
    Journal of Economics Bibliography, 2016, 3, (4), 530-558 Downloads View citations (2)
  7. The strategic interaction between a company and the government surrounding disasters
    Annals of Operations Research, 2016, 237, (1), 27-40 Downloads View citations (7)
    Also in Annals of Operations Research, 2016, 237, (1), 27-40 (2016) Downloads View citations (7)

2015

  1. A game theoretic model of economic crises
    Applied Mathematics and Computation, 2015, 266, (C), 738-762 Downloads View citations (2)
    See also Working Paper (2014)
  2. Al Qaeda at the bar: coordinating ideologues and mercenaries in terrorist organizations
    Public Choice, 2015, 164, (1), 57-73 Downloads View citations (4)
  3. Government protection against terrorism and crime
    Global Crime, 2015, 16, (2), 59-80 Downloads View citations (4)

2014

  1. Choosing what to protect when attacker resources and asset valuations are uncertain
    Operations Research and Decisions, 2014, 3, 23-44 Downloads View citations (11)
  2. Determinants of Election Outcomes: New Evidence from Africa
    African Development Review, 2014, 26, (4), 610-630 Downloads View citations (2)
  3. Individual versus overarching protection and attack of assets
    Central European Journal of Operations Research, 2014, 22, (1), 89-112 Downloads View citations (9)
  4. Inequality, Economic Growth and Poverty in the Middle East and North Africa (MENA)
    African Development Review, 2014, 26, (3), 435-453 Downloads View citations (107)
  5. Measuring patient participation in surgical treatment decision‐making from healthcare professionals' perspective
    Journal of Clinical Nursing, 2014, 23, (3-4), 482-491 Downloads
  6. Optimal defense with variable number of overarching and individual protections
    Reliability Engineering and System Safety, 2014, 123, (C), 81-90 Downloads View citations (14)
  7. Patient participation, decision‐makers and information flow in surgical treatment
    Journal of Clinical Nursing, 2014, 23, (9-10), 1430-1444 Downloads
  8. Political Economy of Service Delivery: Monitoring Versus Contestation
    The Developing Economies, 2014, 52, (1), 68-84 Downloads View citations (1)
  9. Returns to information security investment: Endogenizing the expected loss
    Information Systems Frontiers, 2014, 16, (2), 329-336 Downloads View citations (7)
  10. Two producing and trading agents defending and retaliating against terrorism
    International Journal of Engineering Management and Economics, 2014, 4, (2), 117-131 Downloads

2013

  1. A Qualitative Identification of Categories of Patient Participation in Decision-Making by Health Care Professionals and Patients During Surgical Treatment
    Clinical Nursing Research, 2013, 22, (2), 206-227 Downloads
  2. COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK
    Asia-Pacific Journal of Operational Research (APJOR), 2013, 30, (02), 1-33 Downloads View citations (5)
  3. Defence resource distribution between protection and decoys for constant resource stockpiling pace
    Journal of the Operational Research Society, 2013, 64, (9), 1409-1417 Downloads View citations (6)
  4. Defending and attacking a network of two arcs subject to traffic congestion
    Reliability Engineering and System Safety, 2013, 112, (C), 214-224 Downloads View citations (12)
  5. Defending majority voting systems against a strategic attacker
    Reliability Engineering and System Safety, 2013, 111, (C), 37-44 Downloads View citations (4)
  6. Exchange of goods while investing into production and safety
    Operations Research and Decisions, 2013, 1, 29-35 Downloads
  7. Individual vs. overarching protection for minimizing the expected damage caused by an attack
    Reliability Engineering and System Safety, 2013, 119, (C), 117-125 Downloads View citations (6)
  8. Is it wise to leave some false targets unprotected?
    Reliability Engineering and System Safety, 2013, 112, (C), 176-186 Downloads View citations (12)
  9. Models, phases and cases of patient participation in decision‐making in surgical treatment in Norway: A qualitative study
    Nursing & Health Sciences, 2013, 15, (1), 39-44 Downloads View citations (1)
  10. Parallel systems under two sequential attacks with contest intensity variation
    Central European Journal of Operations Research, 2013, 21, (1), 207-224 Downloads View citations (1)
  11. The impact of disaster on the strategic interaction between company and government
    European Journal of Operational Research, 2013, 225, (2), 363-376 Downloads View citations (18)
  12. The strategic interaction between the government and international oil companies in the UK: An example of a country with dwindling hydrocarbon reserves
    Energy Policy, 2013, 57, (C), 276-286 Downloads View citations (1)

2012

  1. Acquisition and collaboration as determinants of organisational structure
    International Journal of Integrated Supply Management, 2012, 7, (1/2/3), 3-37 Downloads
  2. Bilateral contracts with transaction costs
    International Journal of Management and Enterprise Development, 2012, 12, (1), 73-91 Downloads
  3. Data survivability vs. security in information systems
    Reliability Engineering and System Safety, 2012, 100, (C), 19-27 Downloads View citations (8)
  4. Fixed price contract versus incentive-based contract in the oil and gas industry
    International Journal of Global Energy Issues, 2012, 35, (5), 371-410 Downloads
  5. Individual versus overarching protection against strategic attacks
    Journal of the Operational Research Society, 2012, 63, (7), 969-981 Downloads View citations (11)
  6. Mathematical modelling of acute virus influenza A infections
    Mathematical and Computer Modelling of Dynamical Systems, 2012, 18, (5), 521-538 Downloads View citations (1)
  7. N-player costly contracting
    International Journal of Corporate Governance, 2012, 3, (1), 1-18 Downloads
  8. ON THE IMPOSSIBILITY OF DETERRENCE IN SEQUENTIAL COLONEL BLOTTO GAMES
    International Game Theory Review (IGTR), 2012, 14, (02), 1-13 Downloads View citations (2)
  9. On the inappropriateness of collective rent seeking analysis when agents exert within-group and between-group efforts
    Economics Letters, 2012, 116, (3), 504-507 Downloads View citations (6)
  10. Parallel systems under two sequential attacks with imperfect detection of the first attack outcome
    Journal of the Operational Research Society, 2012, 63, (11), 1545-1555 Downloads View citations (4)
  11. Patient Participation in Surgical Treatment Decision Making from the Patients' Perspective: Validation of an Instrument
    Nursing Research and Practice, 2012, 2012, 1-8 Downloads
  12. Production versus safety in a risky competitive industry
    International Journal of Decision Sciences, Risk and Management, 2012, 4, (1/2), 92-107 Downloads View citations (1)
  13. Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome
    Risk Analysis, 2012, 32, (2), 304-318 Downloads View citations (12)
  14. Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder
    Defence and Peace Economics, 2012, 23, (5), 517-519 Downloads
    See also Working Paper (2012)
  15. Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1
    Defence and Peace Economics, 2012, 23, (5), 525-531 Downloads View citations (3)
  16. Terrorism risks, civil liberties, and privacy concerns
    International Journal of Critical Infrastructures, 2012, 8, (4), 293-305 Downloads
  17. The economics of terrorism against two targets
    Applied Economics Letters, 2012, 19, (12), 1135-1138 Downloads View citations (3)
  18. The paradox and non-paradox of power for groups
    International Journal of Public Policy, 2012, 8, (4/5/6), 308-336 Downloads
  19. The timing and deterrence of terrorist attacks due to exogenous dynamics
    Journal of the Operational Research Society, 2012, 63, (6), 726-735 Downloads View citations (29)

2011

  1. "Service user involvement in practice": The evaluation of an intervention program for service providers and inpatients in Norwegian Community Mental Health Centers
    Psychosis, 2011, 3, (1), 29-40 Downloads View citations (1)
  2. ACTIVE VS. PASSIVE DEFENSE AGAINST A STRATEGIC ATTACKER
    International Game Theory Review (IGTR), 2011, 13, (01), 1-12 Downloads View citations (5)
  3. An equilibrium model of advertising, production and exchange
    International Journal of Economics and Business Research, 2011, 3, (4), 407-442 Downloads
  4. Defending Against a Stockpiling Terrorist
    The Engineering Economist, 2011, 56, (4), 321-353 Downloads View citations (6)
  5. Defending against multiple different attackers
    European Journal of Operational Research, 2011, 211, (2), 370-384 Downloads View citations (32)
  6. Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace
    Risk Analysis, 2011, 31, (10), 1632-1645 Downloads View citations (5)
  7. Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures
    Annals of Operations Research, 2011, 186, (1), 39-59 Downloads View citations (16)
  8. GAME THEORETIC ANALYSIS OF TWO-PERIOD-DEPENDENT DEGRADED MULTISTATE RELIABILITY SYSTEMS
    International Game Theory Review (IGTR), 2011, 13, (03), 247-267 Downloads
  9. Governments' and Terrorists' Defense and Attack in a T -Period Game
    Decision Analysis, 2011, 8, (1), 46-70 Downloads View citations (36)
  10. Inpatient service providers’ perspectives on service user involvement in Norwegian community mental health centres
    International Journal of Social Psychiatry, 2011, 57, (6), 551-563 Downloads
  11. Is it wise to protect false targets?
    Reliability Engineering and System Safety, 2011, 96, (12), 1647-1656 Downloads View citations (6)
  12. Preventive strike vs. false targets and protection in defense strategy
    Reliability Engineering and System Safety, 2011, 96, (8), 912-924 Downloads View citations (9)
  13. Production, safety, exchange, and risk
    International Journal of Business Continuity and Risk Management, 2011, 2, (4), 346-350 Downloads View citations (2)
  14. Production, safety, fighting, and risk
    International Journal of Business Continuity and Risk Management, 2011, 2, (4), 324-329 Downloads View citations (1)
  15. Protecting complex infrastructures against multiple strategic attackers
    International Journal of Systems Science, 2011, 42, (1), 11-29 Downloads View citations (26)
  16. Shield versus sword resource distribution in K-round duels
    Central European Journal of Operations Research, 2011, 19, (4), 589-603 Downloads View citations (6)
  17. Strategic defense and attack of series systems when agents move sequentially
    IISE Transactions, 2011, 43, (7), 483-504 Downloads View citations (12)
  18. Systematization of a set of closure techniques
    Theoretical Population Biology, 2011, 80, (3), 175-184 Downloads
  19. Transaction costs and iceberg costs
    Applied Economics Letters, 2011, 18, (1), 101-102 Downloads

2010

  1. A closure approximation technique for epidemic models
    Mathematical and Computer Modelling of Dynamical Systems, 2010, 16, (6), 555-574 Downloads View citations (1)
  2. Agent takeover risk of principal in outsourcing relationships
    Global Business and Economics Review, 2010, 12, (4), 329-340 Downloads View citations (4)
    See also Working Paper (2009)
  3. An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units
    Economics - The Open-Access, Open-Assessment E-Journal, 2010, 4, 1-38 Downloads
    See also Working Paper (2010)
  4. Defence and attack of systems with variable attacker system structure detection probability
    Journal of the Operational Research Society, 2010, 61, (1), 124-133 Downloads View citations (16)
  5. Defence of homogeneous parallel multi-state systems subject to two sequential attacks
    Journal of Risk and Reliability, 2010, 224, (3), 171-183 Downloads View citations (3)
  6. Defense and attack of complex and dependent systems
    Reliability Engineering and System Safety, 2010, 95, (1), 29-42 Downloads View citations (26)
  7. Evaluating Performance Training and Step Aerobics in Intervals
    International Journal of Performance Analysis in Sport, 2010, 10, (3), 279-294 Downloads
  8. Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems
    Reliability Engineering and System Safety, 2010, 95, (5), 565-572 Downloads View citations (4)
  9. Introducing Randomness into First-Order and Second-Order Deterministic Differential Equations
    Advances in Mathematical Physics, 2010, 2010, 1-42 Downloads
  10. Resource Distribution in Multiple Attacks Against a Single Target
    Risk Analysis, 2010, 30, (8), 1231-1239 Downloads View citations (23)
  11. Risk, price, and reimbursement
    International Journal of Decision Sciences, Risk and Management, 2010, 2, (1/2), 85-97 Downloads
  12. Risk, production and conflict when utilities are as if certain
    International Journal of Decision Sciences, Risk and Management, 2010, 2, (3/4), 228-251 Downloads View citations (8)
  13. Separation in homogeneous systems with independent identical elements
    European Journal of Operational Research, 2010, 203, (3), 625-634 Downloads View citations (7)
  14. Stochastic Theories and Deterministic Differential Equations
    Advances in Mathematical Physics, 2010, 2010, 1-29 Downloads
  15. User involvement in in‐patient mental health services: operationalisation, empirical testing, and validation
    Journal of Clinical Nursing, 2010, 19, (13‐14), 1897-1907 Downloads
  16. Whether to attack growing assets and enterprises today or tomorrow
    International Journal of Business Continuity and Risk Management, 2010, 1, (4), 339-362 Downloads

2009

  1. A MATHEMATICAL MODEL FOR TRAINING IMPULSE AND LACTATE INFLUX AND OUTFLUX DURING EXERCISE
    International Journal of Modern Physics C (IJMPC), 2009, 20, (01), 147-177 Downloads
  2. A dynamic model of Nordic diagonal stride skiing, with a literature review of cross country skiing
    Computer Methods in Biomechanics and Biomedical Engineering, 2009, 12, (5), 531-551 Downloads View citations (1)
  3. False targets efficiency in defense strategy
    European Journal of Operational Research, 2009, 194, (1), 155-162 Downloads View citations (30)
  4. False targets vs. redundancy in homogeneous parallel systems
    Reliability Engineering and System Safety, 2009, 94, (2), 588-595 Downloads View citations (12)
  5. Intelligence and Impact Contests in Systems with Fake Targets
    Defense & Security Analysis, 2009, 25, (2), 157-173 Downloads View citations (10)
  6. Intelligence and impact contests in systems with redundancy, false targets, and partial protection
    Reliability Engineering and System Safety, 2009, 94, (12), 1927-1941 Downloads View citations (15)
  7. Meeting a demand vs. enhancing protections in homogeneous parallel systems
    Reliability Engineering and System Safety, 2009, 94, (11), 1711-1717 Downloads View citations (9)
  8. Minmax defense strategy for complex multi-state systems
    Reliability Engineering and System Safety, 2009, 94, (2), 577-587 Downloads View citations (45)
  9. Parallel systems under two sequential attacks
    Reliability Engineering and System Safety, 2009, 94, (3), 763-772 Downloads View citations (15)
  10. Parallel systems with different types of defence resource expenditure under two sequential attacks
    Journal of Risk and Reliability, 2009, 223, (1), 71-85 Downloads View citations (5)
  11. Protection vs. false targets in series systems
    Reliability Engineering and System Safety, 2009, 94, (5), 973-981 Downloads View citations (29)
  12. Risk limits, conflict, and equilibrium selection in games with multiple equilibria
    International Journal of Decision Sciences, Risk and Management, 2009, 1, (1/2), 54-65 Downloads

2008

  1. Cross-country skiing motion equations, locomotive forces and mass scaling laws
    Mathematical and Computer Modelling of Dynamical Systems, 2008, 14, (6), 535-569 Downloads View citations (1)
  2. EXCHANGE, RAIDING, AND THE SHADOW OF THE FUTURE
    Defence and Peace Economics, 2008, 19, (2), 89-106 Downloads
  3. Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity
    Risk Analysis, 2008, 28, (5), 1477-1486 Downloads View citations (12)
  4. Protection vs. redundancy in homogeneous parallel systems
    Reliability Engineering and System Safety, 2008, 93, (10), 1444-1451 Downloads View citations (27)
  5. Strategic defense and attack for reliability systems
    Reliability Engineering and System Safety, 2008, 93, (11), 1740-1750 Downloads View citations (48)
  6. Strategic defense and attack for series and parallel reliability systems
    European Journal of Operational Research, 2008, 186, (2), 856-881 Downloads View citations (73)
  7. THE DYNAMIC BIOENERGY OF ANIMALS WITH A DIGESTIVE TRACT
    International Journal of Modern Physics C (IJMPC), 2008, 19, (02), 307-349 Downloads
  8. The dynamics of athletic performance, fitness and fatigue
    Mathematical and Computer Modelling of Dynamical Systems, 2008, 14, (6), 515-533 Downloads View citations (1)
  9. Truthful signalling, the heritability paradox, and the Malthusian equi-marginal principle
    Theoretical Population Biology, 2008, 73, (1), 11-23 Downloads View citations (2)
    See also Working Paper (2005)
  10. Whether to attack a terrorist's resource stock today or tomorrow
    Games and Economic Behavior, 2008, 64, (2), 548-564 Downloads View citations (21)

2007

  1. A first experimental test of multilevel game theory: the PD case
    Applied Economics Letters, 2007, 15, (4), 261-264 Downloads
  2. Book Review
    Theory and Decision, 2007, 62, (3), 303-309 Downloads
  3. Information sharing among firms and cyber attacks
    Journal of Accounting and Public Policy, 2007, 26, (6), 639-688 Downloads View citations (29)
  4. Reputation, incomplete information, and differences in patience in repeated games with multiple equilibria
    Economics Letters, 2007, 97, (2), 138-144 Downloads
  5. Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria
    Theory and Decision, 2007, 62, (2), 135-160 Downloads
  6. The dynamics of war between benign cells, malignant cells, and killer agents
    Mathematical and Computer Modelling of Dynamical Systems, 2007, 13, (2), 143-161 Downloads
  7. The impact of the future in games with multiple equilibria
    Economics Letters, 2007, 96, (2), 183-188 Downloads
  8. The population dynamics of potato cyst nematodes
    Ecological Modelling, 2007, 207, (2), 339-348 Downloads View citations (1)

2006

  1. Income, interdependence, and substitution effects affecting incentives for security investment
    Journal of Accounting and Public Policy, 2006, 25, (6), 629-665 Downloads View citations (46)
  2. Jack Hirshleifer: A Nobel Prize left unbestowed
    European Journal of Political Economy, 2006, 22, (2), 251-276 Downloads View citations (1)
  3. Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Information Systems Frontiers, 2006, 8, (5), 338-349 Downloads View citations (33)
  4. THE STABILITY OF ANARCHY AND BREAKDOWN OF PRODUCTION
    Defence and Peace Economics, 2006, 17, (6), 589-603 Downloads View citations (7)
  5. The choice of strategic core – impact of financial volume
    International Journal of Global Energy Issues, 2006, 26, (1/2), 136-157 Downloads View citations (9)

2005

  1. Approximations and empirics for stochastic war equations
    Naval Research Logistics (NRL), 2005, 52, (7), 682-700 Downloads View citations (2)
  2. Production and Conflict Models Versus Rent-Seeking Models
    Public Choice, 2005, 123, (1), 59-93 Downloads View citations (86)
  3. THE DYNAMICS OF BILATERAL EXCHANGE AND DIVISION OF LABOR
    International Journal of Modern Physics C (IJMPC), 2005, 16, (01), 117-137 Downloads View citations (1)
  4. THE DYNAMICS OF CRIME AND PUNISHMENT
    International Journal of Modern Physics C (IJMPC), 2005, 16, (11), 1701-1732 Downloads View citations (2)
  5. THE DYNAMICS OF MULTILATERAL EXCHANGE
    International Journal of Modern Physics C (IJMPC), 2005, 16, (04), 607-631 Downloads View citations (3)
  6. The battle of the sexes when the future is important
    Economics Letters, 2005, 87, (1), 89-93 Downloads View citations (6)

2004

  1. FORMALIZATION OF MULTI-LEVEL GAMES
    International Game Theory Review (IGTR), 2004, 06, (02), 195-221 Downloads View citations (2)
  2. Government Spending and Taxation in Democracies and Autocracies
    Constitutional Political Economy, 2004, 15, (3), 239-259 Downloads View citations (26)
  3. Mutual Raiding of Production and the Emergence of Exchange
    Economic Inquiry, 2004, 42, (4), 572-586 Downloads View citations (22)

2002

  1. Containing Contagious Financial Crises: The Political Economy of Joint Intervention into the Asian Crisis
    Public Choice, 2002, 111, (3-4), 209-36 Downloads View citations (15)
  2. Probabilistic Risk Analysis and Game Theory
    Risk Analysis, 2002, 22, (1), 17-27 Downloads View citations (34)
  3. Stochastic conditional and unconditional warfare
    European Journal of Operational Research, 2002, 140, (1), 61-87 Downloads View citations (10)

2001

  1. The value of a player in n-person games
    Social Choice and Welfare, 2001, 18, (3), 465-483 Downloads View citations (5)

2000

  1. Cooperation and between-group competition
    Journal of Economic Behavior & Organization, 2000, 42, (3), 417-425 Downloads View citations (18)
  2. Migration and intergroup conflict
    Economics Letters, 2000, 69, (3), 327-331 Downloads View citations (6)

1998

  1. Collective rent seeking and division of labor1
    European Journal of Political Economy, 1998, 14, (4), 739-768 Downloads View citations (5)
  2. The impact of actor heterogeneity on the provision of international public goods
    International Interactions, 1998, 25, (1), 61-94 Downloads

1997

  1. Game-theoretic and Behavioral Negotiation Theory
    Group Decision and Negotiation, 1997, 6, (6), 511-528 Downloads View citations (3)

1996

  1. Hegemonic Decline and International Leadership
    Politics & Society, 1996, 24, (3), 273-295 Downloads

1995

  1. Intra-Level and Inter-Level Interaction
    Rationality and Society, 1995, 7, (4), 465-488 Downloads View citations (2)
  2. The dynamics of within-group and between-group interaction
    Journal of Mathematical Economics, 1995, 24, (7), 655-687 Downloads View citations (24)

Books

2013

  1. Quantitative Easing and Its Impact in the US, Japan, the UK and Europe
    SpringerBriefs in Economics, Springer

Edited books

2015

  1. Game Theoretic Analysis of Congestion, Safety and Security
    Springer Series in Reliability Engineering, Springer
  2. Game Theoretic Analysis of Congestion, Safety and Security
    Springer Series in Reliability Engineering, Springer

Chapters

2020

  1. Blockchain Technology Adoption Decisions: Developed vs. Developing Economies
    Chapter 3 in Information for Efficient Decision Making Big Data, Blockchain and Relevance, 2020, pp 91-113 Downloads

2015

  1. A Leader–Follower Game on Congestion Management in Power Systems
    Springer
  2. Game-Theoretic Context and Interpretation of Kerner’s Three-Phase Traffic Theory
    Springer

2013

  1. Broader Economic Effects of Quantitative Easing
    Springer
  2. Conclusion
    Springer
  3. Introduction
    Springer
  4. The Central Bank Loss Function and Quantitative Easing as a Stackelberg Game
    Springer
  5. The Impact of Quantitative Easing on Interest Rates
    Springer
  6. Transmission Channels for QE and Effects on Interest Rates
    Springer

2009

  1. Defending Against Terrorism, Natural Disaster, and All Hazards
    Springer View citations (21)

Undated

  1. Game Theoretic Analysis of Standby Systems
    IntechOpen Downloads View citations (2)
 
Page updated 2021-05-08