Showing 1 - 10 of 11
Persistent link: https://www.econbiz.de/10001713833
Persistent link: https://www.econbiz.de/10001713856
Persistent link: https://www.econbiz.de/10001919416
organizations when considering the tradeoff between secrecy and operational efficiency. We use elements from game theory and graph … theory to determine the `optimal' communication structure a covert network should adopt. Every covert organization faces the …
Persistent link: https://www.econbiz.de/10011092758
We investigate the equilibria of game theoretic models of network formation that are based on individual actions only.Our approach is grounded in three simple and realistic principles: (1) Link formation should be a binary process of consent.(2) Link formation should be costly.(3) The class of...
Persistent link: https://www.econbiz.de/10011090903
We consider game theoretic models of social network formation.In this paper we limit our investigation to game theoretic models of network formation that are based on individual actions only.Our approach is based on three simple and realistic principles: (1) Link formation is a binary process of...
Persistent link: https://www.econbiz.de/10011091118
Abstract: Lindelauf et al. (2009a) introduced a quantitative approach to investigate optimal structures of covert networks. This approach used an objective function which is based on the secrecy versus information trade-off these organizations face. Sageman (2008) hypothesized that covert...
Persistent link: https://www.econbiz.de/10011091475
Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper...
Persistent link: https://www.econbiz.de/10011091539
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10011091910
We consider the problem of control of access to a firm's productive asset, embedding the decision makers into a structure of formal authority relationships.Within such a structure, decision makers act as principal to some decision makers, while they act as agent to other decision makers.We study...
Persistent link: https://www.econbiz.de/10011091965