Showing 1 - 10 of 12
organizations when considering the tradeoff between secrecy and operational efficiency. We use elements from game theory and graph … theory to determine the `optimal' communication structure a covert network should adopt. Every covert organization faces the …
Persistent link: https://www.econbiz.de/10011092758
In a three player dynamic public goods experiment, social output today determines production possibilities tomorrow.In each period, players choose to sabotage, to co-operate, or to play best response.Sabotage harms social output and growth.Mutual co-operation maximises both.The property rights...
Persistent link: https://www.econbiz.de/10011090686
In an experimental study we examine a variant of the 'minimum effort game', a coordination game with Pareto ranked equilibria, and risk considerations pointing to the least efficient equilibrium.We focus on the question whether simple cues such as smiles, winks and handshakes could be recognized...
Persistent link: https://www.econbiz.de/10011090848
We investigate the equilibria of game theoretic models of network formation that are based on individual actions only.Our approach is grounded in three simple and realistic principles: (1) Link formation should be a binary process of consent.(2) Link formation should be costly.(3) The class of...
Persistent link: https://www.econbiz.de/10011090903
We consider game theoretic models of social network formation.In this paper we limit our investigation to game theoretic models of network formation that are based on individual actions only.Our approach is based on three simple and realistic principles: (1) Link formation is a binary process of...
Persistent link: https://www.econbiz.de/10011091118
Abstract: Lindelauf et al. (2009a) introduced a quantitative approach to investigate optimal structures of covert networks. This approach used an objective function which is based on the secrecy versus information trade-off these organizations face. Sageman (2008) hypothesized that covert...
Persistent link: https://www.econbiz.de/10011091475
Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper...
Persistent link: https://www.econbiz.de/10011091539
equilibrium play increases from 51% in the first to 74% in the last tournament, with the equilibria that maximize joint payoff …
Persistent link: https://www.econbiz.de/10011091650
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10011091910
We consider the problem of control of access to a firm's productive asset, embedding the decision makers into a structure of formal authority relationships.Within such a structure, decision makers act as principal to some decision makers, while they act as agent to other decision makers.We study...
Persistent link: https://www.econbiz.de/10011091965