Showing 1 - 10 of 211
This paper considers terrorism as an extortion activity. It uses tools from the theory of extortion and from conflict theory to describe how terrorism works, why terrorism is a persistent phenomenon, why terrorism is a violent phenomenon, and how retaliation affects the outcome. The analysis...
Persistent link: https://www.econbiz.de/10010306959
This paper considers terrorism as an extortion activity. It uses tools from the theory of extortion and from conflict theory to describe how terrorism works, why terrorism is a persistent phenomenon, why terrorism is a violent phenomenon, and how retaliation affects the outcome. The analysis...
Persistent link: https://www.econbiz.de/10009367924
Consider a committee that in the past has made a promise not confiscate the profits from a foreign investor. After the investment has taken place, there is a material benefit if the committee decides to default on the earlier promise. But there are also some small moral costs for those who vote...
Persistent link: https://www.econbiz.de/10014073310
This paper considers terrorism as an extortion activity. It uses tools from the theory of extortion and from conflict theory to describe how terrorism works, why terrorism is a persistent phenomenon, why terrorism is a violent phenomenon, and how retaliation affects the outcome. The analysis...
Persistent link: https://www.econbiz.de/10014178434
We consider campaign competition in which candidates compete for votes among a continuum of voters by engaging in persuasive efforts that are targetable. Each individual voter is persuaded by campaign effort and votes for the candidate who targets more persuasive effort to this voter. Each...
Persistent link: https://www.econbiz.de/10011657130
We consider campaign competition in which candidates compete for votes among a continuum of voters by engaging in persuasive efforts that are targetable. Each individual voter is persuaded by campaign effort and votes for the candidate who targets more persuasive effort to this voter. Each...
Persistent link: https://www.econbiz.de/10012956898
This paper studies the attack-and-defence game between a web user and a whole set of players over this user's ‘valuable secrets.' The number and type of these valuable secrets are the user's private information. Attempts to tap information as well as privacy protection are costly. The...
Persistent link: https://www.econbiz.de/10012870620
We examine an endogenous, sunk budget extension of Myerson's (1993) two-candidate model of political competition in which candidates simultaneously allocate an exogenous level of a use-it-or-lose-it persuasive advertising resource across a homogeneous electorate of unit measure. We completely...
Persistent link: https://www.econbiz.de/10013006110
We consider campaign competition in which candidates compete for votes among a continuum of voters by engaging in persuasive efforts that are targetable. Each individual voter is persuaded by campaign effort and votes for the candidate who targets more persuasive effort to this voter. Each...
Persistent link: https://www.econbiz.de/10011637583
We consider a two-candidate campaign competition in majoritarian systems with many voters. Some voters are loyal, some can be influenced by campaign spending. Own loyalty with respect to a candidate is the voter's private information. Candidates simultaneously choose their campaign budgets and...
Persistent link: https://www.econbiz.de/10011202937