Showing 1 - 10 of 42,935
Persistent link: https://www.econbiz.de/10010231692
Persistent link: https://www.econbiz.de/10009788613
efforts in the two periods, depending on asset valuations, asset growth, time discounting, and contest intensities, and when …
Persistent link: https://www.econbiz.de/10012432466
Persistent link: https://www.econbiz.de/10015047903
This paper addresses a complex problem of finding optimal or suboptimal strategies and business decisions of (1) entrepreneurs, inventors, innovators, and other “economic actors” who are engaged, or want and can be engaged, in innovation activities, and (2) policymakers who want to secure...
Persistent link: https://www.econbiz.de/10010993801
Persistent link: https://www.econbiz.de/10011879355
Persistent link: https://www.econbiz.de/10011754562
sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more … attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two … hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information …
Persistent link: https://www.econbiz.de/10011708862
Persistent link: https://www.econbiz.de/10011970030
Persistent link: https://www.econbiz.de/10003387197