EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Espionage"
Narrow search

Narrow search

Year of publication
Subject
All
Espionage 54 Spionage 54 espionage 31 Economic espionage 13 USA 13 Wirtschaftsspionage 13 Game theory 12 Spieltheorie 12 United States 12 Datensicherheit 10 Geheimdienst 10 Internet 10 Intelligence agency 9 Sowjetunion 9 Welt 9 World 9 Asymmetric information 8 Dienstleistung 7 EU 7 Feuerwehr 7 Polizei 7 R&D 7 Sicherheit 7 Sicherheitspolitik 7 Statistik 7 USSR 7 Unternehmen 7 auctions 7 collusion 7 data security 7 enterprise 7 fire brigade 7 internet 7 police 7 security 7 security policy 7 service 7 statistics 7 Economists 6 Incomplete information 6
more ... less ...
Online availability
All
Free 35 Undetermined 14
Type of publication
All
Book / Working Paper 69 Article 31
Type of publication (narrower categories)
All
Working Paper 20 Article in journal 19 Aufsatz in Zeitschrift 19 Arbeitspapier 14 Graue Literatur 13 Non-commercial literature 13 Article 2 Aufsatz im Buch 2 Book section 2 Collection of articles of several authors 2 Hochschulschrift 2 Sammelwerk 2 research-article 2 Amtsdruckschrift 1 Autobiografie 1 Bibliographie 1 Conference proceedings 1 Government document 1 Konferenzschrift 1 Quelle 1 Research Report 1 Thesis 1 review-article 1 viewpoint 1
more ... less ...
Language
All
English 74 Undetermined 14 German 9 French 2 Italian 1
Author
All
Fan, Cuihong 7 Fischer, Sven 6 Glitz, Albrecht 6 Kaplan, Todd R. 6 Meyersson, Erik 6 Barrachina, Alex 5 Boughton, James M. 5 Güth, Werner 5 Tauman, Yair 5 Solan, Eilon 4 Wolfstetter, Elmar 4 Yariv, Leeat 4 Zultan, Ro'i 4 Chŏn, Pyŏng-hŏn 3 Jun, Byoung Heon 3 Wolfstetter, Elmar G. 3 Guth, Werner 2 Ho, Shirley J. 2 Ro'i Zultan 2 Salvador, Amparo Urbano 2 Sandilands, Roger J. 2 Thranov, Asbjørn 2 Aaronson, Susan Ariel 1 Aghion, Philippe 1 Altmann, Ludwig 1 Anning, Nick 1 Antonin, Céline 1 Archibald, James F. J. 1 Bagchi, Aniruddha 1 Bandyopadhyay, Tridib 1 Barton, Laurence 1 Berkowitz, Daniel M. 1 Bothmer, Felix von 1 Brandmeier, Rupert A. 1 Chen, Po-Lu 1 Chun, Yongtae 1 Clerc, Philippe 1 Cooper, H. H. A. 1 Corson, William R. 1 Crowley, Robert T. 1
more ... less ...
Institution
All
DECISION 7 Ecorys 7 Europäische Kommission / Generaldirektion Migration und Inneres 7 TNO 7 Estructura de Recerca Interdisciplinar Comportament Econòmic i Social (ERI-CES), Universidad de València 2 Center for Mathematical Studies in Economics and Management Science (CMS-EMS), Kellogg Graduate School of Management 1 Economics Department, Ben Gurion University of the Negev 1 Economics Department, State University of New York-Stony Brook (SUNY) 1 Faculteit Economie en Bedrijfskunde, Universiteit Gent 1 Frankreich / Commissariat Général du Plan 1 Institute on Global Conflict and Cooperation, University of California 1 Volkswirtschaftliche Fakultät, Ludwig-Maximilians-Universität München 1 Wirtschaftswissenschaftliche Fakultät, Friedrich-Schiller-Universität Jena 1
more ... less ...
Published in...
All
Defence and peace economics 3 Jena Economic Research Papers 3 CESifo Working Paper 2 CESifo working papers 2 Comparative economic studies 2 Discussion Papers in Economic Behaviour 2 Games and economic behavior 2 History of political economy 2 Jena economics research papers 2 (Miscellaneous 1 A penguin handbook 1 Accounting, Auditing & Accountability Journal 1 Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series 1 Barcelona GSE working paper series : working paper 1 China-focused cases : selected winners of the CEIBS global case contest 1 Corporate reputation review 1 DIIS Report 1 DIIS reports 1 Decision analysis : a journal of the Institute for Operations Research and the Management Sciences, INFORMS 1 Department of Economics Working Papers / Economics Department, State University of New York-Stony Brook (SUNY) 1 Discussion Paper 1 Discussion Papers / Center for Mathematical Studies in Economics and Management Science (CMS-EMS), Kellogg Graduate School of Management 1 Discussion paper 1 Discussion paper / Center for Mathematical Studies in Economics and Management Science, Northwestern University 1 Discussion paper series / IZA 1 Economic Theory Bulletin 1 Economic theory bulletin 1 GIGA working papers 1 Games and Economic Behavior 1 Handbook of the international political economy of trade 1 History of Political Economy 1 Homo oeconomicus 1 I libri d'oggi 1 IMF Working Paper, Vol. , pp. 1-21, 2000 1 IMF working paper 1 IMF working papers 1 IZA Discussion Papers 1 Institute on Global Conflict and Cooperation, Working Paper Series 1 International Journal of Game Theory 1 International Journal of Law and Management 1
more ... less ...
Source
All
ECONIS (ZBW) 64 RePEc 12 EconStor 9 ArchiDok 7 Other ZBW resources 5 USB Cologne (EcoSocSci) 3
Showing 1 - 50 of 100
Cover Image
Social learning and reputation management in an espionage crisis
Kuoppakangas, Päivikki; Hagman, Sirkka; Stenvall, Jari; … - In: Corporate reputation review 27 (2024) 4, pp. 271-282
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015186225
Saved in:
Cover Image
Cyber espionage: How the competition for intelligence challenges international law
Thranov, Asbjørn - 2023
Cyber espionage has become a common method for states to gather confidential information in cyberspace. The vast interconnectedness of the Internet provides a target-rich environment for states to engage in low-risk collection of large amounts of data at an unprecedented speed and scale. Cyber...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014577237
Saved in:
Cover Image
Cyber espionage : how the competition for intelligence challenges international law
Thranov, Asbjørn - 2023
Cyber espionage has become a common method for states to gather confidential information in cyberspace. The vast interconnectedness of the Internet provides a target-rich environment for states to engage in low-risk collection of large amounts of data at an unprecedented speed and scale. Cyber...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014426371
Saved in:
Cover Image
Price leadership, spying, and secret price changes : a Stackelberg game with imperfect commitment
Fan, Cuihong; Chŏn, Pyŏng-hŏn; Wolfstetter, Elmar - In: International journal of game theory 52 (2023) 3, pp. 775-804
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014381843
Saved in:
Cover Image
Spying and imperfect commitment in first-price auctions : a case of tacit collusion
Fan, Cuihong; Chŏn, Pyŏng-hŏn; Wolfstetter, Elmar - In: Economic theory bulletin 11 (2023) 2, pp. 255-275
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014369284
Saved in:
Cover Image
Spying and imperfect commitment in first-price auctions: a case of tacit collusion
Fan, Cuihong; Jun, Byoung Heon; Wolfstetter, Elmar G. - In: Economic Theory Bulletin 11 (2023) 2, pp. 255-275
We analyze Stackelberg leadership in a first-price auction. Leadership is induced by an information system, represented by a spy, that leaks one bidder’s bid before others choose their bids. However, the leader may secretly revise his bid with some probability; therefore, the leaked bid is...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015327705
Saved in:
Cover Image
Price leadership, spying, and secret price changes: a Stackelberg game with imperfect commitment
Fan, Cuihong; Jun, Byoung Heon; Wolfstetter, Elmar G. - In: International Journal of Game Theory 52 (2023) 3, pp. 775-804
We analyze price leadership in a Stackelberg game with incomplete information and imperfect commitment. Sequential play is induced by an information system, represented by a spy, that reports the price of one firm to its rival before the latter chooses its own price. However, the Stackelberg...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015327890
Saved in:
Cover Image
Contest copycats : adversarial duplication of effort in contests
Send, Jonas - In: Defence and peace economics 34 (2023) 5, pp. 684-703
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014321362
Saved in:
Cover Image
Does Chinese research hinge on US co-authors? : evidence from the China initiative
Aghion, Philippe; Antonin, Céline; Paluskiewicz, Luc; … - 2023
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014326985
Saved in:
Cover Image
Disinformation, influence, and hybrid threats : thoughts from Singapore
Shashi Jayakumar - In: Oxford review of economic policy 40 (2024) 2, pp. 405-425
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015045311
Saved in:
Cover Image
Strategic Leaks in First-Price Auctions and Tacit Collusion: The Case of Spying and Counter-Spying
Fan, Cuihong; Jun, Byoung Heon; Wolfstetter, Elmar G. - 2021
We analyze strategic leaks due to spying out a rival’s bid in a first-price auction. Such leaks induce sequential bidding, complicated by the fact that the spy may be a counterspy who serves the interests of the spied at bidder and reports strategically distorted information. This ambiguity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012582084
Saved in:
Cover Image
Strategic leaks in first-price auctions and tacit collusion : the case of spying and counter-spying
Fan, Cuihong; Chŏn, Pyŏng-hŏn; Wolfstetter, Elmar - 2021
We analyze strategic leaks due to spying out a rival’s bid in a first-price auction. Such leaks induce sequential bidding, complicated by the fact that the spy may be a counterspy who serves the interests of the spied at bidder and reports strategically distorted information. This ambiguity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012507333
Saved in:
Cover Image
The Case Against Harry Dexter White Still Not Proven
Boughton, James M. - 2021
Harry Dexter White, the principal architect of the international financial system established at the end of the Second World War, was arguably the most important U. S. government economist of the 20th century. His reputation, however, has suffered because of allegations that he spied for the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013317836
Saved in:
Cover Image
Trusting a double agent
Grant, William C. - In: Defence and peace economics 32 (2021) 8, pp. 941-955
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012802242
Saved in:
Cover Image
Harry White and the American creed : how a federal bureaucrat created the modern global economy (and failed to get the credit)
Boughton, James M. - 2021
Prologue : The missing legacy -- PART I: BECOMING HARRY DEXTER WHITE. 1. Who--really--was Harry White? -- 2. The education of Harry White -- 3. A brief academic career -- PART II: BECOMING A KEYNESIAN INTERNATIONALIST. 4. What next? Dr. White goes to Washington -- 5. Settling into Morgenthau's...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013448984
Saved in:
Cover Image
Industrial Espionage and Productivity
Glitz, Albrecht; Meyersson, Erik - 2017
In this paper, we investigate the economic returns to industrial espionage by linking information from East Germany’s foreign intelligence service to sector-specific gaps in total factor productivity (TFP) between West and East Germany. Based on a dataset that comprises the entire flow of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011698692
Saved in:
Cover Image
Industrial Espionage and Productivity
Glitz, Albrecht; Meyersson, Erik - 2017
In this paper, we investigate the economic returns to industrial espionage by linking information from East Germany's foreign intelligence service to sector-specific gaps in total factor productivity (TFP) between West and East Germany. Based on a dataset that comprises the entire flow of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011744528
Saved in:
Cover Image
Auctions and leaks: A theoretical and experimental investigation
Fischer, Sven; Güth, Werner; Kaplan, Todd R.; Zultan, Ro'i - 2017
In first- and second-price private value auctions with sequential bidding, second movers may discover the first movers' bid. Equilibrium behavior in the first-price auction is mostly unaffected but there are multiple equilibria in the second- price auction. Consequently, comparative statics...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011788770
Saved in:
Cover Image
Industrial espionage and productivity
Glitz, Albrecht; Meyersson, Erik - 2017
In this paper, we investigate the economic returns to industrial espionage by linking information from East Germany's foreign intelligence service to sector-specific gaps in total factor productivity (TFP) between West and East Germany. Based on a dataset that comprises the entire flow of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011665623
Saved in:
Cover Image
Industrial espionage and productivity
Glitz, Albrecht; Meyersson, Erik - 2017
In this paper, we investigate the economic returns to industrial espionage by linking information from East Germany's foreign intelligence service to sector-specific gaps in total factor productivity (TFP) between West and East Germany. Based on a dataset that comprises the entire flow of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011670848
Saved in:
Cover Image
Auctions and leaks : a theoretical and experimental investigation
Fischer, Sven; Güth, Werner; Kaplan, Todd R.; Zultan, Ro'i - 2017 - Revised Version of JERP 2014-027
In first- and second-price private value auctions with sequential bidding, second movers may discover the first movers’ bid. Equilibrium behavior in the first-price auction is mostly unaffected but there are multiple equilibria in the second- price auction. Consequently, comparative statics...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011738563
Saved in:
Cover Image
Industrial espionage and productivity
Glitz, Albrecht; Meyersson, Erik - 2017 - This version: November 2017
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011777982
Saved in:
Cover Image
Industrial espionage and productivity
Glitz, Albrecht; Meyersson, Erik - 2017
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011801340
Saved in:
Cover Image
Bertrand Market Games with Espionage under Incomplete Information
Fan, Cuihong - 2017
We analyze the effect of espionage on pricing in a Bertrand market with substitutes. We explain why incomplete information is essential for a robust espionage equilibrium. Yet, under incomplete information espionage is not always profitable (the second-mover advantage may vanish) and we provide...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012960763
Saved in:
Cover Image
Huawei's quest for global markets
Muralidhara, G. V.; Faheem, Hadiya - In: China-focused cases : selected winners of the CEIBS …, (pp. 65-80). 2019
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012004031
Saved in:
Cover Image
Auctions and leaks: A theoretical and experimental investigation
Fischer, Sven; Güth, Werner; Kaplan, Todd R.; Zultan, Ro'i - 2014
We study first- and second-price private value auctions with sequential bidding where second movers may discover the first movers bids. There is a unique equilibrium in the first-price auction and multiple equilibria in the second-price auction. Consequently, comparative statics across price...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010500151
Saved in:
Cover Image
Auctions and Leaks: A Theoretical and Experimental Investigation
Fischer, Sven; Guth, Werner; Kaplan, Todd; Zultan, Roi - Volkswirtschaftliche Fakultät, … - 2014
We study first- and second-price private value auctions with sequential bidding where second movers may discover the first movers bids. There is a unique equilibrium in the first-price auction and multiple equilibria in the second-price auction. Consequently, comparative statics across price...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011112622
Saved in:
Cover Image
Entry with Two Correlated Signals
Barrachina, Alex; Tauman, Yair; Salvador, Amparo Urbano - Estructura de Recerca Interdisciplinar Comportament … - 2014
We analyze the effect of industrial espionage on limit-pricing models. We consider an incumbent monopolist engaged in R&D trying to reduce his cost of production and deter a potential entrant from entering the market. The R&D project may be successful or not and its outcome is a private...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010960301
Saved in:
Cover Image
Auctions and leaks : a theoretical and experimental investigation
Fischer, Sven Heiko; Güth, Werner; Kaplan, Todd R.; … - 2014 - This version: November 5, 2014
We study first- and second-price private value auctions with sequential bidding where second movers may discover the first movers bids. There is a unique equilibrium in the first-price auction and multiple equilibria in the second-price auction. Consequently, comparative statics across price...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010433909
Saved in:
Cover Image
Entry and espionage with noisy signals
Barrachina, Alex; Tauman, Yair; Salvador, Amparo Urbano - Estructura de Recerca Interdisciplinar Comportament … - 2013
We analyze industrial espionage in the context of entry deterrence. We consider a monopoly incumbent, who may expand capacity to deter entry, and a potential entrant who owns an inaccurate Intelligence System. The Intelligence System generates a noisy signal on incumbent’s actions and the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010616810
Saved in:
Cover Image
Better Security and Encryption Within Cloud Computing Systems
Williams, K.Y.B.; Griffin, Jimmy A.G. - In: International Journal of Public Administration in the … 5 (2018) 2, pp. 1-11
Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012047053
Saved in:
Cover Image
Role of intelligence inputs in defending against cyber warfare and cyberterrorism
Bagchi, Aniruddha; Bandyopadhyay, Tridib - In: Decision analysis : a journal of the Institute for … 15 (2018) 3, pp. 174-193
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011920732
Saved in:
Cover Image
Protecting Research and Technology from Espionage
THORLEUCHTER, D.; POEL, D. VAN DEN - Faculteit Economie en Bedrijfskunde, Universiteit Gent - 2012
In recent years, governmental and industrial espionage becomes an increased problem for governments and corporations. Especially information about current technology development and research activities are interesting targets for espionage. Thus, we introduce a new and automated methodology that...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011083097
Saved in:
Cover Image
Industrial Espionage with a Noisy Intelligence
Tauman, Yair; Barrachina, Alex - Economics Department, State University of New … - 2012
We analyze industrial espionage in a model of two firms: a monopoly incumbent, M, and a potential entrant, E, who owns a noisy intelligence system (IS) of a certain precision a . The IS generates a signal on M’s action and E decides whether or not to enter based on this signal. We show that if...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011207067
Saved in:
Cover Image
Protecting research and technology from espionage
Thorleuchter, Dirk; Van den Poel, Dirk - 2012
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009713369
Saved in:
Cover Image
Seeing from above : the geopolitics of satellite vision and North Korea
Shim, David - 2012
Satellite imagery plays an important role in contemporary geopolitics. Arguably the most well-known example is Colin Powell's (in)famous presentation to the UN Security Council in February 2003, during which he used satellite pictures to legitimate the invasion of Iraq. Satellite photographs...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009573013
Saved in:
Cover Image
National security and counterintelligence in the era of cyber espionage
Silva, Eugenie de (ed.) - 2016
"This book highlights technological advancements in intelligence systems and law enforcement in relation to cybercrime and reconnaissance issues, focusing on current and emergent threats to national security, as well as the technological advancements being adopted within the intelligence...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011728384
Saved in:
Cover Image
Cross-country economic espionage and investment in research and development
Chen, Po-Lu - In: International journal of economics and finance 8 (2016) 4, pp. 146-155
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011456803
Saved in:
Cover Image
China’s Defense Electronics Industry: Innovation, Adaptation, and Espionage
Mulvenon, James; Luce, Matthew - Institute on Global Conflict and Cooperation, … - 2010
Contrary to popular perceptions of China as either “technology thief†or “technology superpower,†the success of the Chinese defense electronics sector can be attributed to a combination of indigenous innovation, adaptation of foreign technology, and large-scale technology...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011131740
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: Germany
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011799442
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: Spain
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011799443
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: France
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011799444
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: Italy
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011799445
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: Poland
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011799446
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: United Kingdom
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011799447
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Final Report
Ecorys - 2015
In light of the challenges and needs, this study was launched with the overall aim to contribute to the development of statistical data that provide a clear picture of the technological and industrial base of the security industry in the EU. At the same time, the study has also served to...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011799450
Saved in:
Cover Image
AUCTIONS AND LEAKS: A THEORETICAL AND EXPERIMENTAL INVESTIGATION
Fischer, Sven; Guth, Werner; Kaplan, Todd R.; Ro'i Zultan - Economics Department, Ben Gurion University of the Negev - 2014
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011095610
Saved in:
Cover Image
Entry and espionage with noisy signals
Barrachina, Alex; Tauman, Yair; Urbano, Amparo - In: Games and Economic Behavior 83 (2014) C, pp. 127-146
We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011049669
Saved in:
Cover Image
Auctions and Leaks: A Theoretical and Experimental Investigation
Fischer, Sven; Güth, Werner; Kaplan, Todd R.; Ro'i Zultan - Wirtschaftswissenschaftliche Fakultät, … - 2014
We study first- and second-price private value auctions with sequential bidding where second movers may discover the first movers bids. There is a unique equilibrium in the first-price auction and multiple equilibria in the second-price auction. Consequently, comparative statics across price...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010961052
Saved in:
Cover Image
Entry and espionage with noisy signals
Barrachina, Alex; Tauman, Yair; Urbano Salvador, Amparo - In: Games and economic behavior 83 (2014), pp. 127-146
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010473519
Saved in:
  • 1
  • 2
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...