EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Research Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Espionage"
Narrow search

Narrow search

Year of publication
Subject
All
Spionage 51 Espionage 44 espionage 26 Economic espionage 12 USA 12 Wirtschaftsspionage 12 Geheimdienst 11 United States 11 Datensicherheit 10 Intelligence agency 10 Sowjetunion 10 Internet 9 USSR 8 Asymmetric information 7 Dienstleistung 7 EU 7 Feuerwehr 7 Game theory 7 Polizei 7 R&D 7 Sicherheit 7 Sicherheitspolitik 7 Spieltheorie 7 Statistik 7 Unternehmen 7 Welt 7 World 7 auctions 7 collusion 7 data security 7 enterprise 7 fire brigade 7 internet 7 police 7 security 7 security policy 7 service 7 statistics 7 Economists 5 Frankreich 5
more ... less ...
Online availability
All
Free 25 Undetermined 9
Type of publication
All
Book / Working Paper 63 Article 20
Type of publication (narrower categories)
All
Working Paper 17 Article in journal 14 Aufsatz in Zeitschrift 14 Arbeitspapier 11 Graue Literatur 11 Non-commercial literature 11 Aufsatz im Buch 2 Book section 2 Collection of articles of several authors 2 Hochschulschrift 2 Sammelwerk 2 Amtsdruckschrift 1 Bibliographie 1 Conference proceedings 1 Government document 1 Konferenzschrift 1 Thesis 1
more ... less ...
Language
All
English 60 Undetermined 14 German 6 French 2 Italian 1
Author
All
Fischer, Sven 6 Glitz, Albrecht 6 Kaplan, Todd R. 6 Meyersson, Erik 6 Barrachina, Alex 5 Güth, Werner 5 Tauman, Yair 5 Boughton, James M. 4 Solan, Eilon 4 Yariv, Leeat 4 Zultan, Ro'i 4 Corson, William R. 2 Crowley, Robert T. 2 Fan, Cuihong 2 Guth, Werner 2 Ho, Shirley J. 2 Ro'i Zultan 2 Salvador, Amparo Urbano 2 Sandilands, Roger J. 2 Aaronson, Susan Ariel 1 Altmann, Ludwig 1 Anning, Nick 1 Archibald, James F. J. 1 Bagchi, Aniruddha 1 Bandyopadhyay, Tridib 1 Berkowitz, Daniel Michael 1 Bothmer, Felix von 1 Brandmeier, Rupert A. 1 Chen, Po-Lu 1 Chun, Yongtae 1 Chŏn, Pyŏng-hŏn 1 Clerc, Philippe 1 Cooper, H. H. A. 1 Dallin, David J. 1 Du Moulin-Eckart, Karl 1 Faheem, Hadiya 1 Fischer, Sven Heiko 1 Grant, William C. 1 Gray, Ezio Maria 1 Griffin, Jimmy A.G. 1
more ... less ...
Institution
All
DECISION 7 Ecorys 7 Europäische Kommission / Generaldirektion Migration und Inneres 7 TNO 7 Estructura de Recerca Interdisciplinar Comportament Econòmic i Social (ERI-CES), Universidad de València 2 Center for Mathematical Studies in Economics and Management Science (CMS-EMS), Kellogg Graduate School of Management 1 Economics Department, Ben Gurion University of the Negev 1 Economics Department, State University of New York-Stony Brook (SUNY) 1 Faculteit Economie en Bedrijfskunde, Universiteit Gent 1 Frankreich / Commissariat Général du Plan 1 Frankreich / Groupe Intelligence Economique et Stratégie des Entreprises 1 Institute on Global Conflict and Cooperation, University of California 1 Volkswirtschaftliche Fakultät, Ludwig-Maximilians-Universität München 1 Wirtschaftswissenschaftliche Fakultät, Friedrich-Schiller-Universität Jena 1
more ... less ...
Published in...
All
Jena Economic Research Papers 3 CESifo Working Paper 2 CESifo working papers 2 Comparative economic studies 2 Defence and peace economics 2 Discussion Papers in Economic Behaviour 2 Games and economic behavior 2 History of political economy 2 Jena economic research papers 2 (Miscellaneous 1 A penguin handbook 1 Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series 1 Barcelona GSE working paper series : working paper 1 China-focused cases : selected winners of the CEIBS global case contest 1 Decision analysis : a journal of the Institute for Operations Research and the Management Sciences, INFORMS 1 Department of Economics Working Papers / Economics Department, State University of New York-Stony Brook (SUNY) 1 Discussion Paper 1 Discussion Papers / Center for Mathematical Studies in Economics and Management Science (CMS-EMS), Kellogg Graduate School of Management 1 Discussion paper / Center for Mathematical Studies in Economics and Management Science, Northwestern University 1 Discussion paper series / IZA 1 GIGA working papers 1 Games and Economic Behavior 1 Handbook of the international political economy of trade 1 History of Political Economy 1 Homo oeconomicus 1 I libri d'oggi 1 IMF Working Paper, Vol. , pp. 1-21, 2000 1 IMF working paper 1 IZA Discussion Papers 1 Institute on Global Conflict and Cooperation, Working Paper Series 1 International Journal of Public Administration in the Digital Age (IJPADA) 1 International journal of economic behavior and organization : IJEBO 1 International journal of economics and finance 1 Journal of Economics 1 Journal of economics 1 Le grand jeu 1 MPRA Paper 1 Post-soviet affairs 1 Praeger special studies / Praeger scientific 1 Schriften des Europa-Instituts der Universität des Saarlandes - Rechtswissenschaft 1
more ... less ...
Source
All
ECONIS (ZBW) 54 RePEc 12 ArchiDok 7 EconStor 6 USB Cologne (EcoSocSci) 3 Other ZBW resources 1
Showing 1 - 50 of 83
Cover Image
Strategic Leaks in First-Price Auctions and Tacit Collusion: The Case of Spying and Counter-Spying
Fan, Cuihong; Jun, Byoung Heon; Wolfstetter, Elmar G. - 2021
We analyze strategic leaks due to spying out a rival’s bid in a first-price auction. Such leaks induce sequential bidding, complicated by the fact that the spy may be a counterspy who serves the interests of the spied at bidder and reports strategically distorted information. This ambiguity...
Persistent link: https://ebtypo.dmz1.zbw/10012582084
Saved in:
Cover Image
Strategic leaks in first-price auctions and tacit collusion : the case of spying and counter-spying
Fan, Cuihong; Chŏn, Pyŏng-hŏn; Wolfstetter, Elmar - 2021
We analyze strategic leaks due to spying out a rival’s bid in a first-price auction. Such leaks induce sequential bidding, complicated by the fact that the spy may be a counterspy who serves the interests of the spied at bidder and reports strategically distorted information. This ambiguity...
Persistent link: https://ebtypo.dmz1.zbw/10012507333
Saved in:
Cover Image
The Case Against Harry Dexter White Still Not Proven
Boughton, James M. - 2021
Harry Dexter White, the principal architect of the international financial system established at the end of the Second World War, was arguably the most important U. S. government economist of the 20th century. His reputation, however, has suffered because of allegations that he spied for the...
Persistent link: https://ebtypo.dmz1.zbw/10013317836
Saved in:
Cover Image
Trusting a double agent
Grant, William C. - In: Defence and peace economics 32 (2021) 8, pp. 941-955
Persistent link: https://ebtypo.dmz1.zbw/10012802242
Saved in:
Cover Image
Harry White and the American creed : how a federal bureaucrat created the modern global economy (and failed to get the credit)
Boughton, James M. - 2021
Prologue : The missing legacy -- PART I: BECOMING HARRY DEXTER WHITE. 1. Who--really--was Harry White? -- 2. The education of Harry White -- 3. A brief academic career -- PART II: BECOMING A KEYNESIAN INTERNATIONALIST. 4. What next? Dr. White goes to Washington -- 5. Settling into Morgenthau's...
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10013448984
Saved in:
Cover Image
Industrial Espionage and Productivity
Glitz, Albrecht; Meyersson, Erik - 2017
In this paper, we investigate the economic returns to industrial espionage by linking information from East Germany’s foreign intelligence service to sector-specific gaps in total factor productivity (TFP) between West and East Germany. Based on a dataset that comprises the entire flow of...
Persistent link: https://ebtypo.dmz1.zbw/10011698692
Saved in:
Cover Image
Industrial Espionage and Productivity
Glitz, Albrecht; Meyersson, Erik - 2017
In this paper, we investigate the economic returns to industrial espionage by linking information from East Germany's foreign intelligence service to sector-specific gaps in total factor productivity (TFP) between West and East Germany. Based on a dataset that comprises the entire flow of...
Persistent link: https://ebtypo.dmz1.zbw/10011744528
Saved in:
Cover Image
Auctions and leaks: A theoretical and experimental investigation
Fischer, Sven; Güth, Werner; Kaplan, Todd R.; Zultan, Ro'i - 2017
In first- and second-price private value auctions with sequential bidding, second movers may discover the first movers' bid. Equilibrium behavior in the first-price auction is mostly unaffected but there are multiple equilibria in the second- price auction. Consequently, comparative statics...
Persistent link: https://ebtypo.dmz1.zbw/10011788770
Saved in:
Cover Image
Industrial espionage and productivity
Glitz, Albrecht; Meyersson, Erik - 2017
In this paper, we investigate the economic returns to industrial espionage by linking information from East Germany's foreign intelligence service to sector-specific gaps in total factor productivity (TFP) between West and East Germany. Based on a dataset that comprises the entire flow of...
Persistent link: https://ebtypo.dmz1.zbw/10011665623
Saved in:
Cover Image
Industrial espionage and productivity
Glitz, Albrecht; Meyersson, Erik - 2017 - This version: November 2017
Persistent link: https://ebtypo.dmz1.zbw/10011777982
Saved in:
Cover Image
Industrial espionage and productivity
Glitz, Albrecht; Meyersson, Erik - 2017
Persistent link: https://ebtypo.dmz1.zbw/10011801340
Saved in:
Cover Image
Industrial espionage and productivity
Glitz, Albrecht; Meyersson, Erik - 2017
In this paper, we investigate the economic returns to industrial espionage by linking information from East Germany's foreign intelligence service to sector-specific gaps in total factor productivity (TFP) between West and East Germany. Based on a dataset that comprises the entire flow of...
Persistent link: https://ebtypo.dmz1.zbw/10011670848
Saved in:
Cover Image
Auctions and leaks : a theoretical and experimental investigation
Fischer, Sven; Güth, Werner; Kaplan, Todd R.; Zultan, Ro'i - 2017 - Revised Version of JERP 2014-027
In first- and second-price private value auctions with sequential bidding, second movers may discover the first movers’ bid. Equilibrium behavior in the first-price auction is mostly unaffected but there are multiple equilibria in the second- price auction. Consequently, comparative statics...
Persistent link: https://ebtypo.dmz1.zbw/10011738563
Saved in:
Cover Image
Huawei's quest for global markets
Muralidhara, G. V.; Faheem, Hadiya - In: China-focused cases : selected winners of the CEIBS …, (pp. 65-80). 2019
Persistent link: https://ebtypo.dmz1.zbw/10012004031
Saved in:
Cover Image
Auctions and leaks: A theoretical and experimental investigation
Fischer, Sven; Güth, Werner; Kaplan, Todd R.; Zultan, Ro'i - 2014
We study first- and second-price private value auctions with sequential bidding where second movers may discover the first movers bids. There is a unique equilibrium in the first-price auction and multiple equilibria in the second-price auction. Consequently, comparative statics across price...
Persistent link: https://ebtypo.dmz1.zbw/10010500151
Saved in:
Cover Image
Auctions and leaks : a theoretical and experimental investigation
Fischer, Sven Heiko; Güth, Werner; Kaplan, Todd R.; … - 2014 - This version: November 5, 2014
We study first- and second-price private value auctions with sequential bidding where second movers may discover the first movers bids. There is a unique equilibrium in the first-price auction and multiple equilibria in the second-price auction. Consequently, comparative statics across price...
Persistent link: https://ebtypo.dmz1.zbw/10010433909
Saved in:
Cover Image
Auctions and Leaks: A Theoretical and Experimental Investigation
Fischer, Sven; Guth, Werner; Kaplan, Todd; Zultan, Roi - Volkswirtschaftliche Fakultät, … - 2014
We study first- and second-price private value auctions with sequential bidding where second movers may discover the first movers bids. There is a unique equilibrium in the first-price auction and multiple equilibria in the second-price auction. Consequently, comparative statics across price...
Persistent link: https://ebtypo.dmz1.zbw/10011112622
Saved in:
Cover Image
Entry with Two Correlated Signals
Barrachina, Alex; Tauman, Yair; Salvador, Amparo Urbano - Estructura de Recerca Interdisciplinar Comportament … - 2014
We analyze the effect of industrial espionage on limit-pricing models. We consider an incumbent monopolist engaged in R&D trying to reduce his cost of production and deter a potential entrant from entering the market. The R&D project may be successful or not and its outcome is a private...
Persistent link: https://ebtypo.dmz1.zbw/10010960301
Saved in:
Cover Image
Auctions and Leaks: A Theoretical and Experimental Investigation
Fischer, Sven; Güth, Werner; Kaplan, Todd R.; Ro'i Zultan - Wirtschaftswissenschaftliche Fakultät, … - 2014
We study first- and second-price private value auctions with sequential bidding where second movers may discover the first movers bids. There is a unique equilibrium in the first-price auction and multiple equilibria in the second-price auction. Consequently, comparative statics across price...
Persistent link: https://ebtypo.dmz1.zbw/10010961052
Saved in:
Cover Image
Better Security and Encryption Within Cloud Computing Systems
Williams, K.Y.B.; Griffin, Jimmy A.G. - In: International Journal of Public Administration in the … 5 (2018) 2, pp. 1-11
Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are...
Persistent link: https://ebtypo.dmz1.zbw/10012047053
Saved in:
Cover Image
Role of intelligence inputs in defending against cyber warfare and cyberterrorism
Bagchi, Aniruddha; Bandyopadhyay, Tridib - In: Decision analysis : a journal of the Institute for … 15 (2018) 3, pp. 174-193
Persistent link: https://ebtypo.dmz1.zbw/10011920732
Saved in:
Cover Image
Entry and espionage with noisy signals
Barrachina, Alex; Tauman, Yair; Salvador, Amparo Urbano - Estructura de Recerca Interdisciplinar Comportament … - 2013
We analyze industrial espionage in the context of entry deterrence. We consider a monopoly incumbent, who may expand capacity to deter entry, and a potential entrant who owns an inaccurate Intelligence System. The Intelligence System generates a noisy signal on incumbent’s actions and the...
Persistent link: https://ebtypo.dmz1.zbw/10010616810
Saved in:
Cover Image
Seeing from above : the geopolitics of satellite vision and North Korea
Shim, David - 2012
Satellite imagery plays an important role in contemporary geopolitics. Arguably the most well-known example is Colin Powell's (in)famous presentation to the UN Security Council in February 2003, during which he used satellite pictures to legitimate the invasion of Iraq. Satellite photographs...
Persistent link: https://ebtypo.dmz1.zbw/10009573013
Saved in:
Cover Image
Protecting research and technology from espionage
Thorleuchter, Dirk; Van den Poel, Dirk - 2012
Persistent link: https://ebtypo.dmz1.zbw/10009713369
Saved in:
Cover Image
Industrial Espionage with a Noisy Intelligence
Tauman, Yair; Barrachina, Alex - Economics Department, State University of New … - 2012
We analyze industrial espionage in a model of two firms: a monopoly incumbent, M, and a potential entrant, E, who owns a noisy intelligence system (IS) of a certain precision a . The IS generates a signal on M’s action and E decides whether or not to enter based on this signal. We show that if...
Persistent link: https://ebtypo.dmz1.zbw/10011207067
Saved in:
Cover Image
Protecting Research and Technology from Espionage
THORLEUCHTER, D.; POEL, D. VAN DEN - Faculteit Economie en Bedrijfskunde, Universiteit Gent - 2012
In recent years, governmental and industrial espionage becomes an increased problem for governments and corporations. Especially information about current technology development and research activities are interesting targets for espionage. Thus, we introduce a new and automated methodology that...
Persistent link: https://ebtypo.dmz1.zbw/10011083097
Saved in:
Cover Image
Cross-country economic espionage and investment in research and development
Chen, Po-Lu - In: International journal of economics and finance 8 (2016) 4, pp. 146-155
Persistent link: https://ebtypo.dmz1.zbw/10011456803
Saved in:
Cover Image
National security and counterintelligence in the era of cyber espionage
Silva, Eugenie de (ed.) - 2016
"This book highlights technological advancements in intelligence systems and law enforcement in relation to cybercrime and reconnaissance issues, focusing on current and emergent threats to national security, as well as the technological advancements being adopted within the intelligence...
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10011728384
Saved in:
Cover Image
China’s Defense Electronics Industry: Innovation, Adaptation, and Espionage
Mulvenon, James; Luce, Matthew - Institute on Global Conflict and Cooperation, … - 2010
Contrary to popular perceptions of China as either “technology thief†or “technology superpower,†the success of the Chinese defense electronics sector can be attributed to a combination of indigenous innovation, adaptation of foreign technology, and large-scale technology...
Persistent link: https://ebtypo.dmz1.zbw/10011131740
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: Germany
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://ebtypo.dmz1.zbw/10011799442
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: Spain
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://ebtypo.dmz1.zbw/10011799443
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: France
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://ebtypo.dmz1.zbw/10011799444
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: Italy
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://ebtypo.dmz1.zbw/10011799445
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: Poland
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://ebtypo.dmz1.zbw/10011799446
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Security Sector Survey Analysis: United Kingdom
Ecorys - 2015
This Background Report has been produced as part of the study on “Development of statistical data on the European security technological and industrial base” commissioned by the European Commission within the Framework Contract on Security (ENTR/09/050) between the European Commission and a...
Persistent link: https://ebtypo.dmz1.zbw/10011799447
Saved in:
Cover Image
Study on the development of statistical data on the European security technological and industrial base : Final Report
Ecorys - 2015
In light of the challenges and needs, this study was launched with the overall aim to contribute to the development of statistical data that provide a clear picture of the technological and industrial base of the security industry in the EU. At the same time, the study has also served to...
Persistent link: https://ebtypo.dmz1.zbw/10011799450
Saved in:
Cover Image
Entry and espionage with noisy signals
Barrachina, Alex; Tauman, Yair; Urbano Salvador, Amparo - In: Games and economic behavior 83 (2014), pp. 127-146
Persistent link: https://ebtypo.dmz1.zbw/10010473519
Saved in:
Cover Image
Trade and the Internet : policies in the US, the EU and Canada
Aaronson, Susan Ariel; Maxim, Rob - In: Handbook of the international political economy of trade, (pp. 550-602). 2014
Persistent link: https://ebtypo.dmz1.zbw/10011507192
Saved in:
Cover Image
AUCTIONS AND LEAKS: A THEORETICAL AND EXPERIMENTAL INVESTIGATION
Fischer, Sven; Guth, Werner; Kaplan, Todd R.; Ro'i Zultan - Economics Department, Ben Gurion University of the Negev - 2014
Persistent link: https://ebtypo.dmz1.zbw/10011095610
Saved in:
Cover Image
Entry and espionage with noisy signals
Barrachina, Alex; Tauman, Yair; Urbano, Amparo - In: Games and Economic Behavior 83 (2014) C, pp. 127-146
We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The...
Persistent link: https://ebtypo.dmz1.zbw/10011049669
Saved in:
Cover Image
An analysis on the industrial technology leakage cases in South Korea
Chun, Yongtae; Lee, Ju-lak - In: International journal of economic behavior and … 1 (2013) 3, pp. 27-32
Persistent link: https://ebtypo.dmz1.zbw/10010252366
Saved in:
Cover Image
Entre l'Etat et le marché : l'information et l'intelligence économique en France ; les textes qui suivent sont issus du premier colloque organisé le 6 juin 2007 dans le cadre du pr...
Laurent, Sébastien (contributor) - 2010
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10003931764
Saved in:
Cover Image
Masking and revealing secrets : encryption, competitive intelligence and spy games
Brandmeier, Rupert A.; Rupp, Florian - In: Homo oeconomicus 26 (2009) 1, pp. 7-21
Persistent link: https://ebtypo.dmz1.zbw/10003884722
Saved in:
Cover Image
The case against Harry Dexter White : still not proven
Boughton, James M. - 2000
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10001539803
Saved in:
Cover Image
Spy trade : how Israel's lobby undermines America's economy
Smith, Grant F. - 2008
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10003876234
Saved in:
Cover Image
Extracting the information : espionage with double crossing
Ho, Shirley J. - In: Journal of economics 93 (2008) 1, pp. 31-58
Persistent link: https://ebtypo.dmz1.zbw/10003649598
Saved in:
Cover Image
Extracting the information: espionage with double crossing
Ho, S. - In: Journal of Economics 93 (2008) 1, pp. 31-58
Persistent link: https://ebtypo.dmz1.zbw/10005715567
Saved in:
Cover Image
An economic analysis of military intelligence
Ho, Shirley J. - In: Defence and peace economics 18 (2007) 6, pp. 485-493
Persistent link: https://ebtypo.dmz1.zbw/10003622787
Saved in:
Cover Image
Games with Espionage
Solan, Eilon; Yariv, Leeat - 1998
"There is no place where espionage is not possible." -Sun Tzu, The Art of War, approximately 500BC We consider extensive form games in which players decide on their strategies before the start of play and can purchase noisy information about their opponents' decisions concerning future response...
Persistent link: https://ebtypo.dmz1.zbw/10012236069
Saved in:
Cover Image
Games with Espionage
Solan, Eilon; Yariv, Leeat - Center for Mathematical Studies in Economics and … - 1998
"There is no place where espionage is not possible." -Sun Tzu, The Art of War, approximately 500BC We consider extensive form games in which players decide on their strategies before the start of play and can purchase noisy information about their opponents' decisions concerning future response...
Persistent link: https://ebtypo.dmz1.zbw/10005588392
Saved in:
  • 1
  • 2
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...