Journal Article |
File Downloads |
Abstract Views |
Last month |
3 months |
12 months |
Total |
Last month |
3 months |
12 months |
Total |
"Service user involvement in practice": The evaluation of an intervention program for service providers and inpatients in Norwegian Community Mental Health Centers |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
11 |
A Bitcoin price prediction model assuming oscillatory growth and lengthening cycles |
0 |
0 |
1 |
2 |
0 |
0 |
1 |
4 |
A Game Theoretic Analysis of Competition Between Vaccine and Drug Companies during Disease Contraction and Recovery |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
2 |
A Game Theoretic Model of Adversaries and Media Manipulation |
0 |
0 |
0 |
1 |
0 |
2 |
4 |
27 |
A Generalized Interest Rates Model with Scaling |
0 |
0 |
0 |
5 |
0 |
0 |
3 |
15 |
A MATHEMATICAL MODEL FOR TRAINING IMPULSE AND LACTATE INFLUX AND OUTFLUX DURING EXERCISE |
0 |
0 |
0 |
2 |
0 |
0 |
0 |
15 |
A Qualitative Identification of Categories of Patient Participation in Decision-Making by Health Care Professionals and Patients During Surgical Treatment |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
4 |
A Review of Attacker–Defender Games and Cyber Security |
0 |
1 |
1 |
1 |
0 |
5 |
5 |
5 |
A Review of Axioms for Group Contest Success Functions |
0 |
0 |
1 |
2 |
0 |
0 |
3 |
6 |
A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling |
0 |
0 |
0 |
3 |
0 |
0 |
0 |
13 |
A closure approximation technique for epidemic models |
0 |
0 |
0 |
2 |
0 |
0 |
0 |
8 |
A cost–benefit analysis of terrorist attacks |
1 |
2 |
4 |
25 |
1 |
4 |
14 |
89 |
A dynamic model of Nordic diagonal stride skiing, with a literature review of cross country skiing |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
6 |
A first experimental test of multilevel game theory: the PD case |
0 |
0 |
0 |
6 |
0 |
0 |
0 |
29 |
A game between central banks and households involving central bank digital currencies, other digital currencies and negative interest rates |
0 |
0 |
0 |
2 |
2 |
2 |
3 |
7 |
A game theoretic model of economic crises |
0 |
0 |
0 |
1 |
0 |
1 |
1 |
47 |
ACTIVE VS. PASSIVE DEFENSE AGAINST A STRATEGIC ATTACKER |
1 |
1 |
4 |
17 |
1 |
2 |
14 |
90 |
Acquisition and collaboration as determinants of organisational structure |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
6 |
Additive multi-effort contests |
0 |
0 |
0 |
3 |
0 |
0 |
0 |
23 |
Additive multi-effort contests with multiple investment opportunities |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
5 |
Agent takeover risk of principal in outsourcing relationships |
0 |
0 |
0 |
14 |
0 |
1 |
1 |
91 |
Al Qaeda at the bar: coordinating ideologues and mercenaries in terrorist organizations |
0 |
0 |
0 |
9 |
0 |
0 |
1 |
75 |
An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units |
0 |
0 |
1 |
13 |
0 |
1 |
4 |
352 |
An equilibrium model of advertising, production and exchange |
0 |
0 |
0 |
9 |
0 |
1 |
1 |
50 |
Approximations and empirics for stochastic war equations |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
8 |
Assessing the 2010–2018 financial crisis in Greece, Portugal, Ireland, Spain, and Cyprus |
0 |
0 |
0 |
2 |
0 |
0 |
1 |
6 |
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits |
0 |
0 |
0 |
2 |
1 |
1 |
1 |
6 |
Axiomatizing additive multi-effort contests |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
4 |
Bilateral contracts with transaction costs |
0 |
0 |
0 |
3 |
0 |
0 |
0 |
40 |
Book Review |
0 |
0 |
0 |
5 |
0 |
0 |
0 |
38 |
COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
11 |
Choosing what to protect when attacker resources and asset valuations are uncertain |
0 |
0 |
0 |
6 |
0 |
0 |
2 |
64 |
Collective rent seeking and division of labor1 |
0 |
0 |
0 |
9 |
0 |
0 |
0 |
59 |
Comparing Growth Models with Other Investment Methods |
0 |
2 |
5 |
7 |
0 |
3 |
12 |
21 |
Competition between Variable–Supply and Fixed–Supply Currencies |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
5 |
Containing Contagious Financial Crises: The Political Economy of Joint Intervention into the Asian Crisis |
0 |
0 |
0 |
53 |
0 |
0 |
0 |
184 |
Conventionalists, Pioneers and Criminals Choosing Between a National Currency and a Global Currency |
0 |
0 |
0 |
3 |
0 |
0 |
1 |
12 |
Cooperation and between-group competition |
0 |
0 |
0 |
53 |
0 |
0 |
1 |
183 |
Cross-country skiing motion equations, locomotive forces and mass scaling laws |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
5 |
Data survivability vs. security in information systems |
0 |
0 |
0 |
2 |
0 |
0 |
0 |
22 |
Debt crises between a country and an international lender as a two-period game |
0 |
0 |
0 |
0 |
0 |
0 |
2 |
2 |
Decisions of persons, the pharmaceutical industry, and donors in disease contraction and recovery assuming virus mutation |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
4 |
Defence and attack of complex interdependent systems |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
14 |
Defence and attack of systems with variable attacker system structure detection probability |
0 |
1 |
1 |
1 |
0 |
1 |
3 |
19 |
Defence of homogeneous parallel multi-state systems subject to two sequential attacks |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
6 |
Defence resource distribution between protection and decoys for constant resource stockpiling pace |
0 |
0 |
0 |
4 |
0 |
0 |
0 |
18 |
Defending Against a Stockpiling Terrorist |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
14 |
Defending against multiple different attackers |
0 |
0 |
0 |
17 |
0 |
0 |
2 |
64 |
Defending and attacking a network of two arcs subject to traffic congestion |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
24 |
Defending majority voting systems against a strategic attacker |
0 |
0 |
0 |
2 |
0 |
0 |
3 |
15 |
Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
13 |
Defense and attack for interdependent systems |
0 |
0 |
1 |
4 |
0 |
1 |
4 |
60 |
Defense and attack of complex and dependent systems |
0 |
0 |
0 |
4 |
0 |
0 |
1 |
19 |
Determinants of Election Outcomes: New Evidence from Africa |
0 |
0 |
0 |
5 |
0 |
0 |
1 |
47 |
Determining the ideological orientation of terrorist organisations: the effects of government repression and organised crime |
0 |
0 |
0 |
12 |
0 |
1 |
4 |
75 |
Do national development factors affect cryptocurrency adoption? |
0 |
1 |
3 |
9 |
0 |
1 |
5 |
32 |
EVIDENCE ON THE IMPACT OF THE TROUBLED ASSETS RELIEF PROGRAM ON STOCK RETURNS |
1 |
1 |
1 |
28 |
1 |
1 |
5 |
109 |
EVIDENCE ON THE TROUBLED ASSETS RELIEF PROGRAM, BAILOUT SIZE, RETURNS AND TAIL RISK |
0 |
0 |
0 |
8 |
0 |
0 |
3 |
26 |
EXCHANGE, RAIDING, AND THE SHADOW OF THE FUTURE |
0 |
0 |
0 |
6 |
0 |
0 |
0 |
49 |
Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
7 |
Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures |
0 |
0 |
0 |
2 |
0 |
0 |
1 |
24 |
Ethics and efficiency in organizations |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
Evaluating Performance Training and Step Aerobics in Intervals |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
7 |
Exchange of goods while investing into production and safety |
0 |
0 |
0 |
5 |
0 |
0 |
0 |
39 |
Exhaustive Classification and Review of Techniques and Research Program for Techniques for Skate Skiing, Classical Skiing, and Ski Mountaineering |
0 |
0 |
0 |
4 |
0 |
0 |
0 |
34 |
FORMALIZATION OF MULTI-LEVEL GAMES |
0 |
0 |
0 |
9 |
0 |
1 |
5 |
66 |
False targets efficiency in defense strategy |
0 |
0 |
1 |
47 |
0 |
1 |
2 |
160 |
False targets vs. redundancy in homogeneous parallel systems |
0 |
0 |
1 |
2 |
0 |
0 |
2 |
23 |
Fifty Years of Operations Research in Defense |
0 |
0 |
2 |
2 |
1 |
3 |
13 |
13 |
Fixed price contract versus incentive-based contract in the oil and gas industry |
0 |
0 |
1 |
35 |
0 |
0 |
1 |
116 |
Formalizing the Precautionary Principle Accounting for Strategic Interaction, Natural Factors, and Technological Factors |
0 |
0 |
0 |
13 |
0 |
0 |
1 |
29 |
GAME THEORETIC ANALYSIS OF TWO-PERIOD-DEPENDENT DEGRADED MULTISTATE RELIABILITY SYSTEMS |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
14 |
Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention |
0 |
0 |
0 |
2 |
0 |
0 |
0 |
8 |
Game Theoretic Modeling of Economic Systems and the European Debt Crisis |
0 |
0 |
1 |
10 |
1 |
2 |
4 |
59 |
Game theoretic analysis of ideologically biased clickbait or fake news and real news |
0 |
0 |
0 |
8 |
0 |
1 |
4 |
41 |
Game theoretic analysis of persons, the pharmaceutical industry, and donors in disease contraction and recovery |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
11 |
Game-theoretic and Behavioral Negotiation Theory |
0 |
0 |
1 |
15 |
1 |
1 |
3 |
52 |
Generalizing the Black and Scholes Equation Assuming Differentiable Noise |
0 |
0 |
0 |
0 |
0 |
1 |
2 |
2 |
Gordon Tullock: A Nobel Prize left unbestowed |
0 |
0 |
0 |
3 |
0 |
0 |
0 |
44 |
Government Spending and Taxation in Democracies and Autocracies |
0 |
0 |
0 |
151 |
1 |
1 |
3 |
471 |
Government intervention to combat the dynamics of terrorist organizations |
0 |
0 |
0 |
0 |
0 |
1 |
2 |
5 |
Government protection against terrorism and crime |
0 |
0 |
0 |
1 |
0 |
1 |
2 |
13 |
Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency |
0 |
0 |
0 |
9 |
0 |
0 |
0 |
29 |
Governmental combat of migration between competing terrorist organisations |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
18 |
Governmental combat of the dynamics of multiple competing terrorist organizations |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
16 |
Governments Playing Games and Combating the Dynamics of a Terrorist Organization |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
20 |
Governments' and Terrorists' Defense and Attack in a T -Period Game |
0 |
0 |
0 |
8 |
0 |
0 |
0 |
46 |
Hard money and fiat money in an inflationary world |
0 |
0 |
0 |
0 |
0 |
0 |
3 |
4 |
Hegemonic Decline and International Leadership |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
6 |
How Elections are Impacted by Production, Economic Growth and Conflict |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
21 |
How companies and governments react to disasters |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
16 |
Income, interdependence, and substitution effects affecting incentives for security investment |
0 |
0 |
1 |
32 |
0 |
0 |
2 |
114 |
Incumbent policy, benefits provision, and the triggering and spread of revolutionary uprisings |
0 |
0 |
0 |
53 |
1 |
1 |
3 |
266 |
Individual versus overarching protection against strategic attacks |
0 |
0 |
0 |
4 |
0 |
0 |
0 |
37 |
Individual versus overarching protection and attack of assets |
0 |
0 |
0 |
3 |
0 |
0 |
0 |
31 |
Individual vs. overarching protection for minimizing the expected damage caused by an attack |
0 |
0 |
1 |
1 |
0 |
0 |
2 |
8 |
Inequality, Economic Growth and Poverty in the Middle East and North Africa (MENA) |
1 |
2 |
4 |
34 |
2 |
6 |
12 |
178 |
Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
13 |
Information Sharing Among Cyber Hackers in Successive Attacks |
0 |
0 |
1 |
3 |
0 |
0 |
1 |
36 |
Information sharing among firms and cyber attacks |
0 |
0 |
0 |
52 |
0 |
1 |
1 |
145 |
Innovation, Development and National Indices |
0 |
0 |
2 |
15 |
0 |
0 |
6 |
68 |
Inpatient service providers’ perspectives on service user involvement in Norwegian community mental health centres |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
8 |
Insurgent attacks, government protection, and international intervention |
0 |
0 |
0 |
3 |
0 |
0 |
2 |
17 |
Intelligence and Impact Contests in Systems with Fake Targets |
0 |
0 |
0 |
0 |
0 |
1 |
1 |
5 |
Intelligence and impact contests in systems with redundancy, false targets, and partial protection |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
9 |
Interest Rates, the Taylor Rule, the Quantity Equation, and the Phillips Curve |
0 |
2 |
3 |
12 |
1 |
4 |
17 |
44 |
Intra-Level and Inter-Level Interaction |
0 |
0 |
1 |
6 |
0 |
0 |
2 |
62 |
Introducing Randomness into First-Order and Second-Order Deterministic Differential Equations |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
6 |
Is it wise to leave some false targets unprotected? |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
7 |
Is it wise to protect false targets? |
0 |
0 |
0 |
1 |
0 |
2 |
2 |
9 |
Jack Hirshleifer: A Nobel Prize left unbestowed |
0 |
0 |
0 |
120 |
0 |
0 |
2 |
538 |
Janet Tai Landa: Economic success of Chinese merchants in Southeast Asia: identity, ethnic cooperation and conflict: integrating the social sciences with evolutionary biology |
0 |
0 |
0 |
9 |
1 |
2 |
6 |
67 |
Mathematical modelling of acute virus influenza A infections |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
7 |
Measuring patient participation in surgical treatment decision‐making from healthcare professionals' perspective |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
3 |
Meeting a demand vs. enhancing protections in homogeneous parallel systems |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
3 |
Migration and intergroup conflict |
0 |
0 |
1 |
23 |
1 |
1 |
2 |
152 |
Minmax defense strategy for complex multi-state systems |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
18 |
Modeling the evolution of countries and ethnic groups |
0 |
0 |
0 |
0 |
0 |
1 |
1 |
3 |
Modeling which Factors Impact Interest Rates |
0 |
0 |
1 |
2 |
0 |
0 |
4 |
13 |
Models, phases and cases of patient participation in decision‐making in surgical treatment in Norway: A qualitative study |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
4 |
Mutual Raiding of Production and the Emergence of Exchange |
0 |
0 |
0 |
16 |
0 |
0 |
0 |
178 |
N-player costly contracting |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
28 |
New Economics Journals |
0 |
0 |
0 |
2 |
0 |
0 |
3 |
56 |
ON THE IMPOSSIBILITY OF DETERRENCE IN SEQUENTIAL COLONEL BLOTTO GAMES |
0 |
0 |
1 |
1 |
0 |
0 |
1 |
15 |
On the Effectiveness of Security Countermeasures for Critical Infrastructures |
0 |
0 |
0 |
1 |
0 |
0 |
2 |
15 |
On the inappropriateness of collective rent seeking analysis when agents exert within-group and between-group efforts |
0 |
0 |
0 |
8 |
0 |
1 |
2 |
49 |
Optimal defense with variable number of overarching and individual protections |
0 |
0 |
0 |
0 |
0 |
0 |
2 |
18 |
Parallel systems under two sequential attacks |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
11 |
Parallel systems under two sequential attacks with contest intensity variation |
0 |
0 |
0 |
3 |
0 |
0 |
0 |
16 |
Parallel systems under two sequential attacks with imperfect detection of the first attack outcome |
0 |
0 |
0 |
5 |
0 |
0 |
0 |
29 |
Parallel systems with different types of defence resource expenditure under two sequential attacks |
0 |
0 |
0 |
3 |
0 |
0 |
1 |
8 |
Patient Participation in Surgical Treatment Decision Making from the Patients' Perspective: Validation of an Instrument |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
3 |
Patient participation, decision‐makers and information flow in surgical treatment |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
5 |
Policy makers, the international community and people living with HIV/AIDS: the need for new commitment mechanisms |
0 |
0 |
0 |
2 |
0 |
0 |
1 |
11 |
Policy makers, the international community and the population in the prevention and treatment of diseases: case study on HIV/AIDS |
0 |
0 |
0 |
3 |
0 |
0 |
1 |
46 |
Political Economy of Service Delivery: Monitoring Versus Contestation |
0 |
0 |
0 |
4 |
0 |
0 |
0 |
28 |
Preventive strike vs. false targets and protection in defense strategy |
0 |
0 |
0 |
1 |
0 |
1 |
2 |
17 |
Principal–Agent Theory, Game Theory, and the Precautionary Principle |
0 |
1 |
4 |
35 |
2 |
7 |
25 |
209 |
Proactivity and Retroactivity of Firms and Information Sharing of Hackers |
0 |
0 |
1 |
8 |
0 |
0 |
1 |
34 |
Probabilistic Risk Analysis and Game Theory |
0 |
0 |
0 |
2 |
0 |
1 |
1 |
28 |
Production and Conflict Models Versus Rent-Seeking Models |
0 |
1 |
3 |
66 |
0 |
1 |
5 |
378 |
Production versus safety in a risky competitive industry |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
12 |
Production, safety, exchange, and risk |
0 |
0 |
0 |
2 |
0 |
0 |
1 |
14 |
Production, safety, fighting, and risk |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
7 |
Protecting complex infrastructures against multiple strategic attackers |
0 |
0 |
0 |
1 |
0 |
0 |
2 |
11 |
Protection vs. false targets in series systems |
0 |
0 |
0 |
3 |
0 |
0 |
1 |
11 |
Protection vs. redundancy in homogeneous parallel systems |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
30 |
Reputation, incomplete information, and differences in patience in repeated games with multiple equilibria |
0 |
0 |
0 |
14 |
0 |
1 |
3 |
66 |
Resource Distribution in Multiple Attacks Against a Single Target |
0 |
0 |
0 |
2 |
0 |
0 |
0 |
10 |
Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
17 |
Returns to information security investment: Endogenizing the expected loss |
0 |
0 |
0 |
2 |
0 |
1 |
2 |
16 |
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability |
0 |
1 |
2 |
11 |
0 |
2 |
3 |
39 |
Risk limits, conflict, and equilibrium selection in games with multiple equilibria |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
15 |
Risk, price, and reimbursement |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
10 |
Risk, production and conflict when utilities are as if certain |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
20 |
Security Investment, Hacking, and Information Sharing between Firms and between Hackers |
0 |
0 |
0 |
6 |
1 |
1 |
1 |
162 |
Self‐interest and sympathy in economic behaviour |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
Separation in homogeneous systems with independent identical elements |
0 |
0 |
0 |
4 |
0 |
0 |
3 |
55 |
Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal |
0 |
0 |
0 |
2 |
0 |
0 |
1 |
27 |
Service delivery weaknesses within education and healthcare: Applying empirics from Kenya, Uganda, Tanzania, and Senegal |
0 |
0 |
1 |
1 |
0 |
0 |
1 |
19 |
Shield versus sword resource distribution in K-round duels |
0 |
0 |
0 |
3 |
1 |
1 |
1 |
20 |
Special versus general protection and attack of parallel and series components |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
30 |
Special versus general protection and attack of two assets |
0 |
0 |
0 |
2 |
0 |
0 |
3 |
21 |
Stochastic Theories and Deterministic Differential Equations |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
4 |
Stochastic conditional and unconditional warfare |
0 |
0 |
0 |
4 |
0 |
0 |
0 |
62 |
Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder |
0 |
0 |
0 |
2 |
0 |
0 |
0 |
45 |
Strategic choices by the incumbent and challenger during revolution and civil war |
0 |
0 |
0 |
5 |
0 |
0 |
1 |
40 |
Strategic defense and attack for reliability systems |
0 |
0 |
0 |
2 |
4 |
6 |
8 |
46 |
Strategic defense and attack for series and parallel reliability systems |
0 |
0 |
0 |
27 |
0 |
0 |
1 |
125 |
Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1 |
0 |
0 |
0 |
4 |
0 |
0 |
1 |
57 |
Strategic defense and attack of series systems when agents move sequentially |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
11 |
Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria |
0 |
0 |
0 |
18 |
0 |
0 |
1 |
155 |
Systematization of a set of closure techniques |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
3 |
THE DYNAMIC BIOENERGY OF ANIMALS WITH A DIGESTIVE TRACT |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
5 |
THE DYNAMICS OF BILATERAL EXCHANGE AND DIVISION OF LABOR |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
2 |
THE DYNAMICS OF CRIME AND PUNISHMENT |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
8 |
THE DYNAMICS OF MULTILATERAL EXCHANGE |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
3 |
THE STABILITY OF ANARCHY AND BREAKDOWN OF PRODUCTION |
0 |
0 |
0 |
39 |
0 |
0 |
1 |
133 |
Terrorism risks, civil liberties, and privacy concerns |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
13 |
The Links between Business Environment, Economic Growth and Social Equity: A Study of African Countries |
0 |
1 |
2 |
6 |
0 |
1 |
5 |
27 |
The Ranking of Researchers by Publications and Citations: Using RePEc Data |
0 |
0 |
0 |
25 |
0 |
2 |
6 |
222 |
The Shapley value of coalitions to other coalitions |
0 |
0 |
0 |
2 |
0 |
1 |
4 |
11 |
The battle of the sexes when the future is important |
0 |
0 |
0 |
13 |
0 |
0 |
2 |
91 |
The choice of strategic core – impact of financial volume |
0 |
0 |
0 |
12 |
1 |
1 |
1 |
95 |
The dynamics of athletic performance, fitness and fatigue |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
4 |
The dynamics of terrorist organizations |
0 |
0 |
0 |
5 |
0 |
0 |
5 |
38 |
The dynamics of war between benign cells, malignant cells, and killer agents |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
The dynamics of within-group and between-group interaction |
0 |
0 |
0 |
74 |
0 |
0 |
1 |
294 |
The economics of terrorism against two targets |
0 |
0 |
0 |
18 |
0 |
0 |
1 |
55 |
The evolution of fixed-supply and variable-supply currencies |
0 |
0 |
1 |
2 |
0 |
0 |
3 |
7 |
The impact of actor heterogeneity on the provision of international public goods |
0 |
0 |
1 |
1 |
0 |
0 |
2 |
13 |
The impact of disaster on the strategic interaction between company and government |
0 |
0 |
0 |
12 |
0 |
0 |
1 |
58 |
The impact of the future in games with multiple equilibria |
0 |
0 |
0 |
9 |
0 |
0 |
0 |
36 |
The incumbent, challenger, and population during revolution and civil war |
0 |
0 |
0 |
6 |
0 |
0 |
1 |
76 |
The paradox and non-paradox of power for groups |
0 |
0 |
0 |
4 |
0 |
0 |
0 |
15 |
The population dynamics of potato cyst nematodes |
1 |
1 |
2 |
7 |
1 |
1 |
3 |
23 |
The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty |
0 |
0 |
0 |
5 |
0 |
0 |
0 |
13 |
The strategic interaction between a company and the government surrounding disasters |
0 |
0 |
0 |
2 |
0 |
0 |
2 |
40 |
The strategic interaction between a company and the government surrounding disasters |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
25 |
The strategic interaction between the government and international oil companies in the UK: An example of a country with dwindling hydrocarbon reserves |
0 |
0 |
0 |
5 |
0 |
0 |
1 |
33 |
The timing and deterrence of terrorist attacks due to exogenous dynamics |
0 |
0 |
0 |
9 |
0 |
0 |
1 |
48 |
The value of a player in n-person games |
1 |
1 |
1 |
235 |
2 |
2 |
2 |
594 |
Theoretic Model of Adversaries and Media Manipulation: A Two-Period Extension |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
Transaction costs and iceberg costs |
0 |
0 |
0 |
34 |
0 |
0 |
1 |
183 |
Truthful signalling, the heritability paradox, and the Malthusian equi-marginal principle |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
12 |
Two producing and trading agents defending and retaliating against terrorism |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
10 |
Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
1 |
User involvement in in‐patient mental health services: operationalisation, empirical testing, and validation |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
5 |
Whether to attack a terrorist's resource stock today or tomorrow |
0 |
0 |
0 |
26 |
1 |
1 |
2 |
152 |
Whether to attack growing assets and enterprises today or tomorrow |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
11 |
Total Journal Articles |
6 |
19 |
64 |
1,909 |
33 |
96 |
377 |
10,242 |