• A strategic analysis of information sharing among cyber hackers 

      Hausken, Kjell (Journal article; Peer reviewed, 2015-08)
      We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants ...
    • Active vs. passive defense against a strategic attacker 

      Hausken, Kjell; Levitin, Gregory (Journal article; Peer reviewed, 2011)
      The article analyzes how a defender determines a balance between protecting an object (passive defense) and striking preventively against an attacker seeking to destroy the object (active defense). The attacker analogously ...
    • Additive Multi-Effort Contests 

      Hausken, Kjell (Peer reviewed; Journal article, 2020-03)
      Impact on rent seeking occurs even when a player exerts only one effort. This contrasts with models of multiplicative efforts with impact on rent seeking only when a player exerts all its available efforts. An analytical ...
    • Choosing what to protect when attacker resources and asset valuations are uncertain 

      Hausken, Kjell (Journal article; Peer reviewed, 2014-07)
      The situation has been modelled where the attacker’s resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker’s resource capabilities. An attacker targets ...
    • Cooperation and between-group competition 

      Hausken, Kjell (Journal article; Peer reviewed, 2000-07)
      Introducing competition between groups may induce cooperation to emerge in defection games despite considerable cost of cooperation. If the groups can confine themselves to a cooperative sector, either by providing incentives ...
    • Defending against a stockpiling terrorist 

      Hausken, Kjell; Zhuang, Jun (Journal article; Peer reviewed, 2011)
      A government defends against a terrorist who attacks repeatedly and stockpiles its resources over time. The government defends an asset and attacks the terrorist’s resources. The terrorist defends its resources and attacks ...
    • Defense Strategies for Asymmetric Networked Systems with Discrete Components 

      Rao, Nageswara S. V.; Ma, Chris Y.T.; Hausken, Kjell; He, Fei; Yau, David K.Y.; Zhuang, Jun (Peer reviewed; Journal article, 2018)
      We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the ...
    • Exchange, raiding, and the shadow of the future 

      Hausken, Kjell (Journal article; Peer reviewed, 2008-04)
      A two-period exchange model is developed where production decisions in the first period determine the amount of resources available in the second period. Each agent allocates resources to defend its production and attack ...
    • Four categories of patient participation in treatment and their linkage to decision-making in a structure of 81 models 

      Hausken, Kjell; Heggland, Liv-Helen (Journal article; Peer reviewed, 2015-01)
      We clarify patient participation by developing a systematic structure of 34=81 models spanned out by three subcategories for each of four categories. Choosing a qualitative descriptive research design, and applying purposive ...
    • Game Theoretic Analysis of Persons, the Pharmaceutical Industry, and Donors in Disease Contraction and Recovery 

      Hausken, Kjell; Ncube, Mthuli (Peer reviewed; Journal article, 2020)
      Disease contraction and recovery depend on complex interaction between persons potentially contracting and recovering from the disease, the pharmaceutical industry potentially developing drugs, and donors potentially ...
    • Game theoretic analysis of two-period-dependent degraded multistate reliability systems 

      Hausken, Kjell (Journal article; Peer reviewed, 2011)
      A system of two components is analyzed as a two-period game. After period 1 the system can be fully operational, in two states of intermediate degradation, or fail. Analogously to changing failure rates in dependent systems ...
    • Government Protection against Terrorists Funded by Benefactors and Crime: An Economic Model 

      Hausken, Kjell (Journal article; Peer reviewed, 2017)
      We model a game involving a terrorist, the terrorist’s benefactor, and a government protecting against terrorism. The terrorist generates terrorism effort using its own resources, funding from a benefactor, and crime. Crime ...
    • Governments' and terrorists' defense and attack in a T-period game 

      Hausken, Kjell; Zhuang, Jun (Journal article; Peer reviewed, 2011-01)
      We analyze how a government allocates its resources between attacking to downgrade a terrorist’s resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a ...
    • Income, interdependence, and substitution effects affecting incentives for security investment 

      Hausken, Kjell (Journal article; Peer reviewed, 2006)
      Firms in cyber war compete with external intruders such as hackers over their assets. Each firm invests in security technology when the required rate of return from security investment exceeds the average attack level, or ...
    • Information sharing among firms and cyber attacks 

      Hausken, Kjell (Journal article; Peer reviewed, 2007)
      As the Sarbanes-Oxley Act strengthens internal controls, and the government encourages information sharing, accounting gains significance through secure representation, storage, and transfer of information, and by laying ...
    • Insurgent attacks, government protection, and international intervention 

      Hausken, Kjell; Ncube, Mthuli (Peer reviewed; Journal article, 2019-12)
      A government failing to protect against insurgents may or may not be rescued by the international community. Classifying events during 1961-2012, we find that among the successful interventions, war occurs more often than ...
    • Jack Hirshleifer: a Nobel prize left unbestowed 

      Hausken, Kjell (Journal article; Peer reviewed, 2006)
      Jack Hirshleifer (1925–2005) contributed to investment theory, information economics, conflict, and bioeconomics, clarified the foundations of investment and capital theory in the spirit of Fisher, and made basic contributions ...
    • Migration and intergroup conflict 

      Hausken, Kjell (Journal article; Peer reviewed, 2000-12)
      Two groups in conflict produce and appropriate internally generated consumable output in a two-stage game assuming equal within-group sharing and endogenous group sizes. It is shown how agents leave groups with high ...
    • En nytteforventningsanalyse av kriminalitet og straff 

      Hausken, Kjell (Journal article; Peer reviewed, 2007)
      Kriminell atferd bør analyseres ut fra motiv om forventet fordel veid opp mot forventet kostnad i form av straff. I Norge har kriminaliteten økt med en faktor 9 fra 1956-2002 mens fengsling har økt med faktor 1,3. ...
    • On the impossibility of deterrence in sequential Colonel Blotto games 

      Hausken, Kjell (Journal article; Peer reviewed, 2012-06)
      A sequential Colonel Blotto and rent seeking game with fixed and variable resources is analyzed. With fixed resources, which is the assumption in Colonel Blotto games, we show for the common ratio form contest success ...