Vis enkel innførsel

dc.contributor.authorHausken, Kjell
dc.date.accessioned2013-08-28T12:00:46Z
dc.date.available2013-08-28T12:00:46Z
dc.date.issued2010
dc.identifier.citationHausken, K. (2011) Whether to attack growing assets and enterprises today or tomorrow. International Journal of Business Continuity and Risk Management, 1(4), pp. 339-362no_NO
dc.identifier.urihttp://hdl.handle.net/11250/184309
dc.descriptionThe article was originally published as : Hausken, K. (2010) ‘Whether to Attack Growing Assets and Enterprises Today or Tomorrow’, Int. J. Business Continuity and Risk Management, Vol. 1, No. 4, pp. 339-362. Made available here with permission from Inderscience.no_NO
dc.description.abstractAn asset possessed by a defender grows from the first to the second period and is attacked in both periods. With large growth, there is no attack in the first period. Conflict is eliminated. The attacker postpones the attack until the second period. The attacker shows restraint in the first period in order to cash in on the fruits of her restraint in the second period. When the defender's discount parameter is at least 1/8 of the attacker's discount parameter, the defender's first period investment is inverse U formed in growth and eventually decreases to zero since with more growth, he eventually has to defend against a greater attack in the second period. In the second period, both actors' investments increase in growth. The defender's discount parameter does not influence whether an attack occurs in the first period. A first period attack is prevented if the attacker's discount parameter is large, and growth is above a certain value. Also, if the product of growth and the attacker's discount parameter is above one, a first period attack is prevented if the defence inefficiency is large, or the attack inefficiency is low, or the usability of appropriation is large.no_NO
dc.language.isoengno_NO
dc.publisherInderscienceno_NO
dc.subjectdynamic conflict theoryno_NO
dc.subjectdynamicsno_NO
dc.subjectdefenseno_NO
dc.subjectattackno_NO
dc.subjectappropriative usabilityno_NO
dc.subjectcontest success functionno_NO
dc.subjectinvestmentno_NO
dc.titleWhether to attack growing assets and enterprises today or tomorrowno_NO
dc.typeJournal articleno_NO
dc.typePeer reviewedno_NO
dc.subject.nsiVDP::Social science: 200no_NO
dc.source.pagenumber339-362no_NO
dc.source.volume1no_NO
dc.source.journalInternational Journal of Business Continuity and Risk Managementno_NO
dc.source.issue4no_NO
dc.identifier.doi10.1504/IJBCRM.2010.038623


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel