How to Organize Crime1
From MaRDI portal
Publication:3528170
DOI10.1111/J.1467-937X.2008.00508.XzbMATH Open1144.91306OpenAlexW2912708526MaRDI QIDQ3528170FDOQ3528170
Authors: Mariagiovanna Baccara, Heski Bar-Isaac
Publication date: 8 October 2008
Published in: Review of Economic Studies (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1111/j.1467-937x.2008.00508.x
Recommendations
Cited In (13)
- Partners in crime? Corruption as a criminal network
- A game of hide and seek in networks
- Individual security, contagion, and network design
- Network design and defence
- Targeting the key player: an incentive-based approach
- Hidden collusion by decentralization: firm organization and antitrust policy
- Network security and contagion
- How Do You Defend a Network?
- Self-managing terror: resolving agency problems with diverse teams
- Optimizing network topology for cascade resilience
- Who will watch the watchers? On optimal monitoring networks
- Optimal design and defense of networks under link attacks
- Accomplice witnesses and organized crime: theory and evidence from Italy
This page was built for publication: How to Organize Crime1
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3528170)