


default search action
Decision Analysis, Volume 17
Volume 17, Number 1, March 2020
- Vicki M. Bier, Simon French

:
From the Editors: Decision Analysis Focus and Trends. 1-8
- Eva D. Regnier

:
What Is Six Hours Worth? The Impact of Lead Time on Tropical-Storm Preparation Decisions. 9-23 - Jeffery L. Guyse

, L. Robin Keller
, Candice H. Huynh
:
Valuing Sequences of Lives Lost or Saved Over Time: Preference for Uniform Sequences. 24-38 - Jared A. Beekman

, Ronald F. A. Woodaman, Dennis M. Buede
:
A Review of Probabilistic Opinion Pooling Algorithms with Application to Insider Threat Detection. 39-55 - Xing Gao

:
Open Source or Closed Source? A Competitive Analysis with Software Security. 56-73 - M. Hosein Zare, Oleg A. Prokopyev

, Denis Sauré
:
On Bilevel Optimization with Inexact Follower. 74-95
Volume 17, Number 2, June 2020
- Johannes Ulrich Siebert

, Detlof von Winterfeldt
:
Comparative Analysis of Terrorists' Objectives Hierarchies. 97-114 - Zachary J. Smith, J. Eric Bickel

:
Additive Scoring Rules for Discrete Sample Spaces. 115-133 - Hans Olav Vogt Myklebust

, Jo Eidsvik
, Iver Bakken Sperstad
, Debarun Bhattacharjya
:
Value of Information Analysis for Complex Simulator Models: Application to Wind Farm Maintenance. 134-153 - Janne Gustafsson

:
Valuation of Research and Development Projects Using Buying and Selling Prices: Generalized Definitions. 154-168 - Chunling Luo

, Chin Hon Tan:
Almost Stochastic Dominance for Most Risk-Averse Decision Makers. 169-184 - Elisa F. Long

, Gilberto Montibeller
, Jun Zhuang
:
Call for Papers on Emerging Topics in Health Decision Analysis. 185
Volume 17, Number 3, September 2020
- Vicki M. Bier:

From the Editor: Advances in Multi-Agent Decision Making. 187-188
- Jay R. Simon

, Donald G. Saari, L. Robin Keller
:
Interdependent Altruistic Preference Models. 189-207 - Puneet Agarwal, Kyle Hunt

, Shivasubramanian Srinivasan, Jun Zhuang
:
Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners. 208-226 - Nicola Dimitri

:
Skills, Efficiency, and Timing in a Simple Attack and Defense Model. 227-234 - Yong Wu

, Junlin Duan
, Tao Dai, Dong Cheng:
Managing Security Outsourcing in the Presence of Strategic Hackers. 235-259 - Hsi Tse Wang

:
Discussion of the Competitive Strategies of Telecom Operators and Over-the-Top Service Providers from the Perspective of Evolutionary Game Theory. 260-275
Volume 17, Number 4, December 2020
- Theodore T. Allen

, Olivia K. Hernandez, Abdullah Alomair
:
Optimal Off-line Experimentation for Games. 277-298 - Onesun Steve Yoo

, Kevin F. McCardle:
The Valuator's Curse: Decision Analysis of Overvaluation and Disappointment in Acquisition. 299-313 - Johan Burgaard, Mogens Steffensen

:
Eliciting Risk Preferences and Elasticity of Substitution. 314-329 - Tim Höfer

, Rüdiger von Nitzsch
, Reinhard Madlener
:
Using Value-Focused Thinking and Multicriteria Decision Making to Evaluate Energy Transition Alternatives. 330-355 - Aitor Couce Vieira

, David Ríos Insua
, Alex Kosgodagan
:
Assessing and Forecasting Cybersecurity Impacts. 356-374

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














