The following pages link to How to Organize Crime<sup>1</sup> (Q3528170):
Displaying 13 items.
- Network security and contagion (Q337833) (← links)
- Optimal design and defense of networks under link attacks (Q502337) (← links)
- Targeting the key player: an incentive-based approach (Q1633660) (← links)
- Hidden collusion by decentralization: firm organization and antitrust policy (Q1651039) (← links)
- Who will watch the watchers? On optimal monitoring networks (Q2173097) (← links)
- Partners in crime? Corruption as a criminal network (Q2212763) (← links)
- A game of hide and seek in networks (Q2220931) (← links)
- Individual security, contagion, and network design (Q2359387) (← links)
- Network design and defence (Q2636766) (← links)
- Self-managing terror: resolving agency problems with diverse teams (Q2667251) (← links)
- Optimizing Network Topology for Cascade Resilience (Q2917208) (← links)
- Accomplice Witnesses and Organized Crime: Theory and Evidence from Italy (Q4683584) (← links)
- How Do You Defend a Network? (Q5022165) (← links)