Reinoud Joosten

ORCID: 0000-0002-1900-7355
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Game Theory and Applications
  • Economic theories and models
  • Evolutionary Game Theory and Cooperation
  • Decision-Making and Behavioral Economics
  • Experimental Behavioral Economics Studies
  • Network Security and Intrusion Detection
  • Game Theory and Voting Systems
  • Information and Cyber Security
  • Digital Platforms and Economics
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Evolution and Genetic Dynamics
  • Consumer Market Behavior and Pricing
  • Auction Theory and Applications
  • Bayesian Modeling and Causal Inference
  • Economic and Environmental Valuation
  • Economic Theory and Policy
  • Merger and Competition Analysis
  • Monetary Policy and Economic Impact
  • Internet Traffic Analysis and Secure E-voting
  • Ecosystem dynamics and resilience
  • Economic Theory and Institutions
  • Law, Economics, and Judicial Systems
  • Cybercrime and Law Enforcement Studies
  • Knowledge Management and Technology
  • Global Financial Crisis and Policies

University of Twente
2014-2025

Max Planck Society
2005-2009

Maastricht University
1995-1998

United Nations University – Maastricht Economic and Social Research Institute on Innovation and Technology
1996

Purpose The purpose of this paper is to assess whether or not electroencephalography (EEG) provides a valuable and substantial contribution the prediction consumer behaviour their preferences during product consumption. In study, authors especially focus on individual wine tasting experience. Design/methodology/approach A neuroscience experiment was carried out with 26 participants that evaluated different red wines while brain activity recorded EEG. within-subjects design employed in two...

10.1108/apjml-04-2019-0240 article EN Asia Pacific Journal of Marketing and Logistics 2019-10-02

Distributed Denial of Service (DDoS) attacks provide an easy option for these criminals to disrupt the business online platforms. We analyse economic impact DDoS on a crypto-currency exchange using event analysis. Our contributions are fourfold: Firstly, we develop estimation model utilising ideas from behavioural finance predict volume traded basis changes in price. Secondly, perform analysis evaluate whether there is attack 17 different cases. Thirdly, find that 13 cases negative due...

10.1109/empdp.2019.8671642 article EN 2019-02-01

Reliable availability to the internet and internet-based services is crucial in today’s world. DDoS attacks pose a severe threat of such online resources – especially owing booters virtually everyone can execute them nowadays. In order appropriately protect oneself against attacks, it essential have good insight into threats that exist. This paper proposes novel hybrid model combines postulates from various models on crime opportunity, analyzing targeted victim infrastructure conjunction. We...

10.22667/jowua.2020.06.30.003 article EN Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications 2020-06-30

Abstract We model advertising with effects on different time scales for a duopoly in imperfect substitutes using elements from Contest Theory. Firms additionally compete short-run strategic variable, here price or quantity, allowing simultaneous sequential decisions, collusion endogenously changing stage games. Strategic variables range ‘slow’ (advertising), over ‘moderate’ (quantities) to ‘fast’ (prices). find feasible rewards and equilibria the limiting average reward criterion. Uniqueness...

10.1007/s10479-024-06462-y article EN cc-by Annals of Operations Research 2025-01-13

10.1007/s00191-006-0037-1 article EN Journal of Evolutionary Economics 2006-09-15

We analyze effects of rarity value on the sustainability a natural resource. Rarity means that under extreme scarcity resource unit profits increase 'explosively.' focus equilibrium behavior very patient agents in Small Fish War. Agents interacting body water have two options: they can fish with restraint or without. Fishing allows stock to recover; fishing without yields higher immediate but lower future catches. distinguish weak and strong value; for (weak) variant, total symmetric...

10.1007/s13235-015-0136-4 article EN cc-by Dynamic Games and Applications 2015-01-23

10.1007/bf01193636 article EN Journal of Evolutionary Economics 1996-09-01

DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools available to launch an attack significant intensity. These lead a variety losses at the victim's end. We analyse impact Distributed Denial-of-Service (DDoS) announcements over period 5 years on stock prices victim firms. propose method event studies that does not assume cumulative abnormal returns be normally distributed, instead we use empirical distribution testing In most...

10.1109/pdp.2017.82 preprint EN 2017-01-01

10.1007/s001820300143 article EN International Journal of Game Theory 2003-09-01

We introduce the ray-projection dynamics in evolutionary game theory by employing a ray projection of relative fitness (vector) function, i.e., unto unit simplex along through origin. Ray-projection are weakly compatible terminology Friedman (Econometrica 59:637–666, 1991), each their interior fixed points is an equilibrium and one its points. Furthermore, every evolutionarily stable strategy asymptotically point, strict state equilibrium. also employ on set functions related to function...

10.1007/s00186-010-0342-1 article EN cc-by-nc Mathematical Methods of Operations Research 2011-01-03

A two-person general-sum repeated game with vanishing actions is an infinitely where the players face following restrictions. Each action must be used by player k ∈ {1,2} at least once in every r ℕ consecutive stages, otherwise vanishes for remaining play. We assume that wish to maximize their limiting average rewards over entire time-horizon. strategy-pair jointly convergent if each pair a number exists which relative frequency this chosen, converges probability one. of feasible called...

10.1142/s0219198905000430 article EN International Game Theory Review 2005-03-01

The attack intensity of distributed denial service (DDoS) attacks is increasing every year. Botnets based on internet things (IOT) devices are now being used to conduct DDoS attacks. estimation direct and indirect economic damages caused by these a complex problem. One the damage can be market value victim firm. In this article we analyze impact 45 different announcements victim's stock prices. We find that previous studies have mixed conclusion price. Hence, in evaluate using three...

10.48550/arxiv.1806.01781 preprint EN other-oa arXiv (Cornell University) 2018-01-01

We model and analyze strategic interaction over time in a duopoly. Each period the firms independently simultaneously take two sequential decisions. First, they decide whether or not to advertise, then set prices for goods which are imperfect substitutes. Not only own, but also other firm's past advertisement efforts affect current "sales potential" of each firm. How much this potential materializes as immediate sales, depends on If both turns into demand, otherwise part it "evaporates" does...

10.1142/s0219198915400149 article EN International Game Theory Review 2014-12-09

10.1016/s0304-4068(97)00002-5 article EN Journal of Mathematical Economics 1998-01-01
Coming Soon ...