• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
ФКН
Contacts

109028, Moscow, Pokrovsky Boulevard 11, T423
Phone: +7 (495) 621 13 42,
+ 7(495) 772 95 90 *27200; *27212.
Email: dhm-econ@hse.ru; shatskaya@hse.ru

Administration
School Head Fuad T. Aleskerov
Manager Oksana Kolotvina
Svetlana Shatskaya
Senior Administrator Svetlana Shatskaya
Events
Feb 1 – Mar 15
online 
Article
An Approach to Estimating the Economic Expediency of Developing a New Cargo Transport Hub by a Regional Public Administration

Belenky A., Fedin G., Kornhauser A.

International Journal of Public Administration. 2021. Vol. 44. No. 13. P. 1076-1089.

Book chapter
A note on subspaces of fixed grades in Clifford algebras

Shirokov D.

In bk.: AIP Conference Proceedings. Vol. 2328: ICMM-2020. AIP Publishing LLC, 2021. Ch. 060001. P. 060001-1-060001-4.

Working paper
On compact 4th order finite-difference schemes for the wave equation

Zlotnik A., Kireeva O.

math. arXiv. Cornell University, 2020. No. arXiv:2011.14104v2[math.NA].

HSE Seminar on Political Economy: Ethan Bueno de Mesquita (University of Chicago) about cyberwarfare models

Ethan Bueno de Mesquita studied deterrence in a world where attacks cannot be perfectly attributed to attackers. In his model, each of n attackers may attack the defender. The defender observes an imperfect signal that probabilistically attributes the attack. The defender may retaliate against one or more attackers, and wants to retaliate against the guilty attacker only. He uncover an endogenous strategic complementarity among the attackers: if one attacker becomes more aggressive, that attacker becomes more “suspect” and the other attackers become less suspect, which leads the other attackers to become more aggressive as well. 

Topic: "Deterrence with Imperfect Attribution " 

joint work with Sandeep Baliga (Northwestern University) and Alexander Wolitzky (MIT)

Abstract: Motivated by recent developments in cyberwarfare, we study deterrence in a world where attacks cannot be perfectly attributed to attackers. In the model, each of n attackers may attack the defender. The defender observes an imperfect signal that probabilistically attributes the attack. The defender may retaliate against one or more attackers, and wants to retaliate against the guilty attacker only. We uncover an endogenous strategic complementarity among the attackers: if one attacker becomes more aggressive, that attacker becomes more “suspect” and the other attackers become less suspect, which leads the other attackers to become more aggressive as well. Improving the defender’s ability to detect attacks or identify the source of attacks can hinder deterrence and lead to more attacks, but simultaneously improving both detection and identification—in that some attacks which previously went undetected are now both detected and unambiguously attributed—always reduces attacks. Deterrence is improved if the defender can commit to a retaliatory strategy in advance, but the defender should not always commit to retaliate more after every signal.

http://home.uchicago.edu/~bdm/PDF/deterrence.pdf

the joint seminar of Higher School of Economics on political economy, International Center for the Study of Institutions and Development (ICSID) and NES Center for the Study of Diversity and Social Interaction (NES CSDSI) was held on June 05

Moderators: Alexei Zakharov (HSE), Konstantin Sonin (HSE, The University of Chicago Harris School of Public Policy)